Browsing by Title

Sort by: Order: Results:

  • Singh, Monika; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-11-29)
    Wireless devices, including mobile phones, laptops, autonomous driving, UAT, etc., generate an enormous amount of local data, which could be employed to train machine learning models for decision-making and improve prediction ...
  • Somannagari, Neha Reddy; Sethi, Tavpritesh (Advisor) (2021-05)
    Health care systems all around the world have an ever-growing burden of intensive care on them. Complications such as sepsis, organ failure and shock contribute to a large portion of the deaths. However they can be treated ...
  • Pahuja, Jayan; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
    This project focused on the deployment of a deep learning model for species categorization and retraining on the cloud using the YOLOv5x architecture. The goal was to create a web application that allows users to upload ...
  • Mehrotra, Sparsh; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2023-12)
    We use different optimizers in everyday Machine Learning and Deep Learning applications. The task for any machine learning algorithm is to 𝑚𝑖𝑛 𝑓 (𝑥), where 𝑓 is the objective function and 𝑥 is the input parameter. ...
  • Jha, Shragvi Sidharth; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Autonomous vehicles are becoming prevalent day-by-day, and with the advent of such technology comes its various safety risks and challenges. The primary objective is to improve road safety and mobility for all users. The ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Arora, Disha; Hashmi, Mohammad S. (Advisor) (2016-09-12)
    The growing gap between the processor and embedded memory speed is a major setback in the overall performance of electronic systems. Since the sense amplifier (SA) forms an integral part of the read circuitry in both ...
  • Ruhela, Vivek; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2024-05)
    Blood cancer has emerged as a growing concern over the past decade, necessitating early detection for timely and effective treatment. Traditional methods of diagnosing blood cancers involve a series of pathological tests ...
  • Kochar, Adwit Singh; Bansal, Pabitra; Singh, Rahul; Agrawal, Yashwin; Deb, Sujay (Advisor) (IIIT-Delhi, 2021-12)
    Critical health parameters such as SpO2 and Blood Pressure play a massive role in determining a person’s health condition, and hence their tracking and monitoring are essential. Currently, the problem with health monitoring ...
  • Kumar, Ajay; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2022-07)
    In today’s world, it is no exaggeration that the environment and all its organisms face a threat due to environmental degradation of many kinds, and public transportation may be the answer to all the problems. It will help ...
  • Singhal, Shitij; Kaul, Sanjit Krishnan (Advisor) (2017-04-18)
    An autonomous vehicle is a vehicle which has the capabilities to move from one location to another with the help of inputs from various sensors connected to a computer which are used to plan the path for the vehicle, without ...
  • Marwah, Sahas; Dubey, Suyash Kumar; Grover, Anuj (Advisor) (2023-12)
    Neural networks have emerged as a powerful tool in machine learning and deep learning, showcasing remarkable capabilities in image recognition, natural language processing, and autonomous decision-making tasks. However, ...
  • Singh, Anand; Srivastava, Anand (Advisor); Bohara, Vivek Ashok (Advisor) (IIIT-Delhi, 2023-01)
    Most of the current wireless networks are radio frequency (RF) based, however, these networks are regularly confronted with growing demand for higher data rates. Watching high-definition live stream videos and accessing ...
  • Amit; Naik, Vinayak (Advisor) (2014-07-10)
    The area of sensing has witnessed signi cant development over the past two decades. Body of work on sensors has focused on individual sensors, sensor networks, in-network data processing and distributed query processing. ...
  • Kumar, Daksh; Govil, Aryan; Darak, Sumit (Advisor) (IIIT-Delhi, 2023-12-12)
    In the millimetre wave and sub-6 GHz band, next-generation wireless communication systems are anticipated to offer high-mobility Vehicle to Everything (V2X) communication services. This necessitates precise user tracking ...
  • Reddy, Krishna Neel; Joshi, Kshtiz; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Next generation wireless communication systems are expected to support high-mobility Vehicle to everything (V2X) communication services in sub-6 GHz as well as millimeter wave spectrum. This demands accurate tracking of ...
  • Khandelwal, Rimjhim; Hashmi, Mohammad S. (Advisor) (2017-05)
    Power conditioning circuits form an integral part of a memory chip. Various blocks on a memory chip require uninterrupted power supply that are independent of the load conditions. The program, erase and read operations in ...

Search Repository

Browse

My Account