Browsing by Title

Sort by: Order: Results:

  • Sagar, Dikshant; Gupta, Anubha (Advisor); Goswami, Shubham (Advisor) (IIIT- Delhi, 2021-05)
    Images remain the largest data source in the field of healthcare. But at the same time, they are the most difficult to analyze. More than often, these images are analyzed by human experts such as pathologists and physicians. ...
  • Anand; Verma, Ayush; Gupta, Anubha (Advisor); Goswami, Shubham (Advisor) (IIIT-Delhi, 2021-05)
  • Anand; Verma, Ayush; Gupta, Anubha (Advisor); Goswami, Shubham (Advisor) (IIIT-Delhi, 2021-05)
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Gehlot, Gaurav; Das, Syamantak (Advisor) (IIITD-Delhi, 2019-04-25)
    We consider the classical on-line load balancing problem of temporary tasks under restricted assignments. Each job can be processed only on a subset of machines, different jobs require a different amounts of processing ...
  • Pandita, Ayushman; Kumar, Akshay (Advisor) (IIITD-Delhi, 2019-07-10)
    For this project, I have started a venture ‘My JEE Mentor’ which connects current JEE aspirants with previous JEE Toppers and help seek Personal Mentorship from them. We charge our customers for our services and pay a ...
  • Garg, Shelly; Saurabh, Sneh (Advisor) (IIIT-Delhi, 2022-02)
    Metal–oxide–semiconductor field-effect transistor (MOSFET) has been used for decades in the semiconductor industry. However, with the continuous downscaling of the device dimensions to the nanometer regime, conventional ...
  • Rajore, Tanmay; Gambhir, Keshav; Maity, Mukulika (Advisor); Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-12)
    Live Video conferencing has become an essential part of day-to-day lives, especially during the covid times. Due to the Pandemic, there has been a significant increase in video calling applications for official meetings, ...
  • Malik, Manasi; Bagler, Ganesh (Advisor); Banerjee, Arpan (Advisor) (IIITD-Delhi, 2019-05-31)
    We perceive the world around us through multiple senses. Perception of different senses is linked to different regions in the brain. Integration of the perception of objects through multiple senses enables the brain to ...
  • Gupta, Gautam; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Dhyani, Tushar; Bagler, Ganesh (Advisor); Ray, Arjun (Advisor) (IIIT-Delhi, 2021-08)
    Inflammatory bowel disease (IBD) is a general term for chronic conditions caused by inflammation of the gastrointestinal tract. IBD is classified mainly into two forms namely; Crohn’s disease (CD) and Ulcerative colitis ...
  • Pandey, Harsh; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2023-11-29)
    This research addresses the challenge of network inference in large-scale, sparse datasets. Inspired by the Gini coefficient, we introduce a novel methodology leveraging machine learning, including the GENIE3 algorithm and ...
  • Gulati, Anurag; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2023-11-29)
    Millimeter wave (mmWave) massive multiple input multiple output (mMIMO) systems are at the core of fifth-generation (5G) and beyond-fifth-generation (B5G) technologies due to their ability to support error-free communication ...
  • Kasliwal, Pankhuri; Anand, Saket (Advisor) (IIIT-Delhi, 2019-11-16)
    Convolutional Neural Networks are trained using a gradient descent back propagation technique which trains weights in each layer for the sole goal of minimizing training error. Hence, the resulting weights cannot be ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Jindal, Sarthak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-15)
    The spread of fake news poses a serious problem in today’s world where the masses consume and produce news using online platforms. One main reason why fake news detection is hard is the lack of ground truth database for ...
  • Yadav, Rupanshu; Kumaraguru, Ponnurangam (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    NFT or Non-Fungible Token is a token that certifies a digital asset to be unique. A wide range of assets including, digital art, music, tweets, memes, are being sold as NFTs. NFT-related content has been widely shared on ...
  • Bhatnagar, Akshala; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2021-05)
    Treatment notes from the pediatric ICU can be effectively used to construct a predictive model for the onset of shock with a lead time of 24 hours. If this disease is not diagnosed at an early stage, it can create multiple ...

Search Repository

Browse

My Account