Browsing by Title

Sort by: Order: Results:

  • Goyal, Tanishk; Agrawal, Shivam; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-12)
    In this BTP Project we undertake an entrepreneurial venture in the web3 space called Atom DAO. Atom DAO is a community of developers who are willing to grow their development skills by working on industry-level tasks. ...
  • Saini, Aditya; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2021-07)
    The LIME(Local Interpretable Model-Agnostic Explanations) framework is a popular technique for providing simple to understand post-hoc model explanations. However, it su ers from the perplexing issue of inconsistent ...
  • Katyal, Akshyta; Gupta, Anushika; Shukla, Jainendra (Advisor) (IIIT- Delhi, 2021-05)
    Stress is natural, especially during this unprecedented COVID-19 crisis that has brought various emotions and challenges. However, stress experienced over an extended period can lead to serious health problems. It is ...
  • Tyagi, Jatin; Rastogi, Nishaant; Jain, Pratyush; Kumar, Dhruv (Advisor) (IIIT-Delhi, 2023-11-29)
    The exponential growth of machine and deep learning applications across diverse domains has led to the proliferation of machine and deep learning libraries. As these libraries offer various algorithms, tools, and ...
  • Tyagi, Jatin; Rastogi, Nishaant; Jain, Pratyush; Kumar, Dhruv (Advisor) (IIIT-Delhi, 2023-11-29)
    The exponential growth of machine and deep learning applications across diverse domains has led to the proliferation of machine and deep learning libraries. As these libraries offer various algorithms, tools, and ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Basak, Protichi; De, Saurabh; Vatsa, Mayank (Advisor) (2017-04-18)
    The idea of fusing multiple biometric modalities for the identification of an individual has received significant attention in the last two decades. However, this has been limited to recognizing adults only. With the quality ...
  • Dahiya, Hemang; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
    Conservation planning and conflict resolution require careful monitoring and analysis of wildlife. Video traps, in combination with AI-based analytic tools, are an excellent example of noninvasive technology used successfully ...
  • Bansal, Shruti; Singh, Pushpendra (Advisor) (2015-12-03)
    Blended Learning is an amalgamation of face-to-face and e-learning. MOOCs (Massive Open Online Courses), a popular e-learning source of rich quality content produced by best instructors are freely available to learners ...
  • Kumar, Sushant; Bohara, Vivek Ashok (Advisor) (2016-09-23)
    In dynamic environment, multi-standard wireless communication receivers capable of estimating the various parameters of any unknown modulated signal are desired. These parameters include symbol rate, modulation type, ...
  • Joshi, Himani; Darak, Sumit Jagdish (Advisor) (2016-09-13)
    Electromagnetic spectrum is a limited natural resource and needs to be used efficiently. However, various measurements conducted worldwide have observed poor spectrum utilization. Software defined radios (SDRs) and cognitive ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Narang, Ojas; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-11-30)
    India's food industry faces critical challenges with its centralized supply chains, including single point failures, quality issues, and data integrity. There's a high rate of food fraud, contamination, and adulteration, ...
  • Kukrety, Shivanshu; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2022-06)
    Immune-mediated disorders (IMDs) include a wide spectrum of pathologies ranging from autoimmunity to autoinflammation, and they impact a substantial number of individuals worldwide. Although dysfunctional inflammatory ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Tekchandani, Jeet; Bhattacharya, Sayak (Advisor) (IIIT-Delhi, 2023-11-29)
    A photon’s interaction with a semiconductor material can generate an exciton. If the photon is trapped in a microcavity, the exciton can strongly couple with the photon, resulting in a hybrid bosonic state called an ...
  • Caur, Samiya; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    Ever since the 2014 Lok Sabha election, social media platforms such as Twitter, Facebook etc.have become a vital part of election campaigns in India with political parties investing heavily in the expansion of their ...
  • K, Achyuthanand; Chakrabarty, Mrinmoy (Advisor) (IIIT-Delhi, 2022-08)
    Autism spectrum disorder (ASD) is a construct used to describes a cluster of behavioural features that span a range of issues, e.g., decreased social-emotional reciprocity and non-verbal communication in social interactions ...

Search Repository

Browse

My Account