Browsing by Title

Sort by: Order: Results:

  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Rahman, Mir Mohsina; Hashmi, Mohammad S. (Advisor) (2014-07-11)
    Recent trends show increasing cases of implantable devices for monitoring and control of organs such as heart. The implantation of devices requires a multi stage evaluation process in order to make sure that these devices ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Aggarwal, Priya; Gupta, Anubha (Advisor) (2015-12-07)
    In the recent year, road accidents in India have drastically increased. Owing to this, there is a need for reliable and robust data transmission in vehicular communication. IEEE 802.11p standard is a dedicated wireless ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Baghoriya, Sanjeev; Bohara, Vivek Ashok (Advisor) (2015-12-07)
    Although there has been significant research and development on automation devices for assisted living, there has always been trade-offs in terms of the cost, complexity, design and efficiency. Numerous researchers have ...
  • Maktoomi, Md Ayatullah; Hashmi, Mohammad S. (Advisor) (2016-09-13)
    The power dividers are one of the most ubiquitous passive circuit elements in RF/Microwave applications. They are widely used in antenna arrays, balanced amplifiers, mixers, frequency multipliers etc. as power combiners ...
  • Singh, Ankush; Hashmi, Mohammad S. (Advisor) (2017-06)
    Low Dropout Regulators (LDOs) are extensively used in many applications ranging from high power system to the portable application like mobile phones, PDAs and notebooks. These portable applications demand high power ...
  • Kalla, Shivam; Hashmi, Mohammad S. (Advisor) (2017)
    Audio applications necessitate precise data conversion from analog to digital domain. This high resolution conversion can be achieved by using Sigma-Delta architecture, which operates at oversampling rate and exhibits ...
  • Bhatnagar, Juhi; Kumaraguru, Ponnurangam (Advisor); Venkatraman, Shriram (Advisor) (2017-04-18)
    This study examines selfie as a human-driven action and investigates how selfies can turn into killfies by examining the user behavior associated with selfies. Three data collection techniques are discussed - interviews, ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Kumar, Gundu Anil; Hashmi, Mohammad S. (Advisor) (2015-12-07)
    Up to 70% of Systems on a Chip (SoC) area are occupied by embedded memories. In order to achieve higher robustness, embedded SRAMs (eSRAM) are often used in SOC applications. However, due to advancement in technology it ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Singh, Vinod Kumar; Biswas, R. N. (Advisor) (IIIT Delhi, 2014-09-06)
    An approach is proposed to improve static timing analysis for early TA-signoff closure at Very Deep Sub-Micron (V-DSM) nodes. At higher technology nodes (>100nm) the timing path delay is governed mainly by the cells, and ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...

Search Repository

Browse

My Account