Browsing by Title

Sort by: Order: Results:

  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Baghoriya, Sanjeev; Bohara, Vivek Ashok (Advisor) (2015-12-07)
    Although there has been significant research and development on automation devices for assisted living, there has always been trade-offs in terms of the cost, complexity, design and efficiency. Numerous researchers have ...
  • Maktoomi, Md Ayatullah; Hashmi, Mohammad S. (Advisor) (2016-09-13)
    The power dividers are one of the most ubiquitous passive circuit elements in RF/Microwave applications. They are widely used in antenna arrays, balanced amplifiers, mixers, frequency multipliers etc. as power combiners ...
  • Singh, Ankush; Hashmi, Mohammad S. (Advisor) (2017-06)
    Low Dropout Regulators (LDOs) are extensively used in many applications ranging from high power system to the portable application like mobile phones, PDAs and notebooks. These portable applications demand high power ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav(Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswnath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Kalla, Shivam; Hashmi, Mohammad S. (Advisor) (2017)
    Audio applications necessitate precise data conversion from analog to digital domain. This high resolution conversion can be achieved by using Sigma-Delta architecture, which operates at oversampling rate and exhibits ...
  • Kulshreshtha, Mranal; Bahubalindruni, Pydi Ganga Mamba (Advisor); Mathur, Shiv (Advisor) (IIIT-Delhi, 2018-05)
    ESD (Electrostatic Discharge) protection circuits are widely used in the semiconductor industry generally as on-chip solution to protect main circuit or Design Under Test (DUT) against electrostatic discharge. This ...
  • Rehani, Ankit; Deb, Sujay (Advisor); Bahubalindruni, Pydi Ganga Mamba (Advisor); Odedara, Bhavin (Advisor) (IIIT-Delhi, 2018-06)
    Power Management Integrated Circuits (ICs), such as high-efficient switched mode dc- dc converters are essential building blocks in portable battery operated devices. This work presents design and implementation of a ...
  • Bhatnagar, Juhi; Kumaraguru, Ponnurangam (Advisor); Venkatraman, Shriram (Advisor) (2017-04-18)
    This study examines selfie as a human-driven action and investigates how selfies can turn into killfies by examining the user behavior associated with selfies. Three data collection techniques are discussed - interviews, ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Kumar, Gundu Anil; Hashmi, Mohammad S. (Advisor) (2015-12-07)
    Up to 70% of Systems on a Chip (SoC) area are occupied by embedded memories. In order to achieve higher robustness, embedded SRAMs (eSRAM) are often used in SOC applications. However, due to advancement in technology it ...
  • IQBAL, MOHD SHOAIB; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2017-11-25)
    Frontal radar imaging has been proposed as an alternate technology to cameras for through wall surveillance and law enforcement. Cameras cannot see through wall as optic frequencies do not penetrate walls. On the other ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Singh, Vinod Kumar; Biswas, R. N. (Advisor) (IIIT Delhi, 2014-09-06)
    An approach is proposed to improve static timing analysis for early TA-signoff closure at Very Deep Sub-Micron (V-DSM) nodes. At higher technology nodes (>100nm) the timing path delay is governed mainly by the cells, and ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...

Search Repository

Browse

My Account