Browsing by Title

Sort by: Order: Results:

  • Kalra, Siddhant; Ahuja, Gaurav (Advisor) (IIIT-Delhi, 2020-05)
  • Garg, Sasha; Darak, Sumit Jagdish (Advisor) (2017-07)
    Upcoming wireless communication networks are expected to support the wide variety of services ranging from low data rate applications such as wireless sensor networks to high data rate delay sensitive multimedia services. ...
  • Gupta, Ravi Kumar; Visweswaran, G S (Advisor) (IIIT-Delhi, 2020-07)
    An output capacitor-less low-dropout (LDO) regulator with a wide range of load currents is proposed. It is based on the requirement of static comparator and current sinking circuit to control the gate of pmos pass gate. ...
  • Nambiar, Pranav; Arora, Chetan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-04-30)
    Text-to-speech systems generally require large amounts of annotated speech data with the quality of both the annotations and speech being a huge factor. As a result, most of the research performed has been on highly curated ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Zaid, Kunwar; Ghatak, Gourab (Advisor) (IIIT-Delhi, 2020)
    The stationary multi-armed bandit (MAB) framework is a well-studied problem in literature, with many rigorous mathematical treatments and optimal solutions. However, for a non-stationary environment, i.e., when the reward ...
  • Tyagi, Arjun; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-08)
    Correlation filter (CF) based tracker often disregard or weakly incorporate the importance of feature channels as well as channel similarity. To address this, we propose a channel-graph regularization correlation filter-based ...
  • Mrinal; Gautam, Prutyay; Ray, Arjun (Advisor) (IIIT-Delhi, 2020-12)
    The project is based on applying Machine Learning tools and di erent analysis techniques to identify which protein features in metagenomes sampled from Human and Non-Human (other mammal species) microbiomes help them impart ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Vithalkar, Amogh; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2018-04-18)
    Radio Frequency Identification(RFID) has been gaining popularity recently over barcodes for a wide range of applications like inventory control, supply chain management, manufacturing,etc. With the increasing popularity ...
  • Ummalaneni, Vahini; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2017-04-18)
    In the course of this BTP,low cost chipless RFID tags have been designed. The proposed RFID tags are fully passive devices. They do not require chip assembly or any power supply. In the previous semester, the tag studied ...
  • Jain, Sagar; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2019-09)
    A Fabry Perot cavity (FPC) antenna consists of a primary radiator at the base of a dielectric cavity sealed with a partially reflecting surface at the other end. Excitation from the radiator is partially reflected by the ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Khurana, Prerna; Majumdar, Angshul (Advisor) (2016-09-13)
    In this work we propose a classification framework called class-wise deep dictionary learning (CWDDL). For each class, multiple levels of dictionaries are learnt using features from the previous level as inputs (for first ...
  • Aggarwal, Bhavay; Ray, Arjun (Advisor) (IIIT-Delhi, 2021-05)
    Proteins are essential for carrying out the activities our cells perform. Agonist and Antagonist molecules are essential in dictating cell activities and hence the Identi cation of the action of such complexes will help ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Vinayak (IIIT- Delhi, 2021-06)
    Clique counting is a well studied problem in low memory models like graph streaming. There are algorithms which provide good space complexity bounds for general graphs. For constant pass, approximation algorithms counting ...
  • Sethi, Kiran; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2022-08)
    Human cancers are composed of cells with varying genotypes, epigenetic states, and gene expression profiles. Intra and inter-tumor clonal heterogeneity is now recognized as one of the biggest drawbacks for therapeutic ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...

Search Repository

Browse

My Account