Browsing by Title

Sort by: Order: Results:

  • Gupta, Divam; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    First person videos captured from wearable cameras are growing in popularity.Standard algo- rithms developed for third person videos often do not work for such egocentric videos because of drastic change in camera ...
  • Sethi, Akshay; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2018-04-17)
    The first part of this work focuses on facial attribute prediction using a novel deep learning formulation, termed as R-Codean autoencoder. The work presents Cosine similarity based loss function in an autoencoder which ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIITD-Delhi, 2019-04-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIIT-Delhi, 2019-11-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Somannagari, Neha Reddy; Sethi, Tavpritesh (Advisor) (2021-05)
    Health care systems all around the world have an ever-growing burden of intensive care on them. Complications such as sepsis, organ failure and shock contribute to a large portion of the deaths. However they can be treated ...
  • Jha, Shragvi Sidharth; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Autonomous vehicles are becoming prevalent day-by-day, and with the advent of such technology comes its various safety risks and challenges. The primary objective is to improve road safety and mobility for all users. The ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Arora, Disha; Hashmi, Mohammad S. (Advisor) (2016-09-12)
    The growing gap between the processor and embedded memory speed is a major setback in the overall performance of electronic systems. Since the sense amplifier (SA) forms an integral part of the read circuitry in both ...
  • Kochar, Adwit Singh; Bansal, Pabitra; Singh, Rahul; Agrawal, Yashwin; Deb, Sujay (Advisor) (IIIT-Delhi, 2021-12)
    Critical health parameters such as SpO2 and Blood Pressure play a massive role in determining a person’s health condition, and hence their tracking and monitoring are essential. Currently, the problem with health monitoring ...
  • Kumar, Ajay; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2022-07)
    In today’s world, it is no exaggeration that the environment and all its organisms face a threat due to environmental degradation of many kinds, and public transportation may be the answer to all the problems. It will help ...
  • Singhal, Shitij; Kaul, Sanjit Krishnan (Advisor) (2017-04-18)
    An autonomous vehicle is a vehicle which has the capabilities to move from one location to another with the help of inputs from various sensors connected to a computer which are used to plan the path for the vehicle, without ...
  • Singh, Anand; Srivastava, Anand (Advisor); Bohara, Vivek Ashok (Advisor) (IIIT-Delhi, 2023-01)
    Most of the current wireless networks are radio frequency (RF) based, however, these networks are regularly confronted with growing demand for higher data rates. Watching high-definition live stream videos and accessing ...
  • Amit; Naik, Vinayak (Advisor) (2014-07-10)
    The area of sensing has witnessed signi cant development over the past two decades. Body of work on sensors has focused on individual sensors, sensor networks, in-network data processing and distributed query processing. ...
  • Reddy, Krishna Neel; Joshi, Kshtiz; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Next generation wireless communication systems are expected to support high-mobility Vehicle to everything (V2X) communication services in sub-6 GHz as well as millimeter wave spectrum. This demands accurate tracking of ...

Search Repository

Browse

My Account