Browsing by Title

Sort by: Order: Results:

  • Madan, Raghav; Deb, Sujay (Advisor) (2015-12-07)
    Digital VLSI design verification is a process of checking and verifying the correctness of design functionality with respect to the documented specications. Functional verification of a complex IP or sub-system, formed by ...
  • Arora, Udit; Kumar, Shashikant; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2022-05)
    The emergence of stream reasoning accompanies the expansion of the semantic web. A stream is data that is continuously being generated from various sources, such as the stock markets and social networks. The growing number ...
  • Bisht, Manak; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2022-05)
    Open Information Extraction (Open IE) is the task of extracting triples (subject, predicate, object) from plain text. Tools that perform these extractions are called Open IE extractors. While benchmarks to evaluate the ...
  • Mumtaz, Fatima; Ram, Shobha Sundar (Advisor); Purandare, Swapna (Advisor) (IIIT-Delhi, 2019-07)
    Harmonic radar technology has been researched and developed for studying the foraging behaviour of insects such as honey bees in order to study their decline in the ecosystem. The traditional radar fails to detect the bees ...
  • Srivastava, Aman; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2023-02)
    Alzheimer’s disease is progressing as the most prevalent neurological disorder world- wide. It is the most common cause of dementia in ageing society. An artificial Neural Network (ANN) is a set of neural networks which ...
  • Dhall, Anjali; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2022-10)
    One of the major challenges in designing the cancer vaccine or immunotherapy is to predict the cancer-specific peptides or neopeptides that can stimulate the immune system to fight against the cancer cells. Human leukocyte ...
  • Sharma, Shalini; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2022-09)
    Time series analytics is the practice of determining future values of correlated signals. In seminal works, time series were modeled using classical techniques such as ARMA (autoregressive moving average), and its variants ...
  • Agrawaal, Taneea S; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-07-07)
    Darknet markets, also known as cryptomarkets, are websites located on the Darknet and designed to allow the traffcking of illicit products, mainly drugs. Over the past decade, online advertising became the principal ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Bansal, Shrestha; Hashmi, Mohammad S. (Advisor) (2017)
    Most modern circuit designs have a mix of analog and digital circuit blocks integrated on a single chip. Such designs require a dedicated power man- agement unit to provide a stable, regulated and clean power supply. This ...
  • Jain, Ananya; Natarajan, Kirthana; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2022-05)
    Stress is the physical and psychological reaction to situations or demands. It is a natural and inevitable part of life. However, experiencing consistent stress over long periods of time can be harmful for health and may ...
  • Ranjan, Saurav; Vikrant; Priyadarshi, Praveen (Advisor) (IIIT-Delhi, 2022-07)
    Delhi is divided into eleven districts which have a total of thirty-three sub-districts. The website has a map starting from the district level and later going to the sub-district level as performed by the user. Digitizing ...
  • Jati, Arpan; Sanadhya, Somitra Kumar (Advisor) (2013-07-09)
    Many Peer to Peer (P2P) protocols and applications have become popular in the recent years and P2P accounts for a very large portion of the internet traffic. But, most protocols are designed with speed and efficiency in ...
  • Munagala, Deepak; Sujit, PB (Advisor) (IIIT-Delhi, 2017-07-25)
    Disaster simulations can be used to better prepare the disaster management relief forces. Through simulation, we can find out how buildings and people react to oods, measure the scale of destruction during disasters, and ...
  • Gang, Arpita; Biyani, Pravesh (Advisor) (2016-09-13)
    Sound sources are a very common everyday occurrence. But a single audio source is seldom heard alone. There is a sea of applications, like speech recognition, where an isolated sound source is desirable. This makes audio ...
  • Grover, Sonakshi; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2017-11-16)
    This project involves the identification of miRNAs that are differentially expressed across Indolent Vs Progressive and Case Vs Control samples in Chronic Lymphocytic Leukemia (CLL). For this, we have analysed miRNA ...
  • Talwar, Divyanshu; Anand, Saket (Advisor) (IIITD-Delhi, 2018-12-31)
    Disentangling higher level generative factors as disjoint latent dimensions offer several benefits such as ease of deriving invariant representations, targeted data augmentation with style transfer, better interpretability ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT Delhi, 2014-09-05)
    Mobile robots are increasingly being used for tasks like remote surveillance, sensing and maintenance. Some of these tasks are critical and require intelligent decision making for successful completion. It is not always ...
  • Sharma, Somya; Gupta, Mansi; Darak, Sumit J. (Adviosr); Joshi, Himani (Advisor) (IIIT- Delhi, 2021-05)
    The deployment of cellular spectrum in licensed, shared and unlicensed spectrum demands wideband sensing over non-contiguous sub-6 GHz spectrum. To improve the spectrum and energy efficiency, beam forming and massive ...
  • Sharma, Rishi; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT-Delhi, 2022-07)
    Traditional censorship revolves around blocking access to some websites (or services) over the Internet. However, recently there has been a rise in the events of an extreme form of censorship viz., deliberate Internet ...

Search Repository

Browse

My Account