Browsing by Title

Sort by: Order: Results:

  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Agrawal, Sankalp; Rawal, Jay; Mohania, Mukesh (Advisor); Padmanabhan, Deepak (Advisor) (IIIT- Delhi, 2021-05)
    Entity matching (EM) has been one of the long-standing challenges in databases domain. Tra- ditionally, the approaches for EM focuses on developing matching algorithms and works on pairwise similarity between attributes. ...
  • Gupta, Gavish; Singh, Shrey Kumar; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    A rapid growth in the amount of fake news on social media is a very serious concern in our society. Fake news are usually created by making changes to text, images, audio, and videos. To bust these fake news, there are ...
  • Dhawan, Sarthika; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2019-04-15)
    Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, scammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. ...
  • Rai, Priyadarshini; Sengupta, Debarka (Advisor); Majumdar, Angshul (Advisor) (IIIT-Delhi, 2022-10)
    The advent of tissue and single cell based transcriptomic profiling technologies has allowed precise characterization of tissue specific gene activities in the context of development and disease. Human cells express about ...
  • Jain, Shreyansh; Jerripothula, Koteswar Rao (Advisor) (IIIT-Delhi, 2023-05)
    With the growing awareness regarding user privacy and the demand for transparency, traditional distributed machine learning algorithms are becoming taboo that uses the user’s data without any restriction or privacy. The ...
  • Saha, Sanchita; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-05)
    Quantum algorithms like Shor’s and Grover’s algorithms have proven to break several cryptographic schemes theoretically. Shor’s algorithm, which can factor numbers exponentially faster than classical computers, can break ...
  • Kaur, Avneet; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Kaur, Avneet; Bharti, Moh; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Gupta, Aayushee; Dutta, Haimonti (Advisor) (IIIT Delhi, 2014-09-05)
    Historical newspaper archives provide a wealth of information. They are of particular interest to genealogists, historians and scholars for People Search. In this thesis, we design a People Gazetteer from the noisy OCR ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Agrawal, Dewangee; Kumar, Suraj Prathik; Bhatia, Sumit (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2019-11-15)
    We address the problem of finding a textual summary of facts within a path in a knowledge graph.Knowledge graphs are increasingly used in search engines and store data in the form of a Semantic Web structure making ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Mathur, Arpit; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2022-12)
    Studying Chromatin Architecture is paramount to an understanding of cells or nuclei in disease and normal state. With recent advances in genomic technologies and computational power, new domains like Topologically associated ...
  • Mathur, Arpit; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2022-12)
    Background: Studying Chromatin Architecture is paramount to an understanding of cells or nuclei in disease and normal state. With recent advances in genomic technologies and computational power, new domains like Topologically ...
  • Chopra, Shaan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor); Malhotra, Aakarsh (Advisor) (IIITD-Delhi, 2019-01-22)
    Biometrics based user authentication is rather popular in mobile devices using face and fingerprints as the primary modalities. Fingerphoto (an image of a person’s finger captured using an inbuilt smartphone camera) based ...
  • Diwan, Nirav; Chakravorty, Tanmoy (Advisor) (IIIT- Delhi, 2021-05)
    There are concerns that the ability of language models (LMs) to generate high quality synthetic text can be misused to launch spam, dis-information, or propaganda. Therefore, the re-search community is actively working on ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Dwivedi, Namrata; Bohara, Vivek Ashok (Advisor) (IIIT Delhi, 2014-09-05)
    Radio Frequency (RF) High Power Amplifiers (HPAs) are one of the basic building blocks of modern wireless communication system. But most of these broadband wireless communication systems such as Universal Mobile ...

Search Repository

Browse

My Account