Browsing by Title

Sort by: Order: Results:

  • Agrawal, Dewangee; Kumar, Suraj Prathik; Bhatia, Sumit (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2019-11-15)
    We address the problem of finding a textual summary of facts within a path in a knowledge graph.Knowledge graphs are increasingly used in search engines and store data in the form of a Semantic Web structure making ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Mathur, Arpit; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2022-12)
    Studying Chromatin Architecture is paramount to an understanding of cells or nuclei in disease and normal state. With recent advances in genomic technologies and computational power, new domains like Topologically associated ...
  • Mathur, Arpit; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2022-12)
    Background: Studying Chromatin Architecture is paramount to an understanding of cells or nuclei in disease and normal state. With recent advances in genomic technologies and computational power, new domains like Topologically ...
  • Chopra, Shaan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor); Malhotra, Aakarsh (Advisor) (IIITD-Delhi, 2019-01-22)
    Biometrics based user authentication is rather popular in mobile devices using face and fingerprints as the primary modalities. Fingerphoto (an image of a person’s finger captured using an inbuilt smartphone camera) based ...
  • Diwan, Nirav; Chakravorty, Tanmoy (Advisor) (IIIT- Delhi, 2021-05)
    There are concerns that the ability of language models (LMs) to generate high quality synthetic text can be misused to launch spam, dis-information, or propaganda. Therefore, the re-search community is actively working on ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Dwivedi, Namrata; Bohara, Vivek Ashok (Advisor) (IIIT Delhi, 2014-09-05)
    Radio Frequency (RF) High Power Amplifiers (HPAs) are one of the basic building blocks of modern wireless communication system. But most of these broadband wireless communication systems such as Universal Mobile ...
  • Nishtha; Bahubalindruni, Pydi Ganga Mamba (Advisor); Deb, Sujay (Advisor) (IIIT-Delhi, 2021-03)
    With the new habits of lifestyle, new health problems are arising and demands continuous health monitoring. Wearable technology will revolutionize our lives in the upcoming years. To enable widespread usage of such devices, ...
  • Narang, Gaurav; Fell, Alexander (Advisor) (2015-12-07)
    Embedded memories are the key contributor to the chip area, dynamic power dissipation and also form a signicant part of critical path for high performance advanced SoCs. Therefore, optimal selection of memory instances ...
  • Snehil; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    Curbing hate speech is undoubtedly a major challenge for online microblogging platforms like Twitter. While there have been studies around hate speech detection, it is not clear how hate speech finds its way into an online ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Deep, Gyan; Darak, Sumit Jagdish (Advisor) (2017-12-15)
    To support wide variety of services ranging from voice, high-speed data and multimedia, multi-standard wireless communication transceivers (MWCT) are desired. Such transceivers have the capability to adapt to any desired ...
  • Bansal, Swapnil; Goel, Hritik; Deb, Sujay (Advisor) (IIIT-Delhi, 2021-05)
    Reduced Instruction Set Computing (RISC) is an open-source, exible & easy-to-use ISA widely adopted for many applications. In the previous semester, we built the FPGA based RISCV-32I architecture capable of executing ...
  • Singh, Abhishek Pratap; Mitra, Abhijit (Advisor); Srivastava, Anand (Advisor) (IIIT-Delhi, 2021-05)
    The extensive growth in the demand for network bandwidth has created new challenges for net- work operators in the last few years. Traditional optical network technology is no longer enough to handle the massive bandwidth ...
  • Singh, Prateek; Dash, Debasis (Advisor) (2017)
  • Jain, Sakshi; Fell, Alexander (Advisor) (2016-09-20)
    A video analyzer is a comprehensive bitstream analysis tool which accelerates development and debugging of video bitstreams while ensuring compliance with industry standards. There are many conventional analyzers present ...
  • Jain, Shilpi; Goyal, Vikram (Advisor) (2014-07-10)
    In the current changing trends, collaboration between di erent organizations or consolidation between applications of the same organization has become a common phenomenon. In order to achieve strategic business objectives ...
  • Jain, Ayushi; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2022-05)
    Millions of mobile apps are downloaded and used by users throughout the world. For many developers, these apps are the source of their income. Given that there is monetary aspect attached to applications, this gives rise ...
  • Jain, Puneet; Sujit, PB (Advisor) (2016-11-19)
    Mosquitoes are often called the deadliest animal on earth, responsible for spreading several diseases that result in more than a million deaths worldwide every year. Mosquito swarming is a form of collective behavior that ...

Search Repository

Browse

My Account