Browsing by Title

Sort by: Order: Results:

  • Sureka, Ashish (2012-03-26)
    Research shows that cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media and Web 2.0 platforms has become a common phenomenon. This is a growing concern and hence automated ...
  • Singhal, Rahul; Sujit, PB (Advisor) (2015-12-07)
    Path planning is essential for UAVs that travel in different terrains. Designing feasible path planners for UAVs taking the dynamic constraints is difficult. In this thesis, we develop a 3D path planner using model ...
  • Agarwal, Nidhi; Sharma, Ojaswa (Advisor) (2015-12-02)
    In this thesis work, we propose an algorithm for smooth 3D object reconstruction from un- organized planar cross sections. We address the problem in its full generality, and show its e ectiveness on sparse set of cutting ...
  • Pulkit; Attri, Mayank; Ruhela, Sahil; Khushalani, Manohar (Advisor) (IIIT-Delhi, 2017-04-29)
    The goal of our BTP is to make realistic looking residential society having 3D models of villas, apartments including the interior designing of the villas and apartments. Last Semester we made the autocad files of the ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2014-09-15)
    Simultaneous execution of multiple threads on multicores is necessary for good resource utilization. However, such utilization calls for accurate models to predict the impact on performance due to contention of shared ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Mamgain, Ankush; Grover, Anuj (Advisor) (IIIT-Delhi, 2018-07)
    In advance technology nodes, static power consumption is a major component of total system power in systems that do not continuously operate at very high clock frequency. SRAMs not only contribute a major portion of SoC ...
  • Banerjee, Shisagnee; Majumdar, Angshul (Advisor) (2016-09-15)
    In the following three chapters of my thesis, I have applied several methods to solve the coldstart problem in Recommender Systems. The coldstart problem is the situation where a user or item is new to a website and ...
  • Agarwal, Aman; Jain, Atulya; Kogta, Saloni; Naik, Vinayak (Advisor) (2017-04-18)
    Delhi has been ranked the most polluted city in the world. The air quality has been reported to be far above the safe limits. Our project aims to bring forth insights into the aspects that affect the quality of the air. ...
  • Saini, Kunal; Subramanyam, A.V (Advisor) (IIIT-Delhi, 2018-04-18)
    Visual tracking and person re-identification has gathered a lot of attention in computer vision due to its challenging nature and importance in surveillance applications. In this work, we explore the on-board visual tracking ...
  • Aneja, Joy; Singh, Pushpendra (Advisor) (2016)
    The wide deployment of IEEE 802.11 Wireless LAN in offices, colleges and other organizations makes it a prime solution for indoor localization. Wireless access point awareness and its small cell size helps in localizing ...
  • Sharma, Vijender Kumar; Deb, Sujay (Advisor) (IIIT Delhi, 2014-09-06)
    Maintaining quality of signal transmission is a major challenge with the increasing speed of data transmission in Nano-scale VLSI technology. The decreasing voltage margins at the same time, makes it even stringent to ...
  • Agarwal, Mallika; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2017-04-18)
    Recognizing people with their face has received a lot of attention from the research community. However, face recognition for newborns is in a nascent stage. The need for effective identification of newborns has been rising ...
  • Bhattacharjee, Protim; Majumdar, Angshul (Advisor) (2016-09-13)
    Data classification is the core of leading technologies today. With the explosion of data through mobility and growth of the Internet, analysis and classification of data is the immediate process after acquisition. Most ...
  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Khandelwal, Aanchal; Srivastava, Anand (Advisor) (2017-12)
    This thesis work provides theoretical analysis of an optical distribution network (ODN) that integrates mobile backhaul network with already existing passive optical network (PON). The need to reduce the cost of laying ...
  • Maktoomi, Md Ayatullah; Hashmi, Mohammad S. (Advisor) (2016-10-14)
    The proliferation of multi-band and multi-standard wireless systems are well known but very little is known about the challenges associated in the design and development of such systems. For example, the RF front-ends in ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Cheema, Gullal Singh; Anand, Saket (Advisor) (2016-09-15)
    Mean shift is a non-parametric mode seeking procedure widely used in many computer vision problems. Mean shift clustering in particular is a well studied and established algorithm, which has many merits over the classic ...

Search Repository

Browse

My Account