IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Kaif, Mohammed; Mittal, Shivansh; Shah, Rinku (Advisor); Deb, Sujay (Advisor) (IIIT-Delhi, 2023-11-29)
    Cloud providers host tenant applications on the shared server infrastructure and provide isolation by leveraging virtualization solutions such as virtual machines (VMs), containers, or serverless. The current virtualization ...
  • Sood, Raghav; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2020-05-31)
    Modality refers to how something happens or is experienced. It is the representation format in which information is stored. Multimodal Learning involves relating information from multiple sources. Many modalities are ...
  • Mathur, Himanshi; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-05)
    The first study is based on classification of fake video detection. Filtering, vetting, and verifying digital information is an area of core interest in information science. Content present online in the format of news, ...
  • Desai, Poorav; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT- Delhi, 2021-08)
    Sarcasm is a pervading linguistic phenomenon and highly challenging to explain due to its subjectivity, lack of context and deeply-felt opinion. In the multimodal setup, sarcasm is conveyed through the incongruity between ...
  • S, Giridhar; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Sarcasm is a nuanced and context-dependent communication that poses a significant challenge for natural language processing (NLP) systems. This study proposes a novel approach to improving sarcasm understanding by generating ...
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Gehlot, Gaurav; Das, Syamantak (Advisor) (IIITD-Delhi, 2019-04-25)
    We consider the classical on-line load balancing problem of temporary tasks under restricted assignments. Each job can be processed only on a subset of machines, different jobs require a different amounts of processing ...
  • Pandita, Ayushman; Kumar, Akshay (Advisor) (IIITD-Delhi, 2019-07-10)
    For this project, I have started a venture ‘My JEE Mentor’ which connects current JEE aspirants with previous JEE Toppers and help seek Personal Mentorship from them. We charge our customers for our services and pay a ...
  • Rajore, Tanmay; Gambhir, Keshav; Maity, Mukulika (Advisor); Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-12)
    Live Video conferencing has become an essential part of day-to-day lives, especially during the covid times. Due to the Pandemic, there has been a significant increase in video calling applications for official meetings, ...
  • Gupta, Gautam; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Kasliwal, Pankhuri; Anand, Saket (Advisor) (IIIT-Delhi, 2019-11-16)
    Convolutional Neural Networks are trained using a gradient descent back propagation technique which trains weights in each layer for the sole goal of minimizing training error. Hence, the resulting weights cannot be ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Jindal, Sarthak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-15)
    The spread of fake news poses a serious problem in today’s world where the masses consume and produce news using online platforms. One main reason why fake news detection is hard is the lack of ground truth database for ...
  • Yadav, Rupanshu; Kumaraguru, Ponnurangam (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    NFT or Non-Fungible Token is a token that certifies a digital asset to be unique. A wide range of assets including, digital art, music, tweets, memes, are being sold as NFTs. NFT-related content has been widely shared on ...
  • Bhatnagar, Akshala; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2021-05)
    Treatment notes from the pediatric ICU can be effectively used to construct a predictive model for the onset of shock with a lead time of 24 hours. If this disease is not diagnosed at an early stage, it can create multiple ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushalani, Manohar (Advisor) (IIITD-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report, we will be shedding some light on different and fascinating ways like how and what ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushalani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...

Search Repository


Advanced Search

Browse

My Account