IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Jindal, Sarthak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-15)
    The spread of fake news poses a serious problem in today’s world where the masses consume and produce news using online platforms. One main reason why fake news detection is hard is the lack of ground truth database for ...
  • Yadav, Rupanshu; Kumaraguru, Ponnurangam (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    NFT or Non-Fungible Token is a token that certifies a digital asset to be unique. A wide range of assets including, digital art, music, tweets, memes, are being sold as NFTs. NFT-related content has been widely shared on ...
  • Bhatnagar, Akshala; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2021-05)
    Treatment notes from the pediatric ICU can be effectively used to construct a predictive model for the onset of shock with a lead time of 24 hours. If this disease is not diagnosed at an early stage, it can create multiple ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushalani, Manohar (Advisor) (IIITD-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report, we will be shedding some light on different and fascinating ways like how and what ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushalani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Thakkar, Dev; Arvind K, Hiren; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-11-29)
    In this project, we ventured into computational gastronomy to craft AI-generated recipes that embody diverse regional cooking styles. Our methodology initially centered on a novel tokenization approach, using the GPT-2-based ...
  • Goel, Atharv; Singh, Jyotirmaya; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
    This thesis undertakes a comprehensive exploration of object detection technologies with a particular emphasis on their application in autonomous driving and related application settings. The research delves into 2D and ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Prakash, Pragya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Ghosh, Soumyadeep; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2023-03)
    Face recognition under controlled and constrained scenarios have reached a significant level of maturity with respect to performance and reliability. However, under unconstrained and un controlled settings, current ...
  • Singh, Mridula; Kaul, Sanjit Krishnan (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2012-03-14)
    Simultaneous latent fingerprints are a cluster of latent fingerprints that are concurrently deposited by the same person. Though ACE-V methodology provides the scientific basis for matching latent fingerprints, extending ...
  • Singh, Kartikey; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2022-07)
    In this work we highlight the evolution of Internet censorship within the largest democracy i.e., India. We first report a new form of Internet censorship i.e., mobile app blocking and describe in detail the mechanics ...
  • Garg, Surabhi; Chang, Donghoon (Advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...
  • Dhankar, Hemant; Jaiswal, Nitesh; Saxena, Vaibhav; Mohania, Mukesh (Advisor) (IIIT-Delhi, 2022-05)
    Workflows are part of our daily life. Every process has a workflow. By automating these workflows and making them digital results in time saving, less human resource cost and error free data. IRD at IIITD has various ...
  • Ramanathan, Varun; Raman, Rajiv (Advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...
  • Aggarwal, Aayush; Das, Syamantak (Advisor) (IIIT Delhi, 2020-06-06)
    We are given a bipartite graph G(R, S, E) (|R| = |S|), where R denotes the set of requests and S being the set of servers. The requests R (given by an adversary) arrive sequentially along with their distances to each of ...

Search Repository


Advanced Search

Browse

My Account