IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Reddy, Mortala Gautam; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-11-29)
    With the introduction of the EU’s GDPR in 2017, lawmakers have emphasized the importance of algorithmic decisions being explainable to people affected by those decisions. This has led to a major focus being put on Explainable ...
  • Deepika; Singh, Amarjeet (Advisor) (2014-11-14)
    Energy has become basis of human life today. Practically, we rely on energy for everything we do every single day. As a result, the rate of consumption of energy has increased manifold and thereby has become a global ...
  • Gupta, Kunal; Sureka, Ashish (Advisor) (2015-05-05)
    Process-Aware Information Systems (PAIS) support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and ...
  • Sharma, Ayush; Kumar, Dhruv (Advisor) (IIIT-Delhi, 2023-11-25)
    Breast cancer is a complex and heterogeneous disease with varying clinical outcomes and treatment responses among different subtypes. Accurate classification of breast cancer subtypes is crucial for personalized treatment ...
  • Chauhan, Arushi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-02)
    Convolutional neural networks are being extensively used in real world applications like image and video classification, natural language processing, medical image analysis, recommender systems etc. where previously machine ...
  • Kumar, Sandeep; Pandey, Ashish Kumar (Advisor) (IIIT-Delhi, 2022-10)
    Disaster risk reduction is integral to social and economic development as per the 2030 Agenda of Sustainable Development. Among all the natural disasters, storms and floods have significant contributions in terms of their ...
  • Sista, Anurag; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2023-11-29)
    This study addresses the critical issue of antimicrobial resistance (AMR) in Escherichia coli through machine learning techniques. Our methodology includes using already available E.coli strains that are susceptible and ...
  • Aggarwal, Suchet; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2022-05)
    The growth of metagenomics has accelerated the discovery of new organisms. One such class of organism is viruses that infect bacteria called bacteriophages (or simply phages). The therapeutic use of phages to cure bacterial ...
  • Gupta, Shuchita; Sharma, Yashovardhan; Naik, Vinayak (Advisor) (2016-11-17)
    We are building a low-cost and portable device, which can be controlled by patient's Android smartphone, to measure sleep. The device is easy to use and consists of Airow (Rate of respiration), Pulse Oximeter (Heart rate ...
  • Sanghvi, Nilay; Singh, Sushant Kumar; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-01)
    The non-intrusive nature and high accuracy of face recognition algorithms have led to their successful deployment across multiple applications ranging from border access to mobile unlocking and digital payments. However, ...
  • Agrawal, Vibhu; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2021-12)
    India is a diverse country with very active politics. In recent times (2014-2021), a lot of polit- ical activities have stirred activities in the online space. These political activities range from Elections to Protests ...
  • Bera, Debajyoti; Goyal, Vikram; Saxena, Anuj S. (2012-03-26)
    There are many results on the possibilities of privacy leak in location-based services, and many remedies have also been suggested. In this paper, we look at this problem from an altogether different perspective - ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor) (2014-07-10)
    The rapid increase in popularity of location-based services have resulted in huge amount of spatial textual data being generated by applications like Foursquare, Facebook Places, Flickr etc. The location-based services ...
  • Singal, Sanidhya; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-06-19)
    Virtual Reality Walkthroughs provide an immersive experience of a real place. Through this project, we automate the creation of VR walkthroughs for large spaces, with the case study of IIIT-Delhi's campus. Our project ...
  • Sharma, Sunishka; Deb, Sujay (Advisor) (IIIT-Delhi, 2023-11-29)
    This B.Tech project embarked on an educational journey through the dynamic field of computational architectures, initiating with an in-depth study of Processing-in-Memory (PIM) systems and their challenges in the context ...
  • Bhatia, Anam; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-18)
    It can be observed that students in hostels under high work pressure ( similar to IIITD ) often miss the most essential meals of the day. Project LazyPizza aims to crowd-source intra-university food delivery where students ...
  • Siddiqui, Sahar; Mehta, Sameep (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
    In the era of big data where every individual is a target of intensive data collection, there is a need to create technological tools that empower individuals to track what happens to their data. Provenance has been ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Kumari, Jahnvi; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2022-05)
    With the prevalence of social media as a medium of communication in today’s society, countering the spread of fake news on the network has become an important area of study. In this work, we study the notion of competing ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...

Search Repository


Advanced Search

Browse

My Account