IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Goyal, Tanishk; Agrawal, Shivam; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-12)
    In this BTP Project we undertake an entrepreneurial venture in the web3 space called Atom DAO. Atom DAO is a community of developers who are willing to grow their development skills by working on industry-level tasks. ...
  • Tyagi, Jatin; Rastogi, Nishaant; Jain, Pratyush; Kumar, Dhruv (Advisor) (IIIT-Delhi, 2023-11-29)
    The exponential growth of machine and deep learning applications across diverse domains has led to the proliferation of machine and deep learning libraries. As these libraries offer various algorithms, tools, and ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Basak, Protichi; De, Saurabh; Vatsa, Mayank (Advisor) (2017-04-18)
    The idea of fusing multiple biometric modalities for the identification of an individual has received significant attention in the last two decades. However, this has been limited to recognizing adults only. With the quality ...
  • Dahiya, Hemang; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
    Conservation planning and conflict resolution require careful monitoring and analysis of wildlife. Video traps, in combination with AI-based analytic tools, are an excellent example of noninvasive technology used successfully ...
  • Bansal, Shruti; Singh, Pushpendra (Advisor) (2015-12-03)
    Blended Learning is an amalgamation of face-to-face and e-learning. MOOCs (Massive Open Online Courses), a popular e-learning source of rich quality content produced by best instructors are freely available to learners ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Narang, Ojas; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-11-30)
    India's food industry faces critical challenges with its centralized supply chains, including single point failures, quality issues, and data integrity. There's a high rate of food fraud, contamination, and adulteration, ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Caur, Samiya; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    Ever since the 2014 Lok Sabha election, social media platforms such as Twitter, Facebook etc.have become a vital part of election campaigns in India with political parties investing heavily in the expansion of their ...
  • Agarwal, Ayush; Sinha, Akshat; Arora, Chetan (Advisor); Gupta, Anubha (IIIT-Delhi, 2017-04-18)
    The automated segmentation of Brain MRI is an important initial step in the application of anomaly detection and pain localization due to neurological diseases. In this view, we aim to segment the sub structures (Caudate, ...
  • Gupta, Akshat; Gupta, Anubha (Advisor) (IIIT-Delhi, 2023-12-03)
    Cardiovascular diseases (CVD) include a variety of conditions affecting the heart and blood vessels, often arising from complex interplay of genetic predisposition, lifestyle factors, and environmental influences. Myocardial ...
  • Asthana, Siddhartha; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2017-01)
    Enabling support for information exchange has a great impact on the development of different sections of the society. Mobile phones using telecommunication services have enabled such support in several scenarios including ...
  • Prakash, Divay; Kumar, Hemant (Advisor) (IIIT-Delhi, 2017-04-18)
    The building management HVAC(heating, ventilation and air conditioning) system for Phase II of IIIT-Delhi campus is designed to take care (and advantage) of diversity of use. Instead of using large AHUs(Air Handling ...
  • Kumar, Piyush; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT- Delhi, 2021-08)
    Free and open communication over the Internet is essential for the overall advancement of modern societies. However, there are numerous ways with which malevolent adversaries try to control the flow of information, by ...
  • Agarwal, Anshika; Gosain, Devashish; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Agarwal, Anshika; Chakravarty, Sambuddho (Advisor) (2016-09-15)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more towards free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Jain, Prachi; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of ...

Search Repository


Advanced Search

Browse

My Account