IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Ujjainia, Anjali; Singhal, Nikhil; Babbar, Karishma; Upadhyaya, Utkarsh; Jha, Prashant (Advisor) (2017)
    This project is in continuation with the previous semester. The previous semester's work revolved around understanding the Indian health care system, with the primary focus on all aspects related to prescriptions. This is ...
  • Hegde, Srinidhi; Anand, Saket (Advisor); Sharma, Ojaswa (Advisor) (2017-04-18)
    Recent advancement in deep learning techniques has opened doors for wide variety of applications. With growing interests in deep learning and geometry, lots of computer vision problems have been tackled using deep learning. ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Singhal, Shitij; Kaul, Sanjit (Advisor) (2017-04-18)
    An autonomous vehicle is a vehicle which has the capabilities to move from one location to another with the help of inputs from various sensors connected to a computer which are used to plan the path for the vehicle, without ...
  • Amit; Naik, Vinayak (Advisor) (2014-07-10)
    The area of sensing has witnessed signi cant development over the past two decades. Body of work on sensors has focused on individual sensors, sensor networks, in-network data processing and distributed query processing. ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (Advisor) (2015-07-08)
    Online social media is a powerful platform for dissemination of information during important real- world events. Beyond the challenges of volume, variety and velocity of content generated on online social media, veracity ...
  • Mongia, Aanchal; Gunturi, Venkata M. V.; Naik, Vinayak (IIIT-Delhi, 2017-11-29)
    Our paper aims to build a classification-model which delineates the typical motion-related activities performed at a metro station using smart phone sensors. We focus on typical movements, such as climbing the stairs or ...
  • Agrawal, Swati; Sureka, Ashish (Advisor) (2013-04-08)
    YouTube is one of the largest video sharing website on the Internet. Several music and record companies, artists and bands have o cial channels on YouTube (part of the music ecosystem of YouTube) to promote and monetize ...
  • Jati, Arpan; Sanadhya, Somitra Kumar (Advisor) (2013-07-09)
    Many Peer to Peer (P2P) protocols and applications have become popular in the recent years and P2P accounts for a very large portion of the internet traffic. But, most protocols are designed with speed and efficiency in ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT Delhi, 2014-09-05)
    Mobile robots are increasingly being used for tasks like remote surveillance, sensing and maintenance. Some of these tasks are critical and require intelligent decision making for successful completion. It is not always ...
  • Batra, Manav; Naik, Vinayak (Advisor) (2017-07-05)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers but not quite there yet in implementation. However, with the heavy penetration of the Internet in the world ...
  • Singh, Ankur; Swami, Herrman; Mor, Prikankshit; Narayan, Priyank (Advisor) (2017-04-18)
    FestaVesta.com is an event ticketing and management company that helps you organize better events with our technologies. We make various kinds of registrations, entry and management solutions for events and also help you ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...
  • Gautam, Alvika; Naik, Vinayak (Advisor) (2014-07-17)
    Sleep quality and quantity a ects an individual's personal health. Polysomnography (PSG) is the conventional approach for sleep monitoring. PSG has several limitations in terms of sleep monitoring by a regular user. A ...
  • Bhatt, Himanshu S; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2014-04-14)
    A covariate in face recognition can be defined as an effect that independently increases the intra-class variability or decreases the inter-class variability or both. Covariates such as pose, illumination, expression, ...
  • Rastogi, Ayushi; Nagappan, Nachiappan (Advisor); Jalote, Pankaj (Advisor) (IIIT-Delhi, 2017-08)
  • Mohan, Nitinder; Singh, Pushpendra (Advisor) (2015-12-01)
    Content Centric Network is a proposed future networking paradigm where data is the central entity for communication and the correspondence model follows two-step approach for data delivery. With increasing research in this ...
  • Singh, Digvijay; Singh, Pushpendra (Advisor) (2015-12-02)
    A key factor limiting the wide adoption of ubiquitous computing enabling systems is the need for deployment of expensive sensors and hardware to provide contextual information. These sensors deployments are not commonly ...

Search Repository


Advanced Search

Browse

My Account