IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Rattey, Hemant; Prashant; Moyers Jr., Timothy Scott (Advisor) (IIITD-Delhi, 2019-11-26)
    Making games is a comparatively new eld which demands technical as well as creative ability. Game Development is increasingly becoming popular among millennials. Developing a game involves designing the levels, programming ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Jain, Siddhartha; Raman, Rajiv (Advisor); Ram, Samrith (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a set of axis-parallel rectangles on a plane, can you cut out a constant fraction of them using only Guillotine cuts? We try to answer this question in the project. The general problem of cutting out convex sets was ...
  • Garg, Mannika; Singh, Pushpendra (advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Makkar, Sakshi; Chakraborty, Tanmoy (advisor) (IIIT-Delhi, 2020-07)
    Online hate speech, particularly over microblogging platforms like Twitter, has emerged as arguably the most severe issue of the past decade. Several countries have reported a steep rise in hate crimes infuriated by ...
  • Garg, Rishabh; Baweja, Yashasvi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2018-11)
    Heterogeneous biometric recognition requires matching images with variations such as resolution and spectrum. Heterogeneity in images often reduces the inter-class homogeneous distance while increasing the intra-class ...
  • Mittal, Shravika; Chakraborty, Tanmoy (advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav(Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswnath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Bhatnagar, Juhi; Kumaraguru, Ponnurangam (Advisor); Venkatraman, Shriram (Advisor) (2017-04-18)
    This study examines selfie as a human-driven action and investigates how selfies can turn into killfies by examining the user behavior associated with selfies. Three data collection techniques are discussed - interviews, ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...

Search Repository


Advanced Search

Browse

My Account