IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Deka, Namrata; Kaul, Sanjit (Advisor); Anand, Saket (Advisor) (2017-04-18)
    This report outlines my work in continuation to last semester on understanding human behavior when it comes to driving on Indian streets. Since traffic in India is not governed by lane-markings, zebra crossings and proper ...
  • Goyal, Vikram; Dawar, Siddharth (2015-02-11)
    High-utility itemset mining is an emerging research area in the field of Data Mining. Several algorithms were proposed to find high- utility itemsets from transaction databases and use a data structure called UP-tree ...
  • Phokela, Kanchanjot Kaur; Naik, Vinayak (Advisor) (2017-07)
    Sleep plays a crucial part of one’s physical and mental wellbeing. Polysomnography, which is the gold standard for measuring and analyzing sleep requires the subject to sleep overnight with many expensive sensors attached ...
  • Chandok, Srishti; Kumaraguru, Ponnurangam (Advisor) (2017)
    The Online Social Network (OSN) landscape has transformed significantly over the past few years with the emergence of networks. The primary capabilities of these online networks differ. Few of the major leading ones are: ...
  • Vij, Megha; Naik, Vinayak (Advisor); Gunturi, Venkata MV (Advisor) (2016-07-18)
    We look at the problem of using accelerometer in smartphones to detect whether the user is at a metro train station or in a metro train. Currently, we have solutions to detect simple activities, such as sitting or walking. ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Behavioral finance is an upcoming research field which is drawing a lot of attention of both academia and industry. With changing dynamics of internet behavior of millions across the globe, it provides opportunity to ...
  • Srivastava, Shubham; Bera, Debajyoti (Advisor) (2016-09-15)
    The primary aim of any survey is to facilitate analysis of sensitive data to extract useful information, without jeopardizing privacy of the participants. Privacy models like k-anonymity do not guarantee privacy against ...
  • Anand, Kritika; Sureka, Ashish (Advisor) (2015-06-09)
    Process Aware Information Systems (PAIS) are IT systems which support business processes and generate event-logs as a result of execution of the supported business processes. Fuzzy-Miner (FM) is a popular algorithm within ...
  • Banerjee, Ruchika; Naik, Vinayak (Advisor) (2016-09-15)
    Wide proliferation of smart mobile phones has manifolded the bandwidth demand, as video streaming applications have significantly gained popularity. At the same time, technical challenges, such as requirements of resources, ...
  • Saxena, Shobhita; Subramanyam, AV (Advisor) (2015-12-03)
    In recent years due to advancement in video and image editing tools it has become increasingly easy to modify the multimedia content. The doctored videos are very di cult to identify through visual examination as ...
  • Kundra, Divya; Sureka, Ashish (Advisor) (2015-06-16)
    Process Mining consists of extracting valuable information from event logs produced by Process Aware Information Systems (PAIS) which support business processes and generate event logs as a result of execution of ...
  • Joishi, Jeevan; Sureka, Ashish (Advisor) (2015-03-12)
    Information Systems today record the execution of activities into event logs. Process Mining is an area of research that deals with the study and analysis of various business processes based on these event logs. These ...
  • Sitani, Divya (Advisor); Subramanyam, AV (Advisor); Majumdar, Angshul (Advisor) (2017-08)
    Visual tracking or object tracking is the process of estimating the state of the target in successive frames of a video sequence. It is an integral part of a plethora of applications like security, surveillance, navigation ...
  • Thakur, Shailja; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Increasing energy consumption of commercial buildings has motivated numerous energy tracking and monitoring systems in the recent years. A particular area that is less explored in this domain is that of energy apportionment ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2013-02-06)
    Twitter is a popular micro-blogging website which allows users to post 140-character limit mes- sages called tweets. Twitter users (also called Twitterers) post activity messages about their daily lives, opinions on ...
  • Gupta, Parul; Singh, Pushpendra (Advisor); Goyal, Vikram (Advisor) (2015-12-03)
    181 women distress helpline provides immediate assistance to women in distress and helps them overcome emotional and bureaucratic challenges. In this work, we present the detailed understa ndings of our qualitative and ...
  • Verma, Arjun; Biyani, Pravesh (Advisor) (2017-07-05)
    Ratings of restaurants given in Zomato website are comprised of many factors. It doesn't tell any tailored information of each restaurant like what are the top dishes of a particular restaurant, how is the ambience, etc. ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji(Advisor); Kaulgud, Vikrant(Advisor) (IIIT-Delhi, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Singh, Manish Kr.; Nandan, Ashutosh; Punia, Darvesh; Vasu; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-11-16)
    In the course of this BTP, an online social blogging platform has been developed named – Zailet. Zailet aims to create an open source community which would allow any of its user to create blog posts on our portal. Every ...

Search Repository


Advanced Search

Browse

My Account