IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Maji, Kartik; Sinha, Shubham; Aggarwal, Taruvar; Singh, Pushpendra (Advisor) (2017-04-30)
    The present invention, generally relates to a navigation aid for visually challenged people, and is essentially an escort bot system and method for providing navigational aid to the visually challenged and senior citizens.
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Singh, Katyayani; Sharma, Ojaswa (Advisor); Dey, Arindam (Advisor) (IIITD-Delhi, 2018-04-30)
    In this work, we evaluate the applicability of Augmented Reality and Virtual Reality in designing enhanced learning experiments for children. Such an intervention can prove to be very useful to kids with reduced cognitive ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Dhawan, Sarthika; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2019-04-15)
    Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, scammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. ...
  • Gupta, Aayushee; Dutta, Haimonti (Advisor) (IIIT Delhi, 2014-09-05)
    Historical newspaper archives provide a wealth of information. They are of particular interest to genealogists, historians and scholars for People Search. In this thesis, we design a People Gazetteer from the noisy OCR ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata MV (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Chopra, Shaan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor); Malhotra, Aakarsh (Mentor) (IIITD-Delhi, 2019-01-22)
    Biometrics based user authentication is rather popular in mobile devices using face and fingerprints as the primary modalities. Fingerphoto (an image of a person’s finger captured using an inbuilt smartphone camera) based ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Jain, Shilpi; Goyal, Vikram (Advisor) (2014-07-10)
    In the current changing trends, collaboration between di erent organizations or consolidation between applications of the same organization has become a common phenomenon. In order to achieve strategic business objectives ...

Search Repository


Advanced Search

Browse

My Account