IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Aggarwal, Nisha; Sureka, Ashish (Advisor) (2014-03-14)
    YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A signi cant percentage of videos uploaded on YouTube contains objectionable content and violates ...
  • Gupta, Saloni; Saxena, Simran; Singh, Pushpendra (Advisor) (2017-04-18)
    There has been an increasing need to have access to everything on Mobile phones due to the ease of access and portability. With this aim, we decided to bring the Innovation, Research and Development (IRD) Activities being ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet (2012-10-12)
    In developing countries, smartphones and high bandwidth connections are not yet within the reach of majority of the people. To share multimedia content among themselves, people rely on manual local sharing mechanisms i.e. ...
  • Verma, Richa; Arora, Chetan (Advisor) (2017)
    India is currently home to around 12 million blind people out of 39 million globally - one-third of the world's blind population resides in India. People with low vision or complete blindness find it hard to navigate ...
  • Agarwal, Prerna; Arora, Chetan (Advisor) (2017-07)
    As the volume of video data is increasing day by day, real-time video processing is becoming an important application to build any real time device based on image processing. An interesting task that is crucial for the ...
  • Mittal, Abhishek; Sharma, Ishan; Gunturi, Viswanath (Advisor) (2017-04-18)
    In this paper we will be mentioning the various facets of our research project. We will go through the need to solve the problem of navigability and its relevance to today’s world. We have compared this model to the existing ...
  • Wadhwa, Mohit; Sujit, PB (Advisor) (2017-04-18)
    We study the problem of multi-agent task allocation and planning with local communication between agents. Centralized planning algorithms for task allocation limits the range of the mission and the fixed location where the ...
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Gupta, Gautam; Bera, Debajoyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushlani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Singh, Mridula; Kaul, Sanjit (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2012-03-14)
    Simultaneous latent fingerprints are a cluster of latent fingerprints that are concurrently deposited by the same person. Though ACE-V methodology provides the scientific basis for matching latent fingerprints, extending ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Agarwal, Swati; Sureka, Ashish (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-06)
    Online Social media platforms such as Tumblr, Twitter (micro-blogging website) and YouTube (video sharing website) contains information which is publicly available or open-source. Open source social media intelligence ...

Search Repository


Advanced Search

Browse

My Account