IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Gautam, Alvika; Naik, Vinayak (Advisor) (2014-07-17)
    Sleep quality and quantity a ects an individual's personal health. Polysomnography (PSG) is the conventional approach for sleep monitoring. PSG has several limitations in terms of sleep monitoring by a regular user. A ...
  • Mondal, Sutapa; Mutharaju, Vijaya Raghava (Advisor); Bhatia, Sumit (Advisor) (IIIT-Delhi, 2020-07)
    Knowledge graph (KG) embedding models have recently gained increased attention. However, most of the existing models for KG embeddings ignore the structure and characteristics of the underlying ontology. KGs are not ...
  • Monteiro, Kyzyl John; Parnami, Aman (Advisor) (IIIT-Delhi, 2023-05)
    We introduce Teachable Reality, an augmented reality (AR) prototyping tool for creating interactive tangible AR applications with arbitrary everyday objects. Teachable Reality leverages vision-based interactive machine ...
  • Mohan, Nitinder; Singh, Pushpendra (Advisor) (2015-12-01)
    Content Centric Network is a proposed future networking paradigm where data is the central entity for communication and the correspondence model follows two-step approach for data delivery. With increasing research in this ...
  • Singh, Digvijay; Singh, Pushpendra (Advisor) (2015-12-02)
    A key factor limiting the wide adoption of ubiquitous computing enabling systems is the need for deployment of expensive sensors and hardware to provide contextual information. These sensors deployments are not commonly ...
  • Dev, Harshal; Maity, Mukulika (Advisor); Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2021-12)
    IEEE 802.11ax, popularly known as WiFi 6, introduces OFDMA (Orthogonal Frequency Division Multiple Access) that allows multiple users to transmit or receive frames concurrently via a more flexible utilization of the available ...
  • Rathee, Ravi; Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-06)
    Mobile devices like smartphones can augment their low-power processors by offloading GPU- heavy applications to cloud servers. However, cloud data centers consume a lot of energy and have high latency. To mitigate the ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Simran; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-12)
    Extreme Abstractive Summarization of long scientific papers requires domain knowledge and a concise summary maintaining faithfulness to the source and covering novel aspects presented in the paper. Human annotations are ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Jain, Shreyansh; Jerripothula, Koteswar Rao (Advisor) (IIIT-Delhi, 2023-05)
    With the growing awareness regarding user privacy and the demand for transparency, traditional distributed machine learning algorithms are becoming taboo that uses the user’s data without any restriction or privacy. The ...
  • Saha, Sanchita; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-05)
    Quantum algorithms like Shor’s and Grover’s algorithms have proven to break several cryptographic schemes theoretically. Shor’s algorithm, which can factor numbers exponentially faster than classical computers, can break ...
  • Gupta, Aayushee; Dutta, Haimonti (Advisor) (IIIT Delhi, 2014-09-05)
    Historical newspaper archives provide a wealth of information. They are of particular interest to genealogists, historians and scholars for People Search. In this thesis, we design a People Gazetteer from the noisy OCR ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...

Search Repository


Advanced Search

Browse

My Account