IIIT-Delhi Institutional Repository

Browsing PhD Theses by Title

Browsing PhD Theses by Title

Sort by: Order: Results:

  • Malhotra, Aakarsh; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2024-01)
    Attributed to extensive acceptance and research, lives can and inked fingerprints are successfully used for human recognition. However, applications such as contactless biometrics amidst the pandemic and crime scene ...
  • V, Venktesh; Mohania, Mukesh (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2023-03)
    Education in traditional classroom settings was restricted to static content in textbooks. It also assumes all the learners have a similar pace of learning. Online learning platforms have shifted the paradigm and have made ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Goswami, Chitrita; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2023-02)
    In an era where machine learning (ML) is changing the landscape of financial markets, education, security and privacy, the retail sector, and many other crucial aspects of human life, it is only fitting that we should use ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Mongia, Aanchal; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2020-09)
    Data analytics and computational techniques applied to biological sciences aid rapid technological advances, swift discoveries, and reliable analysis. A broad range of bountiful tools and algorithms have played pivotal ...
  • Arjunan, Pandarasamy; Singh, Amarjeet (Advisor); Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-03)
    As one of the largest consumers of overall energy, buildings have emerged as attractive targets for using information and communications technologies to advance large-scale sustainability goals. With increasing availability ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-04)
    Technological advances have enabled organizations to store large amounts of data cost-effectively. Patterns hidden in such massive databases can be valuable to industries to gain actionable knowledge and promote their ...
  • Kansal, Kajal; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-05)
    The rise of surveillance cameras has led to a significant focus on large scale deployment of intelligent surveillance systems. Person re-identification (Re-ID) is one of the quintessential surveillance problems. Person ...
  • Ghosh, Soumyadeep; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2023-03)
    Face recognition under controlled and constrained scenarios have reached a significant level of maturity with respect to performance and reliability. However, under unconstrained and un controlled settings, current ...
  • Garg, Surabhi; Chang, Donghoon (Advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...
  • Agarwal, Swati; Sureka, Ashish (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-06)
    Online Social media platforms such as Tumblr, Twitter (micro-blogging website) and YouTube (video sharing website) contains information which is publicly available or open-source. Open source social media intelligence ...
  • Ishant; Arora, Chetan (Advisor) (IIIT-Delhi, 2020-08-13)
    Many computer vision problems can be formulated as finding the best labeling configuration. If labelings satisfy Markov property then finding best labeling configuration becomes MRF (Markov Random Field)- MAP (Maximum A ...
  • Agarwal, Akshay; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT-Delhi, 2020-09)
    Mobile robots have become ubiquitous today and are used widely in sensor networks. Their use in applications involving long-term operations, remote sensing and complex environments is a widely studied area of research due ...
  • Sinha, Mitali; Deb, Sujay (Advisor) (IIIT-Delhi, 2022-04)
    In recent years, as multi-core processors are emerging as a solution to the limitations of power scaling, the software domain is also experiencing a surge of compute and data-intensive applications. These applications are ...
  • Bajaj, Garvita; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018)
    I am eternally grateful to a lot of people who, in no particular order, have helped me get through the tough times during the course of this dissertation. I have no words to thank my lovely parents who have always taught ...
  • Kumar, Sandeep; Pandey, Ashish Kumar (Advisor) (IIIT-Delhi, 2022-10)
    Disaster risk reduction is integral to social and economic development as per the 2030 Agenda of Sustainable Development. Among all the natural disasters, storms and floods have significant contributions in terms of their ...
  • Dhamecha, Tejas Indulal; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2017-07)
    Due to the unconstrained nature of data capture and non-cooperative subjects, automatic face recognition is still a research challenge for application scenarios such as law enforcement. We observe that challenges of face ...
  • Gosain, Devashish; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2020-07)
    The original design of the Internet was a resilient, distributed architecture, that should be able to route around (and therefore recover from) massive disruption — up to and including nuclear war. However, network routing ...

Search Repository


Advanced Search

Browse

My Account