IIIT-Delhi Institutional Repository

Browsing PhD Theses by Title

Browsing PhD Theses by Title

Sort by: Order: Results:

  • Lone, Haroon Rashid; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-12)
    Buildings consume 50% of the total available electrical energy. Studies show that up to 20% of the energy gets waste due to several reasons such as appliance misconfigurations, faults, and abnormal user behavior. The ...
  • Sharma, Shalini; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2022-09)
    Time series analytics is the practice of determining future values of correlated signals. In seminal works, time series were modeled using classical techniques such as ARMA (autoregressive moving average), and its variants ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...
  • Bhatt, Himanshu S; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2014-04-14)
    A covariate in face recognition can be defined as an effect that independently increases the intra-class variability or decreases the inter-class variability or both. Covariates such as pose, illumination, expression, ...
  • Rastogi, Ayushi; Nagappan, Nachiappan (Advisor); Jalote, Pankaj (Advisor) (IIIT-Delhi, 2017-08)
  • Saxena, Anuj Shanker; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2019-04)
    The ubiquity of mobile devices has led to the deployment of many mobile applications for providing different types of services, like internet access, route recommendation, cab finder, nearby friends, etc. Some of these ...
  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Gupta, Monika; Jalote, Pankaj (Advisor); Serebrenik, Alexander (Advisor) (IIIT-Delhi, 2019-12)
    Software maintenance refers to the modification of software product after delivery and is required to correct faults, to improve the performance or other attributes, or to adapt the product to a modified environment. It ...
  • Leeka, Jyoti; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2017-12)
    RDF data management has received a lot of attention in the past decade due to the widespread growth of Semantic Web and Linked Open Data initiatives. RDF data is expressed in the form of triples (as Subject - Predicate - ...
  • Gupta, Pooja; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2023-09)
    There are many real-world problems pertaining to the need for the fusion of information from multiple sources. Consider, for example, the problem of demand forecasting that requires estimating the power consumption at a ...
  • Sharma, Anil; Anand, Saket (Advisor); Kaul, Sanjit Krishnan (Advisor) (IIIT-Delhi, 2022-07)
    Surveillance camera networks are a useful monitoring infrastructure dat can be used for various visual analytics applications, where high-level inferences and predictions could be made based on target tracking across teh ...
  • Kaur, Ramneek; Goyal, Vikram (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (IIIT-Delhi, 2022-06)
    Transportation is a fundamental task in modern-day civilization. Examples of transportation in our daily lives include going to the workplace, returning home after work, etc. In this thesis, we investigate computational ...
  • Malhotra, Aakarsh; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2024-01)
    Attributed to extensive acceptance and research, lives can and inked fingerprints are successfully used for human recognition. However, applications such as contactless biometrics amidst the pandemic and crime scene ...
  • V, Venktesh; Mohania, Mukesh (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2023-03)
    Education in traditional classroom settings was restricted to static content in textbooks. It also assumes all the learners have a similar pace of learning. Online learning platforms have shifted the paradigm and have made ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...

Search Repository


Advanced Search

Browse

My Account