Browsing Year-2016 by Title

Sort by: Order: Results:

  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Sharma, Veronica; Goyal, Vikram (Advisor) (2016-10-25)
    High Utility Itemset Mining (HUIM) has gained significant progress in recent years. The HUIM refers to the method of finding most relevant itemsets from a database and it finds its applications in the domain of senosor ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Vij, Megha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-07-18)
    We look at the problem of using accelerometer in smartphones to detect whether the user is at a metro train station or in a metro train. Currently, we have solutions to detect simple activities, such as sitting or walking. ...
  • Srivastava, Shubham; Bera, Debajyoti (Advisor) (2016-09-15)
    The primary aim of any survey is to facilitate analysis of sensitive data to extract useful information, without jeopardizing privacy of the participants. Privacy models like k-anonymity do not guarantee privacy against ...
  • Banerjee, Ruchika; Naik, Vinayak (Advisor) (2016-09-15)
    Wide proliferation of smart mobile phones has manifolded the bandwidth demand, as video streaming applications have significantly gained popularity. At the same time, technical challenges, such as requirements of resources, ...

Search Repository


Advanced Search

Browse

My Account