Browsing Year-2018 by Title

Sort by: Order: Results:

  • Saini, Kunal; Subramanyam, A.V (Advisor) (IIIT-Delhi, 2018-04-18)
    Visual tracking and person re-identification has gathered a lot of attention in computer vision due to its challenging nature and importance in surveillance applications. In this work, we explore the on-board visual tracking ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Agarwal, Ayush; Sinha, Akshat; Arora, Chetan (Advisor); Gupta, Anubha (IIIT-Delhi, 2017-04-18)
    The automated segmentation of Brain MRI is an important initial step in the application of anomaly detection and pain localization due to neurological diseases. In this view, we aim to segment the sub structures (Caudate, ...
  • Prakash, Divay; Kumar, Hemant (Advisor) (IIIT-Delhi, 2017-04-18)
    The building management HVAC(heating, ventilation and air conditioning) system for Phase II of IIIT-Delhi campus is designed to take care (and advantage) of diversity of use. Instead of using large AHUs(Air Handling ...
  • Verma, Ishita; Saran, Nitika; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Pose estimation is a fundamental problem in computer vision and is prevalent in numerous applications such as object-detection, tracking etc. Generally, in pose estimation between two camera views, we have 6 degrees of ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Kalra, Harshvardhan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2018-07-06)
    Current face recognition systems make extensive use of class-wise disparate features drawn from faces in order to achieve state-of-the-art performances. However, there exists a multitude of information in a given image ...
  • Gupta, Divam; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    First person videos captured from wearable cameras are growing in popularity.Standard algo- rithms developed for third person videos often do not work for such egocentric videos because of drastic change in camera ...
  • Saurav, Sakti; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-11-17)
    Did you know that India is now the home to world's largest number of blind people? 41% of the blind population are from India. And one of the real security concerns of visually impaired persons is that whether they get ...
  • Munagala, Deepak; Sujit, PB (Advisor) (IIIT-Delhi, 2017-07-25)
    Disaster simulations can be used to better prepare the disaster management relief forces. Through simulation, we can find out how buildings and people react to oods, measure the scale of destruction during disasters, and ...
  • Grover, Sonakshi; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2017-11-16)
    This project involves the identification of miRNAs that are differentially expressed across Indolent Vs Progressive and Case Vs Control samples in Chronic Lymphocytic Leukemia (CLL). For this, we have analysed miRNA ...
  • Wala, Rounaq Jhunjhunu; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Use of higher order clique potentials in MRF-MAP problems has been limited primarily because of the inefficiencies of the existing algorithmic schemes. A combinatorial algorithm called Generic Cuts Algorithm was proposed ...
  • Parmar, Lohitaksh; Kumaraguru, Ponnurangam (Advisor); Ahmed, Mustaque (Advisor); Gupta, Payas (Advisor) (IIIT-Delhi, 2017-04-18)
    The main aim of a scam campaign is to get the maximum monetary benefit with maximum reach and least infrastructure. This makes Online Social Networks (OSNs) such as Facebook and Twitter prime targets for such campaigns. ...
  • Diwan, Parikshit; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-18)
    Residential Electricity consumption accounts for 25% of electric energy consumption consumed in India and is expected to increase in the future to rapid urbanization, growing income levels, etc. In this project we have ...
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswnath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Khare, Alind; Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-07-05)
    The goal of graph mining is to extract interesting sub graphs from a single large graph (e.g., a social network), or from a database of many graphs.This thesis has modified the FSM-H algorithm (algorithm for frequent sub ...
  • Gupta, Gautam; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...

Search Repository


Advanced Search

Browse

My Account