Browsing Year-2018 by Title

Sort by: Order: Results:

  • Gupta, Divam; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    First person videos captured from wearable cameras are growing in popularity.Standard algo- rithms developed for third person videos often do not work for such egocentric videos because of drastic change in camera ...
  • Saurav, Sakti; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-11-17)
    Did you know that India is now the home to world's largest number of blind people? 41% of the blind population are from India. And one of the real security concerns of visually impaired persons is that whether they get ...
  • Munagala, Deepak; Sujit, PB (Advisor) (IIIT-Delhi, 2017-07-25)
    Disaster simulations can be used to better prepare the disaster management relief forces. Through simulation, we can find out how buildings and people react to oods, measure the scale of destruction during disasters, and ...
  • Grover, Sonakshi; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2017-11-16)
    This project involves the identification of miRNAs that are differentially expressed across Indolent Vs Progressive and Case Vs Control samples in Chronic Lymphocytic Leukemia (CLL). For this, we have analysed miRNA ...
  • Wala, Rounaq Jhunjhunu; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Use of higher order clique potentials in MRF-MAP problems has been limited primarily because of the inefficiencies of the existing algorithmic schemes. A combinatorial algorithm called Generic Cuts Algorithm was proposed ...
  • Parmar, Lohitaksh; Kumaraguru, Ponnurangam (Advisor); Ahmed, Mustaque (Advisor); Gupta, Payas (Advisor) (IIIT-Delhi, 2017-04-18)
    The main aim of a scam campaign is to get the maximum monetary benefit with maximum reach and least infrastructure. This makes Online Social Networks (OSNs) such as Facebook and Twitter prime targets for such campaigns. ...
  • Diwan, Parikshit; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-18)
    Residential Electricity consumption accounts for 25% of electric energy consumption consumed in India and is expected to increase in the future to rapid urbanization, growing income levels, etc. In this project we have ...
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswnath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Khare, Alind; Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-07-05)
    The goal of graph mining is to extract interesting sub graphs from a single large graph (e.g., a social network), or from a database of many graphs.This thesis has modified the FSM-H algorithm (algorithm for frequent sub ...
  • Gupta, Gautam; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushlani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Bhatia, Anam; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-18)
    It can be observed that students in hostels under high work pressure ( similar to IIITD ) often miss the most essential meals of the day. Project LazyPizza aims to crowd-source intra-university food delivery where students ...
  • Siddiqui, Sahar; Mehta, Sameep (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
    In the era of big data where every individual is a target of intensive data collection, there is a need to create technological tools that empower individuals to track what happens to their data. Provenance has been ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Pandey, Adesh; Thukral, Deepak; Gupta, Rishabh; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2017-11-16)
    Given a question on a crowd sourced Q&A platform, we tried to gauge the difficulty of the question. Earlier, we tried various NLP based techniques for this purpose. Now, we tried various graph models in order to model ...
  • Jain, Varun; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-19)
    The Government of India started its flagship programme 'ASHA' under the National Rural Health Mission (NRHM) which delivers health care services to the rural population and has a key focus on pregnable sections like women ...
  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...

Search Repository


Advanced Search

Browse

My Account