Browsing Year-2020 by Title

Sort by: Order: Results:

  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Mittal, Shravika; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...
  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Anand, Gyanesh; Shah, Rajiv Ratn (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-05-31)
    With the explosion of healthcare information, there has been a tremendous amount of heterogeneous Textual Medical Knowledge(TMK), which plays an essential role in healthcare information systems. Existing works for integrating ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Singh, Mandeep; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2020-07)
    A memory efficient filter based iterative algorithm is proposed for a two-player zero sum linear differential game problem arising in the control of process systems affected by disturbances.The objective in such a scenario ...
  • Sood, Raghav; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2020-05-31)
    Modality refers to how something happens or is experienced. It is the representation format in which information is stored. Multimodal Learning involves relating information from multiple sources. Many modalities are ...
  • Prakash, Pragya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Ramanathan, Varun; Raman, Rajiv (Advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...
  • Aggarwal, Aayush; Das, Syamantak (Advisor) (IIIT Delhi, 2020-06-06)
    We are given a bipartite graph G(R, S, E) (|R| = |S|), where R denotes the set of requests and S being the set of servers. The requests R (given by an adversary) arrive sequentially along with their distances to each of ...
  • Sachdeva, Nikhil; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-06-08)
    Ontology Learning is the semi-automatic and automatic extraction of ontology from a natural language text, using text-mining and information extraction. Each ontology primarily represents some concepts and their corresponding ...
  • Photo DNA 
    Singh, Aditya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT Delhi, 2020-05-26)
    Awareness of sexual abuse of children has grown enormously over the past two decades - however, the recent advancements in technology has also made it easier to propagate it. To tackle this problem, we develop an image ...
  • Chauhan, Arushi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-02)
    Convolutional neural networks are being extensively used in real world applications like image and video classification, natural language processing, medical image analysis, recommender systems etc. where previously machine ...
  • Sanghvi, Nilay; Singh, Sushant Kumar; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-01)
    The non-intrusive nature and high accuracy of face recognition algorithms have led to their successful deployment across multiple applications ranging from border access to mobile unlocking and digital payments. However, ...
  • Bhagat, Dhruv; Mahalwal, Manish; Sujit, PB (Advisor) (IIIT-Delhi, 2020-05-30)
    In pursuit-evasion problems, we are presented with one or more pursuers attempting to capture one or more evaders. We consider the same problem in a bounded and convex physics-based environment. In our case, the agents ...
  • Agarwal, Navdha; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-06-03)
    Code clone detection plays an important role in software maintenance and evolution. There are many new applications emerging that rely on clones detected across software systems, and hence to address this, many code clone ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Shah, Daksh; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    Stack Overflow, a Q&A site on programming, awards reputation points and badges (game elements) to users on performing various actions. Situating our work in Digital Signaling Theory, we investigate the role of these game ...

Search Repository


Advanced Search

Browse

My Account