Browsing by Title

Sort by: Order: Results:

  • Gupta, Tanish; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
  • Jain, Anubhav; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2018-01-09)
    Digital alterations have become a common trend on social media websites as well as in the entertainment industry, with magazine printing altered images of celebrities to make them look more attractive. Advancements in ...
  • Srivastava, Aryman; Dheeraj; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-04-29)
    Deep learning involves training machines to understand patterns, classify objects, and predict outcomes. This has led to the emergence of various fields, including computer vision, natural language processing, speech ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...
  • Iqbal, Mohd Shoaib; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2017-11-25)
    Frontal radar imaging has been proposed as an alternate technology to cameras for through wall surveillance and law enforcement. Cameras cannot see through wall as optic frequencies do not penetrate walls. On the other ...
  • Mishra, Biswasmita; Gupta, Ankush; Srivastava, Anmol (Advisor) (IIIT-Delhi, 2023-12-07)
    This project explores museum interactions and how they affect people of different ages. We identified a less explored area of study: how children, ages 7 to 12, engage with museum exhibits and further how such engagement ...
  • Singh, Shivendra; Grover, Anuj (Advisor) (IIIT-Delhi, 2019-07)
    As technology advances,semiconductor devices are becoming less predictable. This means device failure rate increases as we move down to lower technology nodes. According to ITRS roadmap upto 80% of SOC (Silicon On Chip) ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Ambooken, Alvin Joseph; Maity, Mukulika (Advisor) (IIIT-Delhi, 2023-11-29)
    Serverless computing has emerged as a tranformative field in the cloud computing world. It is being increasingly adopted in the industry due to the energy and cost savings associated with it. However, communications withing ...
  • Aamir, Mohd.; Grover, Anuj (Advisor) (IIIT- Delhi, 2021-05)
    Encryption algorithms are used to protect confidential data from unauthorized access by scrambling it into an unreadable format, using a private key. The security of the algorithm is largely dependent on the safety of the ...
  • Gupta, Abhinav; Saurabh, Sneh (Advisor) (IIIT-Delhi, 2024-04)
    In recent years, Machine Learning (ML) and Artificial Intelligence (AI) have become one of the hot topics for research and have found their use in various applications across different sectors like healthcare, automotive, ...
  • Kottur, Shaguftha Zuveria; Shah, Rinku (Advisor); Tammana, Praveen (Advisor); Kadiyala, Krishna (Advisor) (IIIT-Delhi, 2023-05)
    Control and management plane applications such as serverless function orchestration and 4G/5G control plane functions are offloaded to smartNICs to reduce communication and processing latency. Such applications involve ...
  • Aggarwal, Yash; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-05)
    With an increasing amount of hate on online social media platforms, automatic detection of toxic language plays a protecting role for online users and content moderators. Hence, it be- comes important to ensure that these ...
  • Singh, Vinod Kumar; Biswas, R. N. (Advisor) (IIIT Delhi, 2014-09-06)
    An approach is proposed to improve static timing analysis for early TA-signoff closure at Very Deep Sub-Micron (V-DSM) nodes. At higher technology nodes (>100nm) the timing path delay is governed mainly by the cells, and ...
  • Parashar, Varun; Kumar, Vivek (Advisor) (IIIT-Delhi, 2023-12-11)
    The project focuses on enhancing the energy efficiency of Nvidia GPUs, crucial for graphics, AI, and high-performance computing. The rising demand for GPUs has led to increased energy consumption, necessitating optimization ...
  • Suri, Saksham; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-01-10)
    The human mind processes the information in a complex fashion including utilization of color, shape, texture and symmetry-related meta-information. but in conjunction with a strong (domain) knowledge, these can boost the ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Sahrawat, Dhruva; Anand, Saket (Advisor); Kaul, Sanjit Krishnan (Advisor) (IIITD-Delhi, 2019-04-15)
    One of the major problems faced with advanced driver assistance systems is to correctly estimate Driver's situation awareness. We detect and track other vehicles and use that to predict if an accident will occur. We propose ...
  • Gupta, Monika; Jalote, Pankaj (Advisor); Serebrenik, Alexander (Advisor) (IIIT-Delhi, 2019-12)
    Software maintenance refers to the modification of software product after delivery and is required to correct faults, to improve the performance or other attributes, or to adapt the product to a modified environment. It ...
  • Goel, Arnav; Hira, Medha; Gupta, Anubha (Advisor) (IIIT-Delhi, 2023-11-29)
    We benchmark various Speech-to-Text (STT) and Text-to-Speech (TTS) models and performed an extensive literature review on downstream tasks such as Automatic Speech Recognition (ASR), Speech Emotion Recognition, Speaker ...

Search Repository

Browse

My Account