Browsing by Title

Sort by: Order: Results:

  • Agarwal, Anshika; Gosain, Devashish; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Agarwal, Anshika; Chakravarty, Sambuddho (Advisor) (2016-09-15)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more towards free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Jain, Prachi; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of ...
  • Mondal, Arpan; Ram, Shobha Sundar (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-07-09)
    This report is a brief literature study for applications of sensor fusion for making a robust and cheap advanced driver assistance service. We would mainly look into fusion of vision and RADAR, and look into various ...
  • Verma, Ishita; Saran, Nitika; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Pose estimation is a fundamental problem in computer vision and is prevalent in numerous applications such as object-detection, tracking etc. Generally, in pose estimation between two camera views, we have 6 degrees of ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Garg, Sasha; Darak, Sumit Jagdish (Advisor) (2017-07)
    Upcoming wireless communication networks are expected to support the wide variety of services ranging from low data rate applications such as wireless sensor networks to high data rate delay sensitive multimedia services. ...
  • Nambiar, Pranav; Arora, Chetan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-04-30)
    Text-to-speech systems generally require large amounts of annotated speech data with the quality of both the annotations and speech being a huge factor. As a result, most of the research performed has been on highly curated ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Vithalkar, Amogh; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2018-04-18)
    Radio Frequency Identification(RFID) has been gaining popularity recently over barcodes for a wide range of applications like inventory control, supply chain management, manufacturing,etc. With the increasing popularity ...
  • Ummalaneni, Vahini; Hashmi, Mohammad S. (Advisor) (IIIT-Delhi, 2017-04-18)
    In the course of this BTP,low cost chipless RFID tags have been designed. The proposed RFID tags are fully passive devices. They do not require chip assembly or any power supply. In the previous semester, the tag studied ...
  • Jain, Sagar; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2019-09)
    A Fabry Perot cavity (FPC) antenna consists of a primary radiator at the base of a dielectric cavity sealed with a partially reflecting surface at the other end. Excitation from the radiator is partially reflected by the ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Khurana, Prerna; Majumdar, Angshul (Advisor) (2016-09-13)
    In this work we propose a classification framework called class-wise deep dictionary learning (CWDDL). For each class, multiple levels of dictionaries are learnt using features from the previous level as inputs (for first ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Sharma, Siddhant; Naik, Vinayak (Advisor) (2017-04-18)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers, but not quite there yet in implementation. However, with the heavy penetration of the Internet in the ...
  • Goel, Pulkit; Anand, Saket (Advisor); Fell, Alexander (Advisor) (IIITD-Delhi, 2019-04-28)
    Deep learning neural networks have revolutionized the elds of Computer Vision, Robotics, Artifi cial Intelligence. However, these State of the art algorithms come at a high computational cost, huge memory requirements and ...

Search Repository

Browse

My Account