Browsing by Title

Sort by: Order: Results:

  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...
  • Kalra, Isha; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-05-20)
    Unmanned Aerial Vehicles (UAVs) or drones are often used to reach remote areas or regions which are inaccessible to humans. Equipped with a large eld of view, compact size, and remote control abilities, drones are deemed ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Dhawan, Sarthika; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2019-04-15)
    Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, scammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. ...
  • Kaur, Avneet; Roy, Sayan Basu (advisor); Banerjee, Shilpak (advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Kaur, Avneet; Bharti, Moh; Roy, Sayan Basu (advisor); Banerjee, Shilpak (advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Agarwal, Abhishek; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-07)
    A significant advancement in molecular biology has expanded the understanding of the biology of different diseases. However, these discoveries have not completely evolved into the precise treatment of the patient with ...
  • Gupta, Aayushee; Dutta, Haimonti (Advisor) (IIIT Delhi, 2014-09-05)
    Historical newspaper archives provide a wealth of information. They are of particular interest to genealogists, historians and scholars for People Search. In this thesis, we design a People Gazetteer from the noisy OCR ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata MV (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Agrawal, Dewangee; Kumar, Suraj Prathik; Bhatia, Sumit (advisor); Mutharaju, V. Raghava (advisor) (IIIT-Delhi, 2019-11-15)
    We address the problem of finding a textual summary of facts within a path in a knowledge graph.Knowledge graphs are increasingly used in search engines and store data in the form of a Semantic Web structure making ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Chopra, Shaan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor); Malhotra, Aakarsh (Mentor) (IIITD-Delhi, 2019-01-22)
    Biometrics based user authentication is rather popular in mobile devices using face and fingerprints as the primary modalities. Fingerphoto (an image of a person’s finger captured using an inbuilt smartphone camera) based ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Dwivedi, Namrata; Bohara, Vivek Ashok (Advisor) (IIIT Delhi, 2014-09-05)
    Radio Frequency (RF) High Power Amplifiers (HPAs) are one of the basic building blocks of modern wireless communication system. But most of these broadband wireless communication systems such as Universal Mobile ...
  • Narang, Gaurav; Fell, Alexander (Advisor) (2015-12-07)
    Embedded memories are the key contributor to the chip area, dynamic power dissipation and also form a signicant part of critical path for high performance advanced SoCs. Therefore, optimal selection of memory instances ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Deep, Gyan; Darak, Sumit Jagdish (Adviosr) (2017-12-15)
    To support wide variety of services ranging from voice, high-speed data and multimedia, multi-standard wireless communication transceivers (MWCT) are desired. Such transceivers have the capability to adapt to any desired ...

Search Repository

Browse

My Account