Browsing by Title

Sort by: Order: Results:

  • Rattey, Hemant; Prashant; Moyers Jr., Timothy Scott (Advisor) (IIITD-Delhi, 2019-11-26)
    Making games is a comparatively new eld which demands technical as well as creative ability. Game Development is increasingly becoming popular among millennials. Developing a game involves designing the levels, programming ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Verma, Astha; Subramanyam, A V (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2023-09)
    Generative modeling and adversarial learning have significantly advanced the field of computer vision, particularly in object recognition and synthesis, unsupervised domain adaptation, and adversarial attacks and defenses. ...
  • Rahman, Mir Mohsina; Hashmi, Mohammad S. (Advisor) (2014-07-11)
    Recent trends show increasing cases of implantable devices for monitoring and control of organs such as heart. The implantation of devices requires a multi stage evaluation process in order to make sure that these devices ...
  • Sharma, Khushal; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2022-05)
    The transmission of pathogens or infectious agents from animals to humans, i.e. zoonosis, is of global concern. Outbreaks pertaining to zoonosis have been the one of the major causes of fatalities worldwide. Both Influenza ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Gupta, Devansh; Chhabra, Parth; Anand, Saket (Advisor); Kalyanaraman, Kaushik (Advisor) (2021-11)
    In machine learning, disentangling factors of variation lead to robust latent space representations and improve the efficacy of various downstream tasks like classification, prediction etc. Disentangling representations ...
  • Himanshu; Pandey, Satish Kumar (Advisor) (IIIT-Delhi, 2022-05)
    While the project is about general exploration of geometry of Banach spaces, we plan to look carefully at the following two questions: 1. Does every infinite-dimensional Banach space contain an infinite dimensional reflexive ...
  • Singh, Advika; Eden, Grace (Advisor) (IIIT-Delhi, 2021-05)
    Storytelling is the art of sharing stories. This art has existed for centuries varying in different forms. This report looks at the technological intervention into this art. These tools vary according to the use. Giving ...
  • Singha, Anmol; Oberoi, Tejas; Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2021-05)
    In recent years, researchers have started putting in extensive efforts for Natural Language Pro- cessing (NLP) in the context of Indic Languages like Hindi. Tasks like Spell and Grammar Correction, which have been ...
  • Rajgaria, Abhishek; Rastogi, Preyansh; Goyal, Vikram (Advisor) (IIIT-Delhi, 2020-06)
    Subgraph isomorphism problem is one of the most frequently encountered and extensively studied in the big graph database model and in Graph Theory. Graph Sub isomorphism problem is approached with machine learning techniques ...
  • Ali, Saif; Arora, Gaurav (Advisor) (IIIT-Delhi, 2023-12-17)
    A significant body of literature has pointed to a causal relationship between agricultural irrigation and groundwater depletion in India. Despite these allusions, I know of no rig- orous estimation of the causal impact of ...
  • Goel, Smera; Ratn, Anoop (Advisor) (IIIT-Delhi, 2021-12)
    The painted animation technique is a mixed media approach towards animation. It involves physically manipulating paint and capturing it digitally to produce an animation. Physically painting the frames gives it a textured ...
  • Aggarwal, Priya; Gupta, Anubha (Advisor) (2015-12-07)
    In the recent year, road accidents in India have drastically increased. Owing to this, there is a need for reliable and robust data transmission in vehicular communication. IEEE 802.11p standard is a dedicated wireless ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Jain, Siddhartha; Raman, Rajiv (Advisor); Ram, Samrith (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a set of axis-parallel rectangles on a plane, can you cut out a constant fraction of them using only Guillotine cuts? We try to answer this question in the project. The general problem of cutting out convex sets was ...
  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...

Search Repository

Browse

My Account