Browsing by Title

Sort by: Order: Results:

  • Malik, Manasi; Bagler, Ganesh (Advisor); Banerjee, Arpan (Advisor) (IIITD-Delhi, 2019-05-31)
    We perceive the world around us through multiple senses. Perception of different senses is linked to different regions in the brain. Integration of the perception of objects through multiple senses enables the brain to ...
  • Gupta, Gautam; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2017-08-15)
    Enumerating maximal bicliques is essential to analyze several biological networks. For example bicliques in gene expression data helps us to maps a set of genes to their biological function. Statistical methods have been ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Kasliwal, Pankhuri; Anand, Saket (advisor) (IIIT-Delhi, 2019-11-16)
    Convolutional Neural Networks are trained using a gradient descent back propagation technique which trains weights in each layer for the sole goal of minimizing training error. Hence, the resulting weights cannot be ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Jindal, Sarthak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-15)
    The spread of fake news poses a serious problem in today’s world where the masses consume and produce news using online platforms. One main reason why fake news detection is hard is the lack of ground truth database for ...
  • Pankhuri; Hashmi, Mohammad S. (Advisor) (2017-08-21)
    The reduction in the device dimensions, the increasing switching activity and the high power consumption in the IC design cause large currents to flow in a Power Distribution network (PDN). The switching currents cause the ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushlani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushlani, Manohar (Advisor) (IIITD-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report, we will be shedding some light on different and fascinating ways like how and what ...
  • Kabra, Tanay; Bohara, Vivek Ashok (Advisor) (2017-04-10)
    A light emitting diode (LED) acts as a transmitter in visible light communication (VLC) system. However, the nonlinear characteristics of LED limits the performance of the VLC system by degrading the quality of transmitted ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...
  • Malhotra, Rahul; Deb, Sujay (Advisor) (2015-12-07)
    State of the art automotive microcontrollers (MCUs) implementing complex system-on-chip (SoC) architectures requires often additional functional patterns to achieve high degree of reliability. Functional pattern family ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Chitkara, Neha; Fell, Alexander (Advisor) (2015-12-07)
    In this thesis a novel, low memory P-Skip mode decision algorithm for encoding video sequences is proposed. The existing algorithms for P-Skip estimation require reading the previous frames from the memory. The proposed ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Prakash, Pragya; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Singh, Mridula; Kaul, Sanjit (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2012-03-14)
    Simultaneous latent fingerprints are a cluster of latent fingerprints that are concurrently deposited by the same person. Though ACE-V methodology provides the scientific basis for matching latent fingerprints, extending ...
  • Garg, Surabhi; Chang, Donghoon (advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...

Search Repository

Browse

My Account