Browsing by Title

Sort by: Order: Results:

  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Agarwal, Akshay; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT-Delhi, 2020-09)
    Mobile robots have become ubiquitous today and are used widely in sensor networks. Their use in applications involving long-term operations, remote sensing and complex environments is a widely studied area of research due ...
  • Raj, Abhijit; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2020-07)
    Genetics has brought huge breakthroughs in understanding human health & wellbeing, diseases and treatment through modern methods such as personalized medicine. This has been possible through substantial research in the ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Shaikh, Mohd Hamza Naim; Bohara, Vivek Ashok (Advisor); Srivastava, Anand (Advisor) (IIIT-Delhi, 2023-01)
    The widespread proliferation of wireless services in daily life has boosted the demand for very high data rates. This plunge in data rate leads to an increase in energy consumption. As a result, in order to meet the ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Sikka, Utkrisht; Maity, Mukulika (Advisor) (IIIT-Delhi, 2022-12)
    High speed WiFi has become a necessity now-a-days. The latest standard of WiFi, IEEE 802.11ax, makes use of OFDMA, MU-MIMO, frame aggregation from different access categories, edca protocol, special Trigger frames that ...
  • Ahmad, Rizwana; Srivastava, Anand (Advisor) (IIIT-Delhi, 2021-05)
    Keywords- LiFi, WiFi, O-OFDM, PAPR, DP-OFDM, GMSK, DFT, O-GFDM, HLWN, load balancing, RL, RWP, ORWP. A significant increase in wireless communication has been observed over the past decade. The existing radio frequency ...
  • Sinha, Mitali; Deb, Sujay (Advisor) (IIIT-Delhi, 2022-04)
    In recent years, as multi-core processors are emerging as a solution to the limitations of power scaling, the software domain is also experiencing a surge of compute and data-intensive applications. These applications are ...
  • Rastogi, Divyansh; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2022-12)
    Federated learning has been a popular research subject in allowing diverse people and businesses to collaborate on machine learning model training while maintaining privacy. Additionally, in today’s world there is an ...
  • Arora, Kanika; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-07)
    An immense amount of data is generated daily usingmodern technologies in autonomous vehicles, IoT, smart grids, etc. But unfortunately, this data generated at the edge cannot be used for any machine learning model training ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...
  • Photo DNA 
    Singh, Aditya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT Delhi, 2020-05-26)
    Awareness of sexual abuse of children has grown enormously over the past two decades - however, the recent advancements in technology has also made it easier to propagate it. To tackle this problem, we develop an image ...
  • Gupta, Ojaswi; Sharma, Ojaswa (Advisor) (2016-04-28)
    Physically Based Volume Rendering involves solving the Radiative Transfer Equation (with the Rendering Equation as its boundary condition) in-silico to produce images that are indistinguishable from reality. Graphics ...
  • Bajaj, Garvita; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018)
    I am eternally grateful to a lot of people who, in no particular order, have helped me get through the tough times during the course of this dissertation. I have no words to thank my lovely parents who have always taught ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Fazili, Sehban; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Privacy policies are often lengthy and complex, hindering individual’s ability to make informed decisions about their data privacy. Abstractive summarization techniques can improve accessibility and transparency, but there ...
  • Kirtani, Chhavi; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2020-12)
    Survival Analysis is an important field of research and has its application in medical fields. Researchers have been experimenting with multiple methods to provide a better predicting model for survival analysis, yet ...

Search Repository

Browse

My Account