Browsing by Title

Sort by: Order: Results:

  • Nandini; Singh, Pushpendra (Advisor); Gupta, Swati (Advisor) (IIIT-Delhi, 2022-05)
    Mental illness is one of the growing concerns across the world. According to WHO, mental health patients are more likely to receive lower quality of health and social care. Many researchers have leveraged mobile technology ...
  • Jain, Ritika; Sureka, Ashish (Advisor) (2014-02-19)
    User requirement speci cation (URS) documents written in the form of free-form natural lan- guage text contain system use-case descriptions as one of the elements in the URS. For few application domains, some of the ...
  • Jain, Varun; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-19)
    The Government of India started its flagship programme 'ASHA' under the National Rural Health Mission (NRHM) which delivers health care services to the rural population and has a key focus on pregnable sections like women ...
  • Khattar, Manisha; Sureka, Ashish (Advisor) (2014-10-16)
    Software regression bugs are de ned as defects which occur, when a previously working software feature or functionality stops behaving as intended. One of the reasons for regression bugs is code changes or system patching ...
  • Vaibhav, Shashwat; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-12)
    Sarcasm is a means to convey ridicule or contempt. There has been a plethora of work in sentiment analysis, of which sarcasm is one of the most challenging tasks due to the incongruity between the surface level and the ...
  • Agrawal, Archit; Biswas, Sanat (Advisor) (IIIT-Delhi, 2022-05)
    Modern infrastructure and a myriad of services rely on the ability to generate precise position using GPS. Although, generating precise position using GPS is a complex multi step process involving selecting satellites, ...
  • Gupta, Vivek; Goyal, Vikram (Advisor) (2015-05-27)
    Spatio-textual similarity join retrieves a set of pairs of objects wherein objects in each pair are close in spatial as well as textual dimensions. A lot of work has been done in the spatial dimension but no work has been ...
  • Agarwal, Navdha; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-06-03)
    Code clone detection plays an important role in software maintenance and evolution. There are many new applications emerging that rely on clones detected across software systems, and hence to address this, many code clone ...
  • Ganguly, Antara; Deb, Sujay (Advisor) (2016-09-12)
    With the advent of many-core era, scalable hardware support for cache coherence has become vital to system performance. Cache coherence protocols are provided in order to ensure that multiple cached copies of a single ...
  • Dhingra, Karan; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2021-09)
    The problem of the ETA prediction of public transit has an essential role in improving the rider’s experience. While, it is challenging to ensure the timeliness of bus, especially during the rush hours. This thesis provides ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Singh, Akshat; Deb, Sujay (Advisor) (IIIT Delhi, 2020-06-01)
    As the number of heterogeneous systems in Systems-on-Chip (SoCs) increases, bus-based interconnection architectures act as a bottleneck to meet the performance required by many applications. For systems with very high ...
  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...
  • Jain, Atishay; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2021-12)
    Complex networks have been studied and modeled extensively due to their relevance in various real-world systems such as the world-wide-web, telecommunication network and a variety of social networks. A large number of ...
  • Goel, Lamha; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-15)
    The necessity of large labeled training database is ubiquitous now with the development of deep neural networks. But there are multiple challenges to collecting labeled data, with the primary concerns being time and cost ...
  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Venkadeswaran, Aravaida Kumaran; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-28)
    Automatic Speech Recognition which is aimed at enabling a more natural form of human-machine interaction has been an area of research for decades now and many breakthroughs have been made in this eld. The performance of ...
  • Sundriyal, Divyanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Deep learning systems require a large amount of labelled training dataset. However large amount of labelled data is not available in many cases as it requires considerable human effort to label each sample correctly. In ...
  • Fulara, Harish; Naik, Vinayak (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-25)
    When a mobile client gets wirelessly associated with an access point, it continuously monitors its connection with the access point. To monitor the connection, the client continuously exchanges management frames with the ...

Search Repository

Browse

My Account