Browsing by Title

Sort by: Order: Results:

  • Deka, Namrata; Kaul, Sanjit (Advisor); Anand, Saket (Advisor) (2017-04-18)
    This report outlines my work in continuation to last semester on understanding human behavior when it comes to driving on Indian streets. Since traffic in India is not governed by lane-markings, zebra crossings and proper ...
  • Saxena, Garvita; Singh, Pushpendra (advisor) (IIIT-Delhi, 2020)
    Most sensor based mobile phone applications like navigation systems, pothole detection, pedometers, traffic detection, etc. rely on the strict and stable positioning of the mobile phone at a particular place throughout ...
  • Jaisinghani, Dheryta; Naik, Vinayak (Advisor); Kaul, Sanjit (Advisor) (IIIT-Delhi, 2019-04)
    A WiFi client needs to discover access points (APs) in its vicinity before it can establish a WiFi connection and initiate a data transfer. Discovery is also essential for a client to stay connected to an AP deemed best ...
  • Balasubramanian, Ajay; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2019-01)
    Object Detection is a fundamental problem in Computer Vision. Face Detection is an important and intriguing type of object detection that is being extensively used in day-to-day activities like in video surveillance, online ...
  • Goswami, Gaurav; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2018-11)
    Automatic face recognition in unconstrained environments is a popular and challenging research problem. With the improvements in recognition algorithms, focus has shifted from addressing various covariates individually to ...
  • Gupta, Sagar; Subramanyam, A.V. (advisor) (IIIT-Delhi, 2020-07)
    Unsupervised Person Re-Identification (Re-ID) suffers severely from the gap in the modality. Many factors pose a challenge to the task, including occlusions, lightning conditions, pose changes, among several others. ...
  • Jain, Kshitiz; Priysha; Subramanyam, AV (advisor) (IIIT-Delhi, 2020-05-28)
    Subspace learning has often been explored for various applications such as dimensionality reduction, denoising, clustering and feature extraction among others. However, low rank subspace learning for clustering as well ...
  • Goyal, Vikram; Dawar, Siddharth (2015-02-11)
    High-utility itemset mining is an emerging research area in the field of Data Mining. Several algorithms were proposed to find high- utility itemsets from transaction databases and use a data structure called UP-tree ...
  • Bhattacharya, Sudatta; Bera, Debajyoti (advisor) (IIIT-Delhi, 2020-08-03)
    In this thesis we address the problem of computing closeness centrality, Harmonic centrality and a few related centrality measures that operate on the shortest paths in a graph. We consider sparse graphs, especially ...
  • Phokela, Kanchanjot Kaur; Naik, Vinayak (Advisor) (2017-07)
    Sleep plays a crucial part of one’s physical and mental wellbeing. Polysomnography, which is the gold standard for measuring and analyzing sleep requires the subject to sleep overnight with many expensive sensors attached ...
  • Chandok, Srishti; Kumaraguru, Ponnurangam (Advisor) (2017)
    The Online Social Network (OSN) landscape has transformed significantly over the past few years with the emergence of networks. The primary capabilities of these online networks differ. Few of the major leading ones are: ...
  • Kaushal, Rishabh; Kumaraguru, Ponnurangam (advisor) (IIIT-Delhi, 2020-10)
    Online Social Networks (OSNs) have become popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected ...
  • Vij, Megha; Naik, Vinayak (Advisor); Gunturi, Venkata MV (Advisor) (2016-07-18)
    We look at the problem of using accelerometer in smartphones to detect whether the user is at a metro train station or in a metro train. Currently, we have solutions to detect simple activities, such as sitting or walking. ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Behavioral finance is an upcoming research field which is drawing a lot of attention of both academia and industry. With changing dynamics of internet behavior of millions across the globe, it provides opportunity to ...
  • Goyal, Sangeeta; Ram, Shobha Sundar (Advisor); Bohara, Vivek Ashok (Advisor) (2016-09)
    Radar systems for detecting the humans present behind the wall are powerful tools for law enforcement, military and elderly care. Walls are complex propagation mediums that introduce attenuation, refraction and multipath ...
  • Srivastava, Shubham; Bera, Debajyoti (Advisor) (2016-09-15)
    The primary aim of any survey is to facilitate analysis of sensitive data to extract useful information, without jeopardizing privacy of the participants. Privacy models like k-anonymity do not guarantee privacy against ...
  • Anand, Kritika; Sureka, Ashish (Advisor) (2015-06-09)
    Process Aware Information Systems (PAIS) are IT systems which support business processes and generate event-logs as a result of execution of the supported business processes. Fuzzy-Miner (FM) is a popular algorithm within ...
  • Samanta, Pranay; Deb, Sujay (Advisor) (2014-07-10)
    The ever increasing advances in the integrated circuit technology made it possible for electronic system designers to assemble complete systems-on-chips (SoC). As these SoCs have been used in computer, graphics, and ...
  • Aggarwal, Himanshu; Shah, Rajiv Ratn (Advisor); NII, Yi Yu (Co-Advisor) (IIIT-Delhi, 2019-07)
    With a massive amount of online multimedia data (e.g., images, videos, text articles, etc.) and increasing needs of the people, venue discovery using multimedia data has become an underlined research topic. We are referring ...
  • Banerjee, Ruchika; Naik, Vinayak (Advisor) (2016-09-15)
    Wide proliferation of smart mobile phones has manifolded the bandwidth demand, as video streaming applications have significantly gained popularity. At the same time, technical challenges, such as requirements of resources, ...

Search Repository

Browse

My Account