Browsing by Title

Sort by: Order: Results:

  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Somannagari, Neha Reddy; Sethi, Tavpritesh (Advisor) (2021-05)
    Health care systems all around the world have an ever-growing burden of intensive care on them. Complications such as sepsis, organ failure and shock contribute to a large portion of the deaths. However they can be treated ...
  • Jha, Shragvi Sidharth; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Autonomous vehicles are becoming prevalent day-by-day, and with the advent of such technology comes its various safety risks and challenges. The primary objective is to improve road safety and mobility for all users. The ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Arora, Disha; Hashmi, Mohammad S. (Advisor) (2016-09-12)
    The growing gap between the processor and embedded memory speed is a major setback in the overall performance of electronic systems. Since the sense amplifier (SA) forms an integral part of the read circuitry in both ...
  • Kochar, Adwit Singh; Bansal, Pabitra; Singh, Rahul; Agrawal, Yashwin; Deb, Sujay (Advisor) (IIIT-Delhi, 2021-12)
    Critical health parameters such as SpO2 and Blood Pressure play a massive role in determining a person’s health condition, and hence their tracking and monitoring are essential. Currently, the problem with health monitoring ...
  • Kumar, Ajay; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2022-07)
    In today’s world, it is no exaggeration that the environment and all its organisms face a threat due to environmental degradation of many kinds, and public transportation may be the answer to all the problems. It will help ...
  • Singhal, Shitij; Kaul, Sanjit Krishnan (Advisor) (2017-04-18)
    An autonomous vehicle is a vehicle which has the capabilities to move from one location to another with the help of inputs from various sensors connected to a computer which are used to plan the path for the vehicle, without ...
  • Singh, Anand; Srivastava, Anand (Advisor); Bohara, Vivek Ashok (Advisor) (IIIT-Delhi, 2023-01)
    Most of the current wireless networks are radio frequency (RF) based, however, these networks are regularly confronted with growing demand for higher data rates. Watching high-definition live stream videos and accessing ...
  • Amit; Naik, Vinayak (Advisor) (2014-07-10)
    The area of sensing has witnessed signi cant development over the past two decades. Body of work on sensors has focused on individual sensors, sensor networks, in-network data processing and distributed query processing. ...
  • Reddy, Krishna Neel; Joshi, Kshtiz; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Next generation wireless communication systems are expected to support high-mobility Vehicle to everything (V2X) communication services in sub-6 GHz as well as millimeter wave spectrum. This demands accurate tracking of ...
  • Khandelwal, Rimjhim; Hashmi, Mohammad S. (Advisor) (2017-05)
    Power conditioning circuits form an integral part of a memory chip. Various blocks on a memory chip require uninterrupted power supply that are independent of the load conditions. The program, erase and read operations in ...
  • Sri Harsha, Gade Narayana; Srinivasan, Ashwin (Advisor) (2014-07-17)
    Power density and interconnect delay have emerged as the biggest challenges for Ultra Large Scale Integration (ULSI) and System-on-Chip (SoC) designs particularly beyond 65nm generation. Leakage power has been traditionally ...
  • Singh, Arihant; Chhabra, Smiti; Mohania, Mukesh (Advisor) (IIIT-Delhi, 2022-12)
    Facility Management Services, commonly known as FMS, is the body that manages various services provided by the Institute for the welfare of the IIIT-D family. It is mainly responsible for providing a smooth experience to ...
  • Banerjee, Deepayan; Hashmi, Mohammad S. (Advisor) (2017-03)
    Power Amplifiers are undoubtedly one of the most important blocks in any transmitter system. Long range communication requires a massive boost-up of the power to be delivered, before it can be launched in the channel. This ...

Search Repository

Browse

My Account