Browsing by Title

Sort by: Order: Results:

  • Munagala, Deepak; Sujit, PB (Advisor) (IIIT-Delhi, 2017-07-25)
    Disaster simulations can be used to better prepare the disaster management relief forces. Through simulation, we can find out how buildings and people react to oods, measure the scale of destruction during disasters, and ...
  • Gang, Arpita; Biyani, Pravesh (Advisor) (2016-09-13)
    Sound sources are a very common everyday occurrence. But a single audio source is seldom heard alone. There is a sea of applications, like speech recognition, where an isolated sound source is desirable. This makes audio ...
  • Grover, Sonakshi; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2017-11-16)
    This project involves the identification of miRNAs that are differentially expressed across Indolent Vs Progressive and Case Vs Control samples in Chronic Lymphocytic Leukemia (CLL). For this, we have analysed miRNA ...
  • Talwar, Divyanshu; Anand, Saket (Advisor) (IIITD-Delhi, 2018-12-31)
    Disentangling higher level generative factors as disjoint latent dimensions offer several benefits such as ease of deriving invariant representations, targeted data augmentation with style transfer, better interpretability ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT Delhi, 2014-09-05)
    Mobile robots are increasingly being used for tasks like remote surveillance, sensing and maintenance. Some of these tasks are critical and require intelligent decision making for successful completion. It is not always ...
  • Sharma, Somya; Gupta, Mansi; Darak, Sumit J. (Adviosr); Joshi, Himani (Advisor) (IIIT- Delhi, 2021-05)
    The deployment of cellular spectrum in licensed, shared and unlicensed spectrum demands wideband sensing over non-contiguous sub-6 GHz spectrum. To improve the spectrum and energy efficiency, beam forming and massive ...
  • Sharma, Rishi; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT-Delhi, 2022-07)
    Traditional censorship revolves around blocking access to some websites (or services) over the Internet. However, recently there has been a rise in the events of an extreme form of censorship viz., deliberate Internet ...
  • Sachdev, Anvit; Kanjilal, Kiriti (Advisor) (IIIT- Delhi, 2021-05)
    A very common business strategy in the market of goods is to provide a free trial version of their good or service. This is done to increase the demand as well as the brand value of the product. Some common examples of ...
  • Batra, Manav; Naik, Vinayak (Advisor) (2017-07-05)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers but not quite there yet in implementation. However, with the heavy penetration of the Internet in the world ...
  • Das, Supratim; Singh, Amarjeet (Advisor) (2014-07-10)
    Wireless Sensor Nodes are very low power resource constrained devices with limited radio communications ability. As the technology is evolving at a rapid pace, more and more complex protocols and applications are integrated ...
  • Sarmah, Deepam; Kanjilal, Kiriti (Advisor) (IIIT-Delhi, 2023-11-29)
    Dynamic Stochastic General Equilibrium (DSGE) models are the workhorse of modern macroeconomics. They are used to study the effects of monetary and fiscal policy, and to understand the sources of business cycle fluctuations. ...
  • Monga, Sargam; Mohania, Mukesh (Advisor); Mondal, Anirban (Advisor) (IIIT-Delhi, 2021-12)
    Starting from the location of the desired destination, how far it is or other tourism services around the destination to the booking of various travel services and accommodation, GIS along with the power of information ...
  • Singh, Ankur; Swami, Herrman; Mor, Prikankshit; Narayan, Priyank (Advisor) (2017-04-18)
    FestaVesta.com is an event ticketing and management company that helps you organize better events with our technologies. We make various kinds of registrations, entry and management solutions for events and also help you ...
  • EATM 
    Pruthi, Parikshit Kumar; Girsa, Rajan; Butta, Shubhankar R.; Biyani, Pravesh (Advisor) (IIITD-Delhi, 2019-11)
    EATM is an automated vending machine that uses several machine learning and computer vision techniques for object detection. It is a similar model to Amazon Go and uses mainly camera and RF system for object detection. ...
  • Ramalingam, Anirudh; Arora, Gaurav (Advisor) (IIIT-Delhi, 2022-12-16)
    Satellite land use land change (LULC) data and district-level administrative data indicate an intensification of cropland usage (single to multi-crop transition) in India between 2005-06 to 2018-19. This study attmepts to ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...
  • Sahoo, Piyush Ranjan; Rajoria, Romesh; Darak, Sumit J. (Adviosr); PAU, Danilo (Advisor) (IIIT- Delhi, 2021-05)
    With recent advancements in AI algorithms, data processing for AI applications is primarily done in a cloud-based data center with deep-learning models that require massive computing capacity. The decision-making process ...
  • Shukla, Paritosh; Makkar, Rohit; Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-05)
    With increase in urbanization, there’s a need for better transportation systems, in terms of their efficiency. To do this, an important technique is to use the running of computer vision algorithms for identifying obstructions ...
  • Anusha, Renduchinthala; Deb, Sujay (Advisor) (2016-09-12)
    With technology scaling and increase of chip complexity, power consumption of chip has been rising and its power architecture is getting complicated. Many power management techniques like power gating, multi-voltage, ...
  • Gautam, Alvika; Naik, Vinayak (Advisor) (2014-07-17)
    Sleep quality and quantity a ects an individual's personal health. Polysomnography (PSG) is the conventional approach for sleep monitoring. PSG has several limitations in terms of sleep monitoring by a regular user. A ...

Search Repository

Browse

My Account