Browsing by Title

Sort by: Order: Results:

  • Arjunan, Pandarasamy; Singh, Amarjeet (Advisor); Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-03)
    As one of the largest consumers of overall energy, buildings have emerged as attractive targets for using information and communications technologies to advance large-scale sustainability goals. With increasing availability ...
  • Mittal, Megha; Sureka, Ashish (Advisor) (2014-01-24)
    An undergraduate level Software Engineering course generally consists of a team-based semester long project and emphasizes on both technical and managerial skills. Software Engineering is a practice-oriented and applied ...
  • Aditi, K; Kaul, Sanjit Krishnan (Advisor) (IIIT-Delhi, 2020-07)
    Real-time monitoring applications have networks of Internet-of-Things (IoT) devices sense and communicate information from a scene of interest to a monitor, for example, a server in the cloud. Often the sensed information ...
  • Lamba, Yash; Sureka, Ashish (Advisor) (2014-10-16)
    Software libraries and frameworks, consisting of a collection of Class and Interface de nitions, provide a mechanism for code reuse by providing methods, APIs, components (generic functionality) and a support structure ...
  • Arya, Krishan Kumar; Goyal, Vikram (Advisor) (2014-07-17)
    Penetration of GPS-enabled devices has resulted into generation of a lot of Spatial-Textual data, which can be mined/analyzed to improve various location-based services. One such kind of data is activity-trajectory data, ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-04)
    Technological advances have enabled organizations to store large amounts of data cost-effectively. Patterns hidden in such massive databases can be valuable to industries to gain actionable knowledge and promote their ...
  • Khare, Alind; Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-07-05)
    The goal of graph mining is to extract interesting sub graphs from a single large graph (e.g., a social network), or from a database of many graphs.This thesis has modified the FSM-H algorithm (algorithm for frequent sub ...
  • Sharma, Veronica; Goyal, Vikram (Advisor) (2016-10-25)
    High Utility Itemset Mining (HUIM) has gained significant progress in recent years. The HUIM refers to the method of finding most relevant itemsets from a database and it finds its applications in the domain of senosor ...
  • Aggarwal, Nisha; Sureka, Ashish (Advisor) (2014-03-14)
    YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A signi cant percentage of videos uploaded on YouTube contains objectionable content and violates ...
  • Khandade, Om; Trivedi, Sanchit; Jalote, Pankaj (Advisor) (IIIT-Delhi, 2022-05)
    Minute paper or One minute paper is one of the old exercises that is commonly used in classroom assessment. In this technique, students are asked to fill out responses based on their learnings at the end of a lecture in ...
  • Jain, Drishti; Sethi, Tavpritesh (Advisor) (IIIT- Delhi, 2020-12)
    Following the tsunami of misinterpreted, manipulated and malicious information growing on the Internet, the misinformation surrounding COVID-19 has taken centre stage. In the context of the current COVID-19 pandemic, ...
  • Walia, Preet Kaur; Hashmi, Mohammad S. (Advisor) (2016-09-12)
    RAMs which are widely used in PCs and laptops are likely to break the popular supposition that data in them is lost whenever power supply is cut down. It has been proved in 2008 by a group of researchers that RAMs are no ...
  • Gupta, Saloni; Saxena, Simran; Singh, Pushpendra (Advisor) (2017-04-18)
    There has been an increasing need to have access to everything on Mobile phones due to the ease of access and portability. With this aim, we decided to bring the Innovation, Research and Development (IRD) Activities being ...
  • Narwade, Nitesh; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-06)
    The training and deployment of YOLOv4 and YOLOv5 models in an Android application play a vital role in achieving real-time object detection on mobile devices. This abstract overviews the critical steps in training and ...
  • Sharma, Shreya; Batabayal, Ashutosh; Singh, Pushpendra (Advisor) (IIITD-Delhi, 2019-04-14)
    Medical illnesses such as bipolar disorder, schizophrenia, depression are of great concern in today's time. Mental patients require long term treatment and a caregiver who is there to adhere to their needs. Medical conditions ...
  • Mittal, Vandana; Kaul, Sanjit Krishnan (Advisor) (2015-09-28)
    The adoption of smartphones, their ability to configure as mobile hotspots (WiFi access points), together with access to cellular networks, creates novel possibilities of heterogeneous network access for users. Specifically, ...
  • Verma, Arsh; Gupta, Anubha (Advisor); Arora, Chetan (Advisor); Balakrishnan, M. (Advisor) (IIIT- Delhi, 2021-05)
    Scene Text Recognition (STR) refers to the task of recognition of text in natural scenes. The success of OCR models is hard to achieve on natural scene images due to a variety of challenges, including - variation in ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet (2012-10-12)
    In developing countries, smartphones and high bandwidth connections are not yet within the reach of majority of the people. To share multimedia content among themselves, people rely on manual local sharing mechanisms i.e. ...
  • Kansal, Kajal; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-05)
    The rise of surveillance cameras has led to a significant focus on large scale deployment of intelligent surveillance systems. Person re-identification (Re-ID) is one of the quintessential surveillance problems. Person ...
  • Chhabra, Aarish; Mohania, Mukesh (Advisor) (IIIT- Delhi, 2021-05)
    Exams are conducted to test whether the learner has gained knowledge about the concepts in the subject. Recently, during the pandemic-induced lockdown, there has been a rise in concerns regarding the lack of integrity in ...

Search Repository

Browse

My Account