Browsing by Title

Sort by: Order: Results:

  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...
  • Pal, Utkarsh; Kumar, Aman; Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2023-05-10)
    Edge computing has emerged as a promising paradigm for meeting the requirements of resourceintensive applications by processing data at the network edge. The aim of our project is to optimise the end to end tail latency ...
  • Jain, Atishay; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2021-12)
    Complex networks have been studied and modeled extensively due to their relevance in various real-world systems such as the world-wide-web, telecommunication network and a variety of social networks. A large number of ...
  • Goel, Lamha; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-15)
    The necessity of large labeled training database is ubiquitous now with the development of deep neural networks. But there are multiple challenges to collecting labeled data, with the primary concerns being time and cost ...
  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Sharma, Kunal; Chaudhary, Vipin; Subramanyam, A V (Advisor) (IIIT-Delhi, 2019-11)
    Video summarization is an important step in analysing video feeds in various scenarios such as surveillance, events and other applications. However, it is a challenging task due to inherent dynamic nature of video due to ...
  • Venkadeswaran, Aravaida Kumaran; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-28)
    Automatic Speech Recognition which is aimed at enabling a more natural form of human-machine interaction has been an area of research for decades now and many breakthroughs have been made in this eld. The performance of ...
  • Gupta, Kavya; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2024-03)
    In order to efficiently learn from small amount of labeled data, this study presents pseudo- labeling using semi-supervised learning in a federated setting (Pseudo-FedSSL), a novel approach to semi-supervised federated ...
  • Sundriyal, Divyanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Deep learning systems require a large amount of labelled training dataset. However large amount of labelled data is not available in many cases as it requires considerable human effort to label each sample correctly. In ...
  • Fulara, Harish; Naik, Vinayak (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-25)
    When a mobile client gets wirelessly associated with an access point, it continuously monitors its connection with the access point. To monitor the connection, the client continuously exchanges management frames with the ...
  • Yadav, Jitendra Kumar; Hashmi, Mohammad S. (Advisor) (2015-12-07)
    Nowadays, Non-Volatile Memories (NVM) is part of every electronic system which requires any data storage when power supply is off. Out of many available NVM solutions, Flash memories are the most powerful and cost effective ...
  • Batabyal, Debjit; Grover, Anuj (Advisor); Kumar, Ashish (Advisor) (IIIT-Delhi, 2022-07)
    Soft errors can occur when integrated circuits (ICs) are subjected to hostile conditions in space, the upper atmosphere, or even on Earth. For more than four decades, researchers have been studying similar phenomena. Among ...
  • Gupta, Nalin; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
  • Kataria, Tushar; Agarwal, Vasu; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2018-11-26)
    The problem of stock market predictability has intrigued both academia and industry. In this thesis, we try to empirically predict the stock market using models from deep natural language processing. We review existing ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • Sagar, Himanshu; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-11)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, shows great promise as an anti-censorship mechanism. To use a Decoy Router, the user sends specially crafted packets, apparently to an uncensored website. ...
  • Shukla, Ankita; Srinivasan, Ashwin (Advisor) (2014-07-10)
    Recently there has been a lot of interest in health tele-monitoring. Some vital heath indicators like EEC, ECG, MEG, Pulse Plethysmograph etc. are collected by sensor nodes; the acquired signal is transmitted to a remote ...
  • Shah, Daksh; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    Stack Overflow, a Q&A site on programming, awards reputation points and badges (game elements) to users on performing various actions. Situating our work in Digital Signaling Theory, we investigate the role of these game ...
  • Talukdar, Rajat; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2023-05)
    Epigenetic memory is a vital cellular process. It regulates the inheritance of certain efficient traits of normal cells and the traits attained lately by the cells affected by diseases like Cancer from parents to daughter ...

Search Repository

Browse

My Account