IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Ujjainia, Anjali; Singhal, Nikhil; Babbar, Karishma; Upadhyaya, Utkarsh; Jha, Prashant (Advisor) (2017)
    This project is in continuation with the previous semester. The previous semester's work revolved around understanding the Indian health care system, with the primary focus on all aspects related to prescriptions. This is ...
  • Verma, Khushali; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2022-05)
    Widely adapted locally interpretable methods such as LIME [20] and SHAP [12] fail to capture the underlying causal relationships between the variables. They merely capture the linear and non-linear associations. These ...
  • Singh, Pragya; Eden, Grace (Advisor) (IIIT-Delhi, 2021-11)
    Dark patterns are user interfaces that are purposefully designed to manipulate users into taking certain actions in order to benefit a company or an organisation and are not in the user’s best interest. This report documents ...
  • Kesar, Devishi; Kaul, Sanjit Krishnan (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-26)
    With the increase in demand for enterprise wi- , there is a growing need to understand the functioning of these networks. Large scale Wi-Fi deployment is a challenging task. There is a need to diagnose network related ...
  • Thulasidoss, Bharath Kumar; Garimella, Pavan Kumar; Sethi, Tavpritesh (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    In an era where the volume of data sets for a particular topic keeps increasing, it is necessary to have quality checks on the data to keep it relevant to modern learning algorithms. Quality parameters provide an objective ...
  • V, Sathish; Butail, Sachit (Advisor); Orkisz, Michal (Advisor) (IIIT-Delhi, 2021-02)
    Industrial robots are complex systems that require technical expertise for condition monitoring and diagnostics. In small and medium scale industries, adequate skilled resources may not be available to monitor the robots ...
  • Jain, Milan; Singh, Amarjeet (Advisor); Chandan, Vikas (Advisor) (IIIT-Delhi, 2019-03)
    In buildings, air conditioning consumes a significant proportion of the aggregate electricity bill. Specifically, in residential and small-scale commercial buildings, people prefer to use room-level ACs (AC stands for Air ...
  • Gupta, Pratham; Mohania, Mukesh (Advisor); Garg, Anuj (Advisor) (IIIT-Delhi, 2022-05)
    Education is now often regarded as the most important contributor to a country’s economic prosperity and stability. Digitalization plays a key part in the development and progress of every area in today’s world. The education ...
  • Goel, Anurag; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2023-11)
    The traditional way of clustering is first extracting the feature vectors according to domain-specific knowledge and then employing a clustering algorithm on the extracted features. Deep learning approaches attempt to ...
  • Chawla, Mohit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2019-07)
    With the increased interest in face recognition across di erent applications, the research in this area has ourished over the past few decades. However, face recognition with disguise variations has gained little ...
  • Hegde, Srinidhi; Anand, Saket (Advisor); Sharma, Ojaswa (Advisor) (2017-04-18)
    Recent advancement in deep learning techniques has opened doors for wide variety of applications. With growing interests in deep learning and geometry, lots of computer vision problems have been tackled using deep learning. ...
  • Gupta, Divam; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    First person videos captured from wearable cameras are growing in popularity.Standard algo- rithms developed for third person videos often do not work for such egocentric videos because of drastic change in camera ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIITD-Delhi, 2019-04-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIIT-Delhi, 2019-11-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Somannagari, Neha Reddy; Sethi, Tavpritesh (Advisor) (2021-05)
    Health care systems all around the world have an ever-growing burden of intensive care on them. Complications such as sepsis, organ failure and shock contribute to a large portion of the deaths. However they can be treated ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...

Search Repository


Advanced Search

Browse

My Account