Computer Science and Engineering: Recent submissions

  • Gupta, Mehak; Singh, Vishal; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-26)
    The deployment of biometrics features based person identification has increased significantly from border access to mobile unlock to electronic transactions. Iris recognition is considered as one of the most accurate ...
  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Singh, Mandeep; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2020-07)
    A memory efficient filter based iterative algorithm is proposed for a two-player zero sum linear differential game problem arising in the control of process systems affected by disturbances.The objective in such a scenario ...
  • Tandon, Madhur; Garg, Mudit; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-22)
    There are various domains under which Machine Learning has been successfully applied. With the availability of high computing resources, tasks such as image classification, object detection and others are easily tackled ...
  • WashKaro 
    Bhagat, Kanav; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2020-05-25)
    My B-tech Project is based on the problem was initially in concerns with the water sanitation and hygiene-related issues targeting the illiterate masses which was later transformed into an app that produces wetted ...
  • Anand, Gyanesh; Shah, Rajiv Ratn (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-05-31)
    With the explosion of healthcare information, there has been a tremendous amount of heterogeneous Textual Medical Knowledge(TMK), which plays an essential role in healthcare information systems. Existing works for integrating ...
  • Bhagat, Dhruv; Mahalwal, Manish; Sujit, PB (Advisor) (IIIT-Delhi, 2020-05-30)
    In pursuit-evasion problems, we are presented with one or more pursuers attempting to capture one or more evaders. We consider the same problem in a bounded and convex physics-based environment. In our case, the agents ...
  • Srivatsav, Deepak Magesh; Anand, Saket (Advisor) (IIIT-Delhi, 2020-05-30)
    Wildlife monitoring and tracking are vital for the preservation of various wildlife species. Activities such as poaching and loss of habitat have made wildlife monitoring and tracking increasingly tricky. Modern-day ...
  • Agrawal, Chaitanya; Das, Syamantak (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2019-11-15)
    We are trying to devise a community detection algorithm for networks through modularity maximization. In this semester we further studied and understood the modularity function. We have explored semi-supervised active ...
  • Kaur, Avneet; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...
  • Chauhan, Arushi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-02)
    Convolutional neural networks are being extensively used in real world applications like image and video classification, natural language processing, medical image analysis, recommender systems etc. where previously machine ...
  • Photo DNA 
    Singh, Aditya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT Delhi, 2020-05-26)
    Awareness of sexual abuse of children has grown enormously over the past two decades - however, the recent advancements in technology has also made it easier to propagate it. To tackle this problem, we develop an image ...
  • Aggarwal, Aayush; Das, Syamantak (Advisor) (IIIT Delhi, 2020-06-06)
    We are given a bipartite graph G(R, S, E) (|R| = |S|), where R denotes the set of requests and S being the set of servers. The requests R (given by an adversary) arrive sequentially along with their distances to each of ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-04)
    Technological advances have enabled organizations to store large amounts of data cost-effectively. Patterns hidden in such massive databases can be valuable to industries to gain actionable knowledge and promote their ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Tiwari, Lokender; Anand, Saket (Advisor) (IIIT-Delhi, 2021)
    A scene can be interpreted from two perspectives: geometric and semantic. Geometric scene understanding requires inferring the3D layout of the scene from an image or video, while semantic scene understanding requires ...
  • Bhattacharyya, Pramit; Mutharaju, Vijaya Raghava (Advisor) (2020-07)
    Building an ontology is not only a time-consuming process, but it is also confusing, especially for beginners and the inexperienced. Although ontology developers can take the help of domain experts in building an ontology, ...
  • Pandey, Yogesh; Goyal, Vikram (Advisor) (IIIT-Delhi, 2019-12)
    Congestion is one of the biggest problems which affects life quality and has an impact on social and economic conditions. Tackling traffic congestion has always been a challenge. The situation is more aggravated for ...
  • Gola, Nikhil; Goyal, Vikram (Advisor) (IIIT-Delhi, 2020-06)
    Traffic speed prediction is one of the challenging task and has many applications. Existing solutions either use crowd-sourced data or sophisticated technologies to perform the task, and hence are costly and unreliable. ...

Search Repository


Advanced Search

Browse

My Account