Computer Science and Engineering: Recent submissions

  • Fulara, Harish; Naik, Vinayak (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-25)
    When a mobile client gets wirelessly associated with an access point, it continuously monitors its connection with the access point. To monitor the connection, the client continuously exchanges management frames with the ...
  • Bansal, Palash; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-11-26)
    The goal of this BTP is starting a venture by taking RealVol of as a technology company that strives to improve the best in class visualization of medical scans for better learning and diagnostics and to finally provide ...
  • Garg, Rishabh; Baweja, Yashasvi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2018-11)
    Heterogeneous biometric recognition requires matching images with variations such as resolution and spectrum. Heterogeneity in images often reduces the inter-class homogeneous distance while increasing the intra-class ...
  • Nambiar, Pranav; Arora, Chetan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-04-30)
    Text-to-speech systems generally require large amounts of annotated speech data with the quality of both the annotations and speech being a huge factor. As a result, most of the research performed has been on highly curated ...
  • Singh, Katyayani; Sharma, Ojaswa (Advisor); Dey, Arindam (Advisor) (IIITD-Delhi, 2018-04-30)
    In this work, we evaluate the applicability of Augmented Reality and Virtual Reality in designing enhanced learning experiments for children. Such an intervention can prove to be very useful to kids with reduced cognitive ...
  • Kaur, Ishmeet; Kumar, Shubham; Sengupta, Debarka (Advisor) (IIITD-Delhi, 2018-07-07)
    Detection of cancer has always been one of the most important and valued tasks in the history of medical science. In this project, we're trying to build some sort of a search engine where a person can feed their genomic ...
  • Sagar, Himanshu; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-11)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, shows great promise as an anti-censorship mechanism. To use a Decoy Router, the user sends specially crafted packets, apparently to an uncensored website. ...
  • Bajaj, Garvita; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018)
    I am eternally grateful to a lot of people who, in no particular order, have helped me get through the tough times during the course of this dissertation. I have no words to thank my lovely parents who have always taught ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Gautam, Alvika; Sujit, PB (Advisor); Saripalli, Srikanth (Advisor) (IIIT-Delhi, 2019-05)
    Rotary vehicles like quadrotors, have become an essential part of many applications like mapping, object delivery, tracking, patrolling, and communication relay, etc. A key requirement for these applications is that the ...
  • Saxena, Anuj Shanker; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2019-04)
    The ubiquity of mobile devices has led to the deployment of many mobile applications for providing different types of services, like internet access, route recommendation, cab finder, nearby friends, etc. Some of these ...
  • Jaisinghani, Dheryta; Naik, Vinayak (Advisor); Kaul, Sanjit Krishnan (Advisor) (IIIT-Delhi, 2019-04)
    A WiFi client needs to discover access points (APs) in its vicinity before it can establish a WiFi connection and initiate a data transfer. Discovery is also essential for a client to stay connected to an AP deemed best ...
  • Lone, Haroon Rashid; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-12)
    Buildings consume 50% of the total available electrical energy. Studies show that up to 20% of the energy gets waste due to several reasons such as appliance misconfigurations, faults, and abnormal user behavior. The ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Leeka, Jyoti; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2017-12)
    RDF data management has received a lot of attention in the past decade due to the widespread growth of Semantic Web and Linked Open Data initiatives. RDF data is expressed in the form of triples (as Subject - Predicate - ...
  • Goswami, Gaurav; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2018-11)
    Automatic face recognition in unconstrained environments is a popular and challenging research problem. With the improvements in recognition algorithms, focus has shifted from addressing various covariates individually to ...
  • Verma, Robin; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Bansal, Varun; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    This project includes learning of big data tools like Apache Storm, elastic search, and data visualisations library like D3. Started with understanding how social media analytics tools work and done code refactoring, UI/UX ...
  • Grover, Sonakshi; Gupta, Anubha (Advisor); Gupta, Ritu (Advisor) (IIIT-Delhi, 2017-11-16)
    This project involves the identification of miRNAs that are differentially expressed across Indolent Vs Progressive and Case Vs Control samples in Chronic Lymphocytic Leukemia (CLL). For this, we have analysed miRNA ...

Search Repository


Advanced Search

Browse

My Account