Computer Science and Engineering: Recent submissions

  • Khare, Alind; Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-07-05)
    The goal of graph mining is to extract interesting sub graphs from a single large graph (e.g., a social network), or from a database of many graphs.This thesis has modified the FSM-H algorithm (algorithm for frequent sub ...
  • Sheoran, Aashanvit; Chaudhary, Abhishek; Singh, Robin; Kumar, Yogesh; Khushalani, Manohar (Advisor) (IIIT-Delhi, 2018-07-07)
    There is a social dilemma in which men have been hurting women in ways which is not being taken care of. Therefore through this report we will be shedding some light on different and fascinating ways like how and what ...
  • Jain, Varun; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-19)
    The Government of India started its flagship programme 'ASHA' under the National Rural Health Mission (NRHM) which delivers health care services to the rural population and has a key focus on pregnable sections like women ...
  • Yadav, Tarun Kumar; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-18)
    This report presents a detailed study of the Internet censorship in India. We consolidated a list of potentially blocked websites from various public sources and checked their accessibility from 9 popular ISPs within the ...
  • Diwan, Parikshit; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-18)
    Residential Electricity consumption accounts for 25% of electric energy consumption consumed in India and is expected to increase in the future to rapid urbanization, growing income levels, etc. In this project we have ...
  • Saini, Kunal; Subramanyam, A V (Advisor) (IIIT-Delhi, 2018-04-18)
    Visual tracking and person re-identification has gathered a lot of attention in computer vision due to its challenging nature and importance in surveillance applications. In this work, we explore the on-board visual tracking ...
  • Kalra, Harshvardhan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2018-07-06)
    Current face recognition systems make extensive use of class-wise disparate features drawn from faces in order to achieve state-of-the-art performances. However, there exists a multitude of information in a given image ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswanath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Aggarwal, Akash; Goyal, Vikram (Advisor) (IIIT-Delhi, 2018-04-18)
    The goal is to study accessibility of web pages, specially those who have visual disabilities and finds it difficult to perceive, navigate and interact with the web. Most websites have some sort of accessibility barrier ...
  • Jaiswal, Aishwarya; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-21)
    The term bandwidth, capacity, and throughput characterize the amount of data that can be transferred per unit time. Accurate estimation of bandwidth can be leveraged by various applications which seek to provide best user ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Sarika; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (2018-06)
    Community detection has gained immense popularity in recent years. Real world networks consist of millions of nodes and edges. Groups of nodes exhibit interesting characteristics, whoseknowledge can be of great help in ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarty, Sambuddho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Kaulgud, Vikrant (Advisor) (IIIT-Delhi, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav (Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...

Search Repository


Advanced Search

Browse

My Account