MTech Theses

 

Collections in this community

Recent Submissions

  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Sarika; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (2018-06)
    Community detection has gained immense popularity in recent years. Real world networks consist of millions of nodes and edges. Groups of nodes exhibit interesting characteristics, whoseknowledge can be of great help in ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarthy, Sambudhho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji(Advisor); Kaulgud, Vikrant(Advisor) (IIIT-Delhi, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav(Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Balaji, Arun (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Sitani, Divya (Advisor); Subramanyam, AV (Advisor); Majumdar, Angshul (Advisor) (2017-08)
    Visual tracking or object tracking is the process of estimating the state of the target in successive frames of a video sequence. It is an integral part of a plethora of applications like security, surveillance, navigation ...
  • Chandok, Srishti; Kumaraguru, Ponnurangam (Advisor) (2017)
    The Online Social Network (OSN) landscape has transformed significantly over the past few years with the emergence of networks. The primary capabilities of these online networks differ. Few of the major leading ones are: ...
  • Khatri, Sagar; Goyal, Vikram (Advisor) (2017)
    We study two measures namely maximal information coefficient (MIC) and distance correlation (dCor) for the application anomaly detection. MIC is based on the concept of information theory and measures the mutual information ...
  • Verma, Richa; Arora, Chetan (Advisor) (2017)
    India is currently home to around 12 million blind people out of 39 million globally - one-third of the world's blind population resides in India. People with low vision or complete blindness find it hard to navigate ...
  • Mukherjee, Rajdeep; Chakravarty, Sambuddho (Advisor) (2017)
    Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveillance, more and more Internet ...
  • Gupta, Priyanka; Sethi, Tavpritesh (Advisor); Goyal, Vikram (Advisor) (2017-07)
    Data analytics is not embedded into critical environments such as Intensive Care Unit. It is now realized that there is an untapped potential of Big-data in improving patient care. However, this is not taken into practice ...
  • Agarwal, Prerna; Arora, Chetan (Advisor) (2017-07)
    As the volume of video data is increasing day by day, real-time video processing is becoming an important application to build any real time device based on image processing. An interesting task that is crucial for the ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Phokela, Kanchanjot Kaur; Naik, Vinayak (Advisor) (2017-07)
    Sleep plays a crucial part of one’s physical and mental wellbeing. Polysomnography, which is the gold standard for measuring and analyzing sleep requires the subject to sleep overnight with many expensive sensors attached ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Malhan, Avni; Gunturi, Viswanath (Advisor); Naik, Vinayak (Advisor) (2017-06)
    Taxis have become the most popular and preferred mode of transport because of the comfort and convenience they offer. In this work, we design a novel algorithm, called ST-OPTICS, which helps taxi fleet owners to manage ...

View more