IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Aggarwal, Nisha; Sureka, Ashish (Advisor) (2014-03-14)
    YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A signi cant percentage of videos uploaded on YouTube contains objectionable content and violates ...
  • Verma, Richa; Arora, Chetan (Advisor) (2017)
    India is currently home to around 12 million blind people out of 39 million globally - one-third of the world's blind population resides in India. People with low vision or complete blindness find it hard to navigate ...
  • Agarwal, Prerna; Arora, Chetan (Advisor) (2017-07)
    As the volume of video data is increasing day by day, real-time video processing is becoming an important application to build any real time device based on image processing. An interesting task that is crucial for the ...
  • Desai, Poorav; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT- Delhi, 2021-08)
    Sarcasm is a pervading linguistic phenomenon and highly challenging to explain due to its subjectivity, lack of context and deeply-felt opinion. In the multimodal setup, sarcasm is conveyed through the incongruity between ...
  • S, Giridhar; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Sarcasm is a nuanced and context-dependent communication that poses a significant challenge for natural language processing (NLP) systems. This study proposes a novel approach to improving sarcasm understanding by generating ...
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Singh, Mridula; Kaul, Sanjit Krishnan (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Singh, Kartikey; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2022-07)
    In this work we highlight the evolution of Internet censorship within the largest democracy i.e., India. We first report a new form of Internet censorship i.e., mobile app blocking and describe in detail the mechanics ...
  • Yasvi, Maleeha Arif; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-07)
    Ontologies evolve over time due to changes in the domain and the requirements of the application. Maintaining an ontology over time and keeping it up-to-date with respect to the changes in the domain and the requirements ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...

Search Repository


Advanced Search

Browse

My Account