IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Jain, Shreyansh; Jerripothula, Koteswar Rao (Advisor) (IIIT-Delhi, 2023-05)
    With the growing awareness regarding user privacy and the demand for transparency, traditional distributed machine learning algorithms are becoming taboo that uses the user’s data without any restriction or privacy. The ...
  • Saha, Sanchita; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-05)
    Quantum algorithms like Shor’s and Grover’s algorithms have proven to break several cryptographic schemes theoretically. Shor’s algorithm, which can factor numbers exponentially faster than classical computers, can break ...
  • Gupta, Aayushee; Dutta, Haimonti (Advisor) (IIIT Delhi, 2014-09-05)
    Historical newspaper archives provide a wealth of information. They are of particular interest to genealogists, historians and scholars for People Search. In this thesis, we design a People Gazetteer from the noisy OCR ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Snehil; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    Curbing hate speech is undoubtedly a major challenge for online microblogging platforms like Twitter. While there have been studies around hate speech detection, it is not clear how hate speech finds its way into an online ...
  • Jain, Shilpi; Goyal, Vikram (Advisor) (2014-07-10)
    In the current changing trends, collaboration between di erent organizations or consolidation between applications of the same organization has become a common phenomenon. In order to achieve strategic business objectives ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Vigneshwar, Palani; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2023-05)
    With the widespread use of social media platforms, virality has become a fascinating subject for researchers. Content-based research emphasizes the role of content characteristics in predicting virality, such as the type ...
  • Makkar, Sakshi; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-07)
    Online hate speech, particularly over microblogging platforms like Twitter, has emerged as arguably the most severe issue of the past decade. Several countries have reported a steep rise in hate crimes infuriated by ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav (Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Bhardwaj, Mohit; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    The swift escalation in hostile content on the web and specifically on Online Social Media (OSM) has lately become a matter of concern that we must tackle. The situation worsens to a whole different level with recent events ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Kottur, Shaguftha Zuveria; Shah, Rinku (Advisor); Tammana, Praveen (Advisor); Kadiyala, Krishna (Advisor) (IIIT-Delhi, 2023-05)
    Control and management plane applications such as serverless function orchestration and 4G/5G control plane functions are offloaded to smartNICs to reduce communication and processing latency. Such applications involve ...

Search Repository


Advanced Search

Browse

My Account