IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...
  • Garg, Shilpa; Singh, Pushpendra (2014-04-14)
    Large population, poor road infrastructure, and rapidly growing economies lead to severe tra c congestion in many parts of the world. The problem is exacerbated by increased diversity in vehicle types and poor adherence ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Singh, Mridula; Kaul, Sanjit Krishnan (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Singh, Kartikey; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2022-07)
    In this work we highlight the evolution of Internet censorship within the largest democracy i.e., India. We first report a new form of Internet censorship i.e., mobile app blocking and describe in detail the mechanics ...
  • Yasvi, Maleeha Arif; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-07)
    Ontologies evolve over time due to changes in the domain and the requirements of the application. Maintaining an ontology over time and keeping it up-to-date with respect to the changes in the domain and the requirements ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Fazili, Sehban; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Privacy policies are often lengthy and complex, hindering individual’s ability to make informed decisions about their data privacy. Abstractive summarization techniques can improve accessibility and transparency, but there ...
  • Deepika; Singh, Amarjeet (Advisor) (2014-11-14)
    Energy has become basis of human life today. Practically, we rely on energy for everything we do every single day. As a result, the rate of consumption of energy has increased manifold and thereby has become a global ...
  • Gupta, Kunal; Sureka, Ashish (Advisor) (2015-05-05)
    Process-Aware Information Systems (PAIS) support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor) (2014-07-10)
    The rapid increase in popularity of location-based services have resulted in huge amount of spatial textual data being generated by applications like Foursquare, Facebook Places, Flickr etc. The location-based services ...

Search Repository


Advanced Search

Browse

My Account