IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Venkata M. Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Srivastava, Abhishek; Shah, Rajiv Ratn (Advisor); Yu, Yi (Advisor) (IIIT-Delhi, 2020-07)
    Automating the process of melody generation from lyrics has been a challenging research task in the field of artificial intelligence. Lately, however, music-related datasets have become available at large-scale, and with ...
  • Hussain, Lasani (IIIT-Delhi, 2022-12)
    Data centers demand high throughput (100 to 400 Gbps) and sub-millisecond latency. The performance of data center applications heavily depends on the efficiency of the underlying TCP stack. Despite several optimizations, ...
  • Mittal, Megha; Sureka, Ashish (Advisor) (2014-01-24)
    An undergraduate level Software Engineering course generally consists of a team-based semester long project and emphasizes on both technical and managerial skills. Software Engineering is a practice-oriented and applied ...
  • Lamba, Yash; Sureka, Ashish (Advisor) (2014-10-16)
    Software libraries and frameworks, consisting of a collection of Class and Interface de nitions, provide a mechanism for code reuse by providing methods, APIs, components (generic functionality) and a support structure ...
  • Arya, Krishan Kumar; Goyal, Vikram (Advisor) (2014-07-17)
    Penetration of GPS-enabled devices has resulted into generation of a lot of Spatial-Textual data, which can be mined/analyzed to improve various location-based services. One such kind of data is activity-trajectory data, ...
  • Sharma, Veronica; Goyal, Vikram (Advisor) (2016-10-25)
    High Utility Itemset Mining (HUIM) has gained significant progress in recent years. The HUIM refers to the method of finding most relevant itemsets from a database and it finds its applications in the domain of senosor ...
  • Aggarwal, Nisha; Sureka, Ashish (Advisor) (2014-03-14)
    YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A signi cant percentage of videos uploaded on YouTube contains objectionable content and violates ...
  • Verma, Richa; Arora, Chetan (Advisor) (2017)
    India is currently home to around 12 million blind people out of 39 million globally - one-third of the world's blind population resides in India. People with low vision or complete blindness find it hard to navigate ...
  • Agarwal, Prerna; Arora, Chetan (Advisor) (2017-07)
    As the volume of video data is increasing day by day, real-time video processing is becoming an important application to build any real time device based on image processing. An interesting task that is crucial for the ...
  • Desai, Poorav; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT- Delhi, 2021-08)
    Sarcasm is a pervading linguistic phenomenon and highly challenging to explain due to its subjectivity, lack of context and deeply-felt opinion. In the multimodal setup, sarcasm is conveyed through the incongruity between ...
  • S, Giridhar; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Sarcasm is a nuanced and context-dependent communication that poses a significant challenge for natural language processing (NLP) systems. This study proposes a novel approach to improving sarcasm understanding by generating ...
  • Tarun, Kunwar; Hashmi, Mohammad S. (Advisor) (2017-05)
    The circuits having more than two logic levels called as multiple valued circuits have the potential of reducing area by reducing the on chip interconnection. Despite considerable effort, designing a system for processing ...
  • Newaz, Khalique; Bera, Debajyoti (Advisor) (2015-05-18)
    Prion diseases are transmissible neuro-degenerative diseases that arises due to conformational change of normal cellular prion protein (PrPc ) to protease-resistant isofrom (rPrPSc ). Deposition of misfolded PrPSc proteins ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Sharma, Nishant; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    HMAC or keyed-hash message authentication code is a security implementation using cryptographic hash function (where hash function is iterative i.e. classical Merkle-Damgård construction [7] [12]) and a secret key. It ...

Search Repository


Advanced Search

Browse

My Account