MTech Theses: Recent submissions

  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Gupta, Parul; Singh, Pushpendra (Advisor); Goyal, Vikram (Advisor) (2015-12-03)
    181 women distress helpline provides immediate assistance to women in distress and helps them overcome emotional and bureaucratic challenges. In this work, we present the detailed understa ndings of our qualitative and ...
  • Kumar Abhinav; Dwarakanath, Anurag (Advisor); Singh, Pushpendra (Advisor) (2015-12-03)
    Crowdsourcing is an exciting new trend where a group of geographically distributed individuals contribute willingly, sometimes for free, towards a common goal. Previous research and studies have shown how Crowdsourcing ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Saxena, Shobhita; Subramanyam, A V (Advisor) (2015-12-03)
    In recent years due to advancement in video and image editing tools it has become increasingly easy to modify the multimedia content. The doctored videos are very di cult to identify through visual examination as ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Agarwal, Nidhi; Sharma, Ojaswa (Advisor) (2015-12-02)
    In this thesis work, we propose an algorithm for smooth 3D object reconstruction from un- organized planar cross sections. We address the problem in its full generality, and show its e ectiveness on sparse set of cutting ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • K, Muhammed Noufal; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-02)
    Fair conduct of elections are essential for smooth existence of democratic societies. Voting systems are the method and infrastructure we use to conduct elections. Paper ballot based voting schemes, electronic voting ...
  • Kumar, Abhishek; Naik, Vinayak (Advisor) (2015-12-02)
    The number of desk jobs have increased phenomenally with the evolution of computers, especially in the last few decades. A modern day worker who is indulged into desk job spends nearly one third of her daily time sitting ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Singh, Digvijay; Singh, Pushpendra (Advisor) (2015-12-02)
    A key factor limiting the wide adoption of ubiquitous computing enabling systems is the need for deployment of expensive sensors and hardware to provide contextual information. These sensors deployments are not commonly ...
  • Mohan, Nitinder; Singh, Pushpendra (Advisor) (2015-12-01)
    Content Centric Network is a proposed future networking paradigm where data is the central entity for communication and the correspondence model follows two-step approach for data delivery. With increasing research in this ...
  • Mishra, Akanksha; Sureka, Ashish (Advisor) (2015-08-24)
    Business Process and Model Notation (BPMN) is a graphical model of business processes and Semantic of Business Vocabulary and Business Rules (SBVR) provide business rules corresponding to that business process. Though both ...

Search Repository


Advanced Search

Browse

My Account