MTech Theses: Recent submissions

  • Yadav, Khushbu; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-08)
    Java being designed in a flexible and user-friendly demeanour, makes it the most accepted programming language for the development of web applications and platforms. Due to the immense popularity, there comes the responsibility ...
  • Sundriyal, Himanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Identifying face attributes is an ongoing problem of research which is used in bio-metrics, surveillance etc. In past, researchers have proposed methods which predict single facial attribute at a time. Real-time applications ...
  • Saxena, Garvita; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020)
    Most sensor based mobile phone applications like navigation systems, pothole detection, pedometers, traffic detection, etc. rely on the strict and stable positioning of the mobile phone at a particular place throughout ...
  • Tyagi, Arjun; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-08)
    Correlation filter (CF) based tracker often disregard or weakly incorporate the importance of feature channels as well as channel similarity. To address this, we propose a channel-graph regularization correlation filter-based ...
  • Makkar, Sakshi; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-07)
    Online hate speech, particularly over microblogging platforms like Twitter, has emerged as arguably the most severe issue of the past decade. Several countries have reported a steep rise in hate crimes infuriated by ...
  • Dey, Alvin; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06)
    Multi-document summarization (MDS) is the task of reflecting key points from any set of documents into a concise text paragraph. In the past, it has been used to aggregate news, tweets, product reviews, etc. from various ...
  • Mondal, Sutapa; Mutharaju, Vijaya Raghava (Advisor); Bhatia, Sumit (Advisor) (IIIT-Delhi, 2020-07)
    Knowledge graph (KG) embedding models have recently gained increased attention. However, most of the existing models for KG embeddings ignore the structure and characteristics of the underlying ontology. KGs are not ...
  • Mukherjee, Arpan; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-06)
    Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, more productive studies of social interactions, and improved design of content distribution ...
  • Agarwal, Vani; Buduru, Arun Balaji (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-05)
    Social media systems provide a platform for users to freely express their thoughts and opinions. Although this property represents incredible and unique communication opportunities, it also brings along important challenges. ...
  • Garg, Vaibhav; Kumaraguru, Ponnurangam (Advisor); Buduru, Arun Balaji (Advisor); Asthana, Siddhartha (Advisor) (IIIT-Delhi, 2019-05)
    In a diverse country like India, socio-economic factors like religion, caste, language, income along with other common physical, professional based factors, play a vital role while searching for a spouse. With the surge ...
  • Sharma, Rachesh; Majumdar, Angshul (Advisor); Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-04)
    A human body has billions of cells specialized with their own function and each cell carries genome in its nucleus. The activity of the genome is controlled by a multitude of molecular complexes called as epigenome. Previously ...
  • Chawla, Mohit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2019-07)
    With the increased interest in face recognition across di erent applications, the research in this area has ourished over the past few decades. However, face recognition with disguise variations has gained little ...
  • Aggarwal, Himanshu; Shah, Rajiv Ratn (Advisor); NII, Yi Yu (Advisor) (IIIT-Delhi, 2019-07)
    With a massive amount of online multimedia data (e.g., images, videos, text articles, etc.) and increasing needs of the people, venue discovery using multimedia data has become an underlined research topic. We are referring ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Sarika; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (2018-06)
    Community detection has gained immense popularity in recent years. Real world networks consist of millions of nodes and edges. Groups of nodes exhibit interesting characteristics, whoseknowledge can be of great help in ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarty, Sambuddho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Kaulgud, Vikrant (Advisor) (IIIT-Delhi, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav (Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...

Search Repository


Advanced Search

Browse

My Account