Year-2015

 

Recent Submissions

  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Rathore, Sonam; Goyal, Vikram (Advisor) (2015-12-05)
    Mining high utility episodes in complex event sequences is an emerging topic in data mining. In utility mining, users set a minimum threshold and the episodes having higher utility than the threshold are reported. ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Singh, Rahul Kumar; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    With approximately 250 million Internet users, India stands amongst the top 5 Internet using nations of the world. India's network space is made up of 789 Autonomous Systems (ASes), that route all the network traffic of ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Rana, Anurag; Singh, Pushpendra (Advisor) (2015-12-03)
    Telephones have high reach both in developed and developing countries that have made it a preferred tool for collecting and disseminating information. Voice based information collection systems o ffers data collection ...
  • Bansal, Shruti; Singh, Pushpendra (Advisor) (2015-12-03)
    Blended Learning is an amalgamation of face-to-face and e-learning. MOOCs (Massive Open Online Courses), a popular e-learning source of rich quality content produced by best instructors are freely available to learners ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Gupta, Parul; Singh, Pushpendra (Advisor); Goyal, Vikram (Advisor) (2015-12-03)
    181 women distress helpline provides immediate assistance to women in distress and helps them overcome emotional and bureaucratic challenges. In this work, we present the detailed understa ndings of our qualitative and ...
  • Kumar Abhinav; Dwarakanath, Anurag (Advisor); Singh, Pushpendra (Advisor) (2015-12-03)
    Crowdsourcing is an exciting new trend where a group of geographically distributed individuals contribute willingly, sometimes for free, towards a common goal. Previous research and studies have shown how Crowdsourcing ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Garg, Surabhi; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-03)
    Fuzzy hashing is a technique commonly used to compare two diff erent data les which share identical sets of bits in same order, by determining the level of similarity between them. This is done by generating same hash ...
  • Saxena, Shobhita; Subramanyam, A V (Advisor) (2015-12-03)
    In recent years due to advancement in video and image editing tools it has become increasingly easy to modify the multimedia content. The doctored videos are very di cult to identify through visual examination as ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Agarwal, Nidhi; Sharma, Ojaswa (Advisor) (2015-12-02)
    In this thesis work, we propose an algorithm for smooth 3D object reconstruction from un- organized planar cross sections. We address the problem in its full generality, and show its e ectiveness on sparse set of cutting ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...

View more