Year-2020

 

Recent Submissions

  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Tomar, Yash; Singh, Pushpendra (advisor) (IIIT-Delhi, 2020-06-03)
    Taboo is prohibition or restriction by social custom. So generally teaching a taboo topic is not easy for a teacher as well a student might feel hesitated to ask doubts for the taboo topics.We aim to study can VR help ...
  • Ahuja, Yajur; Das, Syamantak (advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Saini, Vipul; Mutharaju, V. Raghava (advisor); Chakraborty, Tanmoy (advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Bhatia, Vedant; Sujit, P.B. (advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Ramanathan, Varun; Raman, Rajiv (advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...
  • Suhavi; Shah, Rajiv Ratn (advisor); Kumaraguru, Ponnurangam (advisor) (IIIT-Delhi, 2020-05-29)
    Social media has now become the most popular medium for self-expression and community building. More and more people are turning to it to express, write, vent or just be while being comfortable doing so because it’s an ...
  • Jain, Shubhi; Singh, Pushpendra (advisor) (IIIT-Delhi, 2020-06-05)
    Using the publicly available data-sets and the surveys, we aim to design a web-portal that would be able to provide insights into venues that are considered important for research as well as information of researchers ...
  • Mittal, Shravika; Chakraborty, Tanmoy (advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Sood, Raghav; Vatsa, Mayank (advisor); Singh, Richa (advisor) (2020-05-31)
    Modality refers to how something happens or is experienced. It is the representation format in which information is stored. Multimodal Learning involves relating information from multiple sources. Many modalities are ...
  • Jain, Kshitiz; Priysha; Subramanyam, AV (advisor) (IIIT-Delhi, 2020-05-28)
    Subspace learning has often been explored for various applications such as dimensionality reduction, denoising, clustering and feature extraction among others. However, low rank subspace learning for clustering as well ...
  • Prakash, Pragya; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Aggrawal, Palash; Anand, Saket (advisor) (IIIT-Delhi, 2020)
    Monitoring of protected areas to curb illegal activities like poaching and animal trafficking is a monumental task. To augment existing manual patrolling efforts, unmanned aerial surveillance using visible and thermal ...
  • Sanghvi, Nilay; Singh, Sushant Kumar; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2020-06-01)
    The non-intrusive nature and high accuracy of face recognition algorithms have led to their successful deployment across multiple applications ranging from border access to mobile unlocking and digital payments. However, ...
  • Sachdeva, Nikhil; Mutharaju, Raghava (advisor) (IIIT-Delhi, 2020-06-08)
    Ontology Learning is the semi-automatic and automatic extraction of ontology from a natural language text, using text-mining and information extraction. Each ontology primarily represents some concepts and their corresponding ...
  • Agarwal, Navdha; Purandare, Rahul (advisor) (IIIT-Delhi, 2020-06-03)
    Code clone detection plays an important role in software maintenance and evolution. There are many new applications emerging that rely on clones detected across software systems, and hence to address this, many code clone ...
  • Kaur, Avneet; Bharti, Moh; Roy, Sayan Basu (advisor); Banerjee, Shilpak (advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Gupta, Mehak; Singh, Vishal; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2020-05-26)
    The deployment of biometrics features based person identification has increased significantly from border access to mobile unlock to electronic transactions. Iris recognition is considered as one of the most accurate ...
  • Garg, Mannika; Singh, Pushpendra (advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Singh, Mandeep; Roy, Sayan Basu (advisor) (IIIT-Delhi, 2020-07)
    A memory efficient filter based iterative algorithm is proposed for a two-player zero sum linear differential game problem arising in the control of process systems affected by disturbances.The objective in such a scenario ...

View more

Search Repository


Advanced Search

Browse

My Account

Discover

RSS Feeds