Browsing Year-2020 by Title

Sort by: Order: Results:

  • Suhavi; Shah, Rajiv Ratn (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2020-05-29)
    Social media has now become the most popular medium for self-expression and community building. More and more people are turning to it to express, write, vent or just be while being comfortable doing so because it’s an ...
  • Gupta, Mehak; Singh, Vishal; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-26)
    The deployment of biometrics features based person identification has increased significantly from border access to mobile unlock to electronic transactions. Iris recognition is considered as one of the most accurate ...
  • Jain, Shubhi; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-06-05)
    Using the publicly available data-sets and the surveys, we aim to design a web-portal that would be able to provide insights into venues that are considered important for research as well as information of researchers ...
  • Bansal, Tanmay; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    In 2015, Unicode introduced five different skin tone modifiers, that could be applied to the existing emojis that denoted humans. In this project, we analyze how people pose certain personalities using emoji skin colour ...
  • Kaur, Avneet; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Kaur, Avneet; Bharti, Moh; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...
  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Mittal, Shravika; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...
  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Anand, Gyanesh; Shah, Rajiv Ratn (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-05-31)
    With the explosion of healthcare information, there has been a tremendous amount of heterogeneous Textual Medical Knowledge(TMK), which plays an essential role in healthcare information systems. Existing works for integrating ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Singh, Mandeep; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2020-07)
    A memory efficient filter based iterative algorithm is proposed for a two-player zero sum linear differential game problem arising in the control of process systems affected by disturbances.The objective in such a scenario ...
  • Sood, Raghav; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2020-05-31)
    Modality refers to how something happens or is experienced. It is the representation format in which information is stored. Multimodal Learning involves relating information from multiple sources. Many modalities are ...
  • Prakash, Pragya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Ramanathan, Varun; Raman, Rajiv (Advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...
  • Aggarwal, Aayush; Das, Syamantak (Advisor) (IIIT Delhi, 2020-06-06)
    We are given a bipartite graph G(R, S, E) (|R| = |S|), where R denotes the set of requests and S being the set of servers. The requests R (given by an adversary) arrive sequentially along with their distances to each of ...
  • Sachdeva, Nikhil; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-06-08)
    Ontology Learning is the semi-automatic and automatic extraction of ontology from a natural language text, using text-mining and information extraction. Each ontology primarily represents some concepts and their corresponding ...
  • Photo DNA 
    Singh, Aditya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT Delhi, 2020-05-26)
    Awareness of sexual abuse of children has grown enormously over the past two decades - however, the recent advancements in technology has also made it easier to propagate it. To tackle this problem, we develop an image ...

Search Repository


Advanced Search

Browse

My Account