DSpace at IIIT-Delhi: Recent submissions

  • Khyati; Banerjee, Debika (Advisor) (IIIT-Delhi, 2025-07-04)
    Summation formulas play a vital role in analytic number theory. Several kinds of summation formulas exist, like the Poisson summation formula, Abel summation formula, Euler-Maclaurin formula, etc. In 1904, G. F. Voronoi ...
  • Jain, Monika; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2025-06-19)
    Relation extraction is the task of extracting relationships between entities from text, where the text can be a part of a sentence, a document, or across multiple documents. This task has been popular for decades and is ...
  • Singh, Priyanka; Bohara, Vivek Ashok (Advisor); Srivastava, Anand (Advisor) (IIIT-Delhi, 2025-06)
    In today’s world, wireless communication has become a necessity due to the growing reliance on data-intensive Internet usage. The growing need for high transmission rates in bandwidth-intensive applications,such as ...
  • Arora, Utkarsh; Arora, Gaurav (Advisor) (IIIT-Delhi, 2023-12-12)
    In response to the escalating global demand for secure access to freshwater resources, governments worldwide have implemented technology-driven initiatives for water resource development. This research focuses on a pivotal ...
  • Kumar, Kriti; Majumdar, Angshul (Advisor); Chandra, M Girish (Advisor) (IIIT-Delhi, 2025-05)
    Domain Adaptation (DA) techniques facilitate knowledge transfer from labeled data of a source domain to improve model performance on partially labeled or unlabeled target domain data, where source and target data have ...
  • Chatterjee, Sagnik; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2025-06-04)
    In the first part of this dissertation, we focus on identifying the advantage afforded by quantum algorithms in the field of learning theory, which began as a mathematical framework in the mid-20th century to understand ...
  • Mittal, Shefali; Prince, Deepak (Advisor) (IIIT-Delhi, 2024-04-29)
    This project investigates the intersection of grief, academic performance, and coping mechanisms among college students. Through thorough research of scholarly papers and influential books, it reveals the complexity of ...
  • Bhatia, Shreya; Gandhi, Tarushi; Jalote, Pankaj (Advisor) (IIIT-Delhi, 2024-04-29)
    System testing is a crucial phase in software development, ensuring that the final product meets specified requirements and functions correctly. However, creating comprehensive test cases for system testing can be challenging ...
  • Dixit, Shantanu; Akhtar, Md Shad (Advisor) (IIIT-Delhi, 2023-11-29)
    Knowledge distillation is a technique that involves transferring knowledge from a larger teacher model to a smaller student model. The latest developments in meta-learning-based knowledge distillation emphasize the ...
  • Oberoi, Rupin; Gupta, Anubha (Advisor) (IIIT-Delhi, 2024-04-29)
    Electrocardiography (ECG) is widely used in cardiography as a non-invasive diagnostic tool for providing a graphical representation of the electrical activity in the heart over a duration of time. It captures the electrical ...
  • Chilkoti, Mansi; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2024-04-26)
    This project aims to unravel the complex genomic dynamics of COVID-19, which are critical for understanding its virulence and developing targeted therapeutic interventions. Our approachfocuses on meticulously analyzing the ...
  • Saini, Manav; Akhtar, Md Shad (Advisor) (IIIT-Delhi, 2024-04-30)
    This project report investigates the underlying factors contributing to hate speech through an in-depth literature analysis of psychological studies. It identifies intent and implication as critical aspects shaping hate ...
  • Vhavle, Vishwesh; Sharma, Jatin; Kaul, Sanjit K. (Advisor); Anand, Saket (Advisor) (IIIT-Delhi, 2024-05-13)
    In this project, we introduce a physical testbed that enables the integration of virtual scenarios, which allows us to develop and evaluate algorithms for localization, perception, and pathplanning in a safe and efficient ...
  • Khurana, Varun; Shah, Rajiv Ratn (Advisor) (III-Delhi, 2023-05-10)
    In today’s world, digital-born media, especially advertisements, have a substantial influence on our daily lives, from persuading us to buy particular brands to creating awareness about a social or environmental cause. ...
  • Hasan, Munawar; Anand, Ravi (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2025-06)
    Tweakable primitives are advanced cryptographic constructions, primarily used to enhance the flexibility, security, and performance of cryptographic systems. In case of the tweakable primitives, in addition to the key and ...
  • Tiwari, Anusha; Kushagra; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2024-04-26)
    This B.Tech project endeavors to advance mental health counseling through technology by introducing the IndieMH dataset, a curated collection of code-mixed Hindi-English counseling dialogues annotated with emotion labels ...
  • Narayan, Anupam; Pandey, Ashish Kumar (Advisor) (IIIT-Delhi, 2024-05-12)
    This Report investigates the complex dynamics of air pollution in two megacities, Delhi and Beijing, and presents a comparative analysis of their pollution mitigation strategies and outcomes. After acquiring and preprocessing ...
  • Tiwari, Ambuj Bhaskar; Sharma, Deep; Tripathi, Devansh; Srivastava, Anmol (Advisor) (IIIT-Delhi, 2024-04-29)
    This paper presents an innovative approach aimed at seamlessly integrating physical and digital environments via World Building techniques employing a sand table, specifically designed for wargaming applications. By ...
  • Ambooken, Alvin Joseph; Maity, Mukulika (Advisor) (IIIT-Delhi, 2023-04-29)
    Serverless computing has emerged as a transformative field in the cloud computing world. The high energy and cost savings associated with serverless are leading to its increased prevalence.However, network communications ...
  • Venaik, Utkarsh; Ahuja, Aditya; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2024-04-25)
    With the rise in the potential of artificial intelligence, there now is an increased risk of im-personation and deep fakes; one possibility of impersonation lies within audio, which we call“spoofing attacks”, wherein voices ...

Search Repository

Browse

My Account