DSpace at IIIT-Delhi: Recent submissions

  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, HB (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Lathwal, Anjali; Raghava, Gajendra P.S. (supervisor) (IIIT-Delhi, 2020-09)
    According to the World Health Organization report, around 10 million new cases are diagnosed with cancer in the year 2018 alone. Out of these, nearly 45% of the cancer incidences were reported from the Asian countries, 26% ...
  • Banerjee, Deepayan; Hashmi, Mohammad S. (supervisor) (IIIT-Delhi, 2020-12-20)
    The proliferation of multi-band and multi-standard wireless systems has led to frequent advancements in their design techniques and schemes. In essence, the multi-band devices ensure a reduction in the resources required ...
  • Agarwal, Akshay; Singh, Richa (supervisor); Vatsa, Mayank (supervisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...
  • Sidana, Tania; Sharma, Anuradha (supervisor) (IIIT-Delhi, 2020-07)
    Constructing codes that are easy to encode and decode, can detect and correct many errors and have a sufficiently large number of codewords is the primary aim of coding theory. Several metrics (e.g. Hamming metric, Lee ...
  • Ishant; Arora, Chetan (Supervisor) (IIIT-Delhi, 2020-08-13)
    Many computer vision problems can be formulated as finding the best labeling configuration. If labelings satisfy Markov property then finding best labeling configuration becomes MRF (Markov Random Field)- MAP (Maximum A ...
  • Kansal, Kajal; Subramanyam, A.V. (supervisor) (IIIT-Delhi, 2020-05)
    The rise of surveillance cameras has led to a significant focus on large scale deployment of intelligent surveillance systems. Person re-identification (Re-ID) is one of the quintessential surveillance problems. Person ...
  • Gulati, Manoj; Ram, Shobha Sundar (supervisor); Singh, Amarjeet (supervisor) (IIIT-Delhi, 2020)
    Electromagnetic interference (also known as EMI) is a byproduct of high-speed switching circuits used inside most of present-day electrical and electronic appliances. EMI propagates through conduction along the power lines ...
  • Shukla, Ankita; Anand, Saket (supervisor) (IIIT-Delhi, 2020-10)
    Representation of visual data is a connecting link between the perceptual world and machine based processing. Over the decades, the computer vision community is dedicated to improving these representations, so that it can ...
  • Kaushal, Rishabh; Kumaraguru, Ponnurangam (supervisor) (IIIT-Delhi, 2020-10)
    Online Social Networks (OSNs) have become popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected ...
  • Jain, Sagar; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2019-09)
    A Fabry Perot cavity (FPC) antenna consists of a primary radiator at the base of a dielectric cavity sealed with a partially reflecting surface at the other end. Excitation from the radiator is partially reflected by the ...
  • Mongia, Aanchal; Majumdar, Angshul (Supervisor) (IIIT-Delhi, 2020-09)
    Data analytics and computational techniques applied to biological sciences aid rapid technological advances, swift discoveries, and reliable analysis. A broad range of bountiful tools and algorithms have played pivotal ...
  • Gangopadhyay, Rahul; Shannigrahi, Saswata (advisor); Sharma, Anuradha (advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Maini, Parikshit; Sujit, P. B. (advisor) (IIIT-Delhi, 2020-09)
    Mobile robots have become ubiquitous today and are used widely in sensor networks. Their use in applications involving long-term operations, remote sensing and complex environments is a widely studied area of research due ...
  • Rano, Dinesh; Hashmi, Mohammad S. (supervisor) (IIIT-Delhi, 2020-06)
    A network of wearable, implantable,and body-worn devices are collectively known as Wireless Body Area Network (WBAN). These networked devices comprising the WBANs are frequently used in the monitoring and tracking of the ...
  • Gade, Narayana Sri Harsha; Deb, Sujay (advisor) (IIIT-Delhi, 2020-08)
    Advanced CMOS manufacturing technologies and limitations of power scaling have ushered processing chip architectures into the era of multi-core and many core systems. Simultaneously, there has been an emergence of compute ...
  • Sharma, Piyush Kumar; Chaudhary, Shashwat; Hassija, Nikhil; Maity, Mukulika; Chakravarty, Sambuddho (IIIT-Delhi, 2019)
    Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing ...
  • Mumtaz, Fatima; Ram, Shobha Sundar (Advisor); Purandare, Swapna (Advisor) (IIIT-Delhi, 2019-07)
    Harmonic radar technology has been researched and developed for studying the foraging behaviour of insects such as honey bees in order to study their decline in the ecosystem. The traditional radar fails to detect the bees ...
  • Mukherjee, Arpan; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-06)
    Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, more productive studies of social interactions, and improved design of content distribution ...
  • Akhter, Sana; Raghava, Gajendra PS (Advisor) (IIIT-Delhi, 2019-06)
    A significant burden of genetic disorders comes from the malfunctioning of the “suicide bags of the cells” called as the lysosomes and are referred to as Lysosomal Storage disorders or LSD’s. LSD’s comprises a major ...

Search Repository

Browse

My Account