DOCTORAL THESES (E & C): Recent submissions

  • Maheshwari, Swati (Department of Computer Science and Engineering,IITR., 2016-05)
    With the increase in the dependence on Internet for transactions and communications, ensuring security has become a necessity. Intrusion Detection System (IDS) is one of the important software or hardware devices in ...
  • S, Deepak (Department of Computer Science and Engineering,IITR., 2016-05)
    Delay Tolerant Networks(DTNs) differ from the traditional Ad-hoc networks in its main characteristic function. DTNs are opportunistic networks in which there exists no complete end to end paths between the nodes. In view ...
  • Kaur, Harpreet (Department of Computer Science and Engineering,IITR., 2016-05)
    Image Retargeting is content aware image resizing which takes into account the resizing of image according to the resolution of display screen but without distorting salient content of image and without the loss of ...
  • Yadav, Ajay (Department of Computer Science and Engineering,IITR., 2016-05-27)
    Being able to detect and recognize human activities is essential for several applications, including personal assistive robotics.Many approaches have been discussed in the past. Normally 2D data has been used in past. ...
  • Kumar, Manoj (Computer Science and Engineering,IITR., 2016-05)
    This Dissertation report discusses one of the computer vision problem, which is implemented using various video and image processing techniques from last two decades that is “TEMPORAL VIDEO SCENE SEGMENTATION”. From last ...
  • Dixit, Manish Kumar (Computer Science and Engineering,IITR., 2016-05)
    This research explores multi-agent planning where agents are not same. Unlike real world problem, most classical planner solves on a basic assumption that all agents are same. However, in most of the practical cases, Agents ...
  • Goyal, Mudit (Computer Science and Engineering,IITR., 2016-05)
    In this report we have proposed a framework for sign language dynamic gestures recognition from depth sequences. For feature representation two different set of features are extracted. First one is gradient local auto ...
  • Lathwal, Balkar (Computer Science and Engineering,IITR., 2016-05)
    Every individuals and/or organizations need to know about people‟s feelings about their product and services provided by them during making any decision. If organizations or individuals have the information about sentiment ...
  • Behal, Nishitha (Computer Science and Engineering,IITR., 2016-05)
    In recent times, data mining has gained immense application because of the ability with which it can extract previously unknown and potentially useful information from raw data. Frequent Pattern Mining is a subfield of ...
  • Tagra, Ankur (Computer Science and Engineering,IITR., 2016-05)
    In the current digital era approximately 2 million applications (a.k.a. apps) are present on app store which allow users to give ratings and reviews. App developers face serious challenges in getting user feedback. Every ...
  • Kanwar, Sartaj (Computer Science and Engineering,IITR., 2016-05)
    Twitter is a social networking site that allows a large number of users to communicate with each other. Twitter allows users to share their views on different topics ranging from day to day life to what is going in ...
  • Agarwal, ashutosh (Computer Science and Engineering,IITR., 2016-05)
    Web service composition has become an important tool to implement complex business processes demanding multiple functionalities to be served. Selecting best set of services for composition becomes crucial when, there are ...
  • Gupta, Akash (ELECTRICAL ENGINEERING IITR, 2016-05)
    Due to rapid development in semiconductor industry, high package density in Integrated Circuits is required. Scaling trend in CMOS technology dropped down to submicron levels. Also due to small node capacitances, fewer ...
  • Gupta, Nerlam Rani (1970)
    This dissertation p *at* a stud of the motor bmzaoatc San~rstor tip. tr i mm'a.t1pi.rs and desctibss tht designaM dsrslo bt of hreatMad barm"t &agerator op.a rtin .i* isM. Tb. pdat7 ubjestirs of this smorsiss has been ...
  • Sinha, Arun Kumar (1984)
    Various growth systems for the epitaxial layers of GaLs have been presented. Hydrostatic techniques for trans-mitting high pressures to solid state material samples including epitaxial. films have been discussed. The typical ...
  • Singhal, Sonal (2011)
    In recent past, the understanding and applications of quantum-confined structures in the development of LEDs and PV devices has spurt interest in the studies of such structures. However, the difficulties faced in the ...
  • Pandey, Rajoo (2001)
    Neural networks provide a powerful tool for many signal processing applications, including blind signal processing. The task of blind equalization is concerned with retrieval of unknown transmitted sequence, from the ...
  • Taneja, Nidhi (2010)
    Advancement in communication and networking has led to numerous image applications in day-to-day life. With an increase in transmission and distribution of digital image data, piracy operations/illegal activities have ...
  • Ahmad, Khwaja Hina (2010)
    The present research work is focussed to detect bearing faults in electrical machines at the incipient stage through analysis of the monitoring data. Analysis is done on the vibration signal which is acquired using the ...
  • Yadav, Vinod Kumar (2010)
    Presently Electricity sector across the developing countries is under the process of restructuring and adopting the deregulatory structure for providing choice, quality and economic service to the consumers. The motive ...