Now showing items 392-411 of 849

    • How sweet is my THALI? 

      Prajapati, Krina (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "The thali is little India for in many ways it captures the joy we are able to extract from our untidy and chaotic pluralism." -Santosh Desai The following Communication Design project is based on the stereotypical ...
    • Human action recognition in video 

      Kumari, Sonal (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Action recognition is a central problem in computer vision which is also known as action recognition or object detection. Action is any meaningful movement of the human and it is used to convey information or to interact ...
    • Human Action Recognition Using Deep Neural Networks 

      Thakkar, Shaival (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "In this thesis, we present a hierarchical approach for human action classification using 3-D Convolutional neural networks (3-D CNN). Human actions refer to positioning and movement of hands and legs and hence can be ...
    • hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum 

      Dey, Nayan Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...
    • Hybrid approach to digital image watermarking using singular value decomposition and spread spectrum 

      Bhandari, Kunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      We have seen an explosive growth in digitization of multimedia (image, audio and video) content and data exchange in the Internet. Consequently, digital data owners are able to massively transfer multimedia documents across ...
    • Hybrid approach to speech recognition in multi-speaker environment 

      Trivedi, Jigish S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Recognition of voice, in a multi-speaker environment involves speech separation, speech feature extraction and speech feature matching. Traditionally, Vector Quantization is one of the algorithms used for speaker recognition. ...
    • Hybrid partitioning and distribution of RDF data 

      Padiya, Trupti (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      RDF is a standard model by W3C specifically designed for data interchange on the web. RDF was established and used for the development of the semantic web. However, nowadays RDF data is being used for diverse domains and ...
    • I am my language: indentity, culture, society and politics 

      Agrawal, Anshul (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The theme of the project is centered around the question, what is the role of a language in defining the identity of an individual or the society as a whole.
    • I believe 

      Sharma, Kartikeya (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      People Believe, They believe in God, religion, relationships, aliens, ghosts, politicians… We believe in everything and anything, which could help us get through or prevent us from bad luck, bring in money, preserve our ...
    • i-vector-Based Speaker and Person Recognition 

      Naik, Apeksha J. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Speaker recognition is the process of determining whether the speech is uttered by the claimed speaker or not with the help of machines. Speaker recognition or voice biometrics is well suited for many real-world applications ...
    • Identification of an intelligent attacker in ARP spoofing 

      Singh, Subhash Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      ARP spoofing is a most powerful and simplest internal attack that can be done in internal network. There are many techniques have been proposed to secure Address Resolution Protocol (ARP). It includes cryptographic and ...
    • Identifying the protein coding regions in DNA using IIR antinotch filter 

      Grandhi, Durga Ganesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Genomic Signal Processing is an emerging interdisciplinary area. The problem of Identifying Protein Coding Regions in DNA is addressed using signal processing techniques in this work. DNA can be thought of a string formed ...
    • Identifying mutant hierarchies to reduce test effort in mutation testing 

      Nimmagadda, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Mutation testing is a fault-based testing approach. The main goal of mutation testing is to assess the quality of a test suite, and in that process, test the software. The approach asserts the absence of pre-specified ...
    • Identifying small world network properties in ad-hoc networks 

      Garg, Neha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, ...
    • Identity verification in smart KYC 

      Jivani, Foram (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      KYC stands for Know Your Customer or Client which is commonly used for customer or business identification process. It is an indispensable part for anyone in the world of payments, banking sectors,credit & insurance companies ...
    • Image and video super resolution using deep learning 

      Parikh, Dharit (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The aim of the Super-Resolution (SR) technique is to recover the High Resolution (HR) image from a Low Resolution (LR) image. It has applications in many computer vision areas such as medical imaging, face recognition and ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...
    • Image captioning and neural architecture search using reinforcement learning 

      Shaw, Grishma (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      With the advent of Deep Learning, problem solving expertise for a machine has exponentially increased. The past decade has experienced much success in the field of deep neural networks in many difficult areas such as image, ...
    • Image Compression using 2D-Discrete Wavelet Transform on a Reconfigurable Architecture 

      Singh, Mansi (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "This thesis presents a hardware implementation of 2D-DWT, an image compression technique, on a reconfigurable architecture targeting image processing applications developed in-house as the part of the Ph.D. research work. ...
    • Image compression using DCT and compressive sensing (CS) theory 

      Jain, Archit (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Data compression is a method of storing the same information with less data or space. There are many techniques available for compressing the image data resulting in reduced storage space. Minimizing storage space minimizes ...