Now showing items 467-486 of 1001

    • Hotel management system 

      Shah, Rajat Jatinbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      I have worked on two products of Emxcel Solutions Pvt.Ltd namely Bnc and Bns admin portal. In that I used angular framework for front end and node js for backend. I have created REST api to communicate with server . Also ...
    • How sweet is my THALI? 

      Prajapati, Krina (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "The thali is little India for in many ways it captures the joy we are able to extract from our untidy and chaotic pluralism." -Santosh Desai The following Communication Design project is based on the stereotypical ...
    • Human action recognition in video 

      Kumari, Sonal (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Action recognition is a central problem in computer vision which is also known as action recognition or object detection. Action is any meaningful movement of the human and it is used to convey information or to interact ...
    • Human Action Recognition Using Deep Neural Networks 

      Thakkar, Shaival (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "In this thesis, we present a hierarchical approach for human action classification using 3-D Convolutional neural networks (3-D CNN). Human actions refer to positioning and movement of hands and legs and hence can be ...
    • hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum 

      Dey, Nayan Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...
    • Hybrid approach to digital image watermarking using singular value decomposition and spread spectrum 

      Bhandari, Kunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      We have seen an explosive growth in digitization of multimedia (image, audio and video) content and data exchange in the Internet. Consequently, digital data owners are able to massively transfer multimedia documents across ...
    • Hybrid approach to speech recognition in multi-speaker environment 

      Trivedi, Jigish S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Recognition of voice, in a multi-speaker environment involves speech separation, speech feature extraction and speech feature matching. Traditionally, Vector Quantization is one of the algorithms used for speaker recognition. ...
    • Hybrid partitioning and distribution of RDF data 

      Padiya, Trupti (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      RDF is a standard model by W3C specifically designed for data interchange on the web. RDF was established and used for the development of the semantic web. However, nowadays RDF data is being used for diverse domains and ...
    • I am my language: indentity, culture, society and politics 

      Agrawal, Anshul (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The theme of the project is centered around the question, what is the role of a language in defining the identity of an individual or the society as a whole.
    • I believe 

      Sharma, Kartikeya (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      People Believe, They believe in God, religion, relationships, aliens, ghosts, politicians… We believe in everything and anything, which could help us get through or prevent us from bad luck, bring in money, preserve our ...
    • i-vector-Based Speaker and Person Recognition 

      Naik, Apeksha J. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Speaker recognition is the process of determining whether the speech is uttered by the claimed speaker or not with the help of machines. Speaker recognition or voice biometrics is well suited for many real-world applications ...
    • Identification and Analysis of Common Issues Across Different Python Repositories 

      Chhatbar, Deep (2021)
      Our main goal for this research is to identify the common issues present in different repositories having python as their primary programming language. A lot of research has been done in the domain of issues present in ...
    • Identification of an intelligent attacker in ARP spoofing 

      Singh, Subhash Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      ARP spoofing is a most powerful and simplest internal attack that can be done in internal network. There are many techniques have been proposed to secure Address Resolution Protocol (ARP). It includes cryptographic and ...
    • Identifying the protein coding regions in DNA using IIR antinotch filter 

      Grandhi, Durga Ganesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Genomic Signal Processing is an emerging interdisciplinary area. The problem of Identifying Protein Coding Regions in DNA is addressed using signal processing techniques in this work. DNA can be thought of a string formed ...
    • Identifying mutant hierarchies to reduce test effort in mutation testing 

      Nimmagadda, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Mutation testing is a fault-based testing approach. The main goal of mutation testing is to assess the quality of a test suite, and in that process, test the software. The approach asserts the absence of pre-specified ...
    • Identifying small world network properties in ad-hoc networks 

      Garg, Neha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, ...
    • Identity verification in smart KYC 

      Jivani, Foram (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      KYC stands for Know Your Customer or Client which is commonly used for customer or business identification process. It is an indispensable part for anyone in the world of payments, banking sectors,credit & insurance companies ...
    • Image aesthetic assessment using deep learning 

      Sherashiya, Shyam (Dhirubhai Ambani Institute of Information and Communication Technology, 2020)
      Image aesthetic assessment is defined as to classify the image in aesthetically good images and aesthetically bad images. In era of digital media, video and images has impact more in human life. Image aesthetic assessment ...
    • Image and video super resolution using deep learning 

      Parikh, Dharit (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The aim of the Super-Resolution (SR) technique is to recover the High Resolution (HR) image from a Low Resolution (LR) image. It has applications in many computer vision areas such as medical imaging, face recognition and ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...