Now showing items 123-142 of 820

    • Classification of data on manifold. 

      Pandya, Maulik (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      Data classification is one of the most challenging task in the field of pattern recognition and computer vision. Sometimes the values of signal or data are naturally described as points on a manifold. Such data arise from ...
    • Classification of Polarimetric SAR Images 

      Chaudhari, Nilamben (2021)
      Classification of terrain into different ground covers is one of the predominant applications of polarimetric SAR images. TheWishart classifier works well for major classification tasks. However, it is effective only for ...
    • Classification of quantum cryptography 

      Acharya, Jaykumari (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ...
    • CLASSIFICATION OF S PARAMETERS USING RDWG TECHNIQUE in NDT 

      Singh, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Rectangular Dielectric waveguide (RDWG) technique employing a dielectric rod antenna is an experimental setup which is better suited for measurement of S - parameters using a Vector Network Analyser. The complex permittivity ...
    • Clickbait detection using deep learning Techniques 

      Parikh, Apurva Ketanbhai (2020)
      With the growing shift towards news consumption primarily through social media sites like Twitter, Facebook etc., most of the news agencies are prompting their stories on social media platform. These news agencies are ...
    • Cluster recommendation of scientific literature for research area analytics 

      Anjana, Rita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Due to a fast-paced increase of the number of research articles published, it ishard for a researcher to find relevant articles. Research paper RecommendationSystems help in finding the relevant research article. Most ...
    • CMOS current-based mixed-signal architecture for vector-matrix multiplication 

      Chhaya, Vaibhav (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      In present days electronic devices become faster. Computations like vector matrix multiplication become more and more compliant and lengthy. For that CMOS based vectormatrix multiplication architecture, with external ...
    • CMOS latched comparator design for analog to digital converters 

      Gupta, Amit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Conventional comparators are at the two extremes as far as power delay product and isolation between input and output is concern. Either they achieved very good isolation at the cost of power in the preamplifier or save ...
    • CMOS RFIC mixer design 

      Gupta, Mukesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      A CMOS RF (Radio Frequency) up/down conversion mixer results in a reasonable increase in transceiver integration and a reduction in cost. The design of mixers faces many compromises between conversion gain(GC), local ...
    • Collaborative filtering approach with decision tree technique 

      Srivastava, Anit (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Rapid advances in data collection and storage technology has enabled organizations (especially e-commerce) to accumulate vast amounts of data. The amount of data kept in computer files and databases is growing at a phenomenal ...
    • Collusion resistant fingerprinting 

      Juneja, Sandeep (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Digital watermarking is used to carry information by embedding information into the cover data in a perceptually visible or non visible manner. In today's sea of digital information, there are many problems associated ...
    • Column decoder for memory redundant cell array 

      Nahar, Pinky (Dhirubhai Ambani Institute of Information and Communication Technology, 2010)
      As the semiconductor technology advances, the yield of memory chip is reducing. The cause of yield degradation is errors in manufacturing process associated with tight geometries. The thesis work proposes a redundancy ...
    • Combining Model Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAAL 

      Iyer, Kumar Lakshmanan (2021)
      Software testing is continuously evolving and Model-based testing (MBT) is one such test automation strategy. MBT involves the generation of tests by executing a model created by studying the requirements of the System ...
    • Commercial execution playbook 

      Makda, Taher (2020)
      I was in the part of two projects. First one is Commercial Execution Playbook and Second one was Recruitment Portal. Commercial Execution Playbook, this project is client-based project. So, our project manager from Redmond, ...
    • Commonsense validation and explanation 

      Makwana, Vivek H. (Dhirubhai Ambani Institute of Information and Communication Technology, 2020)
      Common-sense reasoning[1] is a field of artificial intelligence and machine learning that focuses on helping computers understand and interact with people more naturally by finding ways to collect these assumptions and ...
    • Community based co-operation protocol for social networks 

      Reddy, A. Ravichandra (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      In wireless ad-hoc networks, information propagates through several intermediate relay nodes. The mobiles in ad-hoc network have limited energy, so the nodes feel uncomfortable to act as a relay for other’s data transformation. ...
    • Comparative study between exponential back off and dynamic waiting strategies for medium access in wireless ad hoc networks 

      Shah, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      IEEE 802.11 DCF (IEEE 802.11 Distributed Coordination Function) is widely used MAC protocol for wireless channel access. Although it is developed for single hop networks where all nodes are in the same radio range, it can ...
    • Comparative Study: Neural Networks on MCUs at the Edge 

      Anand, Harshita (2021)
      Computer vision has evolved excessively over the years, the sizes of the processor and camera shrinking, rising the computational complexity and power and also becoming affordable, making it achievable to be integrated ...
    • Comparison and analysis of channel coding schemes for 5G mobile communication 

      Gupta, Naimishi (Dhirubhai Ambani Institute of Information and Communication Technology, 2020)
      This thesis aims to do a Detailed investigation of the performance of Convolutional, Turbo, Low-Density Parity-Check (LDPC), and Polar codes which are the high-performance channel coding schemes for 5G mobile communication. ...
    • Comparison of single-bit and multi-bit second order sigma-delta modulators 

      Dave, Marshnil (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      This work deals with comparison of Single-bit and Multi-bit Second Order Sigma-Delta Modulators at system level for various performance metrics and different circuit nonidealities. For this work of comparison, Boser-Wooley ...