Now showing items 143-162 of 820

    • Compounding-aware Word Embedding for Improved Semantic Representation 

      Bhat, Shripad Anant (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Existing word embedding approaches may not adequately capture the inherent complexities of a language, e.g. the word compounding phenomenon. While a class of data-driven approaches has been shown to be effective in embedding ...
    • Computational investigation of patch antennas in plasma environment 

      Vyas, Hardik (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Microstrip antennas are extensively used in spacecraft systems and other applicationswhere they encounter a plasma environment. A detailed computationalinvestigation of change in antenna radiation properties in the presence ...
    • Content-based image retrieval system for multi-object images using a combination of features 

      Katare, Aradhana (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      Content-based image retrieval (CBIR) is a research area dedicated to address the retrieval of images based on automatically derived features from the content of the images in database. Traditional CBIR systems generally ...
    • Context aware semantic service discovery 

      Patel, Pankesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      This report is a part of an effort to develop a novel context based mechanism to facilitate semantic service discovery. Context- awareness is considered to be a key problem in designing more adaptive applications. Context ...
    • Contributions to parasitic computing 

      Jain, Rajul (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
    • Cooperation enforcement mechanisms in wireless adhoc networks 

      Chaturvedi, Manish Shivshankar (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Wireless adhoc networks are autonomous, infrastrutureless networks where there are no dedicated routers or base stations and nodes are expected to cooperate in Wireless performing routing duties to keep network connected. ...
    • Cooperative spectrum sensing via dynamic scheduling of secondary users 

      Dubey, Mayank (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Spectrum sensing is a key function in cognitive radio to identify spectrum holes without interference to licensed/primary users (PUs). To overcome issues such as, multipath and shadowing co-operative spectrum sensing has ...
    • Cost per scan (CPS) 

      Sengar, Udit Pratap Singh (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      An analysis of what is known regarding activity-based costing (ABC) applications in the context of supply chain management (SCM) shows that management accounting in supply chains is still at a poor conceptual stage. The ...
    • Counting number of minimum spanning trees 

      Sompura, Jigar (2020)
      The problem discussed in this thesis is "To find all k instances for given n, where 1 k nn��2, n is number of vertices and k is number of minimum weight spanning trees by any weight assignments to the edges of a complete ...
    • Counting spanning binary trees of labelled undirected graphs 

      Gupta, Jitendra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      The number of spanning binary trees of a connected labelled undirectedgraph is an important quantity which is closely related to the reliability of thegraph as a network. Many problems and their applications in mathematics ...
    • Covert communication in TCP/IP network 

      Tandon, Dheeraj (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      This thesis explores the area of Covert Communication in TCP/IP network (Internet). We investigate various protocols of TCP/IP suite, which have potential to be used for covert communication on the network. In this thesis ...
    • Creating orderbook data and displaying it realtime 

      Kakadiya, Ankit Dineshbhai (2020)
      In the financial market order book refers to as a list of sorted orders on the particular financial instrument according to its price. The main goal of my project is to build a visual order book from the past trade data ...
    • Creation of automation plugins for autosar tool 

      Gupta, Suesha (2020)
      Automotive system development is getting more complex due to several reasons such as exponential increase of automotive functionality and hence development of software time. Furthermore, nowadays each vehicle has more than ...
    • Credit Card Fraud Detection Using MachineLearning Algorithms 

      Tank, Ekta (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Credit Card payment facilitating people to pay for goods and service quickly. The credit payment is gaining popularity day by day because of its benefits. With the popularity of credit card payment, crime related to credit ...
    • Crime information extraction from news articles 

      Gohel, Prashant (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In the modern era all news reportings are available in digital form. Most newsagencies put it on their website and are freely available. This motivates us totry extracting some information from online news reporting. While ...
    • Cross-Platform Data Deduplication and Ownership over Encrypted Data 

      Tarkunde, Dipak (2021)
      Data deduplication is the most important data compression technique used in the cloud domain. With this technique, cloud service providers can utilize their storage space efficiently to store large amounts of data. There ...
    • CTS and CCOpt metodology's to achieve low skew-low power clock. 

      Sreekanth, M. (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      In synchronous VLSI chips, clock distribution network plays an important role. The quality of clock network mainly effects the performance of the chip, because the speed of data transfer depends on clock signal. Achieving ...
    • D-latch based low power memory design 

      Tripathi, Saurabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Low power consumption is the main attraction of the digital circuit design in the Sub threshold region of operation. In this region of operation less energy is consumed for active operation and less leakage power is ...
    • Data Augmentation Using CycleGAN for Children’s ASR43e 

      Singh, Dipesh Kumar (2021)
      Extensive use of voice assistants by children in their day-to-day life activities asks for better performance of Automatic Speech Recognition (ASR) for children’speech. The recent advancements in ASR perform better for ...
    • Data aware hybrid partitioning technique and query execution for RDF data 

      Rajkotiya, prashant (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Storage of huge semantic web data using relational techniques has been an important research issue in web databases. Semantic web data is Resource Description Framework (RDF) data. Triple store technique is very inefficient ...