Now showing items 377-396 of 820

    • High-speed 512-point FFT single-chip processor architecture 

      Sinha, Ajay Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      This thesis present a fully parallel novel fixed point 16-bit word width 512 point FFT processor architecture. The 512 point FFT is realized by decomposing it into three 8 point FFT units. This approach reduces the number ...
    • HMM-based speech synthesis system (HTS) for Gujarati language. 

      Shah, Nirmesh Jayeshkumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      Hidden Markov Models (HMM) have been applied successfully to Automatic Speech Recognition (ASR) problems and are currently applied in speech synthesis applications. In this thesis, HMM-based Speech Synthesis System (HTS) ...
    • Hot and cold data identification using query aware hybrid partitioning 

      Kanwar, Jai Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      The price of main memory is reducing with time, which helps to store huge amount of data in the memory. OLTP applications have large database size. It is observed that some applications exhibit skewed access pattern i.e. ...
    • Hotel management system 

      Shah, Rajat Jatinbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      I have worked on two products of Emxcel Solutions Pvt.Ltd namely Bnc and Bns admin portal. In that I used angular framework for front end and node js for backend. I have created REST api to communicate with server . Also ...
    • Human action recognition in video 

      Kumari, Sonal (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Action recognition is a central problem in computer vision which is also known as action recognition or object detection. Action is any meaningful movement of the human and it is used to convey information or to interact ...
    • Human Action Recognition Using Deep Neural Networks 

      Thakkar, Shaival (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "In this thesis, we present a hierarchical approach for human action classification using 3-D Convolutional neural networks (3-D CNN). Human actions refer to positioning and movement of hands and legs and hence can be ...
    • hybrid approach to digital image watermarking using informed coding, informed embedding and spread spectrum 

      Dey, Nayan Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The growth and popularity of the Internet has led to the data storage of multimedia data (audio, image and video) in digital form. The digitization form of multimedia data can be copied easily and then distributed again ...
    • Hybrid approach to digital image watermarking using singular value decomposition and spread spectrum 

      Bhandari, Kunal (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      We have seen an explosive growth in digitization of multimedia (image, audio and video) content and data exchange in the Internet. Consequently, digital data owners are able to massively transfer multimedia documents across ...
    • Hybrid approach to speech recognition in multi-speaker environment 

      Trivedi, Jigish S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Recognition of voice, in a multi-speaker environment involves speech separation, speech feature extraction and speech feature matching. Traditionally, Vector Quantization is one of the algorithms used for speaker recognition. ...
    • i-vector-Based Speaker and Person Recognition 

      Naik, Apeksha J. (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Speaker recognition is the process of determining whether the speech is uttered by the claimed speaker or not with the help of machines. Speaker recognition or voice biometrics is well suited for many real-world applications ...
    • Identification and Analysis of Common Issues Across Different Python Repositories 

      Chhatbar, Deep (2021)
      Our main goal for this research is to identify the common issues present in different repositories having python as their primary programming language. A lot of research has been done in the domain of issues present in ...
    • Identification of an intelligent attacker in ARP spoofing 

      Singh, Subhash Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      ARP spoofing is a most powerful and simplest internal attack that can be done in internal network. There are many techniques have been proposed to secure Address Resolution Protocol (ARP). It includes cryptographic and ...
    • Identifying the protein coding regions in DNA using IIR antinotch filter 

      Grandhi, Durga Ganesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Genomic Signal Processing is an emerging interdisciplinary area. The problem of Identifying Protein Coding Regions in DNA is addressed using signal processing techniques in this work. DNA can be thought of a string formed ...
    • Identifying mutant hierarchies to reduce test effort in mutation testing 

      Nimmagadda, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      Mutation testing is a fault-based testing approach. The main goal of mutation testing is to assess the quality of a test suite, and in that process, test the software. The approach asserts the absence of pre-specified ...
    • Identifying small world network properties in ad-hoc networks 

      Garg, Neha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, ...
    • Identity verification in smart KYC 

      Jivani, Foram (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      KYC stands for Know Your Customer or Client which is commonly used for customer or business identification process. It is an indispensable part for anyone in the world of payments, banking sectors,credit & insurance companies ...
    • Image aesthetic assessment using deep learning 

      Sherashiya, Shyam (Dhirubhai Ambani Institute of Information and Communication Technology, 2020)
      Image aesthetic assessment is defined as to classify the image in aesthetically good images and aesthetically bad images. In era of digital media, video and images has impact more in human life. Image aesthetic assessment ...
    • Image and video super resolution using deep learning 

      Parikh, Dharit (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The aim of the Super-Resolution (SR) technique is to recover the High Resolution (HR) image from a Low Resolution (LR) image. It has applications in many computer vision areas such as medical imaging, face recognition and ...
    • Image authentication using genetic algorithm 

      Londhey, Arjun (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      With a widespread deployment of digital images, there is need to authenticatesuch images for their originality and integrity.The main objective of the work is todesign an authentication scheme that allows two parties to ...
    • Image captioning and neural architecture search using reinforcement learning 

      Shaw, Grishma (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      With the advent of Deep Learning, problem solving expertise for a machine has exponentially increased. The past decade has experienced much success in the field of deep neural networks in many difficult areas such as image, ...