Now showing items 603-622 of 820

    • Post-processing of speech signal for prosody modification and improvement 

      Dhoot, Kuldeep (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      The basic task of a text-to-speech (TTS) synthesis system is to obtain the correct synthetic speech signal with the help of machines corresponding to the given input text. However, the main difficulty with the TTS system ...
    • Power aware software design parallel programming with DVFS 

      Chikte, Shoeb (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      In the first decade of the 21st century, one of the fastest growing areas is Mobile Internet Devices (MIDs). This segment requires devices to be effecient in terms of power usage. Getting maximum performance in the limited ...
    • Power management of wireless sensor node by dynamic power measurement 

      Kapasi, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Wireless sensor network(WSN) is a collection of spatially distributed autonomous sensor nodes, which cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or ...
    • Power reduction schemes in an interrupt driven processor based SoC 

      Gupta, Shruti (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      In recent time, an impressive growth of personal computing devices like portabledesktops, multimedia products and wireless communication systems has beennoted. As the IoT industry has grown very fast, so is the need for ...
    • Practical approach for depth estimation and image restoration using defocus cue 

      Ranipa, Keyur R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Reconstruction of depth from 2D images is an important research issue in computer vision. Depth from defocus (DFD) technique uses space varying blurring of an image as a cue in reconstructing the 3D structure of a scene. ...
    • Practical approaches for photometric stereo 

      Sharma, Swati (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      In this thesis work, we aim to propose approaches for photometric stereo that are less time consuming and have low computational requirements. Many applications of computer vision require high resolution 3-D structure of ...
    • Pre-processing using outlier removal in voice conversion 

      Rao, Sushant V. (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Voice conversion (VC) is a technique that modifies and converts the speech spokenby one speaker to sound as if the same sentence was spoken by another speaker.In short, only the speaker�s identity is converted and the ...
    • Precision agriculture using wireless sensor network 

      Joshi, Nikita Rajeshbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Farming practices should evolve with the rapid increase in population. Recent growth in wireless sensor network (WSN) has the capability to meet this objective. Better quality in crop production can be achieved using ...
    • Precoder design for beamforming in K-User MIMO interference chennel 

      Nivedita, S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Beamforming in MIMO wireless networks, is a techniques used for mitigating interference and achieve the best possible throughput. Accurate channel state information is essential for efficient design of beamforming vectors ...
    • Predicting quality of service parameter for Internet of Things network 

      Patel, Maitri (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      Nowadays, the Internet of Things applications are developed to facilitate users worldwide. Machine learning is very useful to make some decisions for those applications. The main aim of this present work is to provide a ...
    • Prediction of significant co-ordinates from GPS data using clustering techniques 

      Jha, Mayank (2020)
      Location aware computing is used for providing personalised services based on the semantic locations of the users. It can also be used for detecting customer density throughout a region which can help a company for allocating ...
    • Predictive maintenance schedule 

      Changulani, Smriti (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The transportation sector is an eminent and indispensable part of the development of an economy. An potent transportation system supports social and economic benefits and opportunities. When transportation systems are ...
    • Presentation Attack Detection in Face Recognition System 

      Sherasia, Kehkasha (2021)
      One of the quickest, most precise and easily available biometric recognition system is Face recognition. These systems have wide range of uses like phone verification, payment method security checks, border control and ...
    • Printed gujarati word-matching 

      Pulavwala, Tasneem (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      This report describes an approach to perform word-matching for printed Gujarati script word images. A query word image can be used to match indexed word images of a document for document retrieval. The process starts with ...
    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Evaluation of a Web-Based Questionnaire 

      Lata, Shubham (2021)
      This thesis focuses on methods of evaluation of web-based multiple choice type questionnaire, such as online examination and online surveys, in a privacy preserving process. Two styles of questionnaire are discussed, their ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Privacy Resilient Health Record Storage using Blockchain 

      Hingar, Ruchi (2021)
      Blockchain is a decentralized peer-to-peer distributed ledger. Each block of blockchain stores the hash of the previous block creating a chain of blocks, thus the name blockchain. Blockchain is said to tamper-evident and ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...