Search
Now showing items 681-690 of 694
Security and Privacy concerns in Voice Assistants Devices
(2021)
Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...
Identification and Analysis of Common Issues Across Different Python Repositories
(2021)
Our main goal for this research is to identify the common issues present in different repositories having python as their primary programming language. A lot of research has been done in the domain of issues present in ...
Privacy Preserving Evaluation of a Web-Based Questionnaire
(2021)
This thesis focuses on methods of evaluation of web-based multiple choice type questionnaire, such as online examination and online surveys, in a privacy preserving process. Two styles of questionnaire are discussed, their ...
Automated Conversion of Natural Language Textual Specifications into Requirement Templates (RTs)
(2021)
The requirement gathering phase is the fundamental part of any software development project as it formally defines the project by generating the list of requirements that are extracted by interviewing and understanding all ...
Classification of Polarimetric SAR Images
(2021)
Classification of terrain into different ground covers is one of the predominant applications of polarimetric SAR images. TheWishart classifier works well for major classification tasks. However, it is effective only for ...
Deduplication On Cloud Storage
(2021)
Day by day people are moving towards cloud storage for ease of accessibility, availability, security etc. Data Deduplication helps cloud storage to utilize storage space efficiently. Deduplication process is easy when data ...
Deep Learning for Severity Level-based Classification of Dysarthria
(2021)
Dysarthria is a motor speech disorder in which muscles required to speak somehow gets damaged or paralyzed resulting in an adverse effect to the articulatory elements in the speech and rendering the output voice unintelligible. ...
Handcrafted Feature Design for Voice Liveness Detection and Countermeasures for Spoof Attacks
(2021)
Automatic Speaker Verification (ASV) systems are highly vulnerable to the spoofing attacks. Spoof attacks are the attacks when an imposter tries to manipulate the biometric system and to get the access of the system by ...
Design and Implementation of Low Power RISC V ISA based Processor and Coprocessor design for Matrix Multiplication
(2021)
RISC V is an open-source ISA that is used to design the processor and the coprocessor architecture. For fulfilling the requirement of matrix multiplication, a low power and high-performance multiply and accumulate unit has ...
All Digital ECG Front End ASIC
(2021)
The research presents a continuation work of low power front-end digital electrocardiogram (ECG) acquisition system, designed and simulated (with Wilson Central Terminal ECG Database) using 0.18 mm CMOS technology model ...