Now showing items 141-160 of 923

    • Deep Learning based approach for Handwritten Gujarati Word Image Matching 

      Javia, Riya Pankajkumar (2021)
      Information retrieval from scanned handwritten digital copies is a very challenging task especially in Indian scripts like Gujarati due to the presence of joint and conjuct characters as well as matras, cursive nature and ...
    • Combining Model Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAAL 

      Iyer, Kumar Lakshmanan (2021)
      Software testing is continuously evolving and Model-based testing (MBT) is one such test automation strategy. MBT involves the generation of tests by executing a model created by studying the requirements of the System ...
    • Design of Voice Privacy System 

      Prajapati, Gauri P. (2021)
      Extensive use of Intelligent Personal Assistants (IPA) and biometrics in our day to day life asks for privacy preservation while dealing with personal data. To that effect, efforts have been made to preserve the personally ...
    • Data Augmentation Using CycleGAN for Children’s ASR43e 

      Singh, Dipesh Kumar (2021)
      Extensive use of voice assistants by children in their day-to-day life activities asks for better performance of Automatic Speech Recognition (ASR) for children’speech. The recent advancements in ASR perform better for ...
    • Voice Liveness Detection Using Modified Group Delay Functions 

      Singh, Shrishti (2021)
      Automatic Speaker Verification (ASV) system is a key element of the voice biometric system. With the recent advancement in technology, spoofing attacks have also progressed drastically. In spoofing attack, attacker tries ...
    • All Digital ECG Front End ASIC 

      Joshi, Aaditya P. (2021)
      The research presents a continuation work of low power front-end digital electrocardiogram (ECG) acquisition system, designed and simulated (with Wilson Central Terminal ECG Database) using 0.18 mm CMOS technology model ...
    • Design and Implementation of Low Power RISC V ISA based Processor and Coprocessor design for Matrix Multiplication 

      Gaurav, Tanya (2021)
      RISC V is an open-source ISA that is used to design the processor and the coprocessor architecture. For fulfilling the requirement of matrix multiplication, a low power and high-performance multiply and accumulate unit has ...
    • Handcrafted Feature Design for Voice Liveness Detection and Countermeasures for Spoof Attacks 

      Khoria, Kuldeep (2021)
      Automatic Speaker Verification (ASV) systems are highly vulnerable to the spoofing attacks. Spoof attacks are the attacks when an imposter tries to manipulate the biometric system and to get the access of the system by ...
    • Deep Learning for Severity Level-based Classification of Dysarthria 

      Gupta, Siddhant (2021)
      Dysarthria is a motor speech disorder in which muscles required to speak somehow gets damaged or paralyzed resulting in an adverse effect to the articulatory elements in the speech and rendering the output voice unintelligible. ...
    • Use of GitHub in Computer Science Education 

      Patani, Prutha (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      GitHub is a very popular cloud hosting service based on Git version control system (VCS). GitHub provides additional features to Git VCS like task management and bug tracking. GitHub has gained too much popularity in the ...
    • Image Captioning Using Visual And Semantic Attention Mechanism 

      Patel, Abhikumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      Image captioning is a method of generating captions/descriptions for the image. Image captioning have many applications in various fields like image indexing for content based image retrieval, Self-driving car, for visually ...
    • 3D object Classification 

      Pandit, Rishabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      This thesis deals with the task of classifying 3D Objects. Nowadays, 3D object classification is used in robotics, self-driven cars, etc. To organize any object, we need local and global representation. As humans, we ...
    • Algorithmic Trading using Machine Learning 

      Soni, Maulik (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      This works aims to understand the different factors which influence the stock market and further use those factors to forecast its future values. The Nifty50 and NiftyBANK under National Stock Exchange India(NSE India) are ...
    • Query Processing in Different Domains 

      Mishra, Sonal (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      In this modern era, digital content is exploding in every domain. Biomedical domain is also no exception.In this modern era, digital content is exploding in every domain. Biomedical domain is also no exception. Finding ...
    • Privacy Preserving Evaluation of a Web-Based Questionnaire 

      Lata, Shubham (2021)
      This thesis focuses on methods of evaluation of web-based multiple choice type questionnaire, such as online examination and online surveys, in a privacy preserving process. Two styles of questionnaire are discussed, their ...
    • Deduplication On Cloud Storage 

      Gosai, Bhautik (2021)
      Day by day people are moving towards cloud storage for ease of accessibility, availability, security etc. Data Deduplication helps cloud storage to utilize storage space efficiently. Deduplication process is easy when data ...
    • Classification of Polarimetric SAR Images 

      Chaudhari, Nilamben (2021)
      Classification of terrain into different ground covers is one of the predominant applications of polarimetric SAR images. TheWishart classifier works well for major classification tasks. However, it is effective only for ...
    • Automated Conversion of Natural Language Textual Specifications into Requirement Templates (RTs) 

      Shah, Parv (2021)
      The requirement gathering phase is the fundamental part of any software development project as it formally defines the project by generating the list of requirements that are extracted by interviewing and understanding all ...
    • MBE: Client Side Secure Data Deduplication Based on Merkel Tree 

      Joshi, Kriti (2021)
      Several secure data deduplication protocols are recently proposed to maintain unique data copies at the cloud service providers (CSP’s) and utilize the storage space efficiently. Though many Message Locked Encryption (MLE) ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...