Professional Documents
Culture Documents
Full Catalogue 2005 09
Full Catalogue 2005 09
Full Catalogue 2005 09
of
B.Tech. Project Reports
Batch - 2005-09
Abstracts
Resource Centre
DA-IICT
Gandhinagar - 382007
Introduction
The Resource Centre team is happy to bring out this catalogue listing B. Tech. Projects,
submitted by the 2005-2009 batch students to the Institute. This document covers in all 172
projects submitted by 2005-09 batch students and are listed in alphabetical order under each
year by students surname. Each entry of the project provides the bibliographical details, such
as author (with ID number), title, page numbers, year of submission, supervisor name, call
number, accession number, keywords and abstracts. At the end, author and supervisor
indexes have been provided to enable the user to locate a specific entry in this catalogue.
Hope you will find this document useful. We would be happy to have your comments and
suggestions, if any, to improve this catalogue further.
Contents
Batch - 2005-2009
1.
Air for Human Simulator (AFHS) : Graphical Simulation and Physical Study of Inhaled Air
ByAditya
3.
4.
By Himanshu Agarwal
5.
By Ritu Agarwal
6.
-n Junction Solar Cell Simulator - Graphical Simulation and Physics of Solar Cell
By Vineet Aggarwal
7.
8.
Design of Stable Adaptive IIR Notch Filter Using all-pass Lattice Structure
10.
By Anuj Kumar
11.
Health-checking and verification of the DDR3 Subsystem and Survey of clock Domain
Crossing
By V. V.Aravindh
12.
Hybrid Approach to Digital Watermarking Using Independent Component Analysis and Spread
Spectrum
By Arjun Singh
13.
14.
15.
16.
Broadband Beamforming
By Puneet Baser and Anik Mundra
17.
By Sangam Batra
18.
19.
20.
By Nitesh Bhatia
21.
Predict Neural Networks output more accurately using OpenMP Application Program Interface
(API)
By Avinash Bikualla
22.
No-Three-in-Line Problem
By Ravi Teja Boppudi
24.
25.
By Vikrant Chaplot
27.
By Kalyan Cheedi
28.
ii
29.
30.
32.
By B. Aneesha Chowdhary
33.
By Pallavi Daggumati
34.
Lifestyle Modificator
By Abhishek Daiya
35.
36.
10
Improvised filter designs for Performance Enhancement of Depth Estimation using Single
10
Monocular Images
By Das, Aniruddha and Ramnani, Vikas
38.
10
By Akash
40.
11
11
41.
11
11
iii
12
By Apuroop Gadde
44.
12
On-Line Fair Resource Allocation Scheme in OFDMA Systems Using Cooperative Game
12
Theory
By Rohan Gaddh and Khyati Jain
46.
12
Robust Design for M-Banking Client Application on Mobile using Design Patterns
13
By Sagun Garg
48.
13
49.
13
13
Portfolio Optimization
By Abhas Goyal and Rubish Gupta
51.
14
14
Ontology Matching
By Deep Goyal
53.
14
By Gourav Goyal
54.
14
Development of C Simulator for AWG Based Analog & digital Video Interface
15
By Abhishek Gupta
56.
15
By Amit Gupta
57.
iv
15
58.
15
By Divyank Gupta
59.
16
60.
16
By Sachin Gupta
61.
A 0.7 Volt High Performance Three Stage OPAMP Using Forward Body Biased Technique
16
By Shekhar Gupta
62.
16
By Ravi Grandhi
63.
17
17
17
By Anurag Jain
66.
18
By Anurag Jain
67.
18
By Chaitanya Jain
68.
18
69.
Is the attack valid? A Tool for Detecting Erroneous Attacks Found by Scyther
18
By Mohit Jain
70.
19
Service Mashups
By Madan Lal Jat
71.
19
72.
19
73.
20
By Nitesh Jindal
74.
20
75.
20
By Prachi Joshi
76.
20
77.
21
78.
Cross-layer Design for Multimedia streaming in Cluster Based Adaptive Two-hop Wireless
21
Network
By Poornachand Kalyampudi
79.
Performance Analysis of Approximate Nearest Neighbor Searching for k-d and BBD trees
21
By T. Karteek
80.
21
81.
22
By Ravin Khanted
82.
22
22
By Nishanth Koganti
84.
22
22
By Sreekanth Kotapati
86.
23
By R.V.S.Krishna
87.
vi
23
88.
23
By Kashyap Kuchipudi
89.
23
By Lakkaraju Ramesh
90.
24
By Lal, Siddhartha
91.
24
By Suvansh Lal
92.
24
24
ASIC Design
By Divya Macharla
94.
25
25
By Ratnesh Malviya
96.
25
97.
25
By Akhil Mathur
98.
26
99.
26
By Saransh Mehrotra
100.
26
Implementation of Hidden Markov Model for Building a Speaker Dependent Isolated Word
26
Recognizer
By Mayank Mishra
102.
vii
27
27
104.
27
105.
27
106.
28
By Pradeeep Nagireddy
107.
Implementation and Modification of Embedded Zerotree Wavelet Coder for Still Image
28
compression
By Rajendra Prasad Nalamati
108.
28
109.
28
29
By Navkar Samdaria
111.
29
112.
29
29
114.
30
30
By Nandini Patnaik
116.
viii
30
117.
30
118.
31
119.
31
120.
31
By B.K.Priyanka
121.
A Novel MAC Layer Configuration Protocol for CR Based Multihop Wirless Networks
31
32
32
124.
32
A Kalman filter estimation approach for modeling Time Series data in Stock Market
32
33
By G. Ravi Shankar
127.
33
By P. Vivek Reddy
128.
33
By V. S. Goutham Reddy,
129.
34
34
34
Settlement of Chharanagar
By Mohit Kumar Rungta and Kapil Shahani
ix
132.
34
133.
34
35
35
136.
35
137.
Improving Load-Transient Response of Capacitor less Low Drop out Voltage Regulator
36
36
By Amit Sharma
139.
36
36
By Ashish Sharma
141.
37
By Gaurav Sharma
142.
37
37
By Sudhanshu Sharma
144.
38
145.
38
38
147.
38
By Samata Shettigar
148.
39
By Kirti Shrinkhala
149.
39
By Ankur Singhal
150.
39
By Shruti Singhania
151.
39
40
153.
40
Case Study
By Ankit Srivastava
154.
Generic Mathematical Model to evaluate Full Chip Dynamic Voltage Drop based on
40
40
IP Header Compression
By Saurabh Srivastava
156.
41
By Srujan Kumar V. H. N.
157.
41
158.
41
159.
41
By Satyajit Swain
160.
xi
42
161.
42
Implementation of Coverage Driven Verification for verifying AHB Bus using Axiom CDF
42
By Rahul Todi
163.
42
43
165.
43
By G.Vamshi Krishna
166.
43
By T.Vamsi Krishna
167.
43
168.
44
By Varun Varshney
169.
44
44
By Harshal Ved
171.
44
45
By Khushvant Yadav
Author Index
Supervisor Index
46
49
xii
B. Tech Projects
(Abstracts)
2005-2009
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
CoSupervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
CTA (Comprehensive Test Application); FTA (Functional Test Area); XML (Extensible Markup
Language); BREW (Binary Runtime Environment for Wireless systems); WM (Windows Mobile).
Abstract: Comprehensive Test Application is an embedded application that resides on the phone and helps in
testing various modules present in the phone.Our project objective is making a desktop application
for Comprehensive Test Application which will reduce the users effort in using Comprehensive
Test Application to a very considerable amount and also improves the efficiency.
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
10
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
11
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
12
Author:
Title:
Supervisor:
On site
supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
13
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
14
DHCPs which is supported by the automation tool as well, and which considerably eases the
process.
Author:
Title:
Supervisor:
On site
Supervisors:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
15
applications. The file System metadata is modified to increase the efficiency of storage of
continuous media data and issues with multiple disk data management are handled.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
16
Agriculture Unit predicts that the change is weather conditions was also a reason for the price
alteration. India is predominantly an agriculture state. The fluctuations in the food price effects the
life of billions of people. Hence a model to estimate the crops is necessary to further use it to
predict the prices of the crops. Since this involves heavy data crunching we need to use High
Performance Computing.
Iraveni, Ashok Kumar (200501111)
Algorithm for Converting SQL into Relational Algebra; 6 p.; 2009.
Jat, P. M.
SQL (Structured Query Language); Relational Algebra; Syntax; semantics; Relational Schema;
Relational model; Relations; Aggregate functions; Unary operator; Binary operator; Simple query;
Binary query; Complex query; Group by query; Projection; Selection; Union; Intersection; Cartesian
Product.
Abstract: Structured Query Language (SQL) is the dominant relational model data base language today,
comprising commands to define relational algebra objects (DDL Data Definition Language), and
commands for the data manipulation on relations (DML Data Manipulation language). In SQL
there may be some group of queries which are syntactically different but semantics of the queries is
same. But it is tough to predict which queries have same semantics from group of syntactically
different queries. In this report I will explain about how to find out such queries by following the
steps of algorithm proposed by me.
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
17
Author:
Title:
Supervisor:
On Site
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Gupta, Piyush
DDR2 SDRAM; Emulator platform; Palladium; Verification plan.
Memories have been an essential component of various digital designs. New and improved memory
models are continuously being introduced in the market. Currently the most used and trusted
memory used is Double Data Rate2 Synchronous Dynamic Random Access Memory (DDR2
SDRAM). In order to verify a design it needs to be tested with an original DDR2 SDRAM. A high
amount of fee is paid to memory vendors to lease a memory module. ST Microelectronics
developed a memory module of its own to verify designs on emulator platforms. This project is to
verify this new memory module against established DDR2 SDRAM. Since this module is to be used
for two technologies, simulation acceleration and emulation, as a part of this project I implemented
the module with two tools. A comprehensive study and a comparative study of the two different
technologies are also presented in this report.
This project is aimed at analyzing how, in India, various regional speakers who are speakers of
different languages as their native language, differ from each other with respect to their
pronunciation of English. A Dynamic Time Warping based approach has been developed for a
dialect recognition system for Indian English.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
18
found by automated model checkers needs to be validated, as literature reports model checkers
producing false attacks. The two categories of false attacks reported by the model checker Scyther
are Senders Incomplete Knowledge Error (SIKE) and Ticket Attacks. In recent research, Anders
Hagalisletto proposed formal methods and developed a tool to validate attacks on protocols, but
the tool is not publicly available. In this paper, we propose novel formal approaches to detect false
attacks on security protocols under SIKE and Ticket Attack categories. We also developed a tool,
SPAA (Security Protocols Attack Analyzer), to automate the validation approach. SPAA reported
several attacks found by Scyther, to be false. SPAA also discovered falseness in attacks mentioned
in the standard libraries like Clark-Jacob and SPORE. We expect that in the future, attack validation
will become an essential part to determine the soundness of any attack.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
AdaBoost; Detection rates; Eigenface; Face detection; Face recognition; False negatives; False
positives; Nearest feature line.
Abstract: Face recognition deals with identifying or verifying one or more persons in a given still or video
image, using a stored database of faces. Face detection is the first step involved in face recognition.
We start with background removal, which separates the face from the non-face parts. It is done by
attempting to find face-like features in the given image. A method for detecting faces has been
presented in this report. The detected faces are then send for recognition. The second part of the
report presents a method for face recognition.
19
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Partial encryption is a method in which only part of the compressed data is encrypted using a secure
encryption algorithm and the rest is transmitted through the channel unencrypted. The technique
can be applied to images, audio and video data. These partial encryption techniques are faster,
secure and do not have any effect on the compression algorithms involved. In our project we have
explored the application of this partial encryption technique on images which are compressed by
Quadtree, JPEG, and JPEG2000 techniques. The aim of the project is to explore and analyze the
application of this method to various image, audio and video compression techniques and to
propose a new application to one of the known compression techniques.
20
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
21
municipality map along with online monitoring of the waste lifting and dumping process.
Khanted, Ravin (200501240)
A Study on Kalman Filter and Estimation Techniques; 6 p.; 2009.
Mitra, Suman K.
Least squares estimation; Weighted least squares; Recursive least squares; Weighted recursive least
squares; Kalman filter.
Abstract: There are several estimation techniques available in estimation theory literature. I have attempted to
apply estimation techniques namely Least Square, Weighted Least Square and Recursive Weighted
Least Square techniques for curve fitting. Kalman Filter is also an estimation technique. These
methods are implemented using matlab. The performance of various approaches is demonstrated
by taking hundred data points with and without weights and estimating the straight line having the
least square error in Cartesian coordinate.
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Palaniappan, Vinoth
Wideband code division multiple access - Access stratum (WCDMA-AS); Offline build; Testing of
HHO and BMC procedures.
Abstract: Testing of WCDMA mobile software. This includes creating test frame work for WCDMA Access
Stratum, creation of test cases and execution of test cases and debugging of issues for wcdma access
stratum software.
22
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
23
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
High Definition audio; Synthesis; Power planning; Design optimization constraints; Static timing
Analysis; Formal verification.
Abstract: The ASIC implementation of High Definition Audio Controller involved understanding of
architecture of the design and about the intellectual property used in the design, ensuring the coding
guidelines are followed, in the design, constraining the design. The design flow includes Logic
Synthesis of the Register Transfer Level (mapping to a target technology), Formal Verification, PreLayout Timing Analysis (using cell delays and wire load models) for initial understanding of the
designs post-layout performance, Floorplanning (including Power Planning, Input/Output
planning and Intellectual Property Placement), Placement of the design according to the
floorplanning (along with timing and area optimizations using techniques like buffering, sizing,
trimming, pin swapping, cloning), Clock Tree Synthesis, Routing and Post-Layout netlist
24
verification(Formal Verification)
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
25
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
26
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
27
properties of different probe sequences. After studying the insert algorithm of bidirectional linear
probing , I found this area interesting and I finally have come up with a Delete Algorithm in
bidirectional linear probing.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
28
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
29
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
30
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Choudary, Ajay
Simulation, Test Vector; EVCD; Turn around time; Burs; Postedwrites; Test interface controller;
AHB; AXI; Netlist
Abstract: Functional test vector generation for large System on Chips (SoC) is a time consuming job and
requires huge computational resources. The test vectors are generated through simulations which
takes nearly 40 to 70 percent of the overall verification effort. A technique to reduce the time as
well as resources required for vector generation through a simulation is presented here. The
reduction is achieved by partitioning the simulation verification into two in order to identify the
parts which could be replicated with out requiring a simulator. TIC Interface protocol is studied to
identify the two partitions. The technique needs to be modified in order to suit the burst mode and
posted tic writes of AHB as well as AXI interfaces with which the TIC interface interacts. During
the simulations 40-50% speed up is achieved in the vector generation turn around time. The results
obtained from a normal simulation and this partitioned simulation remains the same.
31
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
32
modeling noisy financial time-series. The Kalman Filter is the best linear optimal estimator for the
state estimation of a linear dynamic system. There are several other estimation techniques available
in estimation theory literature. We have attempted to apply other estimation techniques namely
Linear Least Square, Weighted Least Square and Recursive Weighted Least Square techniques and
curve fitting techniques are also used to model the time-series and a comparative analysis is done
between these methods. These methods are implemented in MATLAB. The performance of
various approaches is demonstrated on tick data from Bombay Stock Exchange. A statistical
software SPSS is also used to analyze various statistics of the time-series data.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
33
it effectively. Further the Dependency Matrix can be used to generate other software metrics like
Stability Metrics and Abstraction Metrics which provide an in depth understanding of the
underlying Software Architecture.
Rimmanapudi, Ravi Kiran (200501200)
Comparative Analysis of Kleins and Modified Kleins algorithm; 4 p.; 2009.
Chatterji, Samaresh
Graph; Network; Flow; circulation; augmenting path; Residual network; Negative cost directed
cycle; Minimum mean cycle.
Abstract: Constructing an optimal circulation or minimum cost circulation is one of the most fundamental
network flow problem. There are several approaches proposed to solve this problem. In this
project I propose to conduct a experimental study on actual performance of Kleins and modified
Kleins algorithm in an identical environment.
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
34
of the generator and attempts to make it more robust. Based on the results obtained with the
prototype, changes are suggested in the architecture.
Sambu Shiva Sai Krishna Prasad (200501147)
Computational Geometry -Witness Set and Guard Set Problem; 6 p.; 2009.
Chatterji, Samaresh
Algorithm; Convex Vertex; Guard set; Halfspaces; Line of Support; p sees q; p witnesses q; Reflex
Vertex; Simple polygon; Sweepline algorithm; Visibility Kernel;, Visibility Polygon; Witness set.
Abstract: The problem of how many guards are necessary to guard any polygon with n vertices has been
extensively studied in computational geometry. A variant of this problem is that of finding a witness
set in a polygon. A recent paper by Kyung-Yong Chwa, Byung-Cheol Jo, Christian Knauer, Esther
Moet, Chan-Su Shin et al has obtained various theorems and proposed an algorithm for finding a
finite witness set if it exists. It is proposed to implement the algorithm and study its performance in
a simulation framework.
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
35
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Abstract:
36
Multipoint (multimouse) enabled applications which is typically used for displaying digital content
derived from textbooks augmented with complimentary multimedia resources (image and video)
obtained from any external source, or locally created material such as photographs and drawings.
Multipoint feature will enable one computer to serve many students simultaneously. Data collected
based on observations and teacher feedbacks along with testing by deploying it in many schools can
be used to verify existing applications and also to achieve symbiotic human computer interaction.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
37
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisors:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
38
envelope function with complex sinusoidal. Gabor filters are used through which the image is
passed and histogram values of the output image are dealt as Gabor features for the classification by
finding the minimum Euclidean distance between the test image and the input image. LDA, PCA
and Gabor feature method are then combined and the results compared against the results obtained
using LDA, PCA and Gabor feature method separately.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
39
project, we study existing VoIP security, identify a few shortcomings and propose two protocols for
securing VoIP. One of our protocols considers identity-based crypto-primitive and the other one
uses dynamic authentication technique. We will analyze our proposed protocols and compare them
with existing VoIP protocols.
Soumya, P. V. (200501140)
Centralized Printing System; 5 p.; 2009.
Banerjee, Asim
Client spooler; Server spooler; Internet printing protocol, RPC; Enhanced meta file (EMF),
Graphics device interface (GDI); PrnAdmin.dll, MONO framework.
Abstract: Centralized Printing is one of the many and diverse applications of client server architecture.
Centralized printing is implemented using the Network Printer and the Printer Server concepts.
This report examines the Implementation techniques and describes the Network printer
architecture in detail. Then it describes the system design specifications and also the architectural
design of a network printing system soft ware
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
40
protocol. It uses the redundancy in the transmitted headers to minimize the header size.
I propose to study this protocol; develop it as an independent library and create dynamic memory
scheme for the same. Further I would be developing testing modules for its verification over
Software Unit Test Framework, SUTF.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
CoSupervisor:
Keywords:
Abstract:
41
In our research project we have to address this gap by developing a Game AI library specifically for
mobile based games. This report discusses the motivation, our approach in designing the Game AI
library and the functionalities included in the library. We have also prototyped 2 games using our
Game AI library as a proof of concept. The report also includes an evaluation study conducted to
study the effectuality of our Game AI library.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
42
improvement for camera software" tries to address the issues discussed here and develop tools.
Author:
Title:
Supervisor:
On site
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Mathur, Neeraj
Requirements; Entity Relationship diagram; Class diagram; Testing.
The Sensor Mechanical Group (SMG) of the Indian Space Research Organisation (ISRO) are
getting developed a web based portal through/with the help of which most of the paper work can
be reduced, information is available at a click, redundancies in job reduce, combined with built in
softwares so that they can do their work from anywhere and can easily access needed information
anywhere and anytime. Moreover, have an organized web based system to keep their project work
organized. Thus, my BTech project has been to develop the Sensor Mechanical Group Web
System.
Author:
Title:
Supervisor:
Keywords:
Author:
Title:
Supervisor:
Keywords:
Abstract:
43
some types of trees as graceful. One approach to solve the graceful tree conjecture is to verify how
many trees are graceful for a certain number of vertices n. If the number of non-isomorphic trees
for n vertices is same as number of non-isomorphic graceful trees for n vertices, we can say that all
trees with n vertices are graceful. We will try to prove the graceful tree conjecture for as large a n as
possible or will disprove the graceful tree conjecture if we find that number of non- isomorphic
graceful trees are not equal to number of non-isomorphic trees for certain n. Till now, a brute force
approach is used to find out whether all the trees are graceful for a certain number of vertices n. We
propose a better approach and had proved the graceful tree conjecture for 11 vertices.
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Author:
Title:
Supervisor:
Keywords:
Abstract:
Vishnu Kanth, Irukulapati Naga (200501196) and Srinivas Balu, Seshu (200501169)
Implementation of Adaptive Filters using Subband and Frequency Domain Techniques; 5 p.; 2009.
C. Vijaykumar
Frequency domain adaptive filters (FDAF); Sub band.
Adaptive signal processing applications such as adaptive equalization or adaptive wideband active
noise and echo cancellation involve filters with hundreds of taps required for accurate
44
representation of the channel impulse response. The computational burden associated with such
long adaptive filters and their implementation complexity is very high. In this report, first we
compare time domain and frequency domain implementations of adaptive filters and found that
frequency domain structures yields better results than time domain for very long impulse response.
In the next part of the report, estate the results obtained from implementations of adaptive filters
using sub band and frequency domain techniques.
Author:
Title:
Supervisor:
Keywords:
Abstract:
45
Author Index
Gadde, Apuroop, 12
Gadde, Ramachandra Rao, 12
Gaddh, Rohan, 12
Garg, Amit, 12
Garg, Sagun, 13
Garg, Saurabh, 31
Goenka, Anushree, 42
Golcha, Manish, 36
Gopi, Nitin, 13
Gowtham Srinivas P., 13
Goyal, Abhas, 13
Goyal, Ankush, 14
Goyal, Deep, 14
Goyal, Gourav, 14
Grandhi, Ravi, 16
Gupta , Rubish, 13
Gupta, Aakar, 14
Gupta, Abhishek, 15
Gupta, Amit, 15
Gupta, Anurag, 15
Gupta, Divyank, 15
Gupta, Pawan, 5
Gupta, Rohit, 16
Gupta, Sachin, 16
Gupta, Shekhar, 16
Iraveni, Ashok Kumar, 17
Jain, Amit, 17
Jain, Ankit Kumar, 3
Jain, Anurag, 17, 18
Jain, Chaitanyam 18
Jain, Kapil, 37
Jain, Khyati, 12
Jain, Manish, 18
Jain, Mohit, 18
Jat, Madan Lal, 19
Jha, Anju, 19
Jhunjhunwala, Harsha, 19
Jindal, Nitesh, 20
Jindal, Puneet, 12
Joshi, Apurva, 20
Joshi, Prachi, 20
Josyula, Prakash, 20
Kalra, Anshika, 21
Kalyampudi, Poornachand, 21
Kapoor, Vishav Vikram, 24
Karteek T., 21
Khandelwal, Swapnil, 21
Khanted, Ravin, 22
Abhinav Krishna, 11
Abhinav Vijay, 1
Aditya Prakash, 1
Agarwal, Ambuj, 1
Agarwal, Himanshu, 2
Agarwal, Ritu, 2
Agarwal, Somya, 7
Aggarwal, Vineet, 2
Agrawal, Ankit, 2
Agrawal, Manish, 3
Agrawal, Rohin, 3
Anuj Kumar, 3
Aravindh, V. V., 3
Arjun Singh, 4
Bagga, Sumit, 4
Bagla, Sumit, 4
Bajaj, Prashant, 27
Baphna, Ankit, 4
Baser, Puneet, 5
Batra, Sangam, 5
Bhagya, Rohit, 5
Bhargava, P.V. Vijay, 5
Bhargava, Shobhneet, 42
Bhatia, Nitesh, 6
Bikualla, Avinash, 6
Bontha, Srikanth Reddy, 6
Boppudi, Ravi Teja, 6
Chandra , P. Satish, 7
Chandra, Sakshi, 7
Chandra, Y. Sharad, 41
Chaplot, Vikrant, 7
Chauhan, Sidhartha, 8
Cheedi, Kalyan, 7
Chitneni, B. K Nagarjuna, 8
Chittor, Aditya, 8
Chouhan, Kishan Singh, 8
Chowdhary, B. Aneesha, 9
Daggumati, Pallavi, 9
Daiya, Abhishek, 9
Dantuluri, Udaya Bhaskar, 9
Dargar, Apurva, 10
Das, Aniruddha, 10
Dasksha Gouri, 6
Das, Prabhu Dutta, 10
Dayal, Akash, 11
Dholakia, Rounak, 11
Dhulipala, Hima Kireeti Srikanth, 11
Dubey, Ojas, 11
46
Author Index
Kishore, Anil, 22
Koganti, Nishanth, 22
Koneru, Tilak, 22
Konkimalla, Sravani Ratna, 22
Kotapati, Sreekanth, 22
Krishna Teja, V., 23
Krishna, R.V.S., 23
Kuchipudi, Kashyap, 23
Lakkaraju Ramesh, 23
Lal, Siddhartha, 24
Lal, Suvansh, 24
Lalwani, Vishal, 11
Macharla, Divya, 24
Madhavapeddi, Swetha Sri, 25
Malik, Kunal, 1
Malviya, Ratnesh, 25
Manmeet Singh, 24
Maremanda, Sudha Praveen, 25
Mathur, Akhil, 25
Meel, Praveen, 26
Mehrotra, Saransh, 26
Merwana, Umang, 26
Mishra, Abhinesh, 14
Mishra, Mayank, 26
Mittal, Ashish, 27
Mittal, Saumya, 32
Mittal, Saurabh, 28
Modi, Ankit, 27
Mundra, Anik, 5
Mundra, Ankit, 10
Muraharirao, Siva Charan, 27
Murthy, R. Satyanarayan, 27
Nagireddy, Pradeeep, 28
Nalamati, Rajendra Prasad, 28
Nallavelli, Ramya, 28
Nama, Amit, 28
Navkar Samdaria, 29
Nekkanti, Vasavi Kumar, 29
Nigam, Abhinav, 32
Nirdesh Kumar, 32
Nunia, Vikas, 29
Pandey, Jitendra Kumar, 26
Pandey, Sumit, 17
Pareek, Ritika, 31
Parikh, Gaurav, 34
Parimi, Varun Rajendra, 30
Patnaik, Nandini, 30
Pitchikala, Satish, 30
Prakash, Nikhil, 31
Praveen Kumar, 30
Prithvi Raj Krishna, N. S., 31
Priyanka.B.K., 31
Purohit, Autul, 31
Purohit, Raj Rishi, 32
Puvvala, Sai Charan, 44
Ram, G., 32
Ramnani, Vikas, 10
Ramrakhiyani, Laveen, 32
Rathi, Pankaj Kumar, 32
Ravi Shankar, G., 33
Reddy D., Ravindra Kumar, 13
Reddy, P. Vivek, 33
Reddy, V. S. Goutham, 33
Rimmanapudi, Ravi Kiran, 34
Rout, Lipsa Shrabani, 34
Rungta, Mohit Kumar, 34
Sahoo, Rohit Kumar, 34
Sai Teja P., 34
Saini, Milan, 14
Sambu Shiva Sai Krishna Prasad, 35
Sampath, P. Shanmukha, 35
Saxena, Shubham, 35
Shahani, Kapil, 34
Shaik, Khaja Ahmad, 36
Sharma, Amit, 36
Sharma, Anshul, 36
Sharma, Ashish, 36
Sharma, Gaurav, 37
Sharma, Ruchi, 37
Sharma, Sudhanshu, 37
Shashank Kumar, 38
Shekhar, Praveen, 38
Shekhawat, Ajeet Singh, 38
Shettigar, Samata, 38
Shrinkhala, Kirti, 39
Sidharth Kumar, 1
Singhal, Ankur, 39
Singhania, Shruti, 39
Sinha, Rahul, 39
Somani, Abhishek, 16
Soumya, P. V., 40
Srinivas Balu, Seshu, 44
Srivastava, Ankit, 40
Srivastava, Anuj, 29
Srivastava, Nishant, 40
Srivastava, Saurabh, 40
47
Author Index
Srivastava, Vinay Kumar, 30
Srujan Kumar V. H. N., 41
Subramaniyan, G. S. Neeraj, 41
SuryaNarayana, P.S.V., 41
Swain, Satyajit, 41
Talwar, Ankit, 42
Tandle, Sawant, 34
Taneja, Rajat, 42
Thota, Sai Gopal, 42
Tiwari, Anukool, 29
Todi, Rahul, 42
Tyagi, Anupriya S., 43
Vamshi Krishna, G., 43
Vamsi Krishna, T., 43
Varma, K. Phani Kumar, 43
Varshney, Varun, 44
Varun Raj C. V., 38
Ved, Harshal, 44
Verma, Risav Kumar, 44
Verma, Sparsh, 32
Verma, Swati, 39
Vishnu Kanth, Irukulapati Naga, 44
Yadav, Khushvant, 45
Yenugula, Naveen, 28
48
Supervisor Index
Amin, Ashok T., 2, 7, 19, 27, 30, 35, 39, 43
Banerjee, Asim, 3, 4, 5, 8, 10, 12, 13, 19, 20, 25, 32, 40, 41, 42, 44
C. Vijaykumar, 3, 5, 11, 14, 27, 30, 32, 38, 39, 44
Chatterji, Samaresh, 4, 6, 7, 9, 11, 12, 13, 21, 22, 23, 24, 28, 31, 34, 35, 36, 41, 42, 43, 44, 45
Chaudhary, Sanjay, 2, 6, 8, 11, 13, 14, 16, 17, 27, 29, 30, 36, 43
Das, Manik Lal, 7, 14, 16, 17, 24, 27, 29, 36, 38, 39
Desai, Binita, 3, 38, 44
Divakaran, Srikrishnan, 15, 20, 33, 39
Dutta, Gautam, 1
Dubey, Rahul, 3, 15, 23, 24, 30, 31, 40, 42
Ghodgaonkar, Deepak, 26
Gupta, Manish K., 35
Gupta, Sanjeev, 1, 5, 31, 32, 37
Jat, P .M., 6, 8, 13, 14, 17, 19, 22, 26, 29, 33, 41, 42, 43
Joshi, Manjunath V., 7, 12, 22, 23, 25, 34, 37, 38
Jotwani, Narresh, 1, 2, 15
Mandal, Shushanta, 9, 18
Mathuria, Anish M., 8, 14, 18, 20, 24, 34
Mitra, Suman K., 1, 2, 4, 5, 10, 22, 33
Mohan, S., 9
Nagchoudhuri, Dipnkar, 2, 6, 26, 44
Pandya, Abhinay, 15, 24
Parikh, Chetan D., 2, 10, 16, 28, 36, 40
Patil, Hemant, 18, 26, 32, 37
Ranjan, Prabhat, 18
Raval, Mehul, 11, 25, 28
Roy, Anil K., 2, 3, 9, 21, 29, 38, 44
Sarkar, Aditi Nath, 18, 26
Srivastava, Sanjay, 31
Venkatraman, Hrishikesh, 21
V. Sunitha, 22, 25
49
Resource Centre
DA-IICT
Near Indroda Circle
Gandhinagar - 382007
Phone: 079-30510578
E-mail: rcservices@daiict.ac.in