Skip to content

List of Projects for the ProjectX Mentorship Programme 2025

Notifications You must be signed in to change notification settings

ProjectX-VJTI/ProjectX-2025

Repository files navigation

ProjectX-Projects-2025

This is the list of projects completed in the 2025 programme.

Index

  1. FakeMyVoice
  2. Train Your Foes
  3. Traffiq
  4. Voice2English
  5. Reinforcents
  6. Neural Quest
  7. Encrypted Chat Application
  8. Text to Handwritting
  9. EEG Analyser and Simulator
  10. MuseGan
  11. Multimodal Graph DB with RAG
  12. CodeSage
  13. Sera
  14. Kernel Design
  15. Cryptanalysis
  16. AI Ops

FakeMyVoice

Description

Fake My Voice is a deep learning-powered multi-speaker Text-to-Speech (TTS) system designed to clone voices with high fidelity. By extracting a unique 256-D speaker embedding from just a few seconds of reference audio, the pipeline replicates the specific tone, accent, and style of any target speaker.

The project integrates three state-of-the-art architectures:

  • GE2E Encoder: Extracts robust vocal identity features.
  • Tacotron 2: Generates speaker-conditioned Mel-spectrograms from text.
  • WaveGlow: A flow-based neural vocoder for natural waveform generation.

Output

Tacotron2 Performance

Achieved smooth Mel-spectrogram prediction after ~60 epochs.

Text: "Printing, in the only sense with which we are at present concerned"

Expected Mel Predicted Mel Predicted Frames
Expected mel mel predicted output frames

Speaker Embeddings

Achieved stable separation across 40+ speakers. t-SNE plots show distinct identity clustering.

Losses & Metrics

  • Mel Prediction: Mean Squared Error (MSE) Loss.
  • Stop Token: Binary Cross-Entropy (BCE) Loss.

Audio Output

Download/Listen to Audio Sample

The audio says : "Use this model to clone the voice of any user"

References

Mentors:

  • Kevin Shah
  • Prasanna Kasar
  • Yash Ogale

Domains: Deep Learning, Speech & Audio Signal Processing, Natural Language Processing (TTS)


Train Your Foes

Description

Train Your Foes is a game where your greatest enemy is a machine that learns from you. Built in Unity 6, the game is split into two parts. First, you face The Gauntlet: four intense platforming levels that test your speed and precision. If you survive, you enter The Duel: a final boss fight that isn't scripted. Instead of following a set pattern, the boss uses Artificial Intelligence (Q-Learning) to study your health, energy, and moves. It chooses the best strategy to defeat you based on thousands of past battles, creating a unique challenge that feels alive and unpredictable.

Output images

image image

References

1. Documentation: Full Documentation Site
2. Source Code: GitHub Repository
3. Engine: Unity Engine (6000.2.1f1)
4. Algorithm: Custom Q-Learning Implementation using the Bellman Equation:

$$Q(s, a) \leftarrow Q(s, a) + \alpha [R + \gamma \max_{a'} Q(s', a') - Q(s, a)]$$

Mentors:

Abhay Varnekar
Ishaan Shaikh

Domains: Game Development, Artificial Intelligence, Reinforcement Learning


🚦 Traffiq

Description

TrafIQ is an intelligent traffic signal control system that uses Deep Reinforcement Learning (DRL) to optimize signal timings in real-time. Built using SUMO simulation and algorithms such as Q-Learning, DQN, PPO, and MAPPO, the system dynamically adapts to traffic conditions to reduce queue lengths, waiting time, and emissions while maximizing throughput.

Output images

References

1. Documentation: Project Documentation
2. Source Code: GitHub Repository
3. Simulation Engine: SUMO (Simulation of Urban Mobility)
4. Frameworks: PyTorch, Gymnasium

Mentors:

  • Yashvi Mehta
  • Mahi Palimkar

Domains: Reinforcement Learning, Multi-Agent Systems, Intelligent Transportation Systems


Voice2English

Description

Output images

References

Mentors:

Domains:


Reinforcents

Description

ReinforCents is a project that simulates a real-world stock and options trading market using Reinforcement Learning. It creates a virtual exchange where multiple intelligent agents interact and execute trades, similar to how trading happens in real financial markets.

The market is populated with three types of traders, each with unique behaviors and strategies:

  • Market Makers: Provide liquidity by quoting bid/ask prices.
  • Institutional Traders: Execute large, sophisticated, and long-term strategies.
  • Retail Traders: Emulate the behavior of individual, often sentiment-driven, investors.

The system includes a working electronic exchange with a live order book, automatic trade matching, and real-time trade execution. The agents operate in this environment using advanced reinforcement learning algorithms, including:

  • Soft Actor-Critic (SAC) for Market Makers
  • Deep Deterministic Policy Gradient (DDPG) for Institutional Traders

Agents make decisions using financial modeling tools such as:

  • Black-Scholes option pricing model
  • Option Greeks (Delta, Gamma, Theta, Vega)
  • Technical indicators (EMA, RSI, Stochastic Oscillator, ADX, CMF)

The project demonstrates how multiple AI agents can learn, compete, and make decisions within a simulated stock and options trading environment.

Output images

Output image

References

Mentors:

  • Mudit Jain
  • Krish Shah

Domains: Reinforcement Learning, Options Trading, Multi-Agent Systems


Neural Quest

Description

Output images

References

Mentors:

Domains:


Encrypted Chat Application

Description

Cryptify is a secure real-time messaging system built using Java Socket Programming and Spring Boot, designed to demonstrate low-level encrypted communication over TCP. The application implements Hybrid Cryptography, combining RSA (for secure key exchange) and AES (for fast symmetric message encryption) to ensure confidentiality and integrity. Messages are encrypted before transmission, securely exchanged over TCP sockets, and decrypted only by the intended recipient, ensuring that no plain-text data is exposed during communication.

Output images

image image

References

1. Source Code: GitHub Repository
2. Documentation: Project Documentation
3. Encryption Standard: RSA-2048 for key exchange
4. Symmetric Encryption: AES-256 (GCM mode recommended)
5. Transport Protocol: TCP Socket Programming in Java
6. Security Model: Hybrid Encryption (RSA + AES)

Mentors:

Rupak Gupta
Tanish Bhamare

Domains: Cybersecurity, Network Programming, Cryptography, Secure Communication


Text to Handwriting

Description

This project generates realistic handwritten text from typed input using a Conditional Generative Adversarial Network (CGAN).
Unlike traditional handwriting synthesis systems that require large datasets or fixed vocabularies, this model learns writer-specific style from a small set of handwriting samples (approximately 15 images per writer).

A Content Encoder preserves textual correctness, while a Style Encoder captures unique handwriting characteristics. The Generator combines both representations to produce natural-looking handwritten word images.

Output Images

The system produces handwritten word images that reflect:

  • The provided input text
  • Writer-specific stylistic features
  • Natural handwriting variations

alt text

alt text

alt text

alt text

alt text

References

  • GANwriting: Content-Conditioned Generation of Styled Handwritten Word Images
  • IAM Handwriting Word Database
  • Deep Learning Specialization — DeepLearning.AI
  • Kaggle Datasets

Mentors:

Domains: Computer Vision, Generative Adversarial Networks (GANs), Natural Language Processing


EEG Analyser and Simulator

Description

EEG Analyser and Simulator is a AI-driven simulation and prediction of brain dynamics using EEG data. This project aims to develop an AI-powered system that constructs a personalized Digital Twin of the Brain using EEG (Electroencephalogram) data. The system leverages deep learning and signal processing to analyze, predict, and simulate neurological patterns — enabling early detection of epilepsy, cognitive stress, depression, and other brain-related conditions. The system also aims to classify emotions in awake and dream phase. Other implications include the prediction of failure and success of surgery and drug identification and simulation of its effects on EEG data. In addition, the project explores neural generative modeling to interpret REM-phase brain activity into abstract visual representations, pushing the boundaries of dream analysis and subconscious understanding.

Output images

The system predicts the desired label for EEG signal and also plots it.

alt_text

alt text

alt text

References

Mentors:

Domains: Signal processing, Machine Learning, Deep Learning


MuseGan

Description

MuseGan is a GAN-based project for generating multi-track polyphonic music. It can generate coherent 4-bar music for 5 instruments from scratch and also supports Human-AI collaboration by conditionally generating tracks based on one human input track.

Output images

From-Scratch Model

Model Diagram

Pianoroll Output

Conditional Track

Conditional Model Diagram

Conditional Outputs

References

Mentors:

Domains: Music Generation, Generative Adversarial Networks (GANs), Temporal Sequence Modeling


Multimodal Graph DB with RAG

Description

Output images

References

Mentors:

Domains:


CodeSage

Description

CodeSage is a Python-based framework that executes code and explains its logic in simple, human-readable language.
It combines compiler concepts with AI-based summarization to help users understand how code works internally.

Pipeline

  • Lexer → Converts source code into tokens
  • Parser → Builds an Abstract Syntax Tree (AST)
  • Summarizer → Generates structured explanations
  • Interpreter → Executes the AST (tree-walk)
  • NLP (Optional) → Refines explanations
  • GUI (Tkinter) → Editor, output, AST view, summaries

Purpose

  • Help students understand how interpreters work
  • Explain code behavior clearly
  • Visualize program structure
  • Bridge programming with AI-based explanation

CodeSage runs code and explains it step-by-step.

Output images

image image

References

Mentors: Yadnyesh Patil, Rupak Gupta

Domains: AST Parsing NLP


Sera

Description

Output images

References

Mentors:

Domains:


Kernel Design

Description

Output images

References

Mentors:

Domains:


Cryptanalysis

Description

Cryptanalysis is a hybrid framework combining energy-based learning, side-channel analysis, and classical cryptography to analyze multiple ciphers. It first detects the cipher (AES, DES, Speck, or Vigenère), then applies an appropriate side-channel attack method with CNN-based key recovery for DES and Speck, statistical techniques for Vigenère, and only detection for AES due to its robustness. The system highlights how different ciphers require distinct attack strategies and demonstrates both practical vulnerabilities and modern security limits.

Output images

DES_sca speck32_sca energy_classifier_accuracy vignere_final_loss - 2

References

Mentors:

Domains: Side Channel Analysis, Energy-Based Models, Deep Learning, Cybersecurity, Classical Cryptography


AI Ops

Description

Output images

References

Mentors:

Domains:


About

List of Projects for the ProjectX Mentorship Programme 2025

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 11