Now showing items 81-98 of 98

    • Acoustic Source Localization Using Time Delay Estimation 

      Tellakula, Ashok Kumar (2009-08-19)
      The angular location of an acoustic source can be estimated by measuring an acoustic direction of incidence based solely on the noise produced by the source. Methods for determining the direction of incidence based on sound ...
    • Visibility Visualization And Haptic Path Exploration 

      Manohar, B S (2009-08-19)
      We propose a real-time system to visualize multi-viewpoint visibility information for terrains, supporting flight path optimization for view coverage or vehicle exposure to ground. A volume rendered display and a haptic ...
    • On The Issues Of Supporting On-Demand Streaming Application Over Peer-to-Peer Networks 

      Kalapriya, K (2009-06-17)
      Bandwidth and resource constraints at the server side is a limitation for deployment of streaming media applications. Resource constraints at the server side often leads to saturation of resources during sudden increase ...
    • Reduction Of Query Optimizer Plan Diagrams 

      Darera, Pooja N (2009-06-17)
      Modern database systems use a query optimizer to identify the most efficient strategy, called "plan", to execute declarative SQL queries. Optimization is a mandatory exercise since the difference between the cost of best ...
    • Power Grid Analysis In VLSI Designs 

      Shah, Kalpesh (2009-05-18)
      Power has become an important design closure parameter in today’s ultra low submicron digital designs. The impact of the increase in power is multi-discipline to researchers ranging from power supply design, power converters ...
    • Analysis Of Electromagnetic Pulse Simulators 

      Prakash, Rahul (2009-05-12)
      Electromagnetic pulse simulators are essential for testing the ability of electronic devices to withstand high intensity electromagnetic ends. This work presents the analysis of various parallel plate transmission lines ...
    • QoS Over Multihop Wireless Networks 

      Saxena, Tarun (2009-05-12)
      The aim of this work is to understand the requirements behind Quality of Service (QoS) for Multihop Wireless Networks and evaluate the performance of different such strategies. This work starts by establishing the basis ...
    • Analysis And Predictions Of DNA Sequence Transformations On Grids 

      Joshi, Yadnyesh R (2009-05-11)
      Phylogenetics is the study of evolution of organisms. Evolution occurs due to mutations of DNA sequences. The reasons behind these seemingly random mutations are largely unknown. There are many algorithms that build ...
    • Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems 

      Kumar, V Santhosh (2009-04-13)
      Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...
    • Information Theoretic Approach To Extractive Text Summarization 

      Ravindra, G (2009-04-13)
      Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...
    • A Systematic Approach To Synthesis Of Verification Test-Suites For Modular SoC Designs 

      Surendran, Sudhakar (2009-03-03)
      SoCs (System on Chips) are complex designs with heterogeneous modules (CPU, memory, etc.) integrated in them. Verification is one of the important stages in designing an SoC. Verification is the process of checking if the ...
    • Applications Of Machine Learning To Anomaly Based Intrusion Detection 

      Phani, B (2009-03-02)
      This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...
    • Performance Modeling And Evaluation Of Network Processors 

      Govind, S (2009-03-02)
      In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...
    • Power-Aware Compilation Techniques For Embedded Systems 

      Shyam, K (2008-01-25)
      The demand for devices like Personal Digital Assistants (PDA’s), Laptops, Smart Mobile Phones, are at an all time high. As the demand for these devices increases, so is the push to provide sophisticated functionalities ...
    • One To Mant And Many To Many Collective Communication Operations On Grids 

      Gupta, Rakhi (2008-01-16)
      Collective Communication Operations are widely used in MPI applications and play an important role in their performance. Hence, various projects have focused on optimization of collective communications for various kinds ...
    • CDMA Base Station Receive Co-Processor Architecture 

      Santhosam, Charles L (2007-10-23)
      Third generation mobile communication systems promise a greater data rate and new services to the mobile subscribers. 3G systems support up to 2 Mbps of data rate to a fixed subscriber and 144 Kbps of data rate to a fully ...
    • A Novel Chip Resistor Spacecloth For Radar Absorbing Materials 

      Sudhendra, Chandrika (Indian Institute of Science, 2007-05-17)
      Spacecloth design and development is vital and crucial in Radar Absorbing Materials (RAM) for achieving Low Observability in an Aircraft or an Unmanned Air Vehicle(UAV). The RAM design translates into the spacecloth design. ...
    • Checkpointing Algorithms for Parallel Computers 

      Kalaiselvi, S (Indian Institute of Science, 2005-02-11)
      Checkpointing is a technique widely used in parallel/distributed computers for rollback error recovery. Checkpointing is defined as the coordinated saving of process state information at specified time instances. Checkpoints ...