Browsing by Advisor "Balakrishnan, N"
Now showing items 21-40 of 42
-
Intrusion Identification For Mobile Ad Hoc Networks
(2010-08-16)A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or centralized administration. Such ... -
LU-SGS Implicit Scheme For A Mesh-Less Euler Solver
(2014-10-10)Least Square Kinetic Upwind Method (LSKUM) belongs to the class of mesh-less method that solves compressible Euler equations of gas dynamics. LSKUM is kinetic theory based upwind scheme that operates on any cloud of points. ... -
Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
(2014-06-05)The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and ... -
Motion Optimistion Of Plunging Airfoil Using Swarm Algorithm
(2010-06-03)Micro Aerial Vehicles (MAVs) are battery operated, remote controlled miniature flying vehicles. MAVs are required in military missions, traffic management, hostage situation surveillance, sensing, spying, scientific, rescue, ... -
On Leveraging Dynamic Processes in Large Social Networks for Smart Cities
The concept of smart city which began as being synonymous with electronically networked community underwent significant changes with the growth in mobile devices and social networking. This expanded the outlook of smart ... -
On the Contribution of the Launch Platform towards Acoustic Environment of a Launch Vehicle at Lift-off
A launch vehicle experiences intense acoustic loading in the initial phase of its lift-off due to the noise generated by the rocket exhaust. This affects the launch vehicle structure in addition to sensitive payloads and ... -
On Three Dimensional High Lift Flow Computations
(2018-02-18)Computing 3D high lift flows has been a challenge to the CFD community because of three important reasons: complex physics, complex geometries and large computational requirements. In the recent years, considerable progress ... -
On Viscous Flux Discretization Procedures For Finite Volume And Meshless Solvers
(2009-04-29)This work deals with discretizing viscous fluxes in the context of unstructured data based finite volume and meshless solvers, two competing methodologies for simulating viscous flows past complex industrial geometries. ... -
Optimal Location of Distributed Generation to Reduce Loss in Radial Distribution Networks
(2018-06-26)Power losses are always a cause of worry for any power grid. In India, the situation is even worse. Though recent reports by Ministry of Power shows that Aggregate Technical and Commercial losses (AT &C losses) have come ... -
Performance Enhancement Of Intrusion Detection System Using Advances In Sensor Fusion
(2010-12-31)The technique of sensor fusion addresses the issues relating to the optimality of decision-making in the multiple-sensor framework. The advances in sensor fusion enable to perform intrusion detection for both rare and new ... -
QoS Over Multihop Wireless Networks
(2009-05-12)The aim of this work is to understand the requirements behind Quality of Service (QoS) for Multihop Wireless Networks and evaluate the performance of different such strategies. This work starts by establishing the basis ... -
A Residual Based h-Adaptive Strategy Employing A Zero Mean Polynomial Reconstruction
(2016-04-18)This thesis deals with the development of a new adaptive algorithm for three-dimensional fluid flows based on a residual error estimator. The residual, known as the R –parameter has been successfully extended to three ... -
Residual Error Estimation And Adaptive Algorithms For Fluid Flows
(2011-03-16)The thesis deals with the development of a new residual error estimator and adaptive algorithms based on the error estimator for steady and unsteady fluid flows in a finite volume framework. The aposteriori residual error ... -
Robust Speaker Identification System
Recent advances in research and development in speaker recognition and identification systems have made speaker identification one of the most trusted methods for authorization and forensic applications. However, field ... -
Satellite based web services
In the present information society, Internet services have become a part of urban life due to the easy availability of dial-up/leased lines. Unfortunately, these services have not reached many rural/remote areas due to ... -
Scattering From Chiral And Chirally Coated Bodies
(2012-01-03) -
Speech Signal Classification Using Support Vector Machines
(2011-03-16)Hidden Markov Models (HMMs) are, undoubtedly, the most employed core technique for Automatic Speech Recognition (ASR). Nevertheless, we are still far from achieving high‐performance ASR systems. Some alternative approaches, ... -
Study and Design of Energy Efficient Block Cipher for Wireless Body Area Networks (WBANs)
With the advent of better health care and medical technology, as well as miniaturized devices with built-in radios, today we can see (WBANs) emerging as one of the main research topics. The sensor nodes worn by patients ... -
Study of RCS from Aerodynamic Flow using Parallel Volume-Surface Integral Equation
(2018-02-14)Estimation of the Radar Cross Section of large inhomogeneous scattering objects such as composite aircrafts, ships and biological bodies at high frequencies has posed large computational challenge. The detection of scattering ...

