• Login
    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1303-1318 of 1318

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Wavelet Based Algorithms For Spike Detection In Micro Electrode Array Recordings 

        Nabar, Nisseem S (2010-07-13)
        In this work, the problem of detecting neuronal spikes or action potentials (AP) in noisy recordings from a Microelectrode Array (MEA) is investigated. In particular, the spike detection algorithms should be less complex ...
      • Wavelet Based Denoising Techniques For Improved DOA Estimation And Source Localisation 

        Sathish, R (2011-05-16)
      • Weighted Average Based Clock Synchronization Protocols For Wireless Sensor Networks 

        Swain, Amulya Ratna (2016-07-12)
        Wireless Sensor Networks (WSNs) consist of a large number of resource constrained sensor nodes equipped with various sensing devices which can monitor events in the real world. There are various applications such as ...
      • Who Spoke What And Where? A Latent Variable Framework For Acoustic Scene Analysis 

        Sundar, Harshavardhan (2016-09-15)
        Speech is by far the most natural form of communication between human beings. It is intuitive, expressive and contains information at several cognitive levels. We as humans, are perceptive to several of these cognitive ...
      • Why only two ears? Some indicators from the study of source separation using two sensors 

        Joseph, Joby (Indian Institute of Science, 2005-02-10)
        In this thesis we develop algorithms for estimating broadband source signals from a mixture using only two sensors. This is motivated by what is known in the literature as cocktail party effect, the ability of human beings ...
      • Wide Area Measurement Based Cyber-Attack Resilient Breaker Failure Protection Scheme 

        Dubal, Paawan Kirankumar
        Breaker Failure Protection(BFP) is a backup protection that comes into action when the primary protection schemes are unable to clear the fault. In power systems, every component has a redundant version to avoid failures. ...
      • Wide-Band Radio-Frequency All-Pass Networks for Analog Signal Processing 

        Keerthan, P (2018-01-10)
        There is an ever increasing demand for higher spectral usage in wireless communication, radar and imaging systems. Higher spectral efficiency can be achieved using components that are aware of system environment and adapt ...
      • Wideband Microstrip Patch Antennas and their Modifications for Practical Applications 

        Bhat, Vijayashree
        Printed antennas play an significant role in satellite, mobile, and other wireless communications networks, military systems and several more emerging applications in- cluding radar sensing and imaging. Several of these ...
      • Wideband Rate Adaptation and Scheduling in OFDM Cellular Systems : Modeling, Analysis, and Base Station Side Estimation 

        Francis, Jobin
        Current and next generation wireless cellular systems strive to maximize spectral efficiency and meet the increasing demand for higher data rates despite being severely constrained by the limited availability of spectrum. ...
      • Wireless and Social Networks : Some Challenges and Insights 

        Sunny, Albert (2018-02-07)
        Wireless networks have potential applications in wireless Internet connectivity, battlefields, disaster relief, and cyber-physical systems. While the nodes in these networks communicate with each other over the air, the ...
      • Wireless Channel Modeling for Drone to Ground 2.4 GHz link 

        Abhilash, B
        Use of Drones for communication is picking up the pace and expected to grow exponentially in the coming years. These drones will be used as access points for providing WiFi services in the near future. It is well known ...
      • Wireless Content Centric Networks: Cross Layer Designs for Queueing, Caching, Power Control and Beamforming 

        Raghu, Ramkumar
        Ever increasing user base of social media platforms such as Facebook, Youtube and the Over-the-Top platforms such as Netflix, Prime Video etc., has increased the demand for High Definition Videos/Contents over the Mobile ...
      • Wireless Sensor Networks : Bit Transport Maximization and Delay Efficient Function Computation 

        Shukla, Samta (2018-04-02)
        We consider a wireless sensor network, in which end users are interested in maximizing the useful information supplied by the network till network partition due to inevitable node deaths. Neither throughput maximization ...
      • WiROS: A QoS Software Solution for ROS2 in a WiFi Network 

        Jaiswal, Bishal
        Robot Operating System (ROS) has played a pivotal role as a communication middleware among different peripherals, including sensors and actuators of robotics and other systems, with the advancement of connected systems ...
      • A Workload Based Lookup Table For Minimal Power Operation Under Supply And Body Bias Control 

        Sreejith, K (2011-01-25)
        Dynamic Voltage Scaling (DVS) and Adaptive body bias (ABB) techniques respectively try to reduce the dynamic and static power components of an integrated circuit. Ideally, the two techniques can be combined to find the ...
      • Zero-Knowledge Proofs with Enhanced Deniability 

        Sur, Suvankar
        In cryptography, deniability is a crucial concept that allows a participant to plausibly deny taking part in executing a scheme or protocol. Non-interactive zero-knowledge (NIZK) proofs enable a party (the prover) to ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV