• Application of trust region on methods to learning in feed forward neural networks 

      Shevade, S K
      This thesis presents a novel algorithm for training feed-forward neural networks, addressing the limitations of the widely used back-propagation and Quickprop algorithms. While Quickprop is significantly faster than standard ...
    • Clustering For Designing Error Correcting Codes 

      Joseph, Binoy (Indian Institute of Science, 2005-02-11)
      In this thesis we address the problem of designing codes for specific applications. To do so we make use of the relationship between clusters and codes. Designing a block code over any finite dimensional space may be thought ...
    • Diffraction Tomographic Imaging With A Circular Array 

      Vasuki, A (Indian Institute of Science, 2005-06-02)
      In the conventional diffraction tomography a linear array is used to receive forward scattered field. Then a standard algorithm like back propagation or Fourier domain interpolation is used for reconstruction of the object. ...
    • Dynamic Channel Allocation for integrated Voice Data Communication A Tdm Approach 

      Gopalaiah, S V
      Integrated Services Digital Network (ISDN) is an extension of conventional telecommunications and the data trafics like text, facsimile, image. Efficient transmission of voice/data on a common communication channel has ...
    • Electrical Properties Of Diamond Like Carbon Films In Metal-Carbon-Silicon (MCS) Structure 

      Reddy, K Siva Sankara (Indian Institute of Science, 2006-01-18)
      Amorphous carbon film with Diamond like properties is the subject of intense interest in the past one and half decade. The unusual properties of these diamond like carbon films arise from the preponderance of SP3 tetrahedral ...
    • Electronic Access Control Systems: A New Approach 

      Janardhana Swamy, V C (Indian Institute of Science, 2006-08-30)
      Security systems are gaining increasing importance in recent times to protect life and valuable resources. Many advanced methods of providing security have been developed and are in use in the last few decades. Of these, ...
    • Fault tolerance in feedforward neural networks using minimax optimization 

      Deodhare, Dipti
      Neural computing is currently being proposed as a viable solution to several problems. The approach of neural computing is to capture the guiding principles that underlie the functioning of the human brain and apply them ...
    • FIR System Identification Using Higher Order Cumulants -A Generalized Approach 

      Srinivas, L (Indian Institute of Science, 2010-01-12)
      The thesis presents algorithms based on a linear algebraic solution for the identification of the parameters of the FIR system using only higher order statistics when only the output of the system corrupted by additive ...
    • Frames as abstractions for efficient multimedia object retrieval 

      Sivasubramanian, S
      Multimedia Information Systems (MMISs) integrate various media types - text, audio, video, graphics, and animation - for machine-processable storage, retrieval, and presentation. These systems are characterized by complex ...
    • Multi-scale approaches to signal deblurring and reconstruction from zero-crossings 

      Nayakkankuppam, Madhu Vairy
      This thesis addresses two inverse problems in computer vision: Solving a class of ill-posed convolution equations We analyze the problem of deblurring a Gaussian-blurred signal, which belongs to the class of ill-posed ...
    • Non-Invasive Microwave Hyperthermia 

      Habash, Riadh W Y (Indian Institute of Science, 2006-01-18)
      Presented in this thesis are the following theoretical investigations carried out on the non-invasive microwave hyperthermia of malignant tumours in the human body: Fundamental concepts of electromagnetic wave ...
    • Optimal control for queue length fairness in dual bus networks 

      Roy, Rajarshi
      Advances in optical fibre transmission have created interest in a class of multiple access local and metropolitan area networks called unidirectional bus networks. In the absence of medium access control, the nodes closer ...