Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 61-80 of 1577
-
Efficient computations with special large sparse matrices
Large sparse matrices find many applications in cryptography. A large sparse matrix is a matrix of huge dimensions but the number of nonzero entries per row of the matrix is very small. Most of the times, it is possible ... -
Plefka's mean-field theory and belief networks
Mean-field theory is an interesting alternative to Markov Chain Monte Carlo techniques for probabilistic inference in graphical models. In this thesis, we study a powerful mean-field technique proposed by Plefka, in the ... -
Galois field Computations : Implementation of a Library and a study of the Discrete Logarithm Problem
Computation over finite fields (also called Galois fields) is an active area of research in number theory and algebra, and finds many applications in cryptography, error control coding, and combinatorial design. In this ... -
Facets of some combinatorial polytopes
A proven approach for solving hard combinatorial optimization problems is via polyhedral methods applied to integer programming formulations. Efficient algorithms for such problems are often problem specific and exploit ... -
Framework for solving vehicle scheduling problems using AI techniques
Transportation resource scheduling problems are of high academic as well as practical value. These are primarily concerned with generation of movement schedules for a set of vehicles (tankers, aircraft, etc) to distribute ... -
Escape mechanism in bistable systems driven by strongly correlated noise
This thesis focuses on the analysis of nonlinear dynamical systems influenced by colored noise, which appears in diverse fields such as physics, chemistry, natural sciences, and engineering. The core problem involves solving ... -
Studies on parsing, syntax directed translation and conditional grammars
The compilation process for programming langtiages in digital computers essentially consists of the following two steps; i. Translation of the source language, and ii. The generation of machine code-. The first step ... -
Signal Processing Algorithms for Next-Generation Wireless Systems: Reconfigurable Intelligent Surfaces and Integrated Sensing and Communications
Next-generation wireless systems aim to revolutionize communication by achieving data rates up to terabits per second while also supporting diverse applications such as autonomous mobility, industrial automation, and ... -
Secure Auctions with Rational Parties
Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of ... -
Asynchronous distributed rate control algorithms for best-effort sessions in integrated services networks with minimum rate guarantees
Packet switching networks provide a best-effort transport service that is typically used by store-and-forward applications, such as email, file transfer, and web browsing. In an Integrated Services Packet Network, the ... -
Performance of multiaccess dual slotted unidirectional bus networks
Advances in optical fibre transmission system technology have created interest in a class of multiple access local and metropolitan area networks called unidirectional bus networks. In the absence of Medium Access Control ... -
Linguistic anlaysis of stuttering patterns among monolinguals and bilinguals
It is concluded from this study that stuttering is influenced by two major factors: phonetic factors and factors associated with the encoding process of speech. The results also support Bloodstein's anticipatory struggle ... -
Application of exponential power estimator for speech coding
In speech coding, it is known that the Differential Pulse Code Modulation (DPCM) schemes lead to the reduction of bandwidth requirement (by removing the redundancy) as compared to pulse Code Modulation (PCM) schemes, ... -
On the optimization of control memory and data paths in the design of microprogrammed computers and microprocessors
In a microprogrammed processor, the size of the control memory depends upon the microinstruction word length (width of the control memory). An optimal microinstruction format reduces the width and hence the size of the ... -
Codes over galois rings closed under certain monomials
The use of error-control coding in information transmission systems and data storage systems is increasing rapidly. The primary aim of coding theorists has been to find “good codes” with “reasonably simple” decoding methods. ... -
Optimized neural network dichotomizer for speech recognition
Among the various neural network architectures and learning algorithms that have emerged recently, multilayer perceptron (MLP) network using backpropagation learning is found most effective for speech recognition due to ... -
On the dimension and exceptional subspaces of SSRS codes
A class of nonlinear cyclic error-correcting codes, known as Subspace Subcodes of Reed-Solomon (SSRS) codes, is studied in this thesis. An SSRS code is a subcode of a Reed-Solomon (RS) code consisting of RS codewords whose ... -
Codes closed under arbitrary abelian group of permutations
Discrete Fourier Transform (DFT) is a widely used tool in the field of electrical engineering. In the name of Mattson-Solomon polynomials, DFT was used in the context of linear cyclic codes in the early days of coding ... -
A digital correlation receiver for the Gauribidanur Decametre wave radio telescope
A low-frequency radio telescope operating at 34.5 MHz has been set up at Gauribidanur (Latitude: 13°36′12″ N, Longitude: 77°26′07″ E) in the form of a T-shaped array antenna. It consists of: A 1.38 kilometre long array ... -
Optimal routing and rate allocation problems in packet networks with QoS support
This thesis explores some of the issues that arise in the provisioning of Quality of Service (QoS) guarantees to applications in the Internet. In order to meet the QoS requirements of connections, the Internet needs to be ...

