Electrical Communication Engineering (ECE): Recent submissions
Now showing items 21-40 of 461
-
Application of exponential power estimator for speech coding
In speech coding, it is known that the Differential Pulse Code Modulation (DPCM) schemes lead to the reduction of bandwidth requirement (by removing the redundancy) as compared to pulse Code Modulation (PCM) schemes, ... -
On the optimization of control memory and data paths in the design of microprogrammed computers and microprocessors
In a microprogrammed processor, the size of the control memory depends upon the microinstruction word length (width of the control memory). An optimal microinstruction format reduces the width and hence the size of the ... -
Codes over galois rings closed under certain monomials
The use of error-control coding in information transmission systems and data storage systems is increasing rapidly. The primary aim of coding theorists has been to find “good codes” with “reasonably simple” decoding methods. ... -
Optimized neural network dichotomizer for speech recognition
Among the various neural network architectures and learning algorithms that have emerged recently, multilayer perceptron (MLP) network using backpropagation learning is found most effective for speech recognition due to ... -
On the dimension and exceptional subspaces of SSRS codes
A class of nonlinear cyclic error-correcting codes, known as Subspace Subcodes of Reed-Solomon (SSRS) codes, is studied in this thesis. An SSRS code is a subcode of a Reed-Solomon (RS) code consisting of RS codewords whose ... -
Codes closed under arbitrary abelian group of permutations
Discrete Fourier Transform (DFT) is a widely used tool in the field of electrical engineering. In the name of Mattson-Solomon polynomials, DFT was used in the context of linear cyclic codes in the early days of coding ... -
A digital correlation receiver for the Gauribidanur Decametre wave radio telescope
A low-frequency radio telescope operating at 34.5 MHz has been set up at Gauribidanur (Latitude: 13°36′12″ N, Longitude: 77°26′07″ E) in the form of a T-shaped array antenna. It consists of: A 1.38 kilometre long array ... -
Optimal routing and rate allocation problems in packet networks with QoS support
This thesis explores some of the issues that arise in the provisioning of Quality of Service (QoS) guarantees to applications in the Internet. In order to meet the QoS requirements of connections, the Internet needs to be ... -
Design and performance study of a media access control protocol for wireless lans
Wireless local area networks are gaining importance for computer communications since they eliminate the problem of laying interconnecting LAN cables within and across buildings. One of the main issues in wireless LANs is ... -
Security, Secrecy, and Privacy in Hotplug and Multi-Access Coded Caching Problems
With the rapid growth in data consumption, efficient content delivery has become a key challenge in modern communication networks. Coded caching offers a powerful solution by leveraging storage at the users to reduce peak ... -
Codes over galois rings closed under certain monomials
The use of error-control coding in information transmission systems and data storage systems is increasing rapidly. The primary aim of coding theorists has been to find “good codes” with “reasonably simple” decoding methods. ... -
Some new architectures for fuzzy logic processing
Fuzzy Logic has gained immense popularity in the last decade for use in several scientific and industrial applications. In this context, a substantial role is played by the computational structures used to perform fuzzy ... -
Alternative interleaving schemes for interleaved orthogonal frequency division multiplexing
Interleaved OFDM was proposed as an effective solution for improving code rate over slowly varying channels, without affecting the Peak-Average Power Ratio. The system was proposed with a particular interleaving scheme. In ... -
Performance analysis and optimization of scheduling in high speed input queuing cell switches
It is well known that the phenomenon of Head-of-the-Line (HOL) blocking limits the maximum achievable throughput of a pure Input Queuing cell switch (in which there is only one queue at each input that buffers all the cells ... -
Adaptive algorithms for admission control of elastic sessions in the internet
In the Internet, the majority of the traffic is elastic, and is characterized by the fact that such traffic can withstand loose bounds on performance guarantees. It is a well-understood fact, however, that once the performance ... -
Computer recognition of hand printed characters: an automated approach to the design of recognizers
Computer Recognition of Handprinted Characters is a well-established field of research, active for over three decades. Despite extensive work and numerous publications, the ultimate goal of developing a recognizer with ... -
Logic minimization algorithms for VLSI applications
The extensive use of large scale integration (LSI) and very large scale integration (VLSI) chips in the present day digital systems has evinced keen interest in the design of LSI and VLSI circuits. The design methodology ... -
A token ring local area network for small systems application
This research work deals with a new design/ and study of a token ring local area network (LAN) for small systems application like microcomputer network. The salient features of the work carried out are as follows: “ ... -
Membership algorithms for dependencies in relatinal databases
In relational database theory, a class of dependencies that includes functional dependencies (FDs), multivalued dependencies (MVDs), and join dependencies (JDs) has been found to play an important role in the process of ... -
Discrete electron fluctuations in van der Waals heterojunction
Two-dimensional (2D) materials, including transition metal dichalcogenides (TMDs) and graphene have emerged as promising candidates for next-generation nanoelectronic devices due to their atomically thin geometry. This low ...

