Browsing by Issue Date
Now showing items 1-20 of 1148
-
Novel approach for localization in Ad-Hoc sensor networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)The ability of a sensor node to move itself or to otherwise influence its location will be critical in sensor networks. Today, the wireless community is putting great effort on the possibility of deploying thousands of ... -
Physical and logical mobility of CORBA servants under intermittent connectivity nomadic environments
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)In a wired environment, object-oriented middleware facilitates the development of distributed objects. Common Object Request Broker Architecture is a prominent example of object-oriented middleware. As a joint effect of ... -
Processor allocation for parallel applications in computing cluster
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)We study the problem of processor allocation in multi-computer for parallel processes that do I/O and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel workload that does I/O and ... -
Design of frequency synthesizable delay locked loop
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)As the speed performance of VLSI systems increases rapidly, more emphasis is placed on suppressing skew and jitter in the clocks. Phase-locked loops (PLLs) and delay-locked loops (DLLs) have been typically employed in ... -
Covert communication in TCP/IP network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)This thesis explores the area of Covert Communication in TCP/IP network (Internet). We investigate various protocols of TCP/IP suite, which have potential to be used for covert communication on the network. In this thesis ... -
Energy efficient secret aggregation for wireless sensor networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Sensor networks involves large amount of nodes spread over a region. Data aggre¬gation is an important technique for reducing the amount of data to be transmitted in the networks. Data confidentiality is a crucial requirement ... -
Design and implementation of a framework for context aware mobile services
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Applications designed for mobile platforms are traditionally hampered by the limita¬tions of the client devices, in particular limited user interface and the change of user environment due to mobility. Incorporating location ... -
Study of MPLS traffic engineering with constraint-based routing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Multi-protocol Label Switching (MPLS) is fast becoming popular for future communication networks running applications demanding high speed and Quality of Service. In this work, we have studied the evolution of MPLS, various ... -
Fractal based approach for image segmentation
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)In this thesis, we have proposed an algorithm for image segmentation, using the fractal codes. The basic idea behind this algorithm is to use fractal codes for the image segmentation. This method uses compressed codes ... -
Performance analysis of MPEG traffic under deficit round Robin Scheduler
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)The use of network multimedia applications like Video Conferencing and Video-on-Demand is likely to increase tremendously in future. Bandwidth, delay and delay variation are important performance parameters in such ... -
Improved algorithms for modular multiplication and its application to block cipher RC6
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)This thesis explores the area of hardware implementation of block ciphers. An al¬gorithm for modular multiplication is proposed which is efficient in terms of speed and area. To demonstrate the effectiveness of the algorithm ... -
Classification of quantum cryptography
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ... -
Automated categorization of structured documents
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Automatic text categorization is a problem of assigning text documents to pre¬-defined categories. This requires extraction of useful features. In most of the applications, text document features are commonly represented ... -
Design and analysis of energy aware protocol-MPEARLE
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Due to the technological advances and development in the field of micro electronic devices, the availability of compact, high-performance, customizable, intelligent devices at low cost has become reality. 'Wireless Sensor ... -
Design and implementation of network intrusion detection system
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Most of the intrusion detection systems are based on matching signatures or rules. These rules are the patterns that define the possibility of occurrence of attack. Such signature based intrusion detection system look at ... -
Design of CMOS front end for 900MHz RF receiver
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Portable wireless personal communication systems such as cellular phones, message pagers, and wireless modems traditionally have been built from a mixture of IC technologies. In fact if we section a commercial cellular ... -
Design of AHB-Wishbone bridge
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)System-on-Chip (SoC) design is performed through integration of pre-designed components, called intellectual Property (IP). Design reuse is a critical feature in SoC design. Design reuse is the simple concept of using IP ... -
Fractal based approach for face recognition
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)An automated face recognition system is proposed in this dissertation. The system efficiently recognizes a candidate (test) image using the interdependence of the pixel that arises from the fractal compression of the image. ... -
Integrated receiver front-end: system level architectures and design issues for CDMA based applications
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)During the last decade, the world of mobile communications has experienced an enormous growth. Among the important factors has been possible by the migration from the original analog mobile phones to handsets using digital ... -
Incorporation of mobility model of nodes in zone routing protocol for mobile ad hoc wireless networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Ad Hoc wireless networks are characterized by dynamically changing network topology due to relative motion of the nodes. This leads to the exchange of large number of control packets between the nodes to maintain the network ...