Now showing items 1-20 of 604

    • Ragpickers: a documentary film on recycling in Ahmedabad 

      Prajapati, Soham (Dhirubhai Ambani Institute of Information and Communication Technology, 1996)
      0
    • Novel approach for localization in Ad-Hoc sensor networks 

      Desai, Vishal (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      The ability of a sensor node to move itself or to otherwise influence its location will be critical in sensor networks. Today, the wireless community is putting great effort on the possibility of deploying thousands of ...
    • Physical and logical mobility of CORBA servants under intermittent connectivity nomadic environments 

      Mishra, Mayank (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      In a wired environment, object-oriented middleware facilitates the development of distributed objects. Common Object Request Broker Architecture is a prominent example of object-oriented middleware. As a joint effect of ...
    • Processor allocation for parallel applications in computing cluster 

      Gajjar, Mrugesh R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      We study the problem of processor allocation in multi-computer for parallel processes that do I/O and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel workload that does I/O and ...
    • Design of frequency synthesizable delay locked loop 

      Shah, Hardik K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      As the speed performance of VLSI systems increases rapidly, more emphasis is placed on suppressing skew and jitter in the clocks. Phase-locked loops (PLLs) and delay-locked loops (DLLs) have been typically employed in ...
    • Covert communication in TCP/IP network 

      Tandon, Dheeraj (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      This thesis explores the area of Covert Communication in TCP/IP network (Internet). We investigate various protocols of TCP/IP suite, which have potential to be used for covert communication on the network. In this thesis ...
    • Energy efficient secret aggregation for wireless sensor networks 

      Jadia, Pawan K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Sensor networks involves large amount of nodes spread over a region. Data aggre¬gation is an important technique for reducing the amount of data to be transmitted in the networks. Data confidentiality is a crucial requirement ...
    • Design and implementation of a framework for context aware mobile services 

      Jain, Nikhil (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Applications designed for mobile platforms are traditionally hampered by the limita¬tions of the client devices, in particular limited user interface and the change of user environment due to mobility. Incorporating location ...
    • Design of architecture of artificial neural networks : design and construction of a model for creation of an architecture of artificial neural network based on distributed genetic algorithms 

      Rahi, Sajid S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      The objective of the work is to design and construct a model for creation of architecture of feed forward artificial neural network. The distributed genetic algorithms are used to design and construct the system. This ...
    • Study of MPLS traffic engineering with constraint-based routing 

      Modi, Bhavesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Multi-protocol Label Switching (MPLS) is fast becoming popular for future communication networks running applications demanding high speed and Quality of Service. In this work, we have studied the evolution of MPLS, various ...
    • Fractal based approach for image segmentation 

      Londhe, Tushar (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      In this thesis, we have proposed an algorithm for image segmentation, using the fractal codes. The basic idea behind this algorithm is to use fractal codes for the image segmentation. This method uses compressed codes ...
    • Performance analysis of MPEG traffic under deficit round Robin Scheduler 

      Bavishi, Hardik N. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      The use of network multimedia applications like Video Conferencing and Video-on-Demand is likely to increase tremendously in future. Bandwidth, delay and delay variation are important performance parameters in such ...
    • Improved algorithms for modular multiplication and its application to block cipher RC6 

      Agarwal, Shivani (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      This thesis explores the area of hardware implementation of block ciphers. An al¬gorithm for modular multiplication is proposed which is efficient in terms of speed and area. To demonstrate the effectiveness of the algorithm ...
    • Classification of quantum cryptography 

      Acharya, Jaykumari (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Modern Classical Cryptography is divided into two parts. The first part is Asymmetric (public-key) cryptography and the second is Symmetric (private or secret-key) cryptography. In spite of its popularity public-key ...
    • Hybrid approach to speech recognition in multi-speaker environment 

      Trivedi, Jigish S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Recognition of voice, in a multi-speaker environment involves speech separation, speech feature extraction and speech feature matching. Traditionally, Vector Quantization is one of the algorithms used for speaker recognition. ...
    • Design and implementation of a framework for context aware mobile services 

      Nitin, Saksena (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Applications designed for mobile platforms are traditionally hampered by the limita¬tions of the client devices, in particular limited user interface and the change of user environment due to mobility. Incorporating location ...
    • Automated categorization of structured documents 

      Nallagorla, V. S. R. Krishna (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Automatic text categorization is a problem of assigning text documents to pre¬-defined categories. This requires extraction of useful features. In most of the applications, text document features are commonly represented ...
    • Chaotic communication system for IEEE 802.11B (WLAN) 

      Thakar, Lalitkrushna Jagdishchandra (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Today's WLAN (IEEE 802.11b) is most attractive solution for wireless data communication at higher rate. Chaotic signals, by virtue of their wideband characteristic, are natural candidates for wideband communication ...
    • Design and analysis of energy aware protocol-MPEARLE 

      Mythili, S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Due to the technological advances and development in the field of micro electronic devices, the availability of compact, high-performance, customizable, intelligent devices at low cost has become reality. 'Wireless Sensor ...
    • Design and implementation of network intrusion detection system 

      Jindal, Gaurav (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Most of the intrusion detection systems are based on matching signatures or rules. These rules are the patterns that define the possibility of occurrence of attack. Such signature based intrusion detection system look at ...