Search
Now showing items 121-130 of 209
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Distributed caching mechanism for video on demand on the Internet
(Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
Video on Demand applications in the Internet are delay sensitive and highly resource intensive applications. Such applications require streaming of large video files in a time bound manner. Because large volume in terms ...
Energy efficient data gathering protocol for wireless sensor network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
Wireless Sensor Network is made up of hundreds and thousands of miniature electronic devices called node, which have sensors built on them. Functionality of a sensor is entirely application dependent. They can perform a ...
Executable specification design and simulation of OFDM based communication system
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
The communication system using the OFDM principle is today one of the most important application in communication field. This system has various applications from broadband to 3G and digital TV to Radio LANs. This master’s ...
Energy conserving voidless coverage in wireless ad-hoc sensor networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
For many sensor network applications such as intrusion detection and military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing energy consumption ...
Fault diagnosis algorithm for a flash ADC using oscillation based testing technique
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
With the advent of system-on-a-chip (SoC) designs, the semiconductor industry wants to solve problems that constrain the coexistence of analog and digital cores on a single chip. The complexities of modern (SoC's), comprising ...
Fair downlink packet scheduling approach to support QoS in HSDPA environment
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
Traditionally, only best-effort traffic is supported by packet switching networks, but newer applications need communication services that allow end client to transport data with performance guarantees given in terms of ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Fractal based approach for face recognition
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
An automated face recognition system is proposed in this dissertation. The system efficiently recognizes a candidate (test) image using the interdependence of the pixel that arises from the fractal compression of the image. ...
Identifying mutant hierarchies to reduce test effort in mutation testing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
Mutation testing is a fault-based testing approach. The main goal of mutation testing is to assess the quality of a test suite, and in that process, test the software. The approach asserts the absence of pre-specified ...