Task scheduling is one of the most important issues in designing a real-time
system. Areal-time system typically consists of a mixture of periodic and aperiodic tasks
having hard, firm or soft deadlines. The goal of any ...
With the spurt in computing and communication technology, more and more images are
being captured, stored and are widely used in multimedia collections such as in medical
imaging, geographic information systems, ...
In recent years, many power electronic converters utilizing switching devices are
being widely used in industrial as well as in the domestic applications, ranging from few
watts to MWs. It is desired to draw purely ...
Interest in the area of multimedia databases is growing rapidly with the continuous
evolution of telecommunication and computing technologies. A number of applications in
digital libraries, telemedicine, GIS, tourism ...
Tuning methodology and other aspects of asimple fuzzy logic controller are studied
in this thesis. It is established that a zero order Sugeno type fuzzy controller is
analytically equivalent to a simple Mamdani type fuzzy ...
Narrowband direct sequence code-division multiple-access (DS-CDMA) has been
proposed and implemented recently as an attractive alternative to traditional frequencydivision
multiple-access (FDMA) and time-division ...
Broadband applications over ATM networks generate traffic with varying traffic characteris
tics. These applications specify the required service guarantees in terms of quality of service
(QoS) that the network has to ...
During the last two decades, direct-sequence code-division multiple-access (DSCDMA)
technique has received a considerable interest in mobile and personal
communication systems, and will play an important role in future ...
Order reduction of linear time invariant discrete systems with
constant sampling rate was attempted in this work using step response
matching technique. Altogether three methods were tried using a common
criteria of ...
Aperture coupling is an important boundary-value problem in
electromagnetics. Practical applications ofaperture coupling can be found in slotted
antenna arrays, directional couplers, cavity resonators, radiating slots ...
Computing systems are vulnerable to many failure modes. In distributed systems
likelihood of failure increases with the number of processes and a single failure often
renders the entire system unusable. Checkpointing and ...
This thesis is an attempt towards the development of an enhanced Petrinet, namely
the Advanced Petrinet (APN). The development of Petrinets and its popular extensions to a
much more easy, convenient, modelling and ...
In recent years, there has been increasing interest in using networkbased
resources for large scale data-intensive computation problems. The Grid
computing systems are rapidly gaining importance due to their capability ...
Through wall imaging (TWI) is one of the most rapidly emerging technologies where
it tries to 'see' through visually opaque material like different types of walls and
detect and image various targets behind the wall. It ...
In the last few decades, there has been an increasing interest in model based robust
controllers because of two main factors. The first one is technological advances and the other
is due to challenges such as demand for ...
Soil moisture, surface roughness and soil texture are important soil parameters
in various applications, such as, agriculture, weather forecasting, soil erosion,
hydrological studies and flood and draught prediction. ...
Cosmic rays and alpha particles remain the dominant factors which degrade the performance of
modern electronic systems. It has been widely reported that there are many critical applications
that got affected by the ...
In past two decades, Internet has revolutionized almost every facet of our lives.
Government, commercial, and educational organizations depend on Internet to such an extent
that day-to-day operations are significantly ...
Network forensics is a nascent science that deals with the capture and analysis of the
network traffic and logs of intrusions. Network forensics characterizes intrusion or
misbehavior features in order to discover the ...
Digital circuits operating in subthreshold region have gained wide interest due to their
suitability for applications requiring ultra low power consumption with low-tomedium
performance such as RFID, wireless micro sensors ...