Thesis Abstracts 2008
Thesis Abstracts 2008
DISSERTATIONS
M. DES. PROJECTS
ABSTRACTS
M. TECH. 2002-2004
M. TECH. 2003-2005
M. TECH. 2004-2006
M. TECH. 2005-2007
M. TECH. 2006-2008
M. DES. 2004-2006
M. DES. 2005-2007
M. DES. 2006-2008
Compiled By
RESOURCE CENTRE
RESOURCE CENTRE
DA-IICT
NEAR INDRODA CIRCLE
GANDHINAGAR-382007
Introduction
The Resource Centre team is happy to bring out this brief document listing the M.Tech.
Dissertations, Projects submitted by the 2002-2004, 2003-2005, 2004-2006, 2005-2007 and
2006-2008 batch students and M.Des. Projects submitted by the 2004-2006, 2005-2007 and
2006-2008 batch students to the Institute. This document covers in all 192 dissertations and
are listed in alphabetical order under each year by student’s surname. Each entry of the
dissertation provides the bibliographical details, such as author (with ID number), title, page
numbers, year of submission, supervisor name, call number, accession number, keywords and
abstracts. At the end, author, supervisor and keyword indices have been provided to enable
the user to locate a specific entry in this document. All these dissertations listed here have
also been catalogued in the Resource Centre’s Online Catalogue. We have made this effort to
bring out this document to supplement the Online Catalogue.
Hope you will find this document useful. We would be happy to have your comments and
suggestions, if any, to improve further this catalogue.
Page i
Table of Contents
M. Tech. Dissertations
Introduction i
Abstracts 1
2002-2004
1. Classification of Quantum Cryptography 1
Jaykumari Acharya
2. An Improved Algorithms for Modular Multiplication and its Application to Block Cipher RC6 1
Shivani Agarwal
11. Design and Implementation of a Framework for Context Aware Mobile Services 5
Nikhil Jain
Page ii
Table of Contents
15. Physical and Logical Mobility of CORBA Servants under Intermittent Connectivity Nomadic 7
Environments
Mayank Mishra
20. Study and Development of Computer Aided Tool for Transceiver System Design 9
Hiral D. Oza
22. Design and Implementation of A Framework for Context Aware Mobile Services 10
Nitin Saksena
24. Integrated Receiver Front-End: System Level Architectures and Design Issues for CDMA 11
Based Applications
Ashish Kumar Sharma
26. Voronoi Diagram Modulling for wireless Ad-hoc Sensor Network Coverage 12
G. Srinu Bab
Page iii
Table of Contents
31. Speech Enhancement Using Microphone Array for Hands-Free Speech Applications 14
Chirag Vishwas Vichare
32. Incorporation of Mobility Model of Nodes in Zone Routing Protocol for Mobile Ad-Hoc 15
Wireless Networks
Ravi Chander Vipperaela
2003-2005
33. WebLab: A Framework for Remote Laboratories 17
Awkash Agrawal
35. Hybrid Approach to Digital Image Watermarking using Singular Value Decomposition and 17
Spread Spectrum (A)
Kunal Bhandari
43. Protecting Structures on Heap from Buffer Overflow Vulnerabilities with TIED–LibsafePlus 21
Abhay Jain
Page iv
Table of Contents
46. Performance Evaluation of OFDM Technique for High Speed Communication Applications 22
Mukul Kabra
49. ACIDS: Automated Co-stimulation based Intrusion detection system with a sense of 24
Dynamic Self
Pooja Kumara
51. Protecting Mobile Agents Against Malicious Hosts Using Trusted Computing 24
Niravkumar K. Panchal
53. A Novel Architecture For a CMOS Low Noise Amplifier at 2.4 GHz 26
Anuradha Ray
56. Distributed Clustering for Heterogeneous Wireless Sensor Network in Data Gathering 27
Applications
Nischal Saxena
Page v
Table of Contents
2004-2006
65. Design and Synthesis of Asynchronous Circuits 33
Abhinav Asthana
66. Music Genre Classification using Principal Component Analysis and Auto Associative Neural 33
Network
Abhishek V. Ballaney
70. 0.18µ Low Power Dual-Mode Transceiver Front-end Design for High Speed Bluetooth 35
Systems
Gaurav Chandrakant Dalwadi
71. Reconfigurable Application Specific Instruction Set Processor for Kalman Filter (R-ASIK) 35
Kinjal Dave
Page vi
Table of Contents
73. Hybrid Approach To Digital Image Watermarking Using Informed Coding, Informed 36
Embedding and Spread Spectrum
Nayan Kumar Dey
76. Content-Based Image Retrieval System for Multi-Object Images Using a Combination of 38
Features
Aradhana Katare
77. Receiver Amplifier Design Using CMOS Current Feedback Amplifier & Current Conveyors 38
Gaurav Kaushik
78. Two-level Pricing Scheme for Congestion Control and Service Differentiation in the 39
Internet
Vineet Kulkarni
79. Extremely Low Voltage Operational Amplifier Design with Rail-to-Rail Input Common Mode 39
Range
Yogesh Malviya
86. Mobility Aware MANET Routing Protocol using Cross Layer Design 42
Komalben, Patel
Page vii
Table of Contents
89. Detection of Unauthorized Vehicle Movement across the Forest Boundary using Wireless 43
Sensor Networks
Deepika Rana
90. Low power high slew-rate adaptive biasing circuit for CMOS amplifiers 43
A. Narayana Rao
91. Efficient Scan-Based BIST Scheme for Low Heat Dissipation and Reduced Test Application 44
Time
Malav Shah
99. Low Power and High Speed Sample and Hold Circuit 47
Ronak Trivedi
100. Secure and Efficient Key Assignment Scheme for Dynamic Access Control in a Hierarchy 47
Praveen Kumar Vadnala
101. Design of a Low power high slew rate OPAMP and to study its impact on Sigma Delta 48
Modulator’s performance
Aseem Verma
102. Low Power BIST Architecture for Fast Multiplier Embedded Core 48
Aditya Vij
Page viii
Table of Contents
2005-2007
103. 2ASIC Implementation of a Pipelined Bitrapezoidal Architecture For Discrete Covariance 49
Kalman Filter
Vaibhav Agarwal
104. A Fault Diagnosis Algorithm for a Flash ADC using Oscillation Based Testing Technique 49
Divya Aggarwal
106. An Architecture Design for Preliminary ECG Analysis System Using New DFT Based 50
Analysis Technique
Vasudha Chaurey
108. A Design methodology for architecting Application specific instruction set processor 51
Meghana Desai
109. Design of Low Voltage High Performance, Wide Bandwidth Current Feedback Amplifier 52
with Complementary Input Pair
Divya Dubey
112. Identifying the Protein Coding Regions in DNA Using IIR Antinotch Filter 53
Durga Ganesh Grandhi
116. Localization for A Habitat Monitoring Sensor Network for Ground Turtles 55
Shubham Jain
Page ix
Table of Contents
117. An Investigation of Low Power Design of Left-Right Leap Frog Array Multiplier 56
Ravisankar K.
123. Design of CMOS Voltage Controlled Oscillator for High Tuning Range 58
Bharath Kumar Nayudu
127. A Model Based Channel Shortening Technique For IEEE 802.11a OFDM System 60
Pravin Patidar
130. Frequency Compensation Technique For Low Voltage Three Stage Operational Amplifier 61
K. Raju
Page x
Table of Contents
133. A Fair Downlink Packet Scheduling Approach to Support QoS in HSDPA Environment 63
Deepti Singhal
2006-2008
135. 2Use of Probabilistic Context Free Grammar For Natural Language Interface For An 65
Application
Chetan Agarwal
137. Design of Low Voltage, Low Power, Wide Band CMOS LC VCO using Active Inductors 65
Sai Sesha A. V. R.
146. A Tool to Find Dimension of Capacitors For Switched Capacitor Band Pass Filter 69
Kaushal J. Doshi
Page xi
Table of Contents
148. Design of Low Power and High Speed Decoder for 1Mb Memory 70
Punam Sen Gupta
154. Design of Multi Standard RF Front End Receiver Using Novel Low IF Topology 72
Vivek Kumar Pandit
155. Designing of an efficient power clock generation circuit for complementary pass transistor 73
adiabatic logic carry save multiplier
Ranjith P.
157. Energy Efficient data gathering Protocol for Wireless Sensor Network 73
Parth A. Roa
Page xii
Table of Contents
165. A Queueing Theoretic Framework for Performance Analysis of Mobile Ad Hoc Networks 77
with Finite Buffer Nodes
Sapan Shah
168. A High Speed 512 point FFT Single Chip Processor Architecture 79
Ajay Kumar Sinha
173. Effect of Channel Asymmetry on Reputation based Cooperation Mechanisms in Mobile Ad- 81
hoc Networks
Tejas Vasavada
175. Frequency Offset Estimation in OFDM Signals Using Particle Filtering Along With 82
Resampling Methods
Ravishankar Jayanthi V.
Page xiii
Table of Contents
M. Des. Projects
2004-2006
177. Kite flying: an Indian experience 83
Nikita Desai
2005-2007
182. 6Bhavai on bhavai 87
Ami Ahalpara
2006-2008
187. 6VIKALP: aware a child – save childhood 91
Nidhi, Agarwal
Page xiv
Table of Contents
190. 9Urban soundscapes: an exploration of why and how, we hear, what we do… 93
Neha, Kadam
Indices
Author index 95
Supervisor Index 97
Subject/Keyword Index 99
Page xv
M. Tech. Dissertations
(Abstracts)
2002-2004
Page 1
The system performance is found to be very satisfactory with the recognition rate of 98.4%. A
minor improvement in the performance of the system over a few existing methods has been
observed.
The main objective of the thesis is to analyze how DSMCast provides support for heterogeneous
QoS receivers participating in a multicast session. The performance analysis of DSMCast indicates
that it can support the heterogeneous QoS requirements for the multicast receivers in a better
way than traditional IP multicast. The simulation results bring out an important implication due to
the nearness of receivers who have low QoS demands to those who have high QoS demands.
Page 2
Author: Desai, Vishal (200211029)
Title: A Novel Approach for Localization in Ad-Hoc Sensor Networks; 51p.; 2004.
Supervisor: Ranjan, Prabhat
Call No.: 681.2 DES
Acc. No.: T00021
Keywords: Ad-hoc sensor networks; Routing; Sensor networks.
Abstract:
The ability of a sensor node to move itself or to otherwise influence its location will be critical in
sensor networks. Today, the wireless community is putting great effort on the possibility of
deploying thousands of tiny sensors all over the place and measuring all kinds of data within.
Sensor network is a network of small devices, collaborating with each other to produce a larger
sensing task. Most of the current literature on location discovery in wireless and sensor networks
assumes the availability of GPS receivers at some nodes or beacon nodes with known position. But
as we know having a GPS receiver at sensor nodes may not be feasible due to the limitations of
satellite coverage inside the building or due to cost reasons. Further for ad hoc deployment of
nodes, it is unreasonable to assume the presence of beacon nodes with prior position information.
Hence, the main objective behind this research work is to introduce a localization/positioning
method that would be GPS-free and beaconless, and finally we come up with a method called “LRT
- Localization using Routing Table” which is also scalable, distributed and able to support the ad
hoc deployment of large-scale sensor networks quickly and efficiently.
Page 3
Author: Gajjar, Mrugesh R (200211005)
Title: Processor Allocation for Parallel Applications In Computing Cluster; viii, 36p.; 2004.
Supervisor: Jotwani, N. D.
Call No.: 004.35 GAH
Acc. No: T00003
Keywords: Cluster computing; Computing cluster; Distributed shared memory; Multi-processors; Parallel
processing; Processor allocation.
Abstract:
We study the problem of processor allocation in multi-computer for parallel processes that do I/O
and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel
workload that does I/O and IPC. We study the effect of I/O and IPC on performance of parallel
applications using the simulator. Also, we study a novel design approach for distributed operating
system Kerrighed, which uses kernel level distributed shared memory to provide global resource
management of CPU, memory and disks and efficient process migration mechanism. As kernel
level distributed shared memory provides unified basis for doing IPC we study the special case of
processes, which communicate using underlying DSM. We propose to use state of the DSM pages
in scheduling decisions and utilize efficient process migration mechanism to reduce consistency
related communication in DSM and thereby improve the response time of parallel processes.
Page 4
Author: Jadia, Pawan K. (200211023)
Title: Energy efficiency secret aggregation for wireless sensor networks; v, iii, 70p.; 2004.
Supervisor: Mathuria, Anish
Call No.: 681.2 JAD
Acc. No.: T00016
Keywords: Sensor networks; Wireless LANs; Wireless sensor networks.
Abstract:
Sensor networks involves large amount of nodes spread over a region. Data aggregation is an
important technique for reducing the amount of data to be transmitted in the networks. Data
confidentiality is a crucial requirement in many applications. Many existing protocol for secure
aggregation do not provide confidentiality. To reduce the computations, it is desirable to have a
protocol in which aggregation can be done without decrypting the data at intermediate nodes. This
thesis proposes a protocol in which nodes can do data aggregation without learning the
neighboring nodes data. The scheme is based on Processing Over Encrypted Data. Much work has
been already done in various fields using this cryptographic construct but to the best of our
knowledge the field of sensor networks is still untouched. Using this construct in the field of sensor
network will be a novel idea because it leads to energy efficient secure aggregation and can open
new directions of research in the field of wireless sensor networks.
Page 5
performance degradation of NIDS. We have applied clustering and classification algorithm based
on decision tree for efficient signature matching. The decision tree classifier approach creates tree
from the signature features and its discrete set of values. Decision tree classify the signatures
based on features such that each of the signature could be classified either as individual or group
identity.
We have compared the performance of signature detection engine based on linear as well as
decision tree classification. In particular we have shown that tree based classifier outperforms the
link list structure by a factor of 4 to 5 when tested by reading sample data from tcp dump files
and also the tree classifier has more % of throughput at
high data traffic. The % detection varied from 72 % to 30% for tree approach while for linear
model % detection varied from 52 % to 30% when packets were flooded at the rate of 4000 to
16000 packets/sec that clearly indicates that linear classifiers dropped more number of packets.
For multi packet inspection we compared sequential based threshold method, adaptive threshold
method and cusum algorithms and found that adaptive threshold method and cusum method
performs better than sequential time based method in terms of producing less number of false
alarms.
Page 6
transmitter part of the complete communication system (transmitter, channel model and
receiver). MATLAB was used for this purpose. The thesis presents implementation and simulation
of algorithms for synthesizing channel waveform for Fractal Modulation scheme. The results of the
simulation corroborate those expected from theoretical treatment.
Page 7
Author: Modi, Bhavesh (200211041)
Title: A study of MPLS traffic engineering with constraint-based routing; viii, 50p.; 2004.
Supervisor: Maitra, Anutosh
Call No:; 004.66MOD
Acc. No.: T00031
Keywords: Data transmission; MPLS Architecture; Multiplexing; Packet switching; Routing.
Abstract:
Multi-protocol Label Switching (MPLS) is fast becoming popular for future communication networks
running applications demanding high speed and Quality of Service. In this work, we have studied
the evolution of MPLS, various issues related to MPLS and the architecture ofMPLS. The simplicity
and functional capabilities ofMPLS enables various important applications over it such as Virtual
Private Networks, Provisioning of Quality of Service and Traffic Engineering. The traffic
engineering perspective of MPLS is studied in a greater detail as MPLS protocol has certain
advantageous features in traffic engineering applications, the major being that it allows explicit
routing, through which separately calculated routes can be specified for different traffic flows. The
process of route calculation can be automated with the help of Constraint-based Routing. The
thesis also presents a study on Constraint-based routing in MPLS environment. After that, a few
classical constraint-based routing algorithms that consider bandwidth as constraint are
investigated. The effectiveness of these algorithms is ascertained by means of simulation results.
The concept of minimum interference routing and the corresponding algorithm MIRA is studied in
greater detail in this work and presented in the thesis. The performance of MIRA was analyzed
and factors that affect the performance were identified. Finally, the work suggests two
modifications over MIRA based on the observations and analysis mentioned above. The primary
philosophy behind the modifications are identifying the criticality of the resources and quantifying
the order of the criticality. The performance of the suggested modified algorithms is benchmarked
against classical MIRA algorithm and the simulation results are presented.
Page 8
Author: Nallagorla, V.S.R. Krishna (200211007)
Title: Automated Categorization of structured Documents; x, 54p.; 2004.
Supervisor: Maitra, Anutosh
Call No.: 0005.72 NAL
Acc. No: T00004
Keywords: Categorization techniques; Document categorization; Naive Bayesian; Text categorization; TF-IDF;
Term Frequency-Inverse Document Frequency.
Abstract: Automatic text categorization is a problem of assigning text documents to pre-defined categories.
This requires extraction of useful features. In most of the applications, text document features are
commonly represented by the term frequency and the inverted document frequency. In case of
structured documents, dominant features are often characterized by a few sentences bearing
additional importance. The features from more important sentences should be considered more
than other features. Another issue in automated document categorization is the manageability and
integrity of large volume of text data where the documents can be very large and often certain
parts of the document misrepresent the primary focus of the document.
In this work, we study several document categorization techniques mostly in light of categorizing
structured text. Categorization on summarized text is also studied in details with some specific
purpose. While summarizing, the importance of appropriate sentences has been considered. The
approach is verified by conducting experiments using news group data sets using three
summarization methods. The set of whole documents and the summaries were subjected to a
couple of classical categorization techniques, viz. Naive Bayesian and TF-IDF (Term Frequency-
Inverse Document Frequency) algorithm. A major observation was preservation of the sanctity of
the categorization even while that is based on the summary documents rather than the whole
document. Goodness of the approach was verified on about 500 documents and the test results
are enclosed.
Page 9
Author: Rahi, Sajajd S. (200211011)
Title: Design of architecture of artificial neural network; viii, 106p.; 2004.
Supervisor: Chaudhary, Sanjay
Call No.: 006.32 RAH
Acc. No.: T00005
Keywords: Neural network—Architecture; Neural networks (Computer science); Soft computing.
Abstract:
The objective of the work is to design and construct a model for creation of architecture of feed
forward artificial neural network. The distributed genetic algorithms are used to design and
construct the system. This thesis describes various encoding schemes suggested by researchers
for the evolution of architecture of artificial neural network using genetic algorithm. This research
proposes new encoding scheme called object based encoding for the evolution of architecture and
also proposes data structures, genetic operators and repair algorithms for the system
development. For evolution of weights during training, genetic algorithm is used. For evolution of
weights, two dimensional variable length encoding scheme is proposed. For the same, two-point
layer crossover and average crossover are proposed. The experiments are carried out on the
developed system for the problems like 3-bit even parity. Which combination of genetic operators
are more efficient for better design of artificial neural network architecture, is concluded by the
experiments.
Page 10
Author: Sharma, Ashish Kumar (200211017)
Title: Integrated Receiver Front-end: System Level Architectures and Design Issues for CDMA Based
Applications; xii, 86p.; 2004.
Supervisor: Gupta, Sanjeev
Call No.: 621.3845 SHA
Acc. No.: T00011
Keywords: CDMA; CDMA based application; Integrated receiver; Radio frequency system; Receiver
architecture.
Abstract:
During the last decade, the world of mobile communications has experienced an enormous
growth. Among the important factors has been possible by the migration from the original analog
mobile phones to handsets using digital technology. Another important factor has been the rapid
progress in silicon IC technology that made it possible to squeeze ever more digital functions onto
a single chip. Since CDMA will be among the front running technologies for the mobile
communication applications, the presented work uses its PCS mode air-interface specifications as
the demonstration vehicle to highlight design issues involved with the system level receiver
design.
This thesis deals with the design of integrated receiver front-end for CDMA-based mobile
communication applications. Today circuits can be build in the mainstream CMOS technologies.
For integration also it’s a viable option since, the large digital back-end is exclusively done in
CMOS, so an attractive option is to integrate the RF front-end in CMOS itself.
The work presented here outlines the design path of a receiver at system level, starting from
fundamentals of RF design, architecture exploration, parameters responsible for degradation in
receiver performance in this the focus is to study the effects of RF-Impairments on the QPSK
modulation which is utilized in CDMA. Finally an analysis of CDMA receiver was done. The
requirements of CDMA standard are mapped onto a set of measurable specifications for a highly
integrated receiver. It is shown how a minimum required reception quality can be translated into
specifications on the receiver’s noise figure, image rejection, inter-modulation, etc. and how these
specifications can be distributed among different blocks.
The simulation was carried out in MATLAB from Mathworks and ADS-2003 from Agilent
technologies. The specifications for receiver components were taken from Maxim’s Chipsets and
related literature.
Page 11
antennas at the transmitter and the receiver. In this thesis we study the theory and practice of
space-time coding techniques for multiple antenna communication systems. We discuss the
information theoretic aspects of the so-called Multiple-Input-Multiple-Output (MIMO) channels and
examine the various methods adopted for the design of space-time codes over such channels and
their relative merits. We also carry out simulation to validate the claim that space-time codes can
provide significant increase in SNR in multipath fading channels.
Page 12
Author: Thacker, Grishma D. (200211036)
Title: Technique to Improve Revocation Mechanism and Enhancement of CA’s Services; iv, 54p.; 2004.
Supervisor: Jadhav, Ashish
Call No.: 005.82 THA
Acc. No.: T00027
Keywords: Certificate revocation list; Certification authority (CR); Cryptography; Public key infrastructure;
Publics key cryptography.
Abstract:
Public Key Cryptography [PKC] is becoming popular in the world of security because of its
promising features like authentication and non-repudiation along with integrity and data
confidentiality. It has been possible to achieve an electronic equivalent of hand written signatures
that are considered to be the most common method of providing identity proof in a non-electronic
world, thanks to PKC techniques. Public Key Infrastructure [PKI] is a technology that supports PKC
to achieve its intended services by implementing PKC concepts. It is considered to be one of the
potential technologies for the future of e-business and e-governance. Digital certificates are one of
the most important components of PKI. They are issued and signed by a trusted third party
named Certification Authority to provide trust worthy binding between the entity and its public
key, thus, they impute trust in the public key of a claimant. The certificate has predefined validity
period after which they expire. But sometimes during its valid lifetime due to certain events, the
certificate doesn't remain valid. A need arises to declare its invalidity implying withdrawal of trust
that was imputed in it at the time of issuance. This event is called 'revocation' of the certificate.
The information regarding this event of revocation has to propagate to the entire community that
might use the certificate in question for its important transaction. 'Certificate Revocation' is one of
the key issues in PKI because security of any transaction relies on the validity of the certificate
used in it. Hence, the status of these certificates in terms of 'valid' / 'non- valid' becomes
important information to be processed, conveyed, acquired, and managed securely. There are
many mechanisms proposed for the certificate revocation information distribution.
My primary concern is to focus on some of these mechanisms and to provide some solution for
this problem. I've proposed a method named "Staggered CRLs". It uses delta CRLs and shows how
a CA can avoid generation of signature over the voluminous CRL and still can provide more timely
information than the traditional CRL. CRLs are issued along with delta CRLs with 'slight'
modification. The method avoids prefixing of next update time of CRL and makes it dynamic based
on some other criteria. It provides more timely information at lesser frequency of CRL. My second
proposal is about how a CA can enhance its services to the user community. I suggest to go
beyond merely providing revocation information about the certificate and to add more value to the
CA services by providing further information about the certificates.
Page 13
rate performance in multiuser. This simulation is done in A WGN environment. The simulation is
carried out as per the specification of IEEE 802.11b standard.
Page 14
Author: Vipperla, Ravi Chander(200211014)
Title: Incorporation of mobility model of nodes in zone routing protocol for mobile Ad-hoc wireless
networks; viii, 48 p.; 2004.
Supervisor: Chakka, Vijaykumar
Call No.: 004.65 CHA
Acc. No.: T00008
Keywords: Ad-hoc wireless networks; Computer network architectures; Mobile Ah-hoc networks; Routing
protocol; Wireless communication systems.
Abstract: Ad Hoc wireless networks are characterized by dynamically changing network topology due to
relative motion of the nodes. This leads to the exchange of large number of control packets
between the nodes to maintain the network topology resulting in reduced throughput in such
networks and wastage of bandwidth in the exchange overhead control packets.
In this thesis, we propose the use of mobility models of the nodes to improve routing protocol
performances. The basic idea is that the neighboring nodes exchange their mobility models (i.e.,
location and velocity information) during network updates and use this information to determine
more stable routes that do not become invalid due to the nodes movement. This technique has
been incorporated into one of the popular routing protocol for Mobile Ad Hoc Networks known as
the 'Zone Routing Protocol'.
Among envisaged improvements with the above technique is determination of stable routes
leading to reduction in the number of route failures, reduction in the number of overhead control
packets, Scope for the use of directional antennas, bandwidth efficiency and reduction in power
consumption at mobile nodes.
Simulations have been performed in MATLAB to analyse the performance of the ZRP with mobility
models incorporated and the analysis results show decent improvements.
Page 15
Page 16
2003-2005
Page 17
Author: Bhatt, Krutarth (200311038)
Title: Multiple Watermarking Schemes for Copyright protection; x, 77 p.; 2005.
Supervisor: Mitra, Suman K.
Call No.: 005.8 BHA
Acc. No.: T00057
Keywords: Copyright; Digital watermarking; Watermarking techniques.
Abstract:
Recent advances in digital communication and storage technologies have brought major changes
for consumers. High capacity hard disks and DVDs can store a huge amount of audiovisual data.
In addition, faster Internet connection speeds and emerging high bit rate DSL connection provide
sufficient bandwidth for entertainment networks. These improvements in computer networks and
communication technology are changing the economies of intellectual property reproduction and
distribution. Intellectual property owners must exploit the new ways reproducing, distributing, and
marketing their intellectual property. However a major problem with current digital distribution is
the great threat of piracy. Digital watermarking is proposed as a solution to avoid digital piracy.
In this work we have addressed multiple watermarking to increase robustness requirement for
copyright protection and ownership prevention. Taking into account the scenarios for the present
content distribution environment, we do rely on sending and distributing the content through
physical channels along with digital network communication and distribution. We may publish the
content in some newspapers and/or magazines etc. According to our belief there are very few
techniques that are highly robust against unintentional image processing like print-scan, dithering
that are routinely performed during publication of an image along with the conventional attacks
that are performed on digital representation of an image. We have developed two techniques; one
is “Multiple Watermarking using feature selection” and the other is “Multiple Watermarking in
Hybrid SVD-DCT domain”. Both the techniques are highly robust against various attacks including
JPEG-Lossy compression, Blurring, Median filtering, Rotation, Cropping, Scaling, Rescaling,
Histogram Equalization, Intensity Adjustment, Gamma Correction, Gaussian Noise Addition, Salt &
Pepper Noise Addition, Uniform Noise Addition, Dithering, Print & Rescan, Intentional Tampering,
Pixelate etc. Imperceptibility, Security and Reliability of Detection are also satisfied by the
proposed techniques.
Page 18
Author: Changela, Jasankumar R. (200311035)
Title: Performance Analysis of Fair Schedulers under Heterogeneous Traffic; ix, 67 p.; 2005.
Supervisor: Jotwani, N. D.
Call No.: 621.38216 CHA
Acc. No.: T00055
Keywords: Data transmission system; Packet switching (Data transmission); Switching methods.
Abstract: In this thesis, the role of the packet scheduling discipline has been studied in providing QoS over
the Internet. The fairness and scalability requirements expected to be satisfied by the scheduling
discipline have been analysed, with reference to the two categories under which schedulers are
broadly classified: Round-robin-based schedulers and Timestamp-based schedulers. In particular,
the basic principles and design goals of three specific Fair Schedulers WDRR, NestedDRR and
StratifiedRR have been studied.
The Network Simulator (ns-2) tool has been enhanced to support WDRR, NestedDRR and
StratifiedRR schedulers. To analyse the performance of WDRR, NestedDRR and StratifiedRR under
MPEG, CBR and BE traffic, simulations have been carried out for specific load conditions under
single hop and two hop topologies. From simulation results it has been observed that, as its
reserved rate increases, MPEG traffic achieves better performance under StratifiedRR. Also,
degradation in the performance received by other contending traffics is greater under StratifiedRR.
It has been identified that, for fixed value of Load Factor, as quantum increases, the End-to-End
delay and End-to-End delay-jitter of MPEG traffic under WDRR show greater variation than that
seen under NestedDRR. Based on these results, an improvement over StratifiedRR has been
proposed which is expected to make the delay and delay-jitter seen by a flow independent of the
packet sizes in other flows.
Page 19
Author: Garg, Nitin (200311007)
Title:Performance Analysis of JDO in J2EE Architecture; xi, 72p.; 2005.
Supervisor: Chaudhary, Sanjay
Call No.: 005.133 GAR
Acc. No.: T00035
Keywords: JDO (Java Data Object); J2EE (Computer programming language); Computer programming
languages.
Abstract: Data persistence is one of the most important aspects of any enterprise wide application. An
enterprise data persistence solution must provide speedy client transactions, ensure data integrity
over time, and be able to persist data through such everyday catastrophes as system crashes and
network failures. Object-oriented applications that use the Java 2 Enterprise Environment (J2EE)
have a variety of persistence technologies at hand. Two prominent ones among these are entity
beans and recently introduced Java Data Objects (JDO). Entity beans provide a robust container-
based persistence framework attributed with various middleware services. However, over the
years the use of entity beans has brought into light a number of its drawbacks. Component level
inheritance and dynamic querying are not supported appropriately, and the whole approach seems
to be overweight. In order to overcome these weaknesses, researchers proposed a JCA-compliant
resource adapter, which allows the use of Java Data Objects (JDO) instead of entity beans and
introduces a lightweight, easy to use and powerful transparent persistence layer for the Java 2
Enterprise Environment. We have presented a detailed analysis of JDO technology and compared
its performance with contemporary technologies. Analysis is done to compare the response time,
execution time; maximum tests per second as number of concurrent clients increases of various
object persisting techniques.
Page 20
Author: Jain, Abhay (200311019)
Title: Protecting Structures on Heap from Buffer Overflow Vulnerabilities with TIED–LibsafePlus; ix, 83p.;
2005.
Supervisor: Mathuria, Anish
Call No.: 005.8 JAI
Acc. No.: T00045
Keywords: Computer security; TIED-LibsafePlus.
Abstract:
In spite of the numerous defenses that have been devised to combat the buffer overflow attack,
buffer overflow vulnerability in the C programs still exist as the one widely exploited by the
attackers to subsume the privileges of host on remote machine. This is subsequently used to
launch even more precarious attacks. A buffer is said to be overrun if data is copied beyond its
bounds thus overwriting the memory locations adjacent to the buffer. Buffer overflow
vulnerabilities occur primarily due to two reasons. One is the absence of automatic bounds
checking of arrays and pointer references in the language and other being the use of unsafe C
library functions that don’t range check the buffers before copying data into them.
This thesis proposes a defense mechanism for preventing heap buffer overflow. It is built over
another solution to buffer overflow problem called TIED-LibsafePlus. TIED-LibsafePlus extracts the
type information of all the buffers (except the one lying on heap) from the raw debug information
present in the binary and rewrites it into the binary as new specific tables that are accessed by the
library to find the size of buffers before copying the data into them by intercepting the unsafe C
library functions. TIED-LibsafePlus cannot prevent the overflow of the buffers that are allocated on
heap as member of some user defined data type like C structure. A manually crafted attack is
demonstrated that changes the flow of control by overflowing such buffers. To prevent these
buffers from getting overrun using the approach employed by TIED-LibsafePlus, it is necessary to
dynamically find out the type of the structure allocated on heap, which is not feasible with the
current implementation of malloc family of functions. Thus to achieve this the proposed solution
augments the binary with some more type information pertaining to structures defined in the
program, which is then accessed by the safe library. This thesis describes how the structures
allocated on heap can be protected from buffer overflow at the cost of this extra type-information
and extra checking performed by the library at run time.
Various analytical studies on the effect of correlated multi-path channel on performance of spatial
multiplexing have been done. These studies focus on capacity cumulative distribution function.
Effect of various degree of correlation on other performance measures like diversity gain and error
probability have been not done. This is due to lack of simple method of generation of correlated
Rayleigh fading envelops. By making use of the extended algorithm we have been successful in
carrying out simulation to observe the effects on the performance.
Recently there is interest in extending the concept of MIMO in wireless communication for sensor
networks. The motivation behind it is energy efficiency of sensor nodes. Our results have
implications on this venture.
Page 21
Author: Jain, Rajul (200311036)
Title: Contributions to Parasitic Computing; vii, 54p. 2005.
Supervisor: Mathuria, Anish
Call No.: 005.8 JAI
Acc. No.: T00056
Keywords: Computer security; Data security; Parasitic computing.
Abstract:
Internet is a huge connection of networks. To ensure reliable communication on the Internet a
layered architecture is used, with various protocols functional at each layer. The way these
protocols are used on the Internet, it is possible to exploit them to do computations covertly. This
kind of computing is known as Parasitic Computing. Parasitic computing is a kind of covert
exploitation in which the parasite hides the computation in standard communication protocol and
sends it to target(s), who unwillingly produce the output of the hidden computation as part of the
communication session.
We show that Internet checksum based parasitic computing can be used to solve three well-known
problems, Discrete Fourier Transform, Matrix multiplication and Pattern matching. We describe
how CRC checksum can be used to do primality testing using parasitic computing.
A more efficient implementation of Internet checksum based parasitic computing is proposed and
simulated. A comparison based on false negatives with the existing implementation is given.
Results show that the proposed scheme performs better in terms of the selected parameter of
false negatives. However, there is additional communication overhead associated with it.
Parasitic computing can be applied in the field of security protocols. A novel sorting algorithm,
Ker-sort is devised by exploiting ticket lifetimes in Kerberos and tested on Kerberos version 5.0.
Run time analysis of the algorithm is given, and a comparison with existing distributed sorting
algorithms is also presented. Brute-force cryptanalysis involves doing an exhaustive search in the
key space. Using parasitic computing the parasite can offload the encryption or decryption
operations involved in doing exhaustive search to the target(s). A theoretical cryptanalysis of SKIP
and IP authentication header protocols using distributed exhaustive search is proposed.
Page 22
Author: Khera, Neha (200311041)
Title: Design of Laser Driver Circuit; viii, 30p.; 2005.
Supervisor: Roy, Anil K. and Parikh, Chetan D.
Call No.: 621.38152 KHE
Acc. No.: T00060
Keywords: Integrated circuits; Optoelectronic devices; Optoelectronic Integrated Circuit (OEIC);
Optoelectronics; Semiconductors.
Abstract:
Designing an Optoelectronic Integrated Circuit (OEIC) is an attractive field of research as it
bridges the interface between electrical and optical components. The design of laser driver in
optical transmitter is very critical because it requires large output current and high speed. To date,
majority of laser drivers have been designed using Bipolar Junction Transistor (BJT) due to wider
bandwidth and good quality of passive components. However, the standard digital Complementary
Metal Oxide Semiconductor (CMOS) technology provides advantages, such as, low power, low cost
of fabrication due to high production yield, and a higher degree of integration. Thus, the silicon
CMOS technology, which is well known for low cost and high density, is preferred to design an
Optoelectronic circuitry.
Under this thesis, the work undertaken pertains to devising cascode-based laser driver circuit
operating at 2.5 Gbps, using Hewlett Packard CMOS26G 0.8mm CMOS process. The devised circuit
integrates well with the 1550nm rate equation based equivalent circuit model generated from R-
soft design tool kit OptSim 3.6. This is definitely a step forward on the existing topologies, which
have worked on 850nm VCSEL. The thesis projects reduction in number of transistors and,
consequently, the chip area occupied by the driver. In nutshell, what has been done on this score
and what remains to be done has been explained in detail in chapter-4 of the thesis under the title
“conclusion & future scope”.
Page 23
Author: Kumara, Pooja (200311012)
Title: ACIDS: Automated Co-stimulation based Intrusion detection System with a sense of Dynamic Self;
viii, 79p.; 2005.
Supervisor: Mathuria, Anish
Call No.: 005.8 KAM
Acc. No.: T00039
Keywords: Intrusion detection system; Computer networks-security measures.
Abstract:
Automated Co-stimulation based Intrusion detection system with a sense of Dynamic Self, or
ACIDS, is a distributed architecture for intrusion detection systems. Other than the already used
aspects of human immune systems like negative selection, clonal selection, gene expression etc.,
the novelty of ACIDS is that it incorporates two features of the human system not used previously,
namely thymus and vaccination.
Self is defined as the set of normal connections observed on the network. All the existing systems
are modeling the self as a static entity, when it should have been otherwise. Also, human immune
system needs two disparate signals before taking some action against the antigen. The first signal
is generated at the point of attack and stimulates the immune system for rigorous detection. The
second signal is known as co-stimulation, and it stimulates the immune system for taking the
action against an antigen. All the existing artificial immune models are also seeking co-stimulation,
but it is generated through human intervention. This makes them unusable in real time. Another
drawback in the existing systems is that they start from the scratch, i.e. they do not derive
knowledge from the existing data of the intrusions.
ACIDS aims to overcome the above drawbacks of existing models. It includes a module called
thymus that dynamically updates the self’s definition of the system. To best of our knowledge, this
concept is being used for the first time in intrusion detection systems. In CIDS, hosts are
monitored at two levels, network level and operating system level. Whenever an anomaly is
detected at the network level, ACIDS monitors the activity of the processes in the host. If anomaly
is detected there, system automatically generates the co-stimulation.
Page 24
Author: Panchal, Niravkumar K. (200311023)
Title: Protecting Mobile Agents Against Malicious Hosts Using Trusted Computing; ix, 50p.; 2005.
Supervisor: Mathuria, Anish
Call No.: 005.84 PAN
Acc. No.: T00047
Keywords: Computer security; Intelligent agents; Mobile agents (Computer software); Mobile agents system;
Trusted computing.
Abstract:
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative
applications of mobile agents have been proposed. But it remains to be the fact that these
applications have not been deployed to the desired extent. Security concerns associated with
mobile agent systems are primary obstacles to their widespread adoption. Protecting mobile agent
against malicious host is the unsolved aspect of these security concerns. Existing solutions to this
problem are either not practical or not robust. We have provided a practical and robust solution to
this problem using the concepts of Trusted Computing. We have designed security architecture for
mobile agent systems. Our architecture uses the capabilities of the TCG (Trusted Computing
Group) TPM (Trusted Platform Module) and TCG based integrity measurement architecture to
provide the solution to the above mentioned problem. Since most of the mobile agent systems are
Java based, we have provided an implementation of TCG aware Java Virtual Machine, which is one
component of the overall architecture.
In this thesis, four non-uniform dissemination protocols are analyzed for computational grids
based on the concept of “Grid potential”, which follows above-mentioned requirements for
resource discovery. These protocols disseminate resource information with a resolution inversely
proportional to the distance of resources from the application launch point. The performance
evaluation is done with respect to the dissemination efficiency and message complexity. The
results indicate that these protocols improve the performance of information dissemination
compared to uniform dissemination to all repositories.
Page 25
Author: Ray, Anuradha (200311018)
Title: A Novel Architecture For a CMOS Low Noise Amplifier at 2.4 GHz; ix, 50p.; 2005.
Supervisor: Parikh, Chetan D.
Call No.: 621.39732 RAY
Acc. No.: T00044
Keywords: Amplifiers (Electronics); Complementary Metal Oxide Semiconductor; Image processing; Optical
data processing.
Abstract:
Radio frequency design has been one of the major research areas in the recent past. Emergence
of several Wireless Communication standards has demanded availability of different analog blocks
for use in transceivers with different constraints, imposed by the nature of application.
Particularly, lot of research has been carried out in CMOS technology, due to its low cost nature.
LNA is one of the most important building blocks in the front end of the wireless communication
systems. It determines the noise performance of the overall system, as it is the first block after
the antenna. With technology scaling, the transistor’s cut off frequency continues to increase,
which is desirable for improving the noise performance of CMOS circuit. Some other advantages
like low cost, high level of integration motivates research of RF modules using CMOS technology.
In recent years valuable research is done on CMOS LNA design in submicron technologies: from
topology investigation to various new ideas on improvement of low power consumption, low noise
figure, high gain, smaller space and low supply voltage.
In this thesis, a new LNA architecture is reported, that consumes less power compared to other
existing architectures, while providing the same gain, noise figure, CP-1dB and IIP3 figures. The
new architecture achieves this better performance by combining the beneficial properties of two
existing architectures – Lee’s inductive input stage, and the current-reuse (or the CMOS inverter
amplifier) architecture. Detailed design procedures, and Spice simulation results are presented in
the thesis, along with a brief survey of noise sources in MOSFETs, and a literature survey of
existing LNA architectures.
Page 26
Author: Reddy, S. Gangadhar (200311031)
Title: Enhancing Data efficiency in OFDM (IEEE 802.11a) using Equalization; xii, 50 p.; 2005.
Supervisor: Chakka, Vijaykumar
Call No.: 621.3821 RED
Acc. No.: T00051
Keywords: Communication network; Multiplexing; OFDM (Orthogonal Frequency Division Multiplexing);
Wavelength division multiplexing.
Abstract:
IEEE 802.11a OFDM signal passed through a dispersive channel introduces ISI & ICI. To avoid ISI
& ICI, cyclic prefix (guard interval) is introduced between the OFDM symbols. But the cyclic prefix
contributes about 20% (0.8us/4us) of the total symbol duration. Transmission of OFDM symbols
without cyclic prefix increases the data efficiency, but introduces ICI & ISI. The ISI & ICI can be
removed by equalization at the receiver.
Spill over in the frequency domain is same as ICI & ISI. This spill over can be observed at the
unused carriers also (carriers numbered from 0-6, 33, 59-64 are unused in IEEE 802.11a).
Equalization is done in the frequency domain by making use of spill over in unused carriers. A
relationship is brought between the length of the channel impulse response and the number of
unused carriers for perfect equalization in the absence or very little AWGN-channel noise. To avoid
the noise amplification caused by Zero Forcing equalization and to satisfy the relationship derived,
a methodology using Time domain equalizer (TEQ) is proposed and simulation results are
presented supporting it.
Alternatively, computational efficient algorithm for indoor environment is suggested by
transmitting data in unused carriers with the combination of used carriers. By this method, ICI &
ISI is removed at the transmitter itself and it even doesn’t amplify the noise.
Page 27
Author: Shah, Dhaval Kiritbhai (200311040)
Title: Model for Grid Service Instance Migration; xii,85 p.; 2005.
Supervisor: Chaudhary, Sanjay
Call No.: 004.36 SHA
Acc. No.: T00059
Keywords: Computational grids; Grid computing.
Abstract: Grid computing, emerging as a new paradigm for next-generation computing, enables the sharing,
selection, and aggregation of distributed resources for solving large-scale problems in science,
engineering, and commerce. The resources in the Grid are heterogeneous and geographically
distributed. The resources in the Grid are dynamic in nature. Resource owners are at discretion to
submit/donate the resources in to the Grid environment. A Web Services is a network-enabled
entity accessed using the standard web protocols. Web Services are basically stateless in nature
and there is a need to maintain state across the transactions based on Web Services. Grid Services
is an extension of Web Services in a Grid environment having statefulness as a key feature. State
of any Grid Services is exposed with the help of Service Data Elements. Grid Services may fail
during its life cycle due to failure of a resource or a withdrawal of a resource by the resource
owner. Thus, there is a need to provide a reliable solution in the form of Grid Service instance
migration to protect the work of the users, which was carried out. This thesis proposes a model
that supports Grid Services instance migration. Migration of an instance can take place based on
the failure of resource, increase in load at the resource, change in the policy of the domain in
which resource resides, user specified migration, or migration due to withdrawal of a resource by
the resource owner. It enables the users to specify the migration if (s)he does not trust the
domain in which instance is running. The model includes an incremental checkpointing mechanism
to facilitate migration. Thesis shows the study of checkpointing mechanism in various resource
managers: condor, condor-G and LSF. It narrates the different economic models prevalent in
distributed computing field. The need for dynamic scheduler for Grid is also discussed. A model for
instance migration for a task having parallel independent subtask is also proposed. A proposal to
modify existing Globus-GRAM protocol to support Grid Service instance migration is also
suggested.
Page 28
Author: Singh, Vivek Kumar (200311032)
Title: Knowledge Management Techniques Towards Answering Engine; vii, 74p.; 2005.
Supervisor: Maitra, Anutosh
Call No.: 004.678 SIN
Acc. No.: T00052
Keywords: Answering search engine; Knowledge management technique; Search engine; World Wide Web.
Abstract:
The growth of Internet era has brought magnitude of information at the disposal of end user being
mobilized with the speed of electron. But this bless of information comes with a curse of
‘information overload’. Answer engine has come out as a well-accepted solution to this problem as
it target to directly provide answer to the user’s question. At present, several hurdles exist in the
path of a robust answer engine capable of handling various types of complex questions and they
have been mostly known as inefficient in handling natural language text. This thesis presents a
study, implementation and some contribution to various aspects of this question answering
approach. Notably a novel approach of summarization has been tried that works on the principle
of capturing relation between salient concepts present in text. The work also presents a Feature
Drift model for tracking concept drift, which is a key ingredient in construction of user model
required for personalization at various stages. Finally, a representative implementation of a factoid
Answer Engine and a Search Engine built for the domain of DA-IICT has been described.
Page 29
spacing are considered for defining structural elements for morphological operations. The localised
license plates are segmented into individual character images by connected component labeling
algorithm and the segmented characters of license plate are recognized by template matching
approach. Entire system is implemented in Matlab and is tested over a large database of car
images of various countries.
Page 30
congestion criteria to be violated but that there was already a link in the path followed by the new
request which was violating the criteria.
Page 31
Page 32
2004-2006
Page 33
Author: Banda, Kishore Kumar (200411040)
Title: Efficient Algorithms For Hierarchical Online Rule Mining; viii, 60 p.; 2006.
Supervisor: Jotwani, Naresh
Call No.: 006.312 BAN
Acc. No.: T00101
Keywords: Algorithms; Data mining; Data mining and algorithms.
Abstract:
Association rule Mining, as one of the technologies equipped with Data Mining, deals with the
challenge of mining the informative associations from the fast accumulating data. From the past
decade, the research community has been busy progressing day by day towards the task of rule
mining. Hierarchical Online rule mining opens a new trend to achieve an online approach in real
sense. In this thesis, we further develop the theory of Hierarchical Association Rules. Notably, we
propose a new algorithm that further improves the efficiency of the previously proposed works in
three aspects. In phase 1 of the rule-mining problem, we introduce Hierarchy Aware Counting and
Transaction Reduction concepts that reduce the computational complexity by a considerable
factor. We also propose Redundancy Check while generating rules in phase 2 of the problem. We
propose a modified version of a Synthetic Data Generator that deals with Hierarchical data and
evaluate the performance of the proposed new algorithm. We finally discuss the issues that can
form the future perspectives of the proposed new approach.
Page 34
This research work tries to suggest and implement an amelioration in Oscillation based Built-In
Self-Test, for an analog and mixed signal block i.e., a high speed Analog to Digital Converter
(ADC), in deep sub-micron CMOS technology. ADCs are virtually in all modern SoCs and hence are
one of the most important modules in analog and mixed-signal designs. A novel Oscillation based
Built-In Self-Test is used for testing of a 3-bit 1 GHz CMOS Flash ADC, designed in 0.18 _m CMOS
technology. The simulation results prove that this technique shows an excellent coverage of
catastrophic as well as a good coverage of parametric faults, with minimal area overhead and
lesser test time. The analog and the digital sub-systems of an ADC do not need di_erent test
structure, which is its biggest advantage.
Page 35
unique feature and does not exist in current literature. A novel architecture to compute transpose
of a matrix in only one clock cycle is also presented. The VLSI implementation of R-ASIK was done
in three steps namely, modelling the R-ASIK using Verilog HDL, logic synthesis and physical
synthesis. The implementation methodology presented for logic and physical synthesis resulted in
efficient implementation of R-ASIK in silicon. R-ASIK was mapped to four target technologies
(180,130, 90 and 65 nm) and the synthesis results are analyzed. Physical synthesis of R-ASIK was
carried out for 180 nm technology. R-ASIK works at 50 MHz clock, which is quite high for a data
path intensive algorithm like Kalman filter.
Page 36
informed coding and informed embedding approach to with the most utilized spread spectrum
techniques. In informed coding, the codeword used to represent a message is dependent on the
cover work in which message is embedded. In informed embedding, the embedding process tailors
each watermark patterns according to cover work. Our informed coding is based on trellis, which
is modified so that each message can be represented by set of alternative vectors. Our scheme
first embeds a watermark using informed coding and informed embedding and to increase the
robustness, another spread spectrum based watermark is embedded. The watermark added to our
algorithm is perceptually invisible in nature. The effectiveness of this scheme is verified through
series of experiments, in which a number of standard image processing attacks are conducted.
The obtained results demonstrate, proposed algorithm survives a wide range of attacks.
Page 37
Author: Katare, Aradhana (200411024)
Title: Content-Based Image Retrieval System for Multi-Object Images Using a Combination of Features;
viii, 49 p.; 2006.
Supervisor: Mitra, Suman K. and Banerjee, Asim
Call No.: 006.7 KAT
Acc. No.: T00085
Keywords: Content based image retrieval (CBIR); Image processing--digital techniques; Multi object image
database; Multimedia systems.
Abstract:
Content-based image retrieval (CBIR) is a research area dedicated to address the retrieval of
images based on automatically derived features from the content of the images in database.
Traditional CBIR systems generally compute global features of the image for example, based on
color histograms. When a query images is fired, it returns all those images whose features match
closely with the query image. The major disadvantage of such systems based on global features is
that they return the images that match globally but cannot possibly return images corresponding
to some particular objects in the query image.
The thesis addresses this problem and proposes a CBIR system for multi object image database
with 3D objects using the properties of the object in the images for retrieval. Object segmentation
has been achieved using GVF Active Contour. An inherent problem with active contours is
initialization of contour points. The thesis proposes an approach for automatic initialization of
contour points. Experimental results show that the proposed approach works efficiently for contour
initialization. In the thesis in addition to shape feature using modified chain code other features for
object retrieval using colour with the aid of colour moments and texture using Gabor Wavelets
have also been used. A comparative study has been made as to which combination of features
performs better. Experimental results indicate that the combination of shape and color feature is a
strong feature for image retrieval.
Page 38
Author: Kulkarni, Vineet (200411015)
Title: A Two-level Pricing Scheme for Congestion Control and Service Differentiation in the Internet; ix,
62 p.; 2006.
Supervisor: Srivastava, Sanjay and Lenin, R. B.
Call No.: 004.678 KUL
Acc. No.: T00078
Keywords: Internet (World Wide Web); Internet and scheme; Internet service pricing; Internet--Computer
programs; Internet service provider; Internet users; Pricing mechanism; Pricing scheme.
Abstract:
It is the property of any good service provider that, if a user is ready to pay for the services he
demands, the provider will ensure that the requested level of service is made available. Is this
possible in the Internet? The answer is No. This is because there is no uniform economic model
based on which service is provided in the Internet. Through pricing, we provide one such model
which is sensitive to user demands and budgets.
The proposed pricing mechanism performs the dual functions of providing service differentiation
according to budgets, and doing congestion control through feedback at time scale comparable to
a round trip time. We investigate the optimal rate allocation and stability issues of the proposed
scheme.
A two level pricing scheme is proposed to reflect the structure of the Internet. Data statistics are
maintained as an aggregate, thus reducing the load on intermediate routers in the Internet. The
scheme has been proposed so as to require minimal changes to the current Internet. The working
of the pricing scheme in different traffic scenarios is demonstrated through simulations.
Page 39
as our baseline system which are trained using Expectation Maximization (EM) algorithm. Mel
Frequency Cepstral Coefficients (MFCC), its delta and delta-delta cepstral coefficients are used as
features of speech applied to the system. English and three Indian languages (Hindi, Gujarati and
Telugu) are used to test the performances. In this dissertation we have tried to improve the
performance of GMM for LID. Two modified EM algorithms are used to overcome the limitations of
EM algorithm. The first approach is Split and Merge EM algorithm The second variation is Model
Selection Based Self-Splitting Gaussian Mixture Leaning We have also prepared the speech
database for three Indian languages namely Hindi, Gujarati and Telugu and that we have used in
our experiments.
Page 40
second order moments. A Markov model is the simplest realization of an information source. As
proved by the Asymptotic Equipartition Property [Sha48], not all sequences are produced with the
same probability by such a source. Only a fraction of the total sequences is produced with a high
probability. The number of these high probability sequences decide the number of bits required to
represent these sequences. The number of these sequences are calculated for different models. An
estimate of autocorrelation for lag 1 of these sequences is then made. The results then show that
the bit rate reduction increases with the correlation coefficient.
Page 41
Author: Patel, Komalben (200411013)
Title: Mobility Aware MANET Routing Protocol using Cross Layer Design; vii, 52 p.; 2006.
Supervisor: Srivastava, Sanjay and Lenin, R. B.
Call No.: 004.65 PAT
Acc. No.: T00076
Keywords: Ad-hoc wireless networks; Computer networks; Mobile Ad-hoc Networks; Routers (Computer
networks); Routing protocol; Wireless communication systems.
Abstract:
Mobile Adhoc Network (MANET) is a dynamic network with time varying topology and time varying
network resources. Due to the error-prone wireless channel and high mobility, traditional protocols
of wired networks cannot be successfully applied to MANETs. The popularity of mobile and hand
held devices equipped with wireless interface is creating a new challenge for Quality of Service.
The wired network has also not been able to fulfill end-to-end guarantees. Due to the nature of
MANETs, achieving the same end-to-end guarantees is very difficult. The mobility rate makes the
task dicult. The aim is to fight against the losses caused due to mobility. This work attempts to
build stable paths so as to counter the effects of mobility induced route failures. Using the Cross
Layer Approach, the signal strength of the link from the MAC Layer is captured and used at the
network layer. Upon receiving the signal strength values, the network layer carries out a
prediction mechanism to predict the future signal strength. This information is then used to
categorize the link as stable or unstable. The work also deals with designing a proactive routing
protocol which uses the information of stable and unstable links to build up routes using limited
dissemination technique. The protocol is similar to distance vector protocol in which, only the
distance vectors whose next hop is a stable is advertised. This ensures that only stable link
information reaches the other nodes in the network. The protocol has been tested in Network
Simulator-2 and compared with the Destination Sequenced Distance Vector [PB94] and the Adhoc
On-Demand Distance Vector [PR97] protocols. Various parameters like percentage of packet
delivery, packet latency, effects of moblity, etc. are measured. The results show that the
performance of the designed protocol is better than AODV in high traffic scenarios. With less
overhead, the proposed protocol always performs better than DSDV. In high mobility scenarios,
the protocol is comparable to AODV and performs better than DSDV.
Page 42
linearity.
Page 43
bias current of the transconductance amplifier with respect to the control voltage. Existing
techniques uses different methods like dynamically switching the current, using feed back, etc.
Some of these are area efficient techniques and some are power efficient techniques. In this work,
a new adaptive biasing scheme is proposed which shows excellent results in terms of both area
and power without affecting amplifier design. It uses a simple input pair to sense input signals,
current mirrors to generate a difference between two currents, this difference in current varies
linearly with the input signal while nonlinearity is cancelled out. Simulation results shows about
80% of quiescent power can be saved while maintaining the amplifier small signal characteristics.
Page 44
two stage fully differential telescopic cascode Op-Amp has been designed to meet the
specifications of gain, unity-gain bandwidth and slew rate as an integral part of switched capacitor
circuits. The topology also incorporates a coarse analog to digital converter(ADC) along with an
encoder in feedback loop to account for the discontinuities in the map.
Verification of the generated chaos from the system has been done on the basis of its time domain
evolution, correlation properties and power spectral density. This has also been compared with the
ideal system implementing the same map on similar grounds. The work has been carried out in
0.35µm, bipolar supply, N-well technology using BSIM 3v3.1 SPICE model parameters for
simulations.
Page 45
Author: Singh, Ram Sahay (200411027)
Title: Implementation of Constant gm CMOS op-amp input stage using overlapping of Transition region
in 0.18µm Technology; x, 44 p.; 2006.
Supervisor: Parikh, Chetan D.
Call No.: 621.39732 SIN
Acc. No.: T00088
Keywords: Analog circuit design; CMOS (Electronics); Metal oxide semiconductors, Complementary.
Abstract:
Operational amplifier is the backbone of most of analog circuit design. For low voltage
applications, op-amp should have a rail-to-rail common mode input voltage. This report describes
the implementation of a constant gm rail-to-rail CMOS op-amp using complementary input pairs,
at 0.18µm MOS technology. The concept used to make the input transconductance (gm) constant
is the overlapping of transition regions of n-pair and p-pair tail transistors using a DC level shifter
[2]. A constant gm input stage insures a uniform frequency response for the entire common mode
input range. It also improves the Common Mode Rejection Ratio (CMRR). The results of the
designed op-amp show that it has a rail-to-rail input common mode range and a rail-to-rail output
voltage swing. For rail-to-rail output voltage swing a Class AB output stage is used. Layout of the
chosen architecture is made using 0.18µm technology. Comparisons of pre-layout and post-layout
simulation results are done.
Page 46
The whole thesis work has been divided into two part. First part analyzes the observability
problems of DOA tracking i.e. it analyze the given scenario for the unique solution and suggest
some correction to get proper system parameter estimation. This part also tries to find the
principle causes of filter divergence.
In second part, the thesis is concentrated on the estimation methods used to track target. In this
part thesis analyzes two different estimation algorithms named Extended Kalman Filter(EKF) and
Pseudo Linear Estimator(PLE).
Thesis proposed a Triangulation Estimator which estimates the target motion parameter by using
the geometry formed by the target and sensors available. Finally thesis compared the
performances of the algorithms considered in it on the realistic underwater scenario.
Page 47
access control problem have been proposed. This thesis classifies the existing schemes depending
upon different properties such as type of hierarchy, key derivation method, the range of
applications, etc. A comparative analysis of some prominent schemes is presented. Attacks are
proposed on an existing scheme due to Yang and Li. A modification is proposed to avoid the
attacks and improve the efficiency of the scheme. The modified scheme is proved to be secure
using a security model proposed by Wu and Wei. A countermeasure is proposed to overcome an
attack on an existing time-bound scheme due to Tzeng.
Page 48
2005-2007
Page 49
technique shows an excellent coverage of catastrophic as well as a good coverage of parametric
faults, also the algorithm proposed locate the faults in resistive ladder and comparators. The area
overhead is very less in this techniques and it works on the circuit speed so, lesser test time.
Page 50
Author: Chudasma, Nrupen (200511011)
Title: Service Selection using WS-Agreement; ix, 54 p.; 2008.
Supervisor: Sanjay Chaudhary
Call No.: 658.562 CHU
Acc. No.: T00144
Keywords: Service-level agreements; Customer services; Performance -- Measurement.
Abstract: The business requirements are dynamic in nature and identification of suitable busi- ness partners
"on demand", who can satisfy a set of guarantees is a critical process. Selection of business
partners is influenced by several parameters including maximizing profit, minimizing cost,
reliability, credit history, etc. A business process can be decomposed into several tasks, possibly
expressed as Web services implementing desired business functionalities. Each service offers a set
of guarantees, each defining a Service Level Objective(SLO). Many service providers may provide
the similar business functionality in the form of service with different SLOs. Thus it is necessary to
select the service offered by service partner such that overall performance of the process is
improved.
The thesis proposes architecture for solving selection of the best service provided by available
service partners. To put across our approach, the thesis has taken examples from the Agro-
Produce marketing System. By specifying requirements of the service in the form of multiple
service level objectives (SLOs), selection of a service provider can be achieved based on the best
or optimal matching of SLOs of service consumer and providers. A set of services, SLOs, and
participating actors constitute a Service Level Agreement (SLA). In this work, WS-Agreement
specification is used to specify the SLA. For flexible selection, role of semantic web concepts such
as ontology and semantic rule language is discussed. The service partner must comply with the
multiple criteria and preferences of a requester, Multi Criteria Decision Making (MCDM) methods is
required in the service selection process.
Two scenarios for service selection from Agro-Produce market system are taken. One is single
service selection where selection of sellers selling mangos are selected based on the best seller
offered. Second one is related to service composition where more than two services need to be
selected, such that overall process performance is improved. The scenario is from rice production
process where selection of farmer, rice-miller, storage provider and transporter contribute to
overall cost, quantity and quality of rice.
Page 51
between area, power and timing. Multi-supply voltage feature of the synthesis tool is exploited to
meet the timing closure of the generated processor core.
Page 52
Author: Goyal, Shweta (200511001)
Title: Design and Development of an Ontology for an Agriculture Information System; viii, 74 p.; 2007.
Supervisor: Chaudhari, Sanjay
Call No.: 025.06631 GOY
Acc. No.: T00103
Keywords: Information storage and retrieval systems - Agriculture Science; Agriculture science -- India –
Databases; Agriculture -- Research -- Information services; Information integration; Ontology
application; Ontology; Ontologies (Information retrieval); Expert systems (Computer science);
Information resources management; Agriculture--Information services; Database design;
Database management; Conceptual structures (Information theory); Knowledge representation
(Information theory); Semantic networks (Information theory).
Abstract: Traditional sources of information like books, agricultural extension officer are unable to provide
specific information required by a farmer. There is a need to build an ontology based agriculture
information system which can provide scientific, relevant and contextual information about various
aspects of crop production cycle.
The aim is to develop a domain dependent ontology that will cover various aspects of crop
production cycle. AGROVOC vocabulary developed by Food and Agriculture Organization is used
for indexing and retrieving data in agricultural information systems. In the proposed research
work, AGROVOC is used as base vocabulary to develop the proposed ontology (AGRIont). The
ontology is developed by using open source tool Prot´eg´e 3.2. The ontology developed serves as
a building block to an agriculture information system that answers the farmer’s queries in their
own native language and helps them in making decisions about various aspects of crop production
cycle.
In this work, stages of ontology development, structure of ontology developed, architecture, query
flow and process of query formulation for the proposed system are discussed in detail. At the end,
guidelines to build an ontology, conclusions and future work are given.
Page 53
Author: Gupta, Amit Kumar (200511039)
Title: CMOS Latched Comparator Design for Analog to Digital Converters; v, 32 p.; 2007.
Supervisor: Parikh, Chetan
Call No.: 621.39732 GUP
Acc. No.: T00128
Keywords: Analog-to-digital converters; Digital-to-analog converters; CMOS (Electronics); Microwave
integrated circuits--Design and construction; Microwave equipment Circuits; Complementary metal
oxide semiconductor; CMOS (Metal oxide semiconductor, Complementary); Linear integrated
circuits.
Abstract: Conventional comparators are at the two extremes as far as power delay product and isolation
between input and output is concern. Either they achieved very good isolation at the cost of power
in the preamplifier or save the static power dissipation in preamplifier in the latching mode which
increases the feed through. In this thesis work we propose an optimized CMOS Latch Comparator.
The simulation result based on .18um technology, shows the working of the comparator at 500
MHz, with moderate power delay product and isolation compared with the conventional
architecture.
Page 54
Author: Gupta, Navneet (200511028)
Title: ASIC Implementation of Discrete Fourier Transform Processing Module; iv, 54 p.; 2007.
Supervisor: Dubey, Rahul
Call No.: 621.3815 GUP
Acc. No.: T00121
Keywords: Fourier – introduction; Fourier transformations--Data processing; Fourier analysis--Data
processing; Laplace transformation; Fourier series; Discrete fourier transform; Fourier Transforms;
DFT and FFT Processing; Integrated circuits; ASIC; Application specific integrated circuits -- Design
and construction; Application specific integrated circuits.
Abstract: This work presents the design and ASIC implementation of Discrete Fourier Transform Processing
Module. The performance of designed DFT processing module is better than radix-2 and radix-4
FFT algorithms, and is comparable to Split radix FFT algorithm, in terms of computational
requirements. Different architectures are proposed for DFT processing module, and their
comparative analysis is done. ASIC implementation of Discrete Fourier Transform processing
module includes, its modelling using Verilog HDL, gate level synthesis of the modelled design and
physical synthesis of netlist generated by gate level synthesis. The functionality of Design after
physical synthesis is verified. Designed DFT processing module is retargetable and can be used as
an IP.
Page 55
Author: K. Ravisankar, (200511013)
Title: An Investigation of Low Power Design of Left-Right Leap Frog Array Multiplier; ix, 56 p.; 2007.
Supervisor: Nagchaudhari, Dipankar
Call No.: 621.395 RAV
Acc. No.: T00112
Keywords: Low voltage integrated circuits; Low voltage integrated circuits--Design and construction; Low
voltage systems--Design and construction; Linear integrated circuits--Design and construction;
Linear integrated circuits; Electronic circuit design.
Abstract: This thesis addresses the Low Power design of 12 bit LRLFAM at the Layout, circuit and logic
levels. A new Low power Booth-Recoder (BR), and Multiplexer based partial product generated are
designed using pass-Transistor logic. Several 1-Bit full adders are studied: Transmission gate,
10T, 14T, 16T, Multiplexer based and 22T. Experiments show that all these adders produce
glitches when used in LRLFAM. A 22T adder is designed that best suits the LRLFA architecture.
Floor planning is done with minimum interconnect length has primary aim. LRLFA architecture
presented in the literature is modified to reduce the glitches and delay by adding sign extension
bits in later stages than in the first row. All the layouts are done using MAGIC 7.1 for TSMC 0.25u
technology. Simulations are done using L.T Spice.
Page 56
This work helps in preserving two main objectives of grid namely optimal resource utilization and
speedy computations which can be achieved by using resources in a better way for improving
performance of system rather than engaging them in tasks like rollbacks resulting from cascading
aborts. The saved state using checkpoints can also be used for job migration using job schedulers
of grid on occurrence of critical failures like Operating System failure. Experiments conducted
provide integration of proposed mechanism with standard grid Web Service Resource Framework
and will aid in future development work.
Page 57
Author: Nimmagadda, Rahul (200511033)
Title: Identifying Mutant Hierarchies to Reduce Test Effort in Mutation Testing; ix, 73 p.; 2007.
Supervisor: Kapoor, Kalpesh
Call No.: 005.14 NIM
Acc. No.: T00125
Keywords: Computer software – Testing; Testing techniques; Operation acceptance testing; Mutation testing
Fault based testing.
Abstract: Mutation testing is a fault-based testing approach. The main goal of mutation testing is to assess
the quality of a test suite, and in that process, test the software. The approach asserts the
absence of pre-specified faults. In mutation testing, a single syntactic change is made and the
resulting program is referred to as ‘Mutant’. The mutants obtained by making n syntactic changes
are known as nth-order mutants’. Mutation Testing is based on two hypotheses, (i) Coupling
Hypothesis assumes if a test suite can detect a first-order mutant from the original program, it will
detect most higher-order mutants, (ii) Competent Programmer Hypothesis assumes the program
to be tested is “close” to the intended program. Mutation testing is practically infeasible because
the number of generated mutants is myriad for each program. It is also resource intensive
requiring substantial amount of computation power and time to execute all the mutants against
the original program for a given test suite.
The objective of this thesis is two-fold. First, an empirical study is done to validate a formal
approach proposed [Kapoor, K and Bowen, J. P, 2004] to reduce the test effort required in
mutation testing. The formal approach orders the mutants in a hierarchy such that a mutant
occurring higher in the hierarchy is stronger than a mutant occurring lower in the hierarchy. If a
test suite can distinguish the original program from a stronger mutant, it is guaranteed to
distinguish any mutant occurring lower than the stronger mutant in the hierarchy. Second, the
concept of conditional strong mutant for relational operators is proposed which is a specialisation
of the strong mutant concept. It further reduces the test effort by identifying more number of
strong mutants through some constraints on the operands of the relational operators.
The savings obtained by using conditional strong mutants is more than that obtained by strong
mutants. There is a saving of 80% in the test effort required involving mutants generated by
invoking the Relational Operator Replacement (ROR) operator on conditions present in the branch
statements of a program. The analysis done applies to any program containing relational
operators in the conditions of branch statements.
Page 58
Author: Paluri, Santosh Kumar (200511015)
Title: Web Content Outlier Detection Using Latent Semantic Indexing; vii, 36 p.; 2007.
Supervisor: Jotwani, Naresh
Call No.: 006.312 PAL
Acc. No.: T00114
Keywords: Outliers (Statistics); Content analysis (Communication); Data mining; Web sites; Web databases;
Semantics; Semantics of Data; Semantic Database Models.
Abstract: Outliers are data elements different from the other elements in the category from which they are
mined. Finding outliers in web data is considered as web outlier mining. This thesis explores web
content outlier mining which finds applications in electronic commerce, finding novelty in text, etc.
Web content outliers are text documents having varying contents from the rest of the documents
taken from the same domain. Existing approaches for this problem uses lexical match techniques
such as n-grams which are prone to problems like synonymy (expressing the same word in
different ways), which leads to poor recall (an important measure for evaluating a search
strategy). In this thesis we use Latent Semantic Indexing (LSI) to represent the documents and
terms as vectors in a reduced dimensional space and thereby separating the outlying documents
from the rest of the corpus. Experimental results using embedded outliers in chapter four indicate
the proposed idea is successful and also better than the existing approaches to mine web content
outliers.
Page 59
Author: Patel, Animesh (200511006)
Title: Channel Quality Prediction And Localization; viii, 47 p.; 2007.
Supervisor: Jotwani, Naresh
Call No.: 621.38411 PAT
Acc. No.: T00108
Keywords: Wireless communication systems -- Security measures; Wireless communication systems; Wireless
LANs; Radio communication; Wave propagation and transmission.
Abstract: In this thesis we focus on two problems, Channel Quality Prediction and Localization in wireless
network. In High-Speed Downlink Packet Access (HSDPA) architecture of Universal Mobile
Telecommunications Services (UMTS), User Equipment (UE) provides Channel Quality Indicator
(CQI) values to Node B (base station), as an indication of current channel quality. We investigate
two methods for channel quality prediction, which can be implemented at Node B. Each of these
methods uses recent CQI values to predict future channel quality, i.e. future CQI values.
Experiments are conducted in different environments, to check accuracy of these methods and
found that the simple method using Least-Squares Line gives as good results as the complex
method using Spline. Packet schedulers can be developed which uses predicted CQI values for
scheduling. Cellular networks are used for localization where the UEs are located by measuring the
signal traveling to and from a set of fixed cellular base stations (Node B). We propose a Markov
Chain Model, which can be used as supplement to Angle of Arrival (AOA) method which is used for
localization. Sector-specific information with recent CQI values and information about angle of
arrival of signal can be used to estimate UE’s location using proposed model, in UMTS network
supporting HSDPA architecture.
Page 60
The Exponential Scheduling Algorithm, proposed in literature, is a good candidate to provide
bounded delays when QoS requirements are speci‾ed in terms of maximum tolerable delays, but
the investigations in this thesis show that it fails to provide delay bounds when it is still possible
with some trade-o® with system throughput and sometimes not even that.
The thesis proposes Delay Sense-Exponential Scheduling Algorithm, a variant of Exponential
Scheduling Algorithm, to improve on the delay bounds provided by Exponential algorithm. The
simulation results ensure that the new proposed algorithm improves on providing delay bounds to
the Real Time (RT) services simultaneously providing comparable throughput to Non-Real Time
(NRT) services. The proposed algorithm is studied under wide range of scenarios including NRT,
RT and mixture of NRT and RT services.
Page 61
generated the test data synthetically by the Hierarchical Synthetic Data Generator, which
appropriately models the customer behaviour in the retailing environment. Experimental Results
show that there is higher correlation between the antecedent and consequent of the rules
produced by the supportconviction framework compared with the rules produced by support-
confidence framework. Although support-conviction framework mines the effective associations
but the association rules generated are large in numbers that are difficult to deal with. To
overcome this problem, we propose an association rule pruning algorithm, which produces non-
redundant and significant rules. Results obtained with synthetic data show that the proposed
approach for mining association rules is quite effective and generates meaningful associations
among the sets of data items.
Page 62
Author: Singhal, Deepti (200511030)
Title: A Fair Downlink Packet Scheduling Approach to Support QoS in HSDPA Environment; ix, 69 p.;
2007.
Supervisor: Jotwani, Naresh
Call No.: 621.3845 SIN
Acc. No.: T00123
Keywords: UMTS; Multimedia Telephony; Data transfer technique; Wireless communications networks;
Telecommunication--Traffic—Management; Asynchronous transfer mode.
Abstract: Traditionally, only best-effort traffic is supported by packet switching networks, but newer
applications need communication services that allow end client to transport data with performance
guarantees given in terms of data transfer reliability, available bandwidth and delay bounds. The
choice of the packet-scheduling algorithm to be used at switching nodes is very crucial to provide
the Quality of Service, QoS.
This work aims at designing a downlink packet scheduling approach to QoS provisioning in High
Speed Downlink Packet Access, HSDPA, based UMTS networks. In UMTS a single logical channel is
shared among multiple contending users. Besides better link utilization, scheduling disciplines
seek to achieve fair allocation of this shared resource. However, these two criterions can
potentially be in conflict. In this work a scheduling discipline, \Wireless Fair - High Speed
Scheduling", is proposed, which addresses the above-mentioned conflict. The idea is to allocate
the channel fairly among users, even during short time scales, according to their data rate
requirements.
The proposed algorithm is compared with Adaptive Proportional Fair Algorithm, which provides fair
distribution of channel bandwidth, proportional to the data rate requirements of users. Several
experiments were conducted using simulation for comparing the performance of the algorithms in
different scenarios. The results ensure that the proposed scheduling algorithm provides better link
utilization, and long-term and short-term fairness among users even in heavy load conditions.
Page 63
Page 64
2006-2008
Page 65
topology, with a novel active inductor using a low-voltage gyrator topology with a feedback
resistance, where feedback resistance is realized by a NMOS operating in triode region whose bias
voltage tunes the inductance of the active inductor and hence the frequency of VCO. The
simulation results shows that this VCO operates in a 1.19 GHz to 2.49 GHz , while consuming 1.09
mW from a 1.2V power supply. The VCO’s phase noise level is -86.9 dBc/Hz at 1 MHz offset from
a 1.55 GHz carrier. The deviation of the phase noise is 11.5 dBc/Hz during this tuning range. All
the circuit simulations of VCO were simulated in SpectreRF using TSMC 0.18µm CMOS technology.
Page 66
to decrease the power dissipation. The current mode sensing technique is proposed to give the
small voltage swing on the bit lines during write operation. In the proposed method the layout and
simulation is done for the one bit line pair for three different methodologies. The bit line
interference of selected cell with adjacent selected and non selected cell is also checked out. The
proposed current conveyor method has shown an improvement in terms power dissipation over
the voltage write and current read (VWCR) and current write and current read (CWCR) method
without comprising the performance.
Page 67
Author: Ch. Uday Kumar (200611027)
Title: A 1.5V. 2.4GHz Highly Linear CMOS Down conversion Mixer; x, 50 p.; 2008.
Supervisor: Parikh, Chetan D.
Call No.: 621.38412 KUM
Acc. No.: T00164
Keywords: Integrated circuits; Radio frequency; Metal oxide semiconductors, Complementary -- Design and
construction; Low-voltage integrated circuits; Microwave integrated circuits; Microwave integrated
circuits -- Design and construction; Very high speed integrated circuits.
Abstract: In the tremendous growth of wireless handheld devices, low power consumption becomes a major
consideration in radio frequency integrated circuit (RFIC) designs. This thesis explores low voltage
low power RFIC design for CMOS mixer through their applications in a RF front-end transceiver.
A highly linear CMOS down-conversion mixer is designed to operate at 1.5V for single battery
solution. Mixer perform frequency down-conversion from a 2.4GHz radio frequency (RF) input
signal to a 100MHz intermediate frequency (IF) output signal. The mixer circuit has been
simulated in TSMC 0.18µm CMOS technology. Low voltage operation is achieved by using a folded
cascode topology. The mixer uses a wide range constant gm cell at input RF stage to increase the
linearity (IIP3) performance. The proposed mixer has 0.92dB conversion gain, 17.7dB noise
figure, 3.08 1 dB compression point (P-1 dB), 13.8dBm third-order input intercept point (IIP3) and
consumes 8.1mW DC power at 1.5V supply voltage. The design ensures that all the transistors
remain in saturation, and mixer does perform satisfactorily for +/-50mV variation of the threshold
voltage from the nominal value for both NMOS and PMOS transistors. The mixer is simulated for
+/- 50mV threshold voltage variations for both NMOS and PMOS transistors. Temperature effects
on this circuit were also investigated.
Page 68
functional requirements. For satisfying non-functional requirements of a service consumer, policy
is used in Web service selection phase. This thesis proposes an approach and architecture to
select Web services based on WS-Policy in grid. Service selection depends on metadata and
policy. There is a need for dynamic selection services based on runtime environment such as
content (semantics), and contract (policy). This thesis proposes an approach and architecture for
dynamic selection of services based on policy and semantic .To provide better search, query,
composition, and management, there is a need for mechanism to group these services based on
the requirements of clients and business processes. This thesis proposes context and location
based approach for service grouping and group notification. Context and location provide powerful
mechanism for the better search, query, grouping and group notification to the services, and it
allows customization based on user preferences, role, and location to improve personalization. The
thesis proposes context and location driven grid business process to aggregate information from
multiple sources according to the preferences of clients. A policy based service grouping approach
is used to aggregate services. For achieving location driven approach, this thesis develops virtual
organization and for specifying preferences in virtual organization, a policy is used.
Page 69
Author: Gupta, Akshay Kumar (200611005)
Title: Low Cost Design of IFFT module for Dolby AC-3 Decoder; vii, 45 p.; 2008.
Supervisor: Dubey, Rahul
Call No.: 621.38932 GUP
Acc. No.: T00149
Keywords: Sound -- Recording and reproducing -- Digital techniques – Standards; Data compression
(Computer science) Data compression (Telecommunication) -- Standards.
Abstract: Dolby AC-3 is a flexible audio data compression technology capable of encoding a range of audio
channel formats into a low rate bit stream. AC-3 is the de facto audio standard for high-end digital
consumer multimedia equipment. In this thesis work we have implemented 8 point FFT module
using radix-2 algorithm. This work also shows the implementation of 128 point IFFT module using
split radix algorithm.
Page 70
Author: Kalariya, Vishalkumar Ramshbhai (200611016)
Title: Multi Band Fractal Antenna For Satellite Application; ix, 40 p.; 2008.
Supervisor: Gupta, Sanjeev
Call No.: 621.38254 KAL
Acc. No.: T00155
Keywords: Antenna design; Microstrip antennas; Ultra-wideband antennas; Adaptive control; Wireless
communication systems; Satellite communication; Spacecraft antennas; Communication networks.
Abstract: Fractal Antenna is the current topic for the research engineering because Fractal Technology allow
us to design miniature antennas and integrate multiple band in single device. This antenna is a
type of Micro strip antenna so it can be mount on the same PCB on which other RF components
are mounted. There is not exact method to predict the resonance frequency of the Fractal
antenna. Current research work tell that the prediction of resonance frequency of the Antenna is
made from the simulation result. But in this work we try to predict the resonance frequency by
mean of Network connection method. In this method each small segment of fractal shape antenna
is treated as the single square patch and by analysis the separate patch and combing the total
impedance by mean of Network connection method and the prediction of the resonant frequency
is done by this thesis work.
By using the Cavity model approach we find the impedance of the separate patch and by the
Network connection model approach we can combine the total resistance and find the input
impedance of the fractal antenna and we are trying to design the Multi band Fractal antenna for
the L band(1.4GHz), C band(5.35GHz) and last is X band(9.65GHz) which is resonating at three
band of frequency by this method.
Page 71
Author: Narmawala, Zunnun A. Raoof (200611007)
Title: Network Coding based Multicast in Delay Tolerant Networks; viii, 50 p.; 2008.
Supervisor: Srivastava, Sanjay
Call No.: 004.6 NAR
Acc. No.: T00151
Keywords: Computer networks – Reliability; Computer network protocols.
Abstract: Delay Tolerant Networks (DTN) are sparse ad hoc networks in which no contemporaneous path
exists between source and destination most of the time. In DTN, connectivity graph of the network
changes over time either due to mobility or sleepwakeup cycles of the nodes. Mobile Ad hoc
Network routing protocols such as AODV, DSR etc. fail in such scenario because they try to find
end-to-end path before data transmission which is non-existent in DTN. So, routing protocols
proposed for DTN follow ‘store-carry-forward’ paradigm in which two nodes exchange messages
with each other only when they come into contact. In the process, ‘Single-copy’ schemes maintain
only one copy of the message in the network at any time while ‘Multi-copy’ schemes spread more
than one copy of the message. While Multi-copy schemes improve chances of delivery,
communication overhead and buffer occupancy are quite high for these schemes. We propose
Multi-copy routing protocol for multicasting in DTN called “Multicast In Delay TOlerant NEtworks
(MIDTONE)” which uses ‘Network coding’ to reduce this overhead without impacting the
performance. Network coding is a mechanism in which nodes encode two or more incoming
packets and forward encoded packets instead of forwarding them as it is. We also propose a novel
packet purging scheme which takes advantage of features of network coding to increase buffer
efficiency. As simulation results suggest, our protocol achieves significantly less delay to deliver all
the packets in infinite buffer case and higher delivery ratio in finite buffer case compared to non-
network coding based Multi-copy scheme.
Page 72
analyzed and applied to the proposed multi-standard receiver architecture. Low-IF architecture is
chosen for both Bluetooth and IEEE 802.11a WLAN, respectively. The system specifications and
the building block specifications is derived from the corresponding standards and verified by
spreadsheet models taking into account of major design issues such as image-rejection, intercept
points, noise figure and gain. The simulation results prove the validity of the system analysis and
the proposed multi-standard receiver architecture.
Page 73
cluster heads. Routing of data is done in multi-hop fashion to ensure that the most remotely
located node is also able to communicate with the base station through the best available
intermediary nodes.
Page 74
Author: Rawat, Nitin (200611025)
Title: FPGA Implementation of Image Compression Algorithm Using Wavelet Transform; xi, 60 p.; 2008.
Supervisor: Dubey, Rahul
Call No.: 621.3670151 RAW
Acc. No.: T00162
Keywords: Image compression; Image processing; Wavelets (Mathematics) Image processing – Mathematics;
Image compression – Mathematics; Image transmission; Data compression (Computer science).
Abstract: This work presents FPGA implementation of image compression algorithm by using wavelet
transform. Here the emphasis has been made on algorithmic encoding, the first step of image
compression problem. The transform that has been used for algorithmic encoding is the „Discrete
Wavelet transform‟. The Wavelet family which has been used for this purpose is the „Haar
Wavelet family‟. Various issues involved in hardware implementation of Wavelet Transform such
as fractional interpretation, signed Q-format, range of gray scale values, memory requirement and
addressing schemes have been discussed. A functional unit has been proposed which calculates
the Wavelet transform of input pixel values. An efficient use of „Block RAM‟ present in FPGA has
been proposed by placing the initial pixel values and then placing the computed Wavelet transform
values back in this memory itself. A suitable way to tackle the issue of storing intermediate
wavelet transform values by using a buffer memory has been suggested. This removes the need
of having an external memory and thus the time required in accessing this memory reduces
drastically. A special emphasis in order to use this memory in accordance with the requirement of
image processing algorithms has been made by deriving the necessary addressing schemes. This
is done in order to have the correct placement of transformed values in memory. Here we have
used the Dual port feature of the Block RAM with one port providing multiple pixel values to the
functional unit and other being used to write transformed values one at a time. Along with this,
the DCM available in FPGA has been used to address issue of skew and „set up time‟ involved
with the clocks in digital design. A delayed version of system clock is sent to memory so that all
addresses and enable signals calculated with reference to system clock are stable when active
edge of clock is received by memory. All these modules are incorporated in a top module which
provides the Wavelet transform of an image. The modelling of the architecture has been done by
using Verilog Hardware Description Language and the functional simulation has been done by
using Xilinx ISE Simulator. The synthesis of the design has been done by using Xilinx Synthesis
Tool (XST) of Xilinx. The total amount of the resources being utilized is reported and it comes out
well within reach of Spartan 3E FPGA, our target device. The maximum clock frequency which can
be used for the design comes out to be 23 MHz which is quite high for a compute intensive
algorithm like Discrete Wavelet Transform.
Page 75
Author: R. Ramesh (200611011)
Title: Design Of Low Voltage High Performance Voltage Controlled Oscillator; ix, 48 p.; 2008.
Supervisor: Nagchoudhari, Dipankar and Mandal, Sushantha Kumar (Visiting Faculty)
Call No.: 621.38412 RAM
Acc. No.: T00153
Keywords: Oscillators, Electric; Electronic circuit design; Radio frequency oscillators -- Design and
construction; Low-voltage integrated circuits; Amplifiers (Electronics) Phase-locked loops;
Metal oxide semiconductors, Complementary; Electronic circuits – Noise; Radio circuits; Electronic
circuits.
Abstract: In this thesis an ultra low voltage differential capacitive feedback VCO is being proposed .The VCO
operates at very low supply voltage of 0.6V.The VCO uses techniques like Forward Body Bias
(FBB), and capacitive feedback to achieve high performance in terms of phase noise and output
voltage swing. It uses differential MOS varactors for frequency tuning due to which all low
frequency noise such as flicker noise gets rejected. Inductor was designed and it was simulated in
IE3D electromagnetic simulator to achieve good Quality factor. This VCO achieves a very low
phase noise of -119dBc/Hz@1-MHz offset frequency, power consumption of 3.27mW, and tuning
range of 6% .All the circuit simulations of VCO were simulated in SpectreRF using TSMC 0.18µm
CMOS technology.
Page 76
mathematical equations of the parameters L,C and efficiency e of network before and after adding
the long radio range node in a square grid network.
Page 77
many models have been proposed to analyze MANETs. Many of then have an unrealistic
assumption of an infinite buffer in each node. Moreover, in MANETs, as nodes are mobile, a packet
may revisit the same node which creates feedback loops of a packet. These loops make modeling
and analysis of MANETs difficult as the network becomes cyclic.
This work analyzes MANET with finite buffer nodes. Open finite queuing network with gated queue,
intermittent links and servers is used. The expansion method technique has been used to study
the open finite queuing network with stable links and servers. We modify the method for
intermittency. Numerical results are derived and compared with simulation results to show
effectiveness of the method.
Page 78
structure of a Bayesian network, including techniques for learning with complete data also. We
relate Bayesian network methods for learning, to learn from data samples generated from the
operating system scheduling environment.
The various results produced, tested and verified for scheduling algorithms (FCFS, SJF, RR and
PW) by an Operating System Scheduling Simulator implemented in programming language JAVA.
Here, the given code is modified according to requirements and fulfilling the necessary task.
Page 79
for a special type of binary tree into its optimal hypercube. We also present embedding of
generalized ladders as subgraph into the hypercube. Through an embedding of caterpillars into
generalized ladders, we have obtained an embedding of a class of caterpillars into their optimal
hypercube.
Page 80
Author: Vasavada, Tejas (200611026)
Title: Effect of Channel Asymmetry on Reputation based Cooperation Mechanisms in Mobile Ad-hoc
Networks; viii, 52 p.; 2008.
Supervisor: Srivastava, Sanjay
Call No.: 621.38216 VAS
Acc. No.: T00163
Keywords: Peer-to-peer architecture (Computer networks); Computer network architectures; Cryptography;
Computer security; Signal processing -- Digital techniques; Radio -- Transmitters and transmission
– Fading; Modulators (Electronics) Digital communications;
Mobile communication systems.
Abstract: Enforced cooperation among MANET nodes is an active research issue. In applications, where the
users have different goals and there is no central authority to control them, users may become
selfish. These nodes may not forward packets sent by others and thus affect the basic
functionality of the network.
One proposed class of protocols to handle such scenarios is based on reputation functions. In
reputation based schemes, nodes maintain reputation values of other nodes. Reputation value of a
node is high for nodes that forward the received packets and low otherwise. Nodes with very low
reputation values are identified as selfish nodes and isolated from network operations.
In such schemes, every node has to observe whether its neighbour is forwarding packets or not. A
node after sending a packet to its neighbour to forward further, increases reputation of neighbour
if it overhears the same packet from the neighbour. If it does not overhear the packet, reputation
of neighbour is reduced. This is the basic method to observe whether neighbour node is
cooperative or not. Here basic assumption is that the channel between two neighbour nodes is
always symmetric. This assumption does not hold true due to two reasons: (1) Nodes are moving.
Neighbour node may have forwarded the packet but by the time it forwards, either observing node
or neighbour or both might move out of each others range. (2) Even if both are in each others
range, due to multipath fading, observing node may not overhear the packets forwarded by
neighbour node. Thus sometimes even honest nodes may be considered selfish and isolated due
to this asymmetry. This reduces throughput of honest nodes.
In this thesis work we have examined the probability of channel asymmetry as a function of ratio
r(of inter node distance and transmission range), for given values of relative average velocity of
nodes V and Ricean parameter K. Ricean parameter K represents type of the environment i.e.
obstructed or unobstructed. We have proposed an enhancement of existing reputation protocol
OCEAN. In the enhanced protocol, observing node probabilistically updates reputation of
neighbour when it does not overhear. This probabilistic update takes into account probability of
channel asymmetry. We have tried to minimize false positives, i.e. honest nodes being detected
as selfish. We have shown through simulations that false negatives, i.e. selfish
nodes being detected as honest, do not increase much. We have also shown that how false
positives and false negatives change as degree of dishonesty of selfish nodes change. At last, we
have shown that throughput levels of honest nodes in original OCEAN protocol and modified
OCEAN protocol are almost same.
Page 81
A fully differential, CMOS variable gain amplifier (VGA) has been designed for a 1.2- volt, low-
power, 57-dB dynamic range, and high bandwidth. The VGA comprises of a control circuit, variable
gain stages with common-mode feedback circuit. The gain of the VGA varies dB-linearly from -32
to 25 dB with respect to the control voltage, VC. Proposed VGA uses common-mode feedback
(CMFB) circuit to fix and stabilize the output DC levels at a particular voltage depending on the
input common-mode range (ICMR) requirement and output swing of the VGA. The proposed VGA
uses capacitive neutralization technique to achieve high bandwidth operation. This VGA draws
1.25 mA current from a 1.2 V supply. The 3-dB bandwidth varies from 110 MHZ (at 25 dB gain) to
3828 MHz (at -32 dB gain). The proposed VGA is simulated for 0.18µm CMOS technology in LT-
Spice with BSIM3V3 model.
Page 82
M. Des. Projects
(Abstracts)
2004-2006
Page 83
Author: Saraswat, Manish (200414005)
Title: Re-telling panchatantra: an attempt to rediscover the relevance of panchatantra tales in today’s
society; ix, 34 p.; 2006.
Supervisor: De, Kuntal and Sarkar, Aditi Nath
Call No.: 398.24520934 AGA
Acc. No.: T00135
Keywords: Fables, Indic; Tales—India; Fables of Bidpai; English; Panchatantra Fables; Indic -- History and
criticism; Politics in literature.
Abstract: Current trends in the field of education show people's high motivation 10 take up initiatives for
their children to get them educated through the new medium of computer based learning.
Teaching and learning practices are taking new shapes with the development of" new medium of
communication. This medium allows the children to learn on their own, in a way that engages
their interest. The acceptance of this form of education is achieved by the integration of essential
social values and the roots of Indian heritage with all the disciplines taught to the children as they
are seen vital to develop the skills and knowledge sets which primary students lack due to the
excessive lime spent with computers in the name of education.
Moreover this new medium is open to exploration, and since there is no guidance, the vulnerable
children do not understand where and at what point they arc learning and when (hey need to
slop; it can be said that this medium is not without its pitfalls.
This medium also has another side effect; that it alienated the children from their grand parents
and the traditional way of story telling as a form of learning.
Thus there is a need for design that instructs the child sifting on a computer to learn about the
real world in a form which uses the capabilities integrating the old methods of story telling with
the newer more exciting digital media that (he children are drawn to and enjoy.
Page 84
Notes
• The film uses the vaahan of the Mother Goddesses of Gujarat as metaphor to
communicate the importance of vehicle in everyday life.
• The film is presented as folklore. It uses folk art -mata ni pachedi as the visual treatment
and folk music - daayaro as background sound.
Page 85
Page 86
2005-2007
Page 87
Author: Kumawat, Sumit (200514002)
Title: Pichhvai ke pichhey; 48 p.; 2007.
Supervisor: Mazumdar, Madhumita and Gupta, Anirban Dutta
Call No.: 751.709544 KUM
Acc. No.: T00137
Keywords: Textile painting -- India – Rajasthan; Decorative arts -- India – Rajasthan; Textile fabrics -- India
– Rajasthan; Nathdwara.
Abstract: The Project is an attempt to explore beyond the evident. It imparts the knowledge about the
utilization of background that gives context to foreground.
The Art form of Picchvai (Painted backdrops of Nathdwara) as a specific technique of Visual
communication is chosen as the main research area. It explores the traditions and philosophy
associated with it in the context of Nathdwara.
The vast ethnographic work allowed broadening of the context and analyzing various other
popular visual and performative traditions of the region viz. Kathputli, Bhopaji ki katha, Ajooba,
Nathdwara Studio photography, etc. These traditions primarily use the background to create a
sense of darshan (spectacle) for the viewer. It further includes the contemporary mode of
communications such as Photography, advertisements, etc.
This knowledge has been imparted to the user through an (Hypermedia) interactive multimedia
CD ROM. The Hypermedia format allows the user to seek through the inter‟woven medias so as
to get a clear picture of the subject. It allows him/her to understand the complexities and
simultaneously apply the learning. Thus, it creates the space for the viewer where at one moment
he can be an observer while at another he is a performer.
Page 88
Author: Singh, Rashmi (200514004)
Title: Well of meanings: an insight into the step wells of Gujarat; 50 p.; 2007.
Supervisor: Sarkar, Aditi Nath; Gupta, Anirban Dutta; De, Kuntal; Mazumdar, Madhumita and Pandya,
Vishvajit
Call No.: 725.9 SIN
Acc. No.: T00140
Keywords: Stepwells--India—Gujarat; Water and architecture--India—Gujarat; Architecture, Hindu--India—
Gujarat; Sculpture, Hindu--India—Gujarat; Gods, Hindu, in art.
Abstract: Stepwells of Western India were often regarded as magnificent architectural solutions to the
seasonality of water supply in the region. But as this multimedia presentation will show, the
stepwells were much more than architectural wonders. They are laden with a whole range of
meanings which derive from historical myths, meanings, beliefs and practices of the people of the
region in which they were built. The presence of water in a stepwell made them the active focal
point in villages.
There was a time when these stepwell were used by the people for satisfying different
requirements. This made the presence of the stepwell inevitable in their lives. However, because
of the changes in climatic conditions, almost all of the stepwells are now dry, creating a distance
between the stepwell and the user as the real purpose of stepwells is being lost. The stepwells are
losing their original contexts with their real purpose and hence their importance in lives of people.
The Stepwells of Gujarat are becoming important subject of public attention in recently. Their
importance as site of water management is being complimented by appreciating their potential as
attractive sites for cultural tourism in Gujarat. Stepwells are unique feature of Gujarat. Their
distinctive style of architecture and ornamentation takes us to a new world of discoveries. At the
same time, the multitude presence of the stepwells in the western part of the country opens the
door of knowing their larger social and cultural contexts.
The focus of the project is to study the stepwell of Adalaj to understand larger social, historical
and cultural context and then make sense of the multiple cultural meanings attached to these
wells in Gujarat. Since the Adalaj stepwell does not stand in isolation but there exist a number of
other stepwells in this region. Hence, through this thesis, an effort has been made to build up the
connection of the local context of the stepwell with regional.
Page 89
Page 90
2006-2008
Page 91
Author: Bhar, Rahul (200614008)
Title: Waterpoly: a learning game kit; 68 p.; 2008.
Supervisor: Raje, Nitin
Call No.: 333.9116 BHA
Acc. No.: T00191
Keywords: Soil science; Water conservation; Water conservation – Technique; Water harvesting – Technique;
Computer Aided Design.
Abstract: The title of my project is “Waterpoly” – A Learning Game Kit. The objective of my project is to
design an interactive computer aided training program to bring awareness of Water Conservation
methods for improving standard of living in rural India.
My product contains a Board Game and an Information CD.
The board game is based on simulation of agricultural inputs required to cultivate rice. This is to
arouse curiosity and provide an experienced based learning.
Another part of the project is the Information CD. The Information CD provides the information
regarding various water conservation methods used within the game and its related sub domains
like rainfall, soil, watershed etc. Detail description and implementation methodologies for water
conservation are also included in the CD as an extra level of knowledge.
Along with the information for the various water conservation methodologies, there is a game help
within the CD, to help a player to understand how to play a game and acts as a tutorial for the
game.
Page 92
Author: Kadam, Neha (200614004)
Title: Urban soundscapes: an exploration of why and how, we hear, what we do…; 49 p.; 2008.
Supervisor: Mazumdar, Madhumita
Call No.: 306.4842 KAD
Acc. No.: T00188
Keywords: Cities and towns; Urbanization; City and town life; Soundscapes Folk music -- India --History and
criticism; Music and globalization – Finland; Sounds in literature; Sound -- Recording and
reproducing -- Great Britain -- History -- 19th century; Speech in literature; Sound in literature;
Voice in literature; City and town life in motion pictures; Music -- 21st century -- History and
criticism; Music and technology; Popular culture -- 21st century.
Abstract: Urban soundscapes is a multimedia exploration of the forms, practices and habits of engaging with
sound in a contemporary urban Indian context. It focuses on the listening habits of a section of
the urban Indian youth and invites critical reflection on the choices they make in the selection and
enjoyment of the sounds that come to them through the mediation modern technology.
Put simply, Urban Soundscapes is both an exploration and reflection on why we hear what we do
as we live our lives in the complex sonic environment of the modern city.
It begins on the premise that the urban soundscape is not a random collection of sounds. Sounds
in the city come in forms, patterns, designs and shapes that are tied to dominant economic
structures and local cultural contexts.
It invites the user to explore this observation through four different points of entry through
technology, through the consumer, the music market and of course through the makers of music
themselves. The role of technology in creating a complex and evolving urban soundscape is
underscored by a focus on the particular forms, tastes, and habits of listening to music by a
dominant section of the urban Indian youth.
Based on both fieldwork and academic writings on the subject, this product tries to present a
complex cultural and social phenomenon in a format that tries to appeal to both the initiated and
informed. It can in a sense position itself as educational software that tries to complement serious
writing on the subject by putting together the constitutive elements of multi‟media on a digital
medium that is both attractive and affordable.
It does not in any way pretend to be either a comprehensive or definitive work on the subject. It
offers instead the possibility of generating a critical awareness of one’s social and cultural context
in a way that is both intelligible and entertaining.
Page 93
Author: Patel, Bhavesh (200614005)
Title: Moving canvases: truck as a new medium; 47 p.; 2008.
Supervisor: Sarkar, Aditi Nath
Call No.: 709.540905 PAT
Acc. No.: T00189
Keywords: Art appreciation; Trucks – Painting; Painting – Indonesia; Street art – Indonesia; Trucks –
Decoration; Automobiles – Painting; Trucks in art; Trailers in art; Visual communication -- Social
aspects; Art, India.
Abstract: The most common sight of daily life in India consists of the omnipresent truck that travels on the
highways all across the nation. For everybody on the road, truck is a commonplace sign of thriving
overland transport industry, and for many a momentary pause of appreciation of the wooden
structures on the wheels covered with clashing motifs. A striking vision on the roads of India is the
vision of truck covered in a riot of color and design. These monstrous vehicles are better known
for clogging traffic then for their aesthetic qualities. There are three million trucks in India.
Perhaps the biggest paradox of truck art is that despite its commonness most people do not
recognize it as art. Truck art like movie banners, advertising and posters, is a popular medium
that expresses the creators thoughts. It is a popular form of art that is self advertising and
propagating one, which has no single artist, which is regional yet universal, which is exposed to
masses.
I want to look in to the concept of usage of paintings and the decorations done on the trucks in
the specified domain of art. So through this project I want to show the importance of visual
representation in popular culture by focusing on the decorations done on the truck. It is anattempt
to go beyond the basic characterization of art and look in to how forms of art convey identity in
society through this mode of visual communication.
Page 94
Author Index
Page 95
Patel, Dhawal B., 25 Shenoy, Shakti Prasad, 11
Patel, Hima M., 41 Singh, Archana, 45
Patel, Jay, 41 Singh, Ram Sahay, 46
Patel, Komalben, 42 Singh, Rashmi, 89
Patidar, Pravin, 60 Singh, Vivek Kumar, 29
Pradhan, Pratik, 60 Singhal, Deepti, 63
P. Ranjith, 73 Sinha, Ajay Kumar, 79
Praveen, Asim Rama, 61 Soni, Maulik, 46
Purohit, Amit Gopal M., 42 Soni, Shraddha, 79
Purohit, Shakti Gopal M., 43 Srinubabu, G, 12
Rahi, Sajajd S., 10 Srivastava, Abhishek, 79
Raju, K., 61 Srivastava, Amit, 80
Rana, Deepika, 43 Srivastava, Anit, 80
Rao, A. Narayana, 43 Sudhi, K. Venkata, 29
Rao, Parth, A., 73 Suryanarayana, P. V., 29
Rathore, Akhil, 74 Swarnkar, Hemant, 46
Ravikanth, Sivangi, 74 Tandon, Dheerajm, 12
Rawat, Nitin, 75 Tandon, Manu, 47
Ray, Anuradha, 26 Tatawawadi, Prachi, 84
Reddy, M. Vivekananda, 26 Tatu, Aditya, 30
Reddy, Pandu Ranga M., 75 Thacker, Grishma D., 13
Reddy, S. Gangadhar, 27 Thakar, Lalitkrushna Jagdishchandra, 13
R. Ramesh, 76 Thomas, Shabu, 30
Saksena, Nitin, 10 Trivedi, Jigish S., 14
Saraswat, Manish, 84 Trivedi, Ronak, 47
Sattaru, Annamnaidu, 76 Ujawane, Anand, 67
Saxena, Nischal, 27 Upraity, Maitry, 63
Sejpal, Riddhima, 76 Vadnala, Praveen Kumar, 47
Shah, Daval Kiritbhai, 28 Vasavada, Tejas, 81
Shah, Hardik K., 10 Vege, Hari Kiran, 31
Shah, Hina Rajiv, 77 Verma, Aseem, 48
Shah, Malav, 44 Verma, Vivek, 82
Shah, Nishit H., 44 Vichare, Chirag Vishwas, 14
Shah, Parag, 45 Vij, Aditya, 48
Shah, Pratik P., 28 Vipprela Ravichander, 15
Shah, Sapan 77 V. Jayanthi, 81
Shah, Tejaskumar, 78 Upadhyay, Ankur, 82
Sharma, Abhishek, 78 Ujawane, Anand, 85
Sharma, Adarsh, 61 Uparaity, Maitry, 61
Sharma, Ashish Kumar, 11
Sharma, Swati, 62
Page 96
Supervisor Index
97 Page 97
Subject/Keyword Index
Page
99 99
Subject/Keyword Index
Page
100 100
Subject/Keyword Index
Page
101 101
Subject/Keyword Index
Implements utensils etc. India, 65, 83 Low voltage systems-design & construction, 56
Implements utensils etc India Gujarat, 65 Machine learning, 78
India-Rural conditions, 68, 87 Marketing-India, 68, 87
Indian cookery, 69, 88 Marketing – Statistical methods, 82
Indian cookery-Gujarat, 69, 88 Mathematical optimization, 49
Indic-History and criticism, 66, 84 Memory management (computer science), 74
Infants-Rehabilitation-study and leading, 91 Memory (Computer science), 46
Inference, 78 Memory (computers) semiconductor devices, 70
Information integration, 52 Metal oxide Semiconductors, 34
Information resources management, 52 Metal oxide semiconductors,
Information storage & retrieval systems- Complementary, 34, 38, 43, 46, 58, 65, 72, 73,
Agricultural science, 53 76, 81
Information technology, 82 Metal oxide semiconductors-Design, 74
Integrated circuits, 23, 41, 55, 66, 68, 69, 72 Metal oxide semiconductors, complementary—
Integrated circuits--Very large scale, 48 Design and construction, 65, 68, 81
Integrated circuits-Testing, 59 Metal oxide seminconductor field effect transistor,
Integrated circuits-very large scale integration, 66, 81
81 Microprocessors, 66
Integrated circuits-very large scale integration- Microprocessors – Design, 79
design and construction, 65, 73 Microprocessors-design & construction, 50, 51
Integrated circuits--Very large scale integration— Microphone array, 14
Testing, 44 Microphone Radio engineering, 14
Integrated receiver, 11 Microstrip antennas, 19, 71
Intelligent agents, 24 Microstrip Antennas—Design, 17, 19
Internet, 2, 17, 39 Microstrip patch antenna, 17
Internet and scheme, 39 Microwave, 23
Internet protocol, 12 Microwave antennas, 15, 17, 19
Internet security, 5 Microwave equipment circuits, 54, 63
Internet service pricing, 39 Microwave integrated circuits, 68
Internet service provider, 39 Microwave integrated circuits-design &
Internet users, 39 construction, 54, 63
Internet--Computer programs, 39 Middleware technologies, 7
Intrusion detection system, 24 MIMO (Multiple Input Multiple Output), 11
J2EE (Computer programming language), 20 MIMO Communication system, 21
JDO (Java Data Object), 20 MIMO systems, 69
Kalman, 46 Mobile agents (Computer software), 24
Kalman filtering, 35, 49 Mobile agents system, 24
Key assignment scheme, 47 Mobile Ah-hoc networks, 15, 42, 57, 77
Kites, 65, 83 Mobile communication, 11
Kite flying-India, 65 Mobile communication system, 11, 57, 60, 68, 71,
Kites-juvenile literature, 65, 83 81, 82
Knowledge management technique, 29 Mobile computing, 57
Knowledge representation (Information theory), 53 Mobile service, 5, 10
Laplace transformation, 55 Mobility layer, 7
Language identification, 39 Model based distributed systems, 40
Large scale integration, 70 Modeling-computer programs, 68
Linear integrated circuits, 54, 56, 63 Models theoretical, 53
Linear integrated circuits- Modulation (Electronics), 69
design & construction, 54, 56, 70 Modulator, 10
Localization, 55 Modulators (Electronics), 36
Logic circuits-Design and construction, 73 Modulators (Electronics) Digital Communications,
Low noise amplifiers, 42 81
Low noise amplifiers technique, 42 Modulators and demodulators, 36
Low voltage integrated circuits, 56, 61, 65, 66, 68, Monitoring and discovering computer system, 43
69, 72, 76, 81 MPEARLE, 8
Low voltage integrated circuits- MPEG, 2
design & construction, 50, 52, 56, 73 MPEG (video coding standard), 75
Low voltage system, 52 MPI-Parallel and distributed programming, 26
Page
102 102
Subject/Keyword Index
Page
103 103
Subject/Keyword Index
Page
104 104
Subject/Keyword Index
Page
105 105