P. G. Poonacha

Learn More
One of the main challenges in Machine Type Communication (MTC) services in the 3GPP LTE networks is to improve device power efficiency for Machine to Machine (M2M) communication. We consider MTC application scenarios which consist of a number of devices connecting to the network concurrently. The methods considered in TR 37.868 involve Disjoint Allocation(More)
In this paper we compare analog to digital conversion (ADC) delay in Hopfield ADC and asymmetrical (lower triangular) neural network-based ADC due to Avitabile et al. (1991). It is shown that, although Hopfield ADC has extensive feedback, its behavior in asynchronous mode is similar to that of lower triangular ADC. It is also shown that any constant delay(More)
Embedded zerotree of wavelet coef ic ient ( E Z W) algori thm has become a n efSective way of compressing images. T h e use of multistage vector quantizer ( M S V Q ) provides successive-approximation coding f o r vectors. A n e w algorithm i s proposed tha t provides good quality of reconstructed images at very low bit rates. T h e algorithm uses(More)
This paper presents a joint strategy for parameter estimation of Markov Random Field (MRF) model and image restoration. The proposed scheme is an unsupervised one in the sense that no a priori knowledge of the actual image is assumed. The technique of homotopy continuation method is employed to estimate the model parameters. The model considered involves(More)
In this paper, we present an alternate approach to estimate the parameters of a Markov random field (MRF) model for images using the concepts of homotopy continuation method. We also develop a joint parameter estimation and image restoration scheme where we have used a fairly general model involving the line fields and tested on a real image. Simulation(More)
Robust automatic modulation recognition techniques are in demand for software defined radios and cognitive radio receivers in general and Communication Intelligence (COMINT) applications such as signal interception for mobile communication, defense, civil authority and surveillance in particular. It is also the key for threat analysis. Many algorithms have(More)
Machine-to-machine (M2M) communication is a crucial service for the next generation of cellular networks. Massive access request from machine devices can impose overloading problem for radio access networks (RANs) and degrade the service quality of M2M communication. In an earlier work we had investigated the performance of two possible RAN overload control(More)