Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2010"
Now showing items 1-20 of 51
-
Active Reactive Induction Motor - A New Solution For Load Commutated SCR-CSI Based High Power Drives
(2013-05-28)This thesis deals with a new solution for medium voltage drives. Load Commutated Inverter (LCI) fed synchronous motor drive is a popular solution for high power drive applications. Though the induction machine is more ... -
Acyclic Edge Coloring Of Graphs
(2013-10-07)A proper edge coloring of G =(V,E)is a map c : E → C (where C is the set of available colors ) with c(e) ≠ c(ƒ) for any adjacent edges e,f. The minimum number of colors needed to properly color the edges of G, is called ... -
Analysis And Development Of Voltage Stability Assessment Methods
(2011-07-08)Voltage stability is the ability of the power system to maintain steady acceptable voltages at all the buses in a system under normal operating conditions and after being subjected to a disturbance. The increased consumption ... -
Bond Graph Model Of A Generalised Multiphase Electromagnetic Device With Magnetic Non-idealities
(2013-09-04)The electromagnetic machines like the dc, induction, synchronous motor/generator and the transformer have an energy flow framework that is similar. All these machines deal with electrical energy in the electrical domain ... -
Cluster Identification : Topic Models, Matrix Factorization And Concept Association Networks
(2013-09-17)The problem of identifying clusters arising in the context of topic models and related approaches is important in the area of machine learning. The problem concerning traversals on Concept Association Networks is of great ... -
Coding For Wireless Relay Networks And Mutiple Access Channels
(2011-07-12)This thesis addresses the design of low-complexity coding schemes for wireless relay networks and multiple access channels. The first part of the thesis is on wireless relay networks and the second part is on multiple ... -
Complex Network-Function-Loci For Localization Of Discrete Change In Transformer Windings
(2011-08-04)Large capacity high voltage power transformers are one of the most expensive items of equipment in an electrical power network. Power utilities can ill-afford breakdown of transformers, especially, in a deregulated scenario. ... -
Constellation Constrained Capacity For Two-User Broadcast Channels
(2011-07-12)A Broadcast Channel is a communication path between a single source and two or more receivers or users. The source intends to communicate independent information to the users. A particular case of interest is the Gaussian ... -
Control Of High Power Wound Field Synchronous Motor Drives - Modelling Of Salient Pole Machine, Field Oriented Control Using VSI, LCI And Hybrid LCI/VSI Converters
(2013-05-02)This thesis proposes control schemes and converter configurations for high power wound field synchronous motor (WFSM) drives. The model for a salient pole WFSM in any general rotating reference frame is developed which can ... -
Cooperative Communication In Store And Forward Wireless Networks Using Rateless Codes
(2013-08-30)In this thesis, we consider a cooperative relay-assisted communication system that uses rateless codes. When multiple relays are present, the relay with the highest channel gain to the source is the first to successfully ... -
Design Of Robust Power System Damping Controllers For Interconnected Power Systems
(2012-04-20)Small signal oscillation has been always a major concern in the operation of power systems. In a generator, the electromechanical coupling between the rotor and the rest of the system causes it to behave in a manner similar ... -
Discovering Frequent Episodes With General Partial Orders
(2013-06-04)Pattern Discovery, a popular paradigm in data mining refers to a class of techniques that try and extract some unknown or interesting patterns from data. The work carried out in this thesis concerns frequent episode mining, ... -
Formal Verification Of Analog And Mixed Signal Designs Using Simulation Traces
(2011-07-08)The conventional approach to validate the analog and mixed signal designs utilizes extensive SPICE-level simulations. The main challenge in this approach is to know when all important corner cases have been simulated. An ... -
Geometric And Radiometric Estimation In A Structured-Light 3D Scanner
(2013-10-17)Measuring 3D surface geometry with precision and accuracy is an important part of many engineering and scientific tasks. 3D Scanning techniques measure surface geometry by estimating the locations of sampled surface points. ... -
Grid Interactive Quality AC Power Supply With Switching Arm Based Integrated Magnetics For Dynamically Controlled Interconnection Among Multiple Sources And Loads
(2013-09-17)The extensive use of nonlinear loads in today’s world has inspired considerable research interest in the area of power quality improvement. This thesis proposes an integrated magnetics based compact solution which provides ... -
Hard Drive Failure Prediction : A Rule Based Approach
(2011-07-12)The ability to accurately predict an impending hard disk failure is important for reliable storage system design. The facility provided by most hard drive manufacturers, called S.M.A.R.T. (self-monitoring, analysis and ... -
Hierarchical Logcut : A Fast And Efficient Way Of Energy Minimization Via Graph Cuts
(2013-06-10)Graph cuts have emerged as an important combinatorial optimization tool for many problems in vision. Most of the computer vision problems are discrete labeling problems. For example, in stereopsis, labels represent disparity ... -
High Frequency Link Inverters And Multiresonant Controllers
(2013-10-08)High frequency link power converters for DC – 3Φ AC applications are investigated. Low cost, reduced size, galvanic isolation and efficient large boosting of voltage level are the key motivations behind the selection of ... -
Image Structures For Steganalysis And Encryption
(2013-10-21)In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results on steganalysis – protection against improper usage of images. In the second part ...