Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2016"
Now showing items 1-20 of 64
-
Adaptive Sampling Pattern Design Methods for MR Imaging
(2018-02-07)MRI is a very useful imaging modality in medical imaging for both diagnostic as well as functional studies. It provides excellent soft tissue contrast in several diagnostic studies. It is widely used to study the functional ... -
Algebraic Techniques for Error Correction in Random Networks
Abstract The transmission of data in the presence of errors and erasures over random networks, in situations where there is only partial information regarding the underlying network topology, has been interpreted in ... -
Algorithm And Architecture Design for Real-time Face Recognition
(2017-10-31)Face recognition is a field of biometrics that deals with identification of subjects based on features present in the images of their faces. The factors that make face recognition popular and favorite as compared to other ... -
Algorithms for Adjusted Load Flow Solutions using the Complementarity Principle
The state of a given power system i.e. voltage magnitudes and angles at all the buses can be computed using the Newton-Raphson Load Flow (NRLF) method when active power and reactive power loads are specified at all the ... -
Algorithms for Homogeneous Quadratic Minimization And Applications in Wireless Networks
(2017-11-09)Massive proliferation of wireless devices throughout world in the past decade comes with a host of tough and demanding design problems. Noise at receivers and wireless interference are the two major issues which severely ... -
Analysis of Local Field Potential and Gamma Rhythm Using Matching Pursuit Algorithm
(2017-11-17)Signals recorded from the brain often show rhythmic patterns at different frequencies, which are tightly coupled to the external stimuli as well as the internal state of the subject. These signals also have transient ... -
Automatic Storage Optimization of Arrays Affine Loop Nests
(2018-03-01)Efficient memory usage is crucial for data-intensive applications as a smaller memory footprint ensures better cache performance and allows one to run a larger problem size given a axed amount of main memory. The solutions ... -
Bitrate Reduction Techniques for Low-Complexity Surveillance Video Coding
(2017-09-26)High resolution surveillance video cameras are invaluable resources for effective crime prevention and forensic investigations. However, increasing communication bandwidth requirements of high definition surveillance videos ... -
Capacity and Life Estimation of Flooded Lead Acid Batteries using Eddy Current Sensors
(2018-01-04)Lead acid batteries are widely used in domestic, industrial and automotive applications. Even after lot of advancements in battery technologies, lead acid cells are still in use because of their high capacity and low cost. ... -
A Case for Protecting Huge Pages from the Kernel
(2018-01-01)Modern architectures support multiple size pages to facilitate applications that use large chunks of contiguous memory either for buffer allocation, application specific memory management, in-memory caching or garbage ... -
Conformal Active Sheets
(2017-12-16)Stretchable Electronics is an emerging class of electronics that allow electronics to be bent, conform, ex and stretch while still retaining its full functionality. Other than bending, existing and conforming, adding ... -
Consistency of Spectral Algorithms for Hypergraphs under Planted Partition Model
(2018-01-01)Hypergraph partitioning lies at the heart of a number of problems in machine learning as well as other engineering disciplines. While partitioning uniform hypergraphs is often required in computer vision problems that ... -
Content Dissemination in Mobile Ad Hoc Networks
(2018-06-26)In this thesis, we are concerned with content dissemination in mobile ad hoc networks. The scope of content dissemination is limited by network capacity, and sometimes the price to be paid for securing faster delivery. In ... -
Data Fusion Based Physical Layer Protocols for Cognitive Radio Applications
(2017-09-26)This thesis proposes and analyzes data fusion algorithms that operate on the physical layer of a wireless sensor network, in the context of three applications of cognitive radios: 1. Cooperative spectrum sensing via binary ... -
Dead-Time Induced Oscillations in Voltage Source Inverter-Fed Induction Motor Drives
(2017-12-07)The inverter dead-time is integral to the safety of a voltage source inverter (VSI). Dead-time is introduced between the complementary gating signals of the top and bottom switches in each VSI leg to prevent shoot-through ... -
Design and Characterization of SRAMs for Ultra Dynamic Voltage Scalable (U-DVS) Systems
(2017-11-29)The ever expanding range of applications for embedded systems continues to offer new challenges (and opportunities) to chip manufacturers. Applications ranging from exciting high resolution gaming to routine tasks like ... -
Design And Control of Power Converters for Renewable Energy Systems
(2017-09-20)Renewable energy sources normally require power converters to convert their energy into standardized regulated ac output. The motivation for this thesis is to design and control power converters for renewable energy ... -
Designing Solutions to Some of the Issues in Ubiquitous Networks
The inception of ubiquitous computing goes back to late eighties, when the Research at the Xerox Palo Alto Research (PARC) started designing ubiquitous environment under the guidance of Mark Weiser. Ubiquitous computing ... -
Discharge Plasma Supported Mariculture and Lignite Waste for NOx Cleaning in Biodiesel Exhaust : Direct and Indirect Methods
(2018-06-18)One major aspect of environmental pollution affecting human life and climate is air pollution. The harmful pollutants in the air include mostly hydrocarbons, carbon monoxide, carbon dioxide, nitrogen oxides as well as soot ... -
Distributed Algorithms for Power Allocation Games on Gaussian Interference Channels
(2017-09-20)We consider a wireless communication system in which there are N transmitter-receiver pairs and each transmitter wants to communicate with its corresponding receiver. This is modelled as an interference channel. We propose ...