Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 1039-1058 of 1262
-
Secure Routing Schemes In Mobile Ad Hoc Networks
(2011-09-09) -
Securing Multiprocessor Systems-on-Chip
(2016)With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and ... -
Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved
Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ... -
Segmentation Strategies for Scene Word Images
(2017-12-10) -
Semantic Analysis of Web Pages for Task-based Personal Web Interactions
(2017-11-27)Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ... -
Semi-Supervised Classification Using Gaussian Processes
(2010-03-26)Gaussian Processes (GPs) are promising Bayesian methods for classification and regression problems. They have also been used for semi-supervised classification tasks. In this thesis, we propose new algorithms for solving ... -
Sentiment-Driven Topic Analysis Of Song Lyrics
(2015-08-17)Sentiment Analysis is an area of Computer Science that deals with the impact a document makes on a user. The very field is further sub-divided into Opinion Mining and Emotion Analysis, the latter of which is the basis for ... -
Sequential Controlled Sensing to Detect an Anomalous Process
In this thesis, we study the problem of identifying an anomalous arm in a multi-armed bandit as quickly as possible, subject to an upper bound on the error probability. Also known as odd arm identification, this problem ... -
Sequential Detection Based Cooperative Spectrum Sensing Algorithms For Cognitive Radio
(2011-07-11)Cognitive radios are the radios which use spectrum licensed to other users. For this, they perform Radio Environment Analysis, identify the Spectral holes and then operate in those holes. We consider the problem of Spectrum ... -
Service scheduling with Service, Waiting and Dissatisfaction costs
Service or job scheduling problems arise in many contexts such as cloud computing, task scheduling in CPUs, traffic routing and scheduling, production scheduling in plants, scheduling charging of electric vehicles (EVs), ... -
Shape From Shading Analysis By Synthesis
(2011-05-06) -
Shape-constrained Biomedical Image Segmentation and Applications
The detection, segmentation, and delineation of the targeted regions of interest in biomedical images are fundamental steps for computer-aided assessment and prescreening. In this thesis, we focus on shape-constrained ... -
Shaped Superconducting Films For Electronic Functions
(2012-11-26) -
Short Circuit and Open Circuit Natural Frequencies of 3-Φ Transformers: Derived Analytical Expressions and its Applications
Frequency Response Analysis (FRA) method is perhaps the most sensitive tool that can detect even the slightest of winding/core movements. High sensitivity, non-invasiveness, non-destructiveness, and on-site capability are ... -
Signal Processing Algorithms For Digital Image Forensics
(2010-03-19)Availability of digital cameras in various forms and user-friendly image editing softwares has enabled people to create and manipulate digital images easily. While image editing can be used for enhancing the quality of the ... -
Signal Processing and Coding for Two-Dimensional Magnetic Recording
Many novel approaches have been proposed to improve storage densities of magnetic recording beyond the existing 1 Tb/in2. These include heat-assisted magnetic recording (HAMR), bit-patterned media (BPM) and two-dimensional ... -
Signcryption in a Quantum World
With recent advancements and research on quantum computers, it is conjectured that in the foreseeable future, sufficiently large quantum computers will be built to break essentially all public key cryptosystems currently ...