Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 181-200 of 1263
-
Computational And Combinatorial Problems On Some Geometric Proximity Graphs
(2017-05-24)In this thesis, we focus on the study of computational and combinatorial problems on various geometric proximity graphs. Delaunay and Gabriel graphs are widely studied geometric proximity structures. These graphs have been ... -
Computational Models of Perceptual Space : From Simple Features to Complex Shapes
(2018-02-15)Dissimilarity plays a very important role in object recognition. But, finding perceptual dissimilarity between objects is non-trivial as it is not equivalent to the pixel dissimilarity between the objects (For example, two ... -
Computational Problems In Codes On Graphs
(2009-05-11)Two standard graph representations for linear codes are the Tanner graph and the tailbiting trellis. Such graph representations allow the decoding problem for a code to be phrased as a computational problem on the corresponding ... -
Computational Protein Structure Analysis : Kernel And Spectral Methods
(2010-08-24)The focus of this thesis is to develop computational techniques for analysis of protein structures. We model protein structures as points in 3-dimensional space which in turn are modeled as weighted graphs. The problem of ... -
Computer Assisted Evaluation Of Student Performance In An Engineering Course
(2009-04-29)Increasing enrollment of students and declining availability of qualified and experienced faculty are leading to increased assessment loads of the existing faculty. Moreover, the assessment techniques are changing drastically ... -
Computing Contour Tress for 2D Piecewise Polynomial Functions
Contour trees are extensively used in scalar field analysis. The contour tree is a data structure that tracks the evolution of level set topology in a scalar field. Scalar fields are typically available as samples at ... -
Concurrency Analysis and Mining Techniques for APIs
(2018-06-13)Software components expose Application Programming Interfaces (APIs) as a means to access their functionality, and facilitate reuse. Developers use APIs supplied by programming languages to access the core data structures ... -
Conflict-Tolerant Features
(2010-12-07)Large, software intensive systems are typically developed using a feature oriented development paradigm in which feature specifications are derived from domain requirements and features are implemented to satisfy such ... -
Conformal Active Sheets
(2017-12-16)Stretchable Electronics is an emerging class of electronics that allow electronics to be bent, conform, ex and stretch while still retaining its full functionality. Other than bending, existing and conforming, adding ... -
Conformal Thermal Models for Optimal Loading and Elapsed Life Estimation of Power Transformers
(Indian Institute of Science, 2005-04-18)Power and Generator Transformers are important and expensive elements of a power system. Inadvertent failure of Power Transformers would cause long interruption in power supply with consequent loss of reliability and revenue ... -
Consistency of Spectral Algorithms for Hypergraphs under Planted Partition Model
(2018-01-01)Hypergraph partitioning lies at the heart of a number of problems in machine learning as well as other engineering disciplines. While partitioning uniform hypergraphs is often required in computer vision problems that ... -
A Constant Frequency Resonant Transition Converter
(2012-03-28) -
Constant-rate Non-malleable Codes and their Applications
Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010, provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is ... -
Constellation Constrained Capacity For Two-User Broadcast Channels
(2011-07-12)A Broadcast Channel is a communication path between a single source and two or more receivers or users. The source intends to communicate independent information to the users. A particular case of interest is the Gaussian ... -
Constructing Provably Secure Identity-Based Signature Schemes
(2018-04-03)An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ... -
Construction Of Equivalent Circuit Of A Single Isolated Transformer Winding From Frequency Response
(2013-06-14)Frequency response analysis (FRA) of transformers is universally accepted as a highly sensitive tool to detect deformations in its windings. This is evident from the fact that customized commercial equipment (popularly ... -
Construction Of High-Rate, Reliable Space-Time Codes
(2011-09-09) -
Construction of Secure and Efficient Private Set Intersection Protocol
(2018-03-17)Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ... -
Content Dissemination in Mobile Ad Hoc Networks
(2018-06-26)In this thesis, we are concerned with content dissemination in mobile ad hoc networks. The scope of content dissemination is limited by network capacity, and sometimes the price to be paid for securing faster delivery. In ...