Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 474-493 of 1262
-
A Framework for Privacy-Compliant Delivery Drones
We present Privaros, a framework to enforce privacy policies on drones. Privaros is designed for commercial delivery drones, such as the ones that will likely be used by Amazon Prime Air. Such drones visit a number of host ... -
Frequency and Time Domain Response Analysis of Transformer Winding for Indirect Measurement of Series Capacitance and Construction of Ladder Network Models
(2018-02-10)This thesis proposes innovative methods to extract information embedded in the frequency and time domain response of the transformer winding, and utilizes them to suggest solutions to a few tasks that have until now been ... -
Frequency Synthesis for Cognitive Radio Receivers and Other Wideband Applications
(2018-05-25)The radio frequency (RF) spectrum as a natural resource is severely under-utilized over time and space due to an inefficient licensing framework. As a result, in-creasing cellular and wireless network usage is placing ... -
Frequent Episode Mining: Efficient Discovery Algorithms and Significance Analysis
Frequent Pattern mining is a popular area of data mining, where the goal is to unearth interesting patterns that occur often in a given data. A pattern is a local structure that captures correlations and dependencies present ... -
Fully Integrated CMOS Transmitter and Power Amplifier for Software-Defined Radios and Cognitive Radios
(2018-05-18)Software Defined Radios (SDRs) and Cognitive Radios (CRs) pave the way for next-generation radio technology. They promise versatility, flexibility and cognition which can revolutionize communications systems. However they ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ... -
Functional Index Coding, Network Function Computation, and Sum-Product Algorithm for Decoding Network Codes
(2018-01-10)Network coding was introduced as a means to increase throughput in communication networks when compared to routing. Network coding can be used not only to communicate messages from some nodes in the network to other nodes ... -
Functional Safety Analysis Techniques for Integrated Circuits Used in Cyber-Physical Systems
Integrated Circuits (ICs) are used to realize multitude of real life systems. These real life systems have ICs interacting with physical systems (this combination being referred to as cyber-physical systems or hybrid ... -
Fundamentals Limits Of Communication In Interference Limited Environments
(2017-08-21)In multiuser wireless communications, interference not only limits the performance of the system, but also allows users to eavesdrop on other users’ messages. Hence, interference management in multiuser wireless communication ... -
Fusion of Sparse Reconstruction Algorithms in Compressed Sensing
(2018-06-08)Compressed Sensing (CS) is a new paradigm in signal processing which exploits the sparse or compressible nature of the signal to significantly reduce the number of measurements, without compromising on the signal reconstruction ... -
Game Theoretic Models For Social Network Analysis
(2014-08-01)With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ... -
Game-Theoretic Analysis of Strategic Behaviour in Networks, Crowds and Classrooms
(2018-01-03)Over the past decade, the explosive growth of the Internet has led to a surge of interest to understand and predict aggregate behavior of large number of people or agents, particularly when they are connected through an ... -
Generalization of Hitting, Covering and Packing Problems on Intervals
(2018-05-29)Interval graphs are well studied structures. Intervals can represent resources like jobs to be sched-uled. Finding maximum independent set in interval graphs would correspond to scheduling maximum number of non-conflicting ... -
Generalizations Of The Popular Matching Problem
(2013-07-02)Matching problems arise in several real-world scenarios like assigning posts to applicants, houses to trainees and room-mates to one another. In this thesis we consider the bipartite matching problem where one side of the ... -
Generalized Analytic Signal Construction and Modulation Analysis
(2018-04-02)This thesis deals with generalizations of the analytic signal (AS) construction proposed by Gabor. Functional extensions of the fractional Hilbert Transform (FrHT) are proposed using which families of analytic signals are ... -
Generalized Likelihood Ratio Procedures for Early Detection of Machine Faults
Condition monitoring of industrial machinery is an important example of a cyber physical system (CPS), in which measurements on a machine, transmitted over a wireless network, are used to make inferences about the health ... -
Generalizing Cross-domain Retrieval Algorithms
Cross-domain retrieval is an important research topic due to its wide range of applications in e-commerce, forensics etc. It addresses the data retrieval problem from a search set, when the query belongs to one domain, and ...