Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 624-643 of 1659
-
Framework for solving vehicle scheduling problems using AI techniques
Transportation resource scheduling problems are of high academic as well as practical value. These are primarily concerned with generation of movement schedules for a set of vehicles (tankers, aircraft, etc) to distribute ... -
A framework for timing analysis of event-driven applications
Event-driven applications, particularly those based on the publish–subscribe communication model are widely adopted to build responsive and decoupled applications in domains such as robotics, the Internet of Things ... -
Frequency and Time Domain Response Analysis of Transformer Winding for Indirect Measurement of Series Capacitance and Construction of Ladder Network Models
(2018-02-10)This thesis proposes innovative methods to extract information embedded in the frequency and time domain response of the transformer winding, and utilizes them to suggest solutions to a few tasks that have until now been ... -
Frequency Synthesis for Cognitive Radio Receivers and Other Wideband Applications
(2018-05-25)The radio frequency (RF) spectrum as a natural resource is severely under-utilized over time and space due to an inefficient licensing framework. As a result, in-creasing cellular and wireless network usage is placing ... -
Frequent Episode Mining: Efficient Discovery Algorithms and Significance Analysis
Frequent Pattern mining is a popular area of data mining, where the goal is to unearth interesting patterns that occur often in a given data. A pattern is a local structure that captures correlations and dependencies present ... -
Fully Integrated CMOS Transmitter and Power Amplifier for Software-Defined Radios and Cognitive Radios
(2018-05-18)Software Defined Radios (SDRs) and Cognitive Radios (CRs) pave the way for next-generation radio technology. They promise versatility, flexibility and cognition which can revolutionize communications systems. However they ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ... -
Functional Index Coding, Network Function Computation, and Sum-Product Algorithm for Decoding Network Codes
(2018-01-10)Network coding was introduced as a means to increase throughput in communication networks when compared to routing. Network coding can be used not only to communicate messages from some nodes in the network to other nodes ... -
Functional Safety Analysis Techniques for Integrated Circuits Used in Cyber-Physical Systems
Integrated Circuits (ICs) are used to realize multitude of real life systems. These real life systems have ICs interacting with physical systems (this combination being referred to as cyber-physical systems or hybrid ... -
Fundamentals Limits Of Communication In Interference Limited Environments
(2017-08-21)In multiuser wireless communications, interference not only limits the performance of the system, but also allows users to eavesdrop on other users’ messages. Hence, interference management in multiuser wireless communication ... -
Fusion of Sparse Reconstruction Algorithms in Compressed Sensing
(2018-06-08)Compressed Sensing (CS) is a new paradigm in signal processing which exploits the sparse or compressible nature of the signal to significantly reduce the number of measurements, without compromising on the signal reconstruction ... -
Galois field Computations : Implementation of a Library and a study of the Discrete Logarithm Problem
Computation over finite fields (also called Galois fields) is an active area of research in number theory and algebra, and finds many applications in cryptography, error control coding, and combinatorial design. In this ... -
Game Theoretic Models For Social Network Analysis
(2014-08-01)With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ... -
Game-Theoretic Analysis of Strategic Behaviour in Networks, Crowds and Classrooms
(2018-01-03)Over the past decade, the explosive growth of the Internet has led to a surge of interest to understand and predict aggregate behavior of large number of people or agents, particularly when they are connected through an ... -
Gap between outcomes of voting rules
Through the course of history, a variety of voting rules have been used to determine election outcomes. The traditional way in social choice theory to evaluate a voting rule is by checking whether it satisfies axioms deemed ... -
Gaseous breakdown below paschen minimum in ExB fields
Some investigations about the electric discharge in a coaxial geometry electrode are explained in the transition range, namely, Townsend–Penning discharge for the dry air. The existing theory of 0.05 to 0.3 Torr is extended ... -
Gaussian processes for learning problems with related outputs
Gaussian processes (GPs) have attracted much attention in the machine learning community due to their promising generalization performance and unique properties. GPs provide a Bayesian non-parametric approach to learning ... -
General purpose simulation tool for the performence analysisof ATM Switches
The Broadband Integrated Services Digital Network (B-ISDN) supports a wide range of audio, video, and data services within the same network. To cover the widest range of applications possible, B-ISDN should support both ...

