Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2019"
Now showing items 1-20 of 42
-
Achieving Fairness in the Stochastic Multi-Armed Bandit Problem
The classical Stochastic Multi-armed Bandit (MAB) problem provides an abstraction for many real-world decision making problems such as sponsored-search auctions, crowd-sourcing, wireless communication, etc. In this work, ... -
Algorithms for Processing RGBD Images and Videos for Depth-Based 3D Video Systems
In recent times, immersive visual media such as Virtual Reality (VR), Augmented Reality (AR), 3DTV and Free Viewpoint Television (FTV) have garnered tremendous interest. Immersive visual media content typically provides ... -
Attention-Feedback and Representations in OCR
A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training ... -
Devanagari Online Handwritten Character Recognition
In this thesis, a classifier based on local sub-unit level and global character level representations of a character, using stroke direction and order variations independent features, is developed for recognition of ... -
Efficient and Secure Search over Encrypted Data
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the ... -
Equivalence test for the trace iterated matrix multiplication polynomial
An m-variate polynomial f is affine equivalent to an n-variate polynomial g if m > n and there is a full rank n * m matrix A and a n-dimensional vector b such that f(x) = g(Ax + b). Given blackbox access to f and g (i.e ... -
Error Correction in Index Coding And Coded Caching
In an index coding problem, there is a sender which has a set of messages and there are multiple receivers demanding possibly different subsets of these messages and possessing some other subsets of these messages as ... -
Experiences in using Reinforcement Learning for Directed Fuzzing
Directed testing is a technique to analyze user-specified target locations in the program. It reduces the time and effort of developers by excluding irrelevant parts of the program from testing and focusing on reaching ... -
Face Recognition in Unconstrained Environment
The goal of computer vision is to provide the ability to machines to understand image data and infer the useful information from it. The inferences highly depend on the quality of the image data. But in many real-world ... -
Fast and Robust Biomedical Image Reconstruction from Nonuniform Samples
We consider the problem of reconstructing images from non-uniformly under-sampled spatial point measurements with emphasis on robustness to noise. The computational methods that deals with this problem are known as ... -
Fast total variation minimizing image restoration under mixed Poisson-Gaussian noise
Image acquisition in many biomedical imaging modalities is corrupted by Poisson noise followed by additive Gaussian noise. Maximum Likelihood Estimation (MLE) based restoration methods that use the exact Likelihood ... -
Hardware Emulation of a Long Transmission Line by High Frequency Power Electronic Converter for the study of Switching Transients
To ensure smooth functioning of the grid, the reliability and robustness of the power system equipment needs to be precisely evaluated during their development process. But direct on- eld tests of most of the equipment ... -
Honest Majority and Beyond: Efficient Secure Computation over Small Population
Secure Multi-Party Computation for small population has witnessed notable practically-efficient works in the setting of both honest majority and dishonest majority. While honest majority provides the promise of stronger ... -
Insights into Network Coding Using Tools From Linear Algebra and Matroid Theory
Traditionally, the transmission of information through a network was carried out using store-and-forward techniques. This entails managing information bits in a network analogous to commodity flow, without mixing or combining ... -
Kernel-Based Image Filtering: Fast Algorithms and Applications
Image filtering is a fundamental preprocessing task in computer vision and image processing. Various linear and nonlinear filters are routinely used for enhancement, upsampling, sharpening, reconstruction, etc. The focus ... -
Learning to Adapt Policies for uSD card
Machine Learning(ML) for Systems is a new and promising research area where performance of computer systems is optimized using machine learning methods. ML for Systems has outperformed traditional heuristics methods in ... -
Linear Dynamical Systems with Sparsity Constraints: Theory and Algorithms
This thesis develops new mathematical theory and presents novel recovery algorithms for discrete linear dynamical systems (LDS) with sparsity constraints on either control inputs or initial state. The recovery problems ... -
A Method of Designing an Intelligent Public Transportation System in Metropolitan Area Using Emergent Intelligence
Metropolitan area consists of huge population density, one or more urban areas, satellite cities, rural areas and towns. It highly concentrates economic activities to attract people from rural areas and is a complex ... -
Modeling, Analysis and Control of Reconfigurable Battery/Grid Tied Solar Photo-Voltaic Inverter
Grid reliability and power outages are key concerns today, due to the ever-increasing energy demand. Traditionally, Uninterruptible Power Supplies (UPS) with battery storage have been employed to contend with grid outages. ... -
Modeling, Characterization, Control and Design of Switched Reluctance Machines
Switched reluctance machines (SRM) are permanent magnet free, and have a simple rotor construction with no current carrying parts. These are particularly suitable for high-temperature and high-speed applications. However, ...