Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 1150-1169 of 1208
-
Topics On Security In Sensor Networks And Energy Consumption In IEEE 802.11 WLANs
(2011-05-19)Our work focuses on wireless networks in general, but deals specifically with security in wireless sensor networks and energy consumption in IEEE 802.11 infrastructure WLANs. In the first part of our work, we focus on ... -
Total Electric Field due to an Electron Avalanche and it's coupling to Transmission Line Conductors
Transmission of bulk electric power from the generating stations to the load centres can be carried out only through high voltages transmission lines. One of the main issues in the design and maintenance of extra and ... -
Towards a Charcterization of the Symmetries of the Nisan-Wigderson Polynomial Family
(2018-07-09)Understanding the structure and complexity of a polynomial family is a fundamental problem of arithmetic circuit complexity. There are various approaches like studying the lower bounds, which deals with nding the smallest ... -
Towards a Unified Framework for Design of MEMS based VLSI Systems
(2018-02-12)Current day VLSI systems have started seeing increasing percentages of multiple energy domain components being integrated into the mainstream. Energy domains such as mechanical, optical, fluidic etc. have become all pervasive ... -
Towards Achieving Better NOx Removal In Discharge Plasma Treatment Of Diesel Engine Exhaust
(2010-03-03)In India, the expansion of industries and two-fold increase in motor vehicles over the last decade are posing a serious environmental crisis in the form of urban air pollution. Common pollutants include carbon monoxide, ... -
Towards Development Of Low Cost Electrochemical Biosensor For Detecting Percentage Glycated Hemoglobin
(2014-07-11)There is an ever growing demand for low cost biosensors in medical diagnostics. A well known commercially successful example is glucose biosensors which are used to diagonize and monitor diabetes. These biosensors use ... -
Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol
Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ... -
Towards Robustness of Neural Legal Judgement System
Legal Judgment Prediction (LJP) implements Natural Language Processing (NLP) techniques to predict judgment results based on fact description. It can play a vital role as a legal assistant and benefit legal practitioners ... -
Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions.
Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ... -
Trajectory-based Descriptors for Action Recognition in Real-world Videos
(2018-07-30)This thesis explores motion trajectory-based approaches to recognize human actions in real-world, unconstrained videos. Recognizing actions is an important task in applications such as video retrieval, surveillance, ... -
Transceiver Design Based on the Minimum-Error-Probability Framework for Wireless Communication Systems
(2018-06-19)Parameter estimation and signal detection are the two key components of a wireless communication system. They directly impact the bit-error-ratio (BER) performance of the system. Several criteria have been successfully ... -
Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels
(2018-04-05)Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ... -
Transient Analysis of EHV/UHV Transmission Systems for Improved Protection Schemes
(2018-03-07)Ever increasing demand for electricity, exploitation of large hydro and nuclear power at remote location has led to power evacuation by long EHV/UHV transmission systems. This thesis concentrates on transient analysis of ... -
Transient Lightning Electromagnetic Field Coupling With An Airborne Vehicle In The Presence Of Its Conducting Exhaust Plume
(2010-09-03)The indirect effects of a nearby lightning strike on an airborne vehicle with its long trailing conducting plume is not well understood. Since airborne vehicles and its payload are expensive, their loss as a result of ... -
Transient Vector Estimator Based High Dynamic Performance Control and Kalman Filter based Self Commissioning of Induction Motor Drives for Electric Vehicle Applications
Induction machine, the work horse of the industry, has been widely used in industrial drives. The most common and efficient way to control the speed of induction machine is with variable frequency drives. The variable ... -
Transmit Antenna Selection in Underlay Spectrum Sharing: Role of Power Adaptation, Interference Constraint, and Channel State Information
Spectrum sharing is essential to support high wireless data rates and a large number of wireless connections by the future technologies in the limited spectrum that is available. In underlay spectrum sharing a secondary ... -
TriSL: A Software Architecture Description Language and Environment
(Indian Institute of Science, 2005-03-14)As the size and complexity of a software system increases, the design problem goes beyond the algorithms and data structures of the computation. Designing and specifying the overall system structure -- or software architecture ... -
True Random Number Generators based on Amplified Spontaneous Emission
Low-cost, high-speed quantum random number generators (QRNGs) are imperative to develop in order to have a widespread application in areas ranging from cryptography and stochastic simulations to banking and internet. ... -
Truncated Data Problems In Helical Cone-Beam Tomography
(2010-07-19)This report delves into two of the major truncated data problems in helical cone-beam tomography: Axial truncation and Lateral truncation. The problem of axial truncation, also classically known as the Long Object problem, ... -
A Trusted-Hardware Backed Secure Payments Platform for Android
Digital payments using personal electronic devices have been steadily gaining in popularity for the last few years. While digital payments using smartphones are very convenient, they are also more susceptible to security ...