Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2015"
Now showing items 1-20 of 64
-
Accurate Estimation of Frequency and Phasor for Wide Area Monitoring and Control
Traditionally, monitoring and control functions in large power systems were based on measurements obtained locally. While small disturbances have their impact con ned locally to the area of disturbance, large disturbances ... -
Algorithm-Architecture Co-Design for Dense Linear Algebra Computations
(2018-08-13)Achieving high computation efficiency, in terms of Cycles per Instruction (CPI), for high-performance computing kernels is an interesting and challenging research area. Dense Linear Algebra (DLA) computation is a representative ... -
Analysis of Printed Periodic Structures and Their Applications in Antennas and Absorbers
To meet the demand of continuously growing RF and microwave technologies, scientists and engineers have developed innovative materials consisting of conducting and dielectric materials that overcome limitations in the ... -
Antiresonance and Noise Suppression Techniques for Digital Power Distribution Networks
(2018-08-14)Power distribution network (PDN) design was a non-existent entity during the early days of microprocessors due to the low frequency of operation. Once the switching frequencies of the microprocessors started moving towards ... -
Approximate Dynamic Programming and Reinforcement Learning - Algorithms, Analysis and an Application
(2018-08-13)Problems involving optimal sequential making in uncertain dynamic systems arise in domains such as engineering, science and economics. Such problems can often be cast in the framework of Markov Decision Process (MDP). ... -
Bayesian Nonparametric Modeling of Temporal Coherence for Entity-Driven Video Analytics
(2018-05-14)In recent times there has been an explosion of online user-generated video content. This has generated significant research interest in video analytics. Human users understand videos based on high-level semantic ... -
Behavior of Distance Relay Characteristics on Interconnecting Lines Fed From Wind Farms
(2018-05-14)Distance relays due to their selectivity and operating speed are used in HV/EHV line protection. The dynamic nature of Mho characteristic, which happens to be most primitive technique in line protection implemented with ... -
Classical Binary Codes And Subspace Codes in a Lattice Framework
(2017-10-10)The classical binary error correcting codes, and subspace codes for error correction in random network coding are two different forms of error control coding. We identify common features between these two forms and study ... -
Codes With Locality For Distributed Data Storage
(2017-07-26)This thesis deals with the problem of code design in the setting of distributed storage systems consisting of multiple storage nodes, storing many different data les. A primary goal in such systems is the efficient repair ... -
Coding Schemes For Distributed Subspace Computation, Distributed Storage And Local Correctability
(2017-07-24)In this thesis, three problems have been considered and new coding schemes have been devised for each of them. The first is related to distributed function computation, the second to coding for distributed storage and the ... -
Cost Effective Multi-role Active EMI Filters for Switched Mode Converters
Switched mode power converters are a major source of conducted electromagnetic interference (EMI). The popular technique for mitigation of conducted EMI uses EMI filters. EMI filters may be classified in two types based ... -
Design and Analysis of Consistent Algorithms for Multiclass Learning Problems
(2018-08-14)We consider the broad framework of supervised learning, where one gets examples of objects together with some labels (such as tissue samples labeled as cancerous or non-cancerous, or images of handwritten digits labeled ... -
Design, Fabrication and Characterization of Low Voltage Capacitive RF MEMS Switches
(2018-08-11)This dissertation presents the design, fabrication, and characterization of low-voltage capacitive RF MEMS switches. Although, RF MEMS switches have shown superior performance as compared to the existing solid-state ... -
Device Applications of Epitaxial III-Nitride Semiconductors
(2018-05-14)Through the history of mankind, novel materials have played a key role in techno- logical progress. As we approach the limits of scaling it becomes difficult to squeeze out any more extensions to Moore’s law by ... -
Discharge Plasma based NOx Abatement in Engine Exhaust Assisted by Industry Wastes : A Parametric Evaluation with Diesel Fuels and Corona Electrodes
Diesel engines contribute to a large percentage of oxides of nitrogen (NOx) emission in the atmosphere. The NOx primarily consists of nitric oxide (NO) and nitrogen dioxide (NO2). With depleting fossil fuel supplies ... -
Distributed TDMA-Scheduling and Schedule-Compaction Algorithms for Efficient Communication in Wireless Sensor Networks
(2018-05-16)A wireless sensor network (WSN) is a collection of sensor nodes distributed over a geographical region to obtain the environmental data. It can have different types of applications ranging from low data rate event driven ... -
Dynamic Headpose Classification and Video Retargeting with Human Attention
(2018-07-14)Over the years, extensive research has been devoted to the study of people's head pose due to its relevance in security, human-computer interaction, advertising as well as cognitive, neuro and behavioural psychology. One ... -
Effective Characterization of Sequence Data through Frequent Episodes
(2018-08-14)Pattern discovery is an important area of data mining referring to a class of techniques designed for the extraction of interesting patterns from the data. A pattern is some kind of a local structure that captures correlations ... -
Efficient Instrumentation for Object Flow Profiling
(2018-07-20)Profiling techniques to detect performance bugs in applications are usually customized to detect a specific bug pattern and involve significant engineering effort. In spite of this effort, many techniques either suffer from ... -
Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks
There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be ...