• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 241-250 of 506

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Design and Evaluation of Parallel Coded Systems 

    Badita, Ajay Kumar
    In this computer era, we all live in a place where the demand for data and computing is increasing day by day. Since the need for faster data retrieval and faster computation brings us a reliability as the solution, we ...

    Bayesian Techniques for Joint Sparse Signal Recovery: Theory and Algorithms 

    Khanna, Saurabh
    This thesis contributes new theoretical results, solution concepts, and algorithms concerning the Bayesian recovery of multiple joint sparse vectors from noisy and underdetermined linear measurements. The thesis is written ...

    Design, Development, Deployment and Performance Evaluation of Pyroelectric Infra-Red and Optical Camera based Intrusion Detection Systems in an Outdoor Setting 

    Choubisa, Tarun
    The primary contribution of this thesis is the comprehensive design, development, and deployment of a pyroElectric, InfraRed-sensor-based IntruSion classification (EIRIS) platform, along with attendant detection and ...

    Checking Observational Purity of Procedures 

    Arora, Himanshu
    We provide two static analysis approaches(using theorem proving) that check if a given (recursive) procedure behaves as if it were stateless, even when it maintains state in global variables. In other words, we check if ...

    Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks 

    Sai Keerthi T, Divya
    The open medium, dynamic topology and distributed operation in Mobile Ad hoc Networks (MANET) leads to high risks. Many solutions are proposed to protect a MANET from attacks, ranging from attack identification to ...

    Coded Caching in Multi-access Networks 

    Nayak, Pooja M
    Caching is a promising technique that can reduce the amount of data transmitted over latency-prone links, effectively trading affordable memory for expensive bandwidth resources. The frequently demanded content is stored ...

    Disruptive Approaches to Address Performance & Reliability Challenges in 2-Dimentional (2D) Material Based Transistors & Memories 

    Ansh
    In 2020, Apple introduced its most advanced laptop that has the A14 Bionic processor. The very first processor, Intel’s 4004, was launched in 1971 and had a transistor (the basic building block of a processor) density of ...

    Price of Privacy of Smart Meter Data 

    Gangopadhyay, Soumyajit
    Smart meter data can be used by the utility for billing the consumers timely along with power theft detection, demand side management, distribution network planning, consumer segmentation, load forecasting, fault detection, ...

    Addressing Energy and Performance Related Challenges in Networked Embedded Systems 

    Singh, Kaumudi
    Networked Embedded Systems comprise of spatially and functionally distributed nodes that are interconnected with one another and with the environment to achieve certain goals. The nodes are connected to one another through ...

    Synthesis of Conformal Antenna Arrays on Polygonal Cross-Sectional Cylindrical Conductors for 360 Degree Azimuth Coverage Applications 

    Monga, Vaibhav
    Antenna arrays are one of the most important part of any RF communications system nowadays. Ranging from military to communication applications, the versatility they provide in selectively enhancing and rejecting signals ...
    • 1
    • . . .
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • . . .
    • 51

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorChaporkar, Prasanna S (2)Gavaskar, Ruturaj G (2)Ghulyani, Manu (2)Nair, Pravin (2)Patil, Vishakha (2)Paul, Sayan (2)Srinivasa Ramakrishna, S T G (2)Abhilash, B (1)Abraham, Nithin (1)Achar, Avinash (1)... View MoreSubject
    TECHNOLOGY (506)
    Machine Learning (14)Reinforcement Learning (11)Deep Learning (10)2D materials (8)algorithms (7)Cryptography (7)EEG (6)Inverter (6)MATHEMATICS (6)... View MoreHas File(s)
    Yes (506)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV