Search
Now showing items 211-220 of 381
Engineering quantum emitters in WSe2 films on metal films
The discovery of single photon emitters (SPEs) in van der Waals materials, in particular, from point defects in Tungsten Diselenide (WSe2) and hexagonal Boron Nitride (hBN), has sparked tremendous research interest in the ...
Entanglement-assisted Additive Qudit Stabilizer Codes
Quantum systems governed by the laws of quantum mechanics are the most awaited technology of this century. Based on the shrinkage in the size of the devices over the years in classical systems, device sizes are expected ...
Wireless Channel Modeling for Drone to Ground 2.4 GHz link
Use of Drones for communication is picking up the pace and expected to grow exponentially in the
coming years. These drones will be used as access points for providing WiFi services in the near
future. It is well known ...
Dynamics of a Stratified Population of Optimum Seeking Agents on a Network
Very large scale multi-agent systems occur both naturally and in engineering applications. In many of these systems, the agents are either selfish or act with varying levels of coordination. Understanding the evolution of ...
Novel Reinforcement Learning Algorithms and Applications to Hybrid Control Design Problems
The thesis is a compilation of two independent works.
In the first work, we develop novel weight assignment procedure, which helps us develop several schedule based algorithms. Learning the value function of a given policy ...
Binaural Source Localization using subband reliability and interaural time difference patterns
Machine localization of sound sources is necessary for a wide range of appli-
cations, including human-robot interaction, surveillance and hearing aids.
Robot sound localization algorithms have been proposed using ...
Speech enhancement using deep mixture of experts
Speech enhancement is at the heart of many applications such as speech com-
munication, automatic speech recognition, hearing aids etc. In this work, we
consider the speech enhancement under the framework of multiple ...
Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol
Two-party data mining is a win-win game if played with a guarantee of data privacy from each other.
This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol.
The need to ...
Index Coding, Error Correcting Index Codes And Matroids
In the problem of index coding, there is a central source sending messages to a
set of receivers which demand messages over a noiseless broadcast channel. Each
receiver knows a subset of messages which is referred to as ...
Upper Frequency Bound on Circuit-Based Models for Transformer Windings
The power generation, transmission and utilisation are necessarily being carried out at different
voltage levels, and require transformers for performing the voltage level conversions.
As a result, transformers form one ...