• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 261-270 of 507

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Stochastic approximation with set-valued maps and Markov noise: Theoretical foundations and applications 

    Yaji, Vinayaka Ganapati
    Stochastic approximation algorithms produce estimates of a desired solution using noisy real world data. Introduced by Robbins and Monro, in 1951, stochastic approximation techniques have been instrumental in the asymptotic ...

    Extending Program Analysis Techniques to Web Applications and Distributed Systems 

    Athaiya, Snigdha
    Web-based applications and distributed systems are ubiquitous and indispensable today. These systems use multiple parallel machines for greater functionality, and efficient and reliable computation. At the same time they ...

    Degradation Studies on Polymeric Insulators used for EHV and UHV Transmission 

    Verma, Alok Ranjan
    High voltage insulators used in overhead power transmission systems are of key im- portance for safe, reliable, and effcient operation of transmission line in transferring huge amount of electrical power. Conventionally, ...

    Multisource Subnetwork Level Transfer in Deep CNNs Using Bank of Weight Filters 

    Kirthi, Suresh K
    The convolutional neural networks (CNNs) have become the most successful models for many pattern recognition problems in the areas of computer vision, speech, text and others. One concern about CNNs has always been their ...

    Stationary diesel exhaust treatment by blending discharge plasma/ozone with industry wastes: a study on abatement of NOx and THC 

    Madhukar, Apeksha
    Increased usage of fossil fuels, especially diesel, has made a large impact on the environment in the form of rise in global temperature, increased acidity in the rain water, decreased yield in vegetation and numerous ...

    Problems on bend-number, circular separation dimension and maximum edge 2-colouring 

    Lahiri, Abhiruk
    Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ...

    On Reduced-State Optimal Scheduling for Decentralized Medium Access Control of Wireless Data Collection Networks 

    Mohan, Avinash
    In the Internet of Things (IoT), devices such as sensors and actuators will almost invariably be connected to the Internet via wireless networks. The sensor and actuator devices in such systems will be resource challenged ...

    Structured Regularization Through Convex Relaxations Of Discrete Penalties 

    Sankaran, Raman
    Motivation. Empirical risk minimization(ERM) is a popular framework for learning predictive models from data, which has been used in various domains such as computer vision, text processing, bioinformatics, neuro-biology, ...

    Investigations on Multilevel Voltage Space Vectors Generated by Stacked and Cascaded Basic Inverter Cells with Capacitor Voltage Control for Induction Motor Drives 

    Yadav, Apurv Kumar
    Induction motor drives (IMD) require a DC-AC inverter system to obtain variable frequency operation. Generally, IMD uses conventional 2-level inverters. The conventional 2-level inverter has its pole switching between zero ...

    Adaptively Secure Primitives in the Random Oracle Model 

    Sarkar, Pratik
    Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it models reallife situations ...
    • 1
    • . . .
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • . . .
    • 51

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorChaporkar, Prasanna S (2)Gavaskar, Ruturaj G (2)Ghulyani, Manu (2)Nair, Pravin (2)Patil, Vishakha (2)Paul, Sayan (2)Srinivasa Ramakrishna, S T G (2)Abhilash, B (1)Abraham, Nithin (1)Achar, Avinash (1)... View MoreSubject
    TECHNOLOGY (507)
    Machine Learning (14)Reinforcement Learning (11)Deep Learning (10)2D materials (8)algorithms (7)Cryptography (7)EEG (6)Inverter (6)MATHEMATICS (6)... View MoreHas File(s)Yes (506)No (1)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV