Search
Now showing items 11-20 of 69
Parallel Computing Techniques for High Speed Power System Solutions
Modern power systems are enormously large and complex entities. Planning, maintaining and operating such a system would be cumbersome if it were not for the wide assortment of analytical methods available to assist the ...
Contributions on Index Coding, Coded Caching and Gradient Coding
In this thesis, we cover three major areas, namely, index coding, coded caching and gradient coding. We begin by considering unicast index coding problems where a server broadcasts coded messages over a noiseless channel, ...
An Investigation into the Ancillaries, Parallel Operation of Machines with Voltage Source Inverters, and Development of Switched Capacitor Converters for a Microgrid
With the increase in energy demand worldwide, there is a push towards integrating distributed generation (DG) in parallel with the utility grid at the distribution level. The DGs are integrated into the electrical network ...
Performance improvement of meshless methods for practical time domain electromagnetic analyses.
Solution of Maxwell's equations for practical antennas, filters, waveguides and other
microwave devices requires use of numerical methods. Popular numerical methods include
the finite difference time domain method (FDTD), ...
Hardware Emulation of a Long Transmission Line by High Frequency Power Electronic Converter for the study of Switching Transients
To ensure smooth functioning of the grid, the reliability and robustness of the power
system equipment needs to be precisely evaluated during their development process.
But direct on- eld tests of most of the equipment ...
Energy-Efficient Data Fusion Techniques for Wireless Sensor Networks
Wireless sensor networks (WSNs) are finding increasing use in applications such as environmental monitoring, military surveillance, and healthcare due to their low cost and ease of deployment. However, the nodes in a ...
Sequential Controlled Sensing to Detect an Anomalous Process
In this thesis, we study the problem of identifying an anomalous arm in a multi-armed bandit as quickly as possible, subject to an upper bound on the error probability. Also known as odd arm identification, this problem ...
Speaker verification using whispered speech
Like neutral speech, whispered speech is one of the natural modes of speech
production, and it is often used by speakers in their day-to-day life. For
some people, such as laryngectomees, whispered speech is the only ...
Multisource Subnetwork Level Transfer in Deep CNNs Using Bank of Weight Filters
The convolutional neural networks (CNNs) have become the most successful models for many
pattern recognition problems in the areas of computer vision, speech, text and others. One
concern about CNNs has always been their ...
Stationary diesel exhaust treatment by blending discharge plasma/ozone with industry wastes: a study on abatement of NOx and THC
Increased usage of fossil fuels, especially diesel, has made a large impact on the environment in the form of rise in global temperature, increased acidity in the rain water, decreased yield in vegetation and numerous ...