Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 261-280 of 1279
-
Erasure Codes for Distributed Storage: Tight Bounds and Matching Constructions
The reliable storage of Big Data across a spatially distributed network of nodes, calls for erasure-correcting codes that in addition to protecting against data loss, can also efficiently handle node repair. The need for ... -
Upper Frequency Bound on Circuit-Based Models for Transformer Windings
The power generation, transmission and utilisation are necessarily being carried out at different voltage levels, and require transformers for performing the voltage level conversions. As a result, transformers form one ... -
Index Coding, Error Correcting Index Codes And Matroids
In the problem of index coding, there is a central source sending messages to a set of receivers which demand messages over a noiseless broadcast channel. Each receiver knows a subset of messages which is referred to as ... -
Sparsity Driven Solutions to Linear and Quadratic Inverse Problems
The problem of signal reconstruction from inaccurate and possibly incomplete set of linear/non-linear measurements occurs in a variety of signal and image processing applications. In this thesis, we develop reconstruction ... -
Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks
The open medium, dynamic topology and distributed operation in Mobile Ad hoc Networks (MANET) leads to high risks. Many solutions are proposed to protect a MANET from attacks, ranging from attack identification to ... -
Design, Development, Deployment and Performance Evaluation of Pyroelectric Infra-Red and Optical Camera based Intrusion Detection Systems in an Outdoor Setting
The primary contribution of this thesis is the comprehensive design, development, and deployment of a pyroElectric, InfraRed-sensor-based IntruSion classification (EIRIS) platform, along with attendant detection and ... -
Automated Test Generation and Performance Improvement using Dynamic Program Analysis
Software development process consists of various stages like design, implementation, and testing. Since programmers are considerably involved in these stages, their intuition and expertise play a vital role in the success ... -
Coded Caching in Multi-access Networks
Caching is a promising technique that can reduce the amount of data transmitted over latency-prone links, effectively trading affordable memory for expensive bandwidth resources. The frequently demanded content is stored ... -
Checking Observational Purity of Procedures
We provide two static analysis approaches(using theorem proving) that check if a given (recursive) procedure behaves as if it were stateless, even when it maintains state in global variables. In other words, we check if ... -
Bayesian Techniques for Joint Sparse Signal Recovery: Theory and Algorithms
This thesis contributes new theoretical results, solution concepts, and algorithms concerning the Bayesian recovery of multiple joint sparse vectors from noisy and underdetermined linear measurements. The thesis is written ... -
Price of Privacy of Smart Meter Data
Smart meter data can be used by the utility for billing the consumers timely along with power theft detection, demand side management, distribution network planning, consumer segmentation, load forecasting, fault detection, ... -
Disruptive Approaches to Address Performance & Reliability Challenges in 2-Dimentional (2D) Material Based Transistors & Memories
In 2020, Apple introduced its most advanced laptop that has the A14 Bionic processor. The very first processor, Intel’s 4004, was launched in 1971 and had a transistor (the basic building block of a processor) density of ... -
Design and Evaluation of Parallel Coded Systems
In this computer era, we all live in a place where the demand for data and computing is increasing day by day. Since the need for faster data retrieval and faster computation brings us a reliability as the solution, we ... -
Design of Privacy Protection Schemes for Mobile Adhoc Networks using Rough Set Theory
MANET is a self-con guring, decentralized and infrastructure-less mobile wireless network, where autonomous mobile nodes (such as laptops, smartphones, sensors, etc.) communicate over the wireless channels. Thus, MANETs ... -
Synthesis of Conformal Antenna Arrays on Polygonal Cross-Sectional Cylindrical Conductors for 360 Degree Azimuth Coverage Applications
Antenna arrays are one of the most important part of any RF communications system nowadays. Ranging from military to communication applications, the versatility they provide in selectively enhancing and rejecting signals ... -
Design and Analysis of Full-duplex Systems for Next-generation Wireless Communication Systems
To cater to the ever-growing demand for higher data rates, cellular networks and wireless local area networks (WLANs) need to adopt innovative technologies. Full-duplex (FD) is one such technology that promises to double ... -
nuKSM: NUMA-aware Memory De-duplication for Multi-socket Servers
An operating system's memory management has multiple goals, e.g. reducing memory access latencies, reducing memory footprint. These goals can conflict with each other when independent subsystems optimize them in silos. ... -
Design and Development of Opto-ThermoAcoustic (OTA) Measurement System to Differentiate Cancer from Adjacent Normal Breast Biopsy Tissue
Breast cancer is the most common cancer accounting for almost 11.7% of all cancer incidences and 6.9% of cancer-related deaths globally in 2020, as per Globocan 2020 report. Diagnosis of breast cancer requires microscopic ... -
Solving Inverse Problems Using a Deep Generative Prior
In an inverse problem, the objective is to recover a signal from its measurements, given the knowledge of the measurement operator. In this thesis, we address the problems of compressive sensing (CS) and compressive phase ... -
A Novel Neural Network Architecture for Sentiment-oriented Aspect-Opinion Pair Extraction
Over the years, fine-grained opinion mining in online reviews has received great attention from the NLP research community. It involves different tasks such as Aspect Term Extraction (ATE), Opinion Term Extraction (OTE), ...