Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 361-380 of 1279
-
Protection Schemes for Maintaining the Coordination Time Interval Between the Relays in Micro-grid
Conventional power system alone cannot meet the ever growing needs of electrical power in the world in a reliable manner. Under these circumstances, large penetration of Dis- tributed generators in the distribution level ... -
Visual Speech Recognition
Visual speech recognition (VSR), or automatic lip-reading, is the task of extracting speech information from visual input. The addition of visual speech has been shown to improve the performance of traditional audio ... -
Multiview Registration Using Rank-Constrained Semide nite Programming
We consider the problem of reconstructing a 3D surface from its multiview scans. Typically, the computational pipeline for this problem has two phases: (I) finding point-to-point correspondences between overlapping scans, ... -
Robust Risk Minimization under Label Noise
In the setting of supervised learning, one learns a classi fier from training data consisting of patterns and the corresponding labels. When labels of the examples in training data have errors, it is referred to as label ... -
Strategies for Handling Large Vocabulary and Data Sparsity Problems for Tamil Speech Recognition
This thesis focuses on the design and development of every building block of a very large vocabulary, continuous speech recognition (LVCSR) system and various experiments conducted in order to enhance its performance. ... -
Total Electric Field due to an Electron Avalanche and it's coupling to Transmission Line Conductors
Transmission of bulk electric power from the generating stations to the load centres can be carried out only through high voltages transmission lines. One of the main issues in the design and maintenance of extra and ... -
Theoretical and Algorithmic Aspects of Rigid Registration
In this thesis, we consider the rigid registration problem, which arises in applications such as sensor network localization, multiview registration, and protein structure determination. The abstract setup for this problem ... -
Precoding and Channel Estimation Schemes for MIMO VLC Systems
Increase in the usage of smartphones and growing demand for data have resulted in congestion in the RF spectrum. To ease the overcrowding of RF spectrum, there is a need for wireless communication systems that can ... -
Spectral Efficiency Improvement in Spatial Modulation Systems
A novel energy efficient Multiple-Input-Multiple-Output (MIMO) technique is called Spatial Mod- ulation (SM). It uses only one radio frequency (RF) chain that reduces the hardware complexity and cost of the system. The ... -
On Some Questions Involving Prefix Codes
Let A be a finite alphabet and A be the set of all finite sequences of the elements of A. A word is any member of A . A prefix code X is a set of words satisfying the prefix property, i.e., no word in the set is a prefix ... -
Mask Estimator Approaches For Audio Beamforming
Beamforming is a family of algorithms and performs a spatial filtering operation that makes it possible to map the distribution of the sources at a certain distance from the microphones and therefore locate the ... -
Improved Generative Models for Zero-shot object recognition
Recognizing objects from their images automatically using computers is an important research area in the computer vision community. In this scenario, the testing images are automatically classified into one of the classes ... -
Codes for distributed storage, private information retrieval and low-latency streaming
This thesis presents results on error correcting codes for settings such as: (a) distributed storage, (b) private information retrieval, and (c) low-latency streaming. It also presents two new decoding algorithms for Polar ... -
Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions.
Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ... -
Learning Tournament Solutions from Preference-based Multi-Armed Bandits
We consider the dueling bandits problem, a sequential decision task where the goal is to learn to pick `good' arms out of an available pool by actively querying for and observing relative preferences between selected pairs ... -
Pronunciation assessment and semi-supervised feedback prediction for spoken English tutoring
Spoken English pronunciation quality is often influenced by the nativity of a learner, for whom English is the second language. Typically, the pronunciation quality of a learner depends on the degree of the following four ... -
Efficient and Secure Search over Encrypted Data
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the ... -
Program Analyses to Support Memory-saving Refactorings in Java Programs
Software commonly consumes unexpectedly high amounts of memory, frequently due to programming idioms that are used to make software more reliable, maintainable and understandable. In the case of modern object-oriented ... -
Cross-Modal Retrieval and Hashing
The objective of cross-modal retrieval is to retrieve relevant items from one modality (say image), given a query from another modality (say textual document). Cross-modal retrieval has various applications like matching ... -
Soft Switched Multilevel Unidirectional High Frequency Link DC to AC Converter for Medium Voltage Grid Integration of Solar Photovoltaics
Grounding the frame of photovoltaic (PV) panel is a necessity for the safety of humans. This leads to the formation of large capacitance between PV cells and ground. Hence, to reduce leakage current due to parasitic ...