Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 41-60 of 1277
-
Investigations on Extending the Linear Modulation Range of Multilevel Inverter Fed Induction Motor Drives
Multilevel inverter topologies find extensive industrial and automobile applications due to their utilization of lower voltage-rated switches and enhanced harmonic performance. Incorporating Pulse Width Modulation (PWM) ... -
Decentralized information flow control for the robot operating system
The Robot Operating System (ROS) is a popular open-source middleware widely used in the robotics community. While ROS provides extensive support for robotic application develop- ment, it lacks certain fundamental security ... -
Algorithmic Problems on Vertex Deletion and Graph Coloring
In the thesis, we mainly discuss variants of two well-studied graph theoretical problems - vertex deletion problem and graph coloring problem - both have been used to tackle many real-world problems in diverse fields. Vertex ... -
Adaptive Wideband Microwave Signal Processing Using Reconfigurable Integrated Photonics
The advancement of wireless communications in domains such as satellites, radars, 5G, and future technologies necessitates the utilization of broadband microwave and millimeter wave signal processing. Unlike their electronic ... -
Electro-optically Tunable General-Purpose Microwave Photonic Processors: Platforms, Device Analysis, and Auto-routing Algorithms
Photonic Integrated Circuits (PICs) have been primarily developed as application-specific PICs (ASPICs), relying on time-consuming fabrication processes and exhibiting insertion losses between interconnected ASPICs. To ... -
WiROS: A QoS Software Solution for ROS2 in a WiFi Network
Robot Operating System (ROS) has played a pivotal role as a communication middleware among different peripherals, including sensors and actuators of robotics and other systems, with the advancement of connected systems ... -
Privacy in Information Retrieval, Delivery and Distributed Computing
The aim of our work is to address the challenges of privacy in information retrieval, information delivery, and in distributed computing systems. We focus on reducing the download and upload costs and decreasing the ... -
Resource-Aware State-Triggered Networked Control Systems
State-triggered control is a popular control method in the field of networked control systems owing to its advantage of efficient utilization of resources while simultaneously achieving control objectives. In this control ... -
A Two Step Optimal Decoding for PSK and Trellis Coded Modulation in Noisy Index Coding Problem
Index coding is a communication problem in which a server has a set of messages and wants to broadcast them to a set of receivers. Each receiver is interested in a single message, but some of the receivers may have some ... -
Excitonic complexes in semiconducting monolayers and their twisted heterojunctions
Monolayers of transition metal dichalcogenides (TMDCs) host excitons, a bound state of electron and hole. Excitonic many-body complexes dominate the optical spectra obtained from this system and manipulating these complexes ... -
Exploring Welfare Maximization and Fairness in Participatory Budgeting
Participatory budgeting (PB) is a voting paradigm for distributing a divisible resource, usually called a budget, among a set of projects by aggregating the preferences of individuals over these projects. It is implemented ... -
Specification Synthesis with Constrained Horn Clauses
Many practical problems in software development, verification and testing rely on specifications. The problem of specification synthesis is to automatically find relational constraints for undefined functions, called ... -
Generalized Likelihood Ratio Procedures for Early Detection of Machine Faults
Condition monitoring of industrial machinery is an important example of a cyber physical system (CPS), in which measurements on a machine, transmitted over a wireless network, are used to make inferences about the health ... -
Maximum Independent Set of Rectangles - An Empirical Study
We study the Maximum Independent Set of Rectangles (MISR) problem. The problem involves a collection of n axis-parallel rectangles in 2D with weights. For the unweighted case, the goal is to find the maximum number of ... -
Stochastic Methods in Time-Domain Electromagnetic Computations
The world is advancing towards a highly connected, fast data rate, digital trans- formation through communication technologies like 5G and 6G, high-speed data centres, Terahertz imaging etc. High-frequency RF systems are ... -
Studies on EEG correlates of non-ordinary states of consciousness and slow-paced breathing
Studies on the non-ordinary states of consciousness (NSCs) induced by meditation, hypnosis, trance, and slow-paced breathing are gaining visibility due to their potential efficacy in treating various clinical conditions. ... -
Temporal Point Processes for Forecasting Events in Higher-Order Networks
Real-world systems consisting of interacting entities can be effectively represented as time-evolving networks or graphs, where the entities are depicted as nodes, and the interactions between them are represented as ... -
Energy-efficient Hardware and Algorithmic Techniques for Design of Low-power Intelligent Systems
Low-power design techniques involving hardware and algorithms framework are a fundamental challenge of the modern electronic system. The internet connects devices (IoTs) with advanced capabilities in sensing and processing ... -
High Dimensional Quantum Information Technology Using Photonics: Protocol Development and Implementation Schemes
This thesis explores the realm of high-dimensional quantum information processing through the lens of photonics, focusing on developing and implementing quantum technologies based on d-level quantum systems known as qudits. ... -
Secure Computation Protocol Suite for Privacy-Conscious Applications
As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...