Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 421-440 of 1279
-
Real-Time Status Updates Over Erasure Channels
Real-time decision making relies on the availability of accurate data and, as such, delivering status updates in a timely fashion is of paramount importance. In this thesis, we first look at the interplay between average ... -
Functional Safety Analysis Techniques for Integrated Circuits Used in Cyber-Physical Systems
Integrated Circuits (ICs) are used to realize multitude of real life systems. These real life systems have ICs interacting with physical systems (this combination being referred to as cyber-physical systems or hybrid ... -
Model Extraction Defense using Modified Variational Autoencoder
Machine Learning as a Service (MLaaS) exposes machine learning (ML) models that are trained on confidential datasets to users in the form of an Application Programming Interface (API). Since the MLaaS models are deployed ... -
FA RCU: Fault Aware Read-Copy-Update
Deferred freeing is the fundamental technique used in Read-Copy-Update (RCU) synchronization technique where reclamation of resources is deferred until the completion of all active RCU read-side critical sections. We observe ... -
Novel Neural Architecture for Multi-Hop Question Answering
Natural language understanding has been one of the key drivers responsible for advancing the eld of AI. To this end, automated Question Answering (QA) has served as an effective way of measuring the language understanding ... -
Model Extraction and Active Learning
Machine learning models are increasingly being offered as a service by big companies such as Google, Microsoft and Amazon. They use Machine Learning as a Service (MLaaS) to expose these machine learning models to the ... -
Investigation of Multi-Axis Beam Steering using Diffraction Grating
Optical beam-steering is becoming a key optical functionality in free space optical links used for communication and sensing. For example, in recent times, compact, wide-angle, fast, multi-axis beam steering is used ... -
On Linear Codes in Projective Spaces
The projective space $\mathbb{P}_q(n)$ of order $n$ over a finite field $\mathbb{F}_q$ is defined as the collection of all subspaces of the ambient space $\mathbb{F}_q^n$. The Grassmannian $\mathcal{G}_q(n, k)$ is the set ... -
Load Modulated Arrays for Multi-antenna Wireless Communications
Conventional multi-antenna transmitters use a separate RF chain (consisting of DACs, mixers, filters) and a power amplifier (PA) for each antenna element, and use modulation alphabets such as QAM/PSK for transmission. The ... -
Fault Location in Double Wye Shunt Capacitor Banks
Shunt capacitor banks (SCBs) are usually used for providing reactive power support to power systems. Reactive power support leads to power factor correction, voltage regulation and reduction of network losses. Outage of ... -
Modeling and Adaptive Scheduling Strategies for Distributed Graph Algorithms
Graph processing at scales of millions-billions of vertices and edges has become common to solve real-world problems in domains like social networks, smart cities and genomics. Distributed "Big Data" platforms for graph ... -
Model Checking Temporal Properties of Presburger Counter Systems
Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of counter systems. We address three predominant ... -
Algebraic Techniques for Error Correction in Random Networks
Abstract The transmission of data in the presence of errors and erasures over random networks, in situations where there is only partial information regarding the underlying network topology, has been interpreted in ... -
Reduced Feedback Schemes in 4g/5g Ofdm Systems: Modeling, Performance Analysis and Redesign
Reduced feedback schemes are a crucial component of orthogonal frequency division multiplexing-based 4G and 5G cellular systems that use downlink scheduling, adaptive modulation and coding, and multiple-input-multiple-output ... -
Designing Solutions to Some of the Issues in Ubiquitous Networks
The inception of ubiquitous computing goes back to late eighties, when the Research at the Xerox Palo Alto Research (PARC) started designing ubiquitous environment under the guidance of Mark Weiser. Ubiquitous computing ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ... -
Deep Learning for Bug Localization and Program Repair
In this thesis, we focus on the problem of program debugging and present novel deep learning based techniques for bug-localization and program repair. Deep learning techniques have been successfully applied to a variety ... -
Quantum-Drift-Diffusion Formalism Based Compact Model For Low Effective Mass Channel MOSFET
With the passage of time the semiconductor research community around the globe has progressed from a nearly four decades of dominating Silicon research to look for newer transistor materials, in the pursuit of more operating ... -
Electromagnetic Properties of Carbon Based Polymer Nanocomposites for Shielding, Chaffing and Camouflage Applications
High conductivity is a prerequisite for any material for it to be used in the field of electromagnetics. Metals like copper and aluminium are used for a variety of electromagnetic (EM) applications in industries like ... -
Power Electronic Technologies for Medium and High Power High Voltage Power Supplies
The performance of systems used in various high voltage applications depend majorly on the output voltage ripple of High Voltage Power Supplies (HVPS). One of the failure mode of microwave tube (MWT) commonly used in these ...