Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 441-460 of 1303
-
Fast total variation minimizing image restoration under mixed Poisson-Gaussian noise
Image acquisition in many biomedical imaging modalities is corrupted by Poisson noise followed by additive Gaussian noise. Maximum Likelihood Estimation (MLE) based restoration methods that use the exact Likelihood ... -
Modulation of Power Electronic Converter Fed Split-phase Induction Machine Drive
Induction machine (IM) is the workhorse of several industries due to its low cost and minimal maintenance. Power electronic converters play a major role in driving IMs which give better flexibility in these applications. ... -
On Orthogonal Time Frequency Space Modulation for Wireless Communications
Future wireless communication systems are envisioned to support diverse requirements that include high mobility application scenarios such as high-speed trains, and vehicle-to-vehicle and vehicle-toinfrastructure communications. ... -
Constant-rate Non-malleable Codes and their Applications
Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010, provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is ... -
Real-Time Status Updates Over Erasure Channels
Real-time decision making relies on the availability of accurate data and, as such, delivering status updates in a timely fashion is of paramount importance. In this thesis, we first look at the interplay between average ... -
Functional Safety Analysis Techniques for Integrated Circuits Used in Cyber-Physical Systems
Integrated Circuits (ICs) are used to realize multitude of real life systems. These real life systems have ICs interacting with physical systems (this combination being referred to as cyber-physical systems or hybrid ... -
Model Extraction Defense using Modified Variational Autoencoder
Machine Learning as a Service (MLaaS) exposes machine learning (ML) models that are trained on confidential datasets to users in the form of an Application Programming Interface (API). Since the MLaaS models are deployed ... -
FA RCU: Fault Aware Read-Copy-Update
Deferred freeing is the fundamental technique used in Read-Copy-Update (RCU) synchronization technique where reclamation of resources is deferred until the completion of all active RCU read-side critical sections. We observe ... -
Novel Neural Architecture for Multi-Hop Question Answering
Natural language understanding has been one of the key drivers responsible for advancing the eld of AI. To this end, automated Question Answering (QA) has served as an effective way of measuring the language understanding ... -
Model Extraction and Active Learning
Machine learning models are increasingly being offered as a service by big companies such as Google, Microsoft and Amazon. They use Machine Learning as a Service (MLaaS) to expose these machine learning models to the ... -
Investigation of Multi-Axis Beam Steering using Diffraction Grating
Optical beam-steering is becoming a key optical functionality in free space optical links used for communication and sensing. For example, in recent times, compact, wide-angle, fast, multi-axis beam steering is used ... -
On Linear Codes in Projective Spaces
The projective space $\mathbb{P}_q(n)$ of order $n$ over a finite field $\mathbb{F}_q$ is defined as the collection of all subspaces of the ambient space $\mathbb{F}_q^n$. The Grassmannian $\mathcal{G}_q(n, k)$ is the set ... -
Load Modulated Arrays for Multi-antenna Wireless Communications
Conventional multi-antenna transmitters use a separate RF chain (consisting of DACs, mixers, filters) and a power amplifier (PA) for each antenna element, and use modulation alphabets such as QAM/PSK for transmission. The ... -
Fault Location in Double Wye Shunt Capacitor Banks
Shunt capacitor banks (SCBs) are usually used for providing reactive power support to power systems. Reactive power support leads to power factor correction, voltage regulation and reduction of network losses. Outage of ... -
Modeling and Adaptive Scheduling Strategies for Distributed Graph Algorithms
Graph processing at scales of millions-billions of vertices and edges has become common to solve real-world problems in domains like social networks, smart cities and genomics. Distributed "Big Data" platforms for graph ... -
Model Checking Temporal Properties of Presburger Counter Systems
Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of counter systems. We address three predominant ... -
Algebraic Techniques for Error Correction in Random Networks
Abstract The transmission of data in the presence of errors and erasures over random networks, in situations where there is only partial information regarding the underlying network topology, has been interpreted in ... -
Reduced Feedback Schemes in 4g/5g Ofdm Systems: Modeling, Performance Analysis and Redesign
Reduced feedback schemes are a crucial component of orthogonal frequency division multiplexing-based 4G and 5G cellular systems that use downlink scheduling, adaptive modulation and coding, and multiple-input-multiple-output ... -
Designing Solutions to Some of the Issues in Ubiquitous Networks
The inception of ubiquitous computing goes back to late eighties, when the Research at the Xerox Palo Alto Research (PARC) started designing ubiquitous environment under the guidance of Mark Weiser. Ubiquitous computing ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...