Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 461-480 of 1279
-
Algorithms for Adjusted Load Flow Solutions using the Complementarity Principle
The state of a given power system i.e. voltage magnitudes and angles at all the buses can be computed using the Newton-Raphson Load Flow (NRLF) method when active power and reactive power loads are specified at all the ... -
Investigations on the Corona Degradation of Polymeric Insulating Samples
Insulators play an important role in the reliability and safe operation of EHV/UHV transmission lines. Recently several utilities in the country and elsewhere are using polymeric insulators for the high voltage transmission ... -
Enhancement of Small Signal Stability in Power Systems: Novel Approaches
The modern power system is a highly nonlinear system that operates in a constantly changing environment. Power system, need to maintain more or less flat voltage profile across the grid and maintain stability for small and ... -
On Applications of 3D-Warping and An Analysis of a RANSAC Heuristic
In recent years communication of the scene geometry is gaining importance. With development of technologies such as head mounted displays and Augmented Reality (AR) the need for efficient 3D scene communication is becoming ... -
Distributed Target Tracking in Camera Networks
Recently, there is a tremendous increase in usage of multi-camera set-up in many applications such as surveillance, smart homes, sports analysis etc. Since manual analysis of videos in multi-camera set-up is tedious and ... -
Optimal Routing and Data Transmission for Multi-Hop D2D Communications
Device-to-Device (D2D) communication, which enables direct link communication between nodes without going through the infrastructure, has received considerable attention in recent years, particularly in the context of ... -
Optimal Relay Selection in Interference-Constrained Underlay Cooperative Cognitive Radio
Cognitive radio (CR) promises to significantly improve the utilization of scarce wireless spectrum. In the underlay mode of CR, which is the focus of the thesis, a secondary user (SU) can simultaneously transmit on the ... -
Design of Communication Systems with Energy Harvesting Transmitters and Receivers
An energy harvesting node (EHN) operates using the energy harvested from the environment, e.g., solar, piezoelectric and radio frequency, which presents the tantalizing possibility of perpetually operating of sensor nodes. ... -
Blocker-tolerant Receiver Design Suitable for Software-defined and Cognitive Radio Applications
The ever growing demand for higher data rates and the heavy usage of wireless communication devices have created frequency congestion on certain bands of the radio spectrum. The push has been towards new standards that can ... -
Information-rich Sampling of Time-varying Signals
Confrontation with signal non-stationarity is a rule rather than an exception in the analysis of natural signals, such as speech, animal vocalization, music, bio-medical, atmospheric, ans seismic signals. Interestingly, ... -
Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures
Integrated Heterogeneous System (IHS) processors pack throughput-oriented GPGPUs along-side latency-oriented CPUs on the same die sharing certain resources, e.g., shared last level cache, network-on-chip (NoC), and the ... -
Performance Analysis of Space Shift Keying in Cooperative Relaying Systems
Spatial modulation (SM) is a relatively new and attractive modulation technique for multi-antenna wireless systems. In SM, only one among ns = 2m available transmit antennas, chosen on the basis of m information bits, is ... -
Accurate Estimation of Frequency and Phasor for Wide Area Monitoring and Control
Traditionally, monitoring and control functions in large power systems were based on measurements obtained locally. While small disturbances have their impact con ned locally to the area of disturbance, large disturbances ... -
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ... -
Cost Effective Multi-role Active EMI Filters for Switched Mode Converters
Switched mode power converters are a major source of conducted electromagnetic interference (EMI). The popular technique for mitigation of conducted EMI uses EMI filters. EMI filters may be classified in two types based ... -
Discharge Plasma based NOx Abatement in Engine Exhaust Assisted by Industry Wastes : A Parametric Evaluation with Diesel Fuels and Corona Electrodes
Diesel engines contribute to a large percentage of oxides of nitrogen (NOx) emission in the atmosphere. The NOx primarily consists of nitric oxide (NO) and nitrogen dioxide (NO2). With depleting fossil fuel supplies ... -
Modeling, Performance Analysis and Design of Wireless Networks for Embedded Sensing Applications
The general theme of this thesis is modeling, performance analysis, and design of wireless networks under standardized CSMA/CA MAC protocols. In particular, we consider two widely used MAC protocols, namely, IEEE 802.15.4, ... -
An Exploratory Framework for Cyclone Identification and Tracking
Analyzing depressions plays an important role in meteorology, especially in the study of cyclones. In particular, the study of the temporal evolution of cyclones requires a robust depression tracking framework. To cope ... -
Computing Contour Tress for 2D Piecewise Polynomial Functions
Contour trees are extensively used in scalar field analysis. The contour tree is a data structure that tracks the evolution of level set topology in a scalar field. Scalar fields are typically available as samples at ... -
New Models and Methods for Formation and Analysis of Social Networks
Social networks are an inseparable part of human lives, and play a major role in a wide range of activities in our day-to-day as well as long-term lives. The rapid growth of online social networks has enabled people to ...