Circular Image

R.R. Venkatesha Prasad

40 records found

With the rise of the artificial intelligence starting in the late 2010s there has been a great increase of demand for neural networks. It seems AI is omnipresent these days, whether it is OpenAI releasing the famous or infamous large language model chatGPT, Google following by ad ...
This thesis researches the security of firmware images in the Internet of Things (IoT) and embedded devices. We present an open-source tool, Embedded Binary Analysis Tool (EBAT), designed to analyze cross-architectural firmware image security context. EBAT consists of various mod ...

Sonic Filter Localization

Integrating Particle Filter with Sound Source Localization techniques to achieve accurate indoor localization

For my master’s thesis, I developed a novel indoor localization approach that can achieve accurate localization results. Indoor localization is a well-known topic of research, and many attempts have been made to find the so-called holy grail. For a robotic car swarm to be able to ...

Exploring Bandit Algorithms in Sparse Environments

Does increasing the level of sparsity enhance the advantage of sparsity-adapted Multi-Armed Bandit algorithms?

In sequential decision-making, Multi-armed Bandit (MAB) models the dilemma of exploration versus exploitation. The problem is commonly situated in an unknown environment where a player iteratively selects one action from a set of predetermined choices. The player's choices can be ...
This thesis investigates the performance of various bandit algorithms in non-stationary contextual environments, where reward functions change unpredictably over time. Traditional bandit algorithms, designed for stationary settings, often fail in dynamic real-world scenarios. Thi ...

Comparing bandit algorithms in static and changing environments

An experimental study on the regret performance of bandit algorithms in various environments

The aim of this paper is to show experimental data on the regret-based performance of various solver algorithms within a class of decision problems called Multi-Armed Bandits. This can help to more efficiently choose the algorithm most suited for an application and to reduce the ...

Exploring Bandit Algorithms in User-Interactive Systems

Influence of Delay on Contextual Multi-Armed Bandits

Delay is a frequently encountered phenomenon in Multi-armed bandit problems that affects the accuracy of choosing the optimal arm. One example of this phenomenon is online shopping, where there is a delay between a user being recommended a product and placing the order. This stud ...
The aim of this paper is to challenge and compare several Multi-Armed Bandit algorithms in an en- vironment with fixed kernelized reward and noisy observations. Bandit algorithms are a class of decision-making problems with the goal of opti- mizing the trade-off between explorati ...
Saxophone is a musical instrument that tends to be out of tune. I have invented an automatic tuning saxophone mouthpiece that can help saxophonists play in tune by correcting their notes' frequencies in real time during performances using a stepper motor.
This thesis addresses the challenge of refactoring untyped actor systems into typed ones, particularly within the Scala ecosystem using Akka framework \cite{akkaTypedDocs/Online}. The actor model, with its message-passing architecture, offers a solution to concurrency and scalabi ...
Internet of Things (IoT) devices regularly process sensitive data, including personal information. Therefore, ensuring their security is crucial to avoid damage and prevent data breaches. The Advanced Encryption Standard (AES) is generally regarded as one of the most popular cryp ...
Rowhammer is a security exploit used to cause bit errors DRAM chips. Newer DRAM technologies are becoming more vulnerable to rowhammer attacks, and existing protec- tion methods are starting to reach their limits. This thesis provides methods for DRAM characterization by means of ...
This paper describes the feasibility of digit detection using three photodiodes and an Arduino Nano 33 BLE. This is done using a controlled lighting condition, using a bright lamp. It dives into the process of data collection, preprocessing and model selection for a recurrent neu ...
This paper presents a study focused on developing an efficient signal processing pipeline and identifying suitable machine learning models for real-time gesture recognition using a testbed consisting of an Arduino Nano 33 BLE and three OPT101 photodiodes. Our research aims to add ...
Visible light sensing is a field of research that creates new possibilities for human-computer interaction. This research shows the viability of designing a system for detecting hand gestures using a cost-effective detection circuit employing 3 light-sensitive photodiodes. The wa ...

Touchless Hand Gesture-Based Digit Recognition

Using Light-Sensors, Convolutional Neural Networks and a Microcontroller

Touchless interaction with computers has become more important in recent years, especially in the context of the COVID-19 pandemic.
Applications include situations where touch input is not possible or not desirable, e.g. for hygienic purposes in a public setting or a medical ...

Backoff Reset

Finding the limits of IEEE 802.11 modelling

This thesis has studied an oversight in the scientific literature on Wi-Fi 6 modelling and attempts to quantify the prevalence and effect of this omission.
This effect was dubbed the ”backoff reset” and roughly means that a device connected to a Wi-Fi 6 network that recently ...
The current state of teleoperation in Tactile Internet faces the problem of limited operating distance. To circumvent this limitation, a setup has been proposed which provides Ultra-Low Latency feedback to the operator from a local simulation of the remote environment. To be able ...