Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Entire DC Network

Touch-Screen Sd Card Text Reader, Samia Rahman Nov 2009

Touch-Screen Sd Card Text Reader, Samia Rahman

Honors Theses

No abstract provided.


Intelligent-Navigating, Maze-Mapping, And Maze-Solving Robot Equipped With Sensors, Compass, And Gps System, Yunan Yuan May 2009

Intelligent-Navigating, Maze-Mapping, And Maze-Solving Robot Equipped With Sensors, Compass, And Gps System, Yunan Yuan

Honors Theses

No abstract provided.


Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass Jan 2009

Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass

LSU Master's Theses

The use of simulation is well established in processor design research to evaluate architectural design trade-offs. More importantly, Cycle by Cycle accurate simulation is widely used to evaluate the new designs in processor research because of its accurate and detailed processor performance measurement. However, only configuration in a subspace can be simulated in practice due to its long simulation time and limited resources, leading to suboptimal conclusions that might not be applied to the larger design space. In this thesis, we propose a performance prediction approach which employs a state-of-the-art technique from experimental design, machine learning and data mining. Our …


Task Scheduling And Placement For Reconfigurable Devices, Mostafa Elbidweihy Jan 2009

Task Scheduling And Placement For Reconfigurable Devices, Mostafa Elbidweihy

LSU Doctoral Dissertations

Partially reconfigurable devices allow the execution of different tasks at the same time, removing tasks when they finish and inserting new tasks when they arrive. This dissertation investigates scheduling and placing real-time tasks (tasks with deadline) on reconfigurable devices. One basic scheduler is the First-Fit scheduler. By allowing the First-Fit scheduler to retry tasks while they can satisfy their deadlines, we found that its performance can be enhanced to be better than other schedulers. We also proposed a placement idea based on partitioning the reconfigurable area into regions of various widths, assigning a task to a region based on its …


Sophisticated Denial-Of-Service Attack Detections Through Integrated Architectural, Os, And Appplication Level Events Monitoring, Ran Tao Jan 2009

Sophisticated Denial-Of-Service Attack Detections Through Integrated Architectural, Os, And Appplication Level Events Monitoring, Ran Tao

LSU Master's Theses

As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well explored and widely used in both commercial tools and research works. Such IDS framework is built upon features extracted from the network traffic, which are application-level features, and is effective in detecting flooding-based DoS attacks. However, in a sophisticated DoS attack, where an attacker manages to bypass the network-based monitors and launch a DoS attack locally, sniffer-based methods have difficulty in differentiating attacks with normal behaviors, since the malicious connection itself behaves in the same manner of normal connections. In this work, we study a …


Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj Jan 2009

Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj

LSU Master's Theses

In this work, a ternary to binary converter circuit is designed in 0.5μm n-well CMOS technology. The circuit takes two inputs corresponding to the ternary bits and gives four outputs, which are the binary equivalent bits of the ternary inputs. The ternary inputs range from (-1,-1)3 to (1,1) 3 which are decimal -4 to 4 and the four binary output bits are the sign bit (SB), most significant bit (MSB), second significant bit (SSB) and the least significant bit (LSB). The ternary inputs (-1, 0 and 1) are represented in terms of voltages of -3V, 0V and 3V. Multiple …


Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song Jan 2009

Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song

LSU Master's Theses

For a wide range of application areas such as medical instruments, defense, communication networks, industrial equipment, and consumer electronics, microscanners have been a vibrant research topic. Among various fabrication methodologies, MEMS (microelectromechanical system) stands out for its small size and fast response characteristics. In this thesis, piezoelectric actuation mechanism is selected because of its low voltage and low current properties compared with other mechanisms, which are especially important for the target application of biomedical imaging. Although 1- and 2-dimensional microscanners with piezoelectric actuators have been studied by several other groups, this thesis introduces innovative improvements in design of the piezoelectric …


Physical Layer Security In Wireless Networks: Intelligent Jamming And Eavesdropping, George Traian Amariucai Jan 2009

Physical Layer Security In Wireless Networks: Intelligent Jamming And Eavesdropping, George Traian Amariucai

LSU Doctoral Dissertations

This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first two chapters we study the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no knowledge about either the codebook used by the legitimate communication terminals, or the source’s output. Both transmitter and jammer are subject to power constraints which can be enforced over each codeword (peak) or over all codewords (average). All our jamming problems are formulated as zero-sum games, having the probability of outage …


Super Resolution And Dynamic Range Enhancement Of Image Sequences, Lutfi Murat Gevrekci Jan 2009

Super Resolution And Dynamic Range Enhancement Of Image Sequences, Lutfi Murat Gevrekci

LSU Doctoral Dissertations

Camera producers try to increase the spatial resolution of a camera by reducing size of sites on sensor array. However, shot noise causes the signal to noise ratio drop as sensor sites get smaller. This fact motivates resolution enhancement to be performed through software. Super resolution (SR) image reconstruction aims to combine degraded images of a scene in order to form an image which has higher resolution than all observations. There is a demand for high resolution images in biomedical imaging, surveillance, aerial/satellite imaging and high-definition TV (HDTV) technology. Although extensive research has been conducted in SR, attention has not …


Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala Jan 2009

Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala

LSU Master's Theses

A third order Cascaded Integrated Comb (CIC) filter has been designed in 0.5μm n-well CMOS process to interface with a second order oversampling sigma-delta ADC modulator. The modulator was designed earlier in 0.5μm technology. The CIC filter is designed to operate with 0 to 5V supply voltages. The modulator is operated with ±2.5V supply voltage and a fixed oversampling ratio of 64. The CIC filter designed includes integrator, differentiator blocks and a dedicated clock divider circuit, which divides the input clock by 64. The CIC filter is designed to work with an ADC that operates at a maximum oversampling clock …


Compilation And Scheduling Techniques For Embedded Systems, Hassan Salamy Jan 2009

Compilation And Scheduling Techniques For Embedded Systems, Hassan Salamy

LSU Doctoral Dissertations

Embedded applications are constantly increasing in size, which has resulted in increasing demand on designers of digital signal processors (DSPs) to meet the tight memory, size and cost constraints. With this trend, memory requirement reduction through code compaction and variable coalescing techniques are gaining more ground. Also, as the current trend in complex embedded systems of using multiprocessor system-on-chip (MPSoC) grows, problems like mapping, memory management and scheduling are gaining more attention. The first part of the dissertation deals with problems related to digital signal processors. Most modern DSPs provide multiple address registers and a dedicated address generation unit (AGU) …


Fault Detection Filter Design For Linear Systems, Xiaobo Li Jan 2009

Fault Detection Filter Design For Linear Systems, Xiaobo Li

LSU Doctoral Dissertations

This dissertation considers residual generation for robust fault detection of linear systems with control inputs, unknown disturbances and possible faults. First, multi-objective fault detection problems such as $\mathscr{H_-}/ \mathscr{H_\infty}$, $\mathscr{H}_2/\mathscr{H_\infty}$ and $\mathscr{H_\infty}/\mathscr{H_\infty}$ have been formulated for linear continuous time-varying systems (LCTVS) in time domain for finite horizon and infinite horizon case, respectively. It is shown that under mild assumptions, the optimal solution is an observer determined by solving a standard differential Riccati equation (DRE). The solution is also extended to the case when the initial state for the system is unknown. Second, the parallel problems are also solved for linear …


Bilateral Filter In Image Processing, Ming Zhang Jan 2009

Bilateral Filter In Image Processing, Ming Zhang

LSU Master's Theses

The bilateral filter is a nonlinear filter that does spatial averaging without smoothing edges. It has shown to be an effective image denoising technique. It also can be applied to the blocking artifacts reduction. An important issue with the application of the bilateral filter is the selection of the filter parameters, which affect the results significantly. Another research interest of bilateral filter is acceleration of the computation speed. There are three main contributions of this thesis. The first contribution is an empirical study of the optimal bilateral filter parameter selection in image denoising. I propose an extension of the bilateral …


Scheduling And Reconfiguration Of Interconnection Network Switches, Krishnendu Roy Jan 2009

Scheduling And Reconfiguration Of Interconnection Network Switches, Krishnendu Roy

LSU Doctoral Dissertations

Interconnection networks are important parts of modern computing systems, facilitating communication between a system's components. Switches connecting various nodes of an interconnection network serve to move data in the network. The switch's delay and throughput impact the overall performance of the network and thus the system. Scheduling efficient movement of data through a switch and configuring the switch to realize a schedule are the main themes of this research. We consider various interconnection network switches including (i) crossbar-based switches, (ii) circuit-switched tree switches, and (iii) fat-tree switches. For crossbar-based input-queued switches, a recent result established that logarithmic packet delay is …


Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng Jan 2009

Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng

LSU Master's Theses

The transmitter identification of the DTV systems becomes crucial nowadays. Transmitter identification (TxID, or transmitter fingerprinting) technique is used to detect, diagnose and classify the operating status of any radio transmitter of interest. A pseudo random sequence was proposed to be embedded into the DTV signal before transmission. Thus, the transmitter identification can be realized by invoking the cross-correlation functions between the received signal and the possible candidates of the pseudo random sequences. Gold sequences and Kasami sequences are two excellent candidates for the transmitter ID sequences as they provide a large family of nearly-orthogonal codes. In order to investigate …


Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla Jan 2009

Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla

LSU Master's Theses

We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the outputs are encrypted using a probabilistic cipher. The third party (enemy) fusion centers are unaware of the presence of the probabilistic encipher. We find the optimal (minimum-probability-of-error) fusion rule for the ally (friendly) fusion center subject to a lower bound on the the probability of error for the third-party fusion centers. To obtain the minimum probability of error, we first prove the quasi-convexity of error probability with respect to the sensor's threshold for a given …


Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk Jan 2009

Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk

LSU Master's Theses

In recent years, scientific applications have become increasingly data intensive. The increase in the size of data generated by scientific applications necessitates collaboration and sharing data among the nation's education and research institutions. To address this, distributed storage systems spanning multiple institutions over wide area networks have been developed. One of the important features of distributed storage systems is providing global unified name space across all participating institutions, which enables easy data sharing without the knowledge of actual physical location of data. This feature depends on the ``location metadata'' of all data sets in the system being available to all …