Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj Jun 2009

A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj

Electrical & Computer Engineering Faculty Research

This paper discusses the symbolic functional decomposition method for implementing finite state machines in field-programmable gate array devices. This method is a viable alternative to the presently widespread two-step approaches to the problem, which consist of separate encoding and mapping stages; the proposed method does not have a separate decomposition step instead, the state's final encoding is introduced gradually on every decomposition iteration. Along with general description of the functional symbolic decomposition method's steps, the paper discusses various algorithms implementing the method and presents an example realisation of the most interesting algorithm. In the end, the paper compares the results …


Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes May 2009

Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes

UNLV Theses, Dissertations, Professional Papers, and Capstones

The objective of this thesis is to discuss the viability of using pyroelectric infrared (PIR) sensors as a biometric system for human identification.

The human body emits infrared radiation, the distribution of which varies throughout the body, and depends upon the shape and composition of the particular body part. A PIR sensor utilizing a Fresnel lens will respond to this infrared radiation. When a human walks, the motion of the body's individual components form a characteristic gait that is likely to affect a PIR sensor field in a unique way.

A statistical model, such as a Hidden Markov Model, could …


Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi May 2009

Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automatic Text categorization is the task of assigning an electronic document to one or more categories, based on its contents. There are many known techniques to efficiently solve categorization problems. Typically these techniques fall into two distinct methodologies which are either logic based or probabilistic. In recent years, many researchers have tried approaches which area hybrid of these two methodologies.

In this thesis, we deal with document categorization using Apriori Algorithm. The Apriori algorithm was initially developed for data mining and basket analysis applications in the relational databases. Although the technique is logic based, it also relies on the statistical …


Scheduling Architectures For Diffserv Networks With Input Queuing Switches, Mei Yang, Henry Selvaraj, Enyue Lu, Jianping Wang, S. Q. Zheng, Yingtao Jiang Jan 2009

Scheduling Architectures For Diffserv Networks With Input Queuing Switches, Mei Yang, Henry Selvaraj, Enyue Lu, Jianping Wang, S. Q. Zheng, Yingtao Jiang

Electrical & Computer Engineering Faculty Research

ue to its simplicity and scalability, the differentiated services (DiffServ) model is expected to be widely deployed across wired and wireless networks. Though supporting DiffServ scheduling algorithms for output-queuing (OQ) switches have been widely studied, there are few DiffServ scheduling algorithms for input-queuing (IQ) switches in the literaure. In this paper, we propose two algorithms for scheduling DiffServ DiffServ networks with IQ switches: the dynamic DiffServ scheduling (DDS) algorithm and the hierarchical DiffServ scheduling (HDS) algorithm. The basic idea of DDS and HDS is to schedule EF and AF traffic According to Their minimum service rates with the reserved bandwidth …


Free Regions Of Sensor Nodes, Laxmi P. Gewali, Navin Rongatana, Henry Selvaraj, Jan B. Pedersen Jan 2009

Free Regions Of Sensor Nodes, Laxmi P. Gewali, Navin Rongatana, Henry Selvaraj, Jan B. Pedersen

Electrical & Computer Engineering Faculty Research

We introduce the notion of free region of a node in a sensor network. Intuitively, a free region of a node is the connected set of points R in its neighborhood such that the connectivity of the network remains the same when the node is moved to any point in R. We characterize several properties of free regions and develop an efficient algorithm for computing them. We capture free region in terms of related notions called in-free region and out-free region. We present an O(n2) algorithm for constructing the free region of a node, where n is the number of …


Performance Evaluation Of Network-On-Chip Interconnect Architectures, Xinan Zhou Jan 2009

Performance Evaluation Of Network-On-Chip Interconnect Architectures, Xinan Zhou

UNLV Theses, Dissertations, Professional Papers, and Capstones

With a communication design style, Network-on-Chips (NoCs) have been proposed as a new Multi-Processor System-on-Chip paradigm. Simulation and functional validation are essential to assess the correctness and performance of the NoC design. In this thesis, a cycle-accurate NoC simulation system in Verilog HDL is developed to evaluate the performance of various NoC architectures. First, a library of NoC components is developed based on an existing design. Each NoC architecture to be evaluated is constructed from the library according to the topology description which specifies the network topology, network size, and routing algorithm. The network performance of four NoC architectures under …


Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine Jan 2009

Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis presents both a review of current MANET routing protocols and a new MANET routing algorithm. The routing protocols reviewed include representative samples from the three primary forms of routing found in MANETS: proactive routing, reactive routing and hybrid routing. Secure algorithms are given special treatment in the review. In addition several protocol enhancements are discussed.

The proposed routing protocol is designed to support networks of a medium size, containing over 200 nodes but less than 3,000 nodes. The design is intentionally simple to allow ease of implementation in comparison with other MANET protocols that provide similar functionality.


On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava Jan 2009

On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

We describe a real time system for recognition and tracking 3D objects such as UAVs, airplanes, fighters with the optical sensor. Given a 2D image, the system has to perform background subtraction, recognize relative rotation, scale and translation of the object to sustain a prescribed topology of the fleet. In the thesis a comparative study of different algorithms and performance evaluation is carried out based on time and accuracy constraints. For background subtraction task we evaluate frame differencing, approximate median filter, mixture of Gaussians and propose classification based on neural network methods. For object detection we analyze the performance of …


Extents And Limits Of Radioscopic Detection Of Nuclear Materials In Cargo Containers With Two Megavoltage Energy Barriers, Vijay Kumar Mandava Jan 2009

Extents And Limits Of Radioscopic Detection Of Nuclear Materials In Cargo Containers With Two Megavoltage Energy Barriers, Vijay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

The megavoltage X-ray technology is utilized for detecting nuclear materials in cargo containers. Interlaced response is obtained by switching rapidly between 6MeV and 9 MeV beams. It is known that the ratio of penetration levels of cargo contents taken at nominal and dual energies provides the information about atomic numbers of materials, and thus can also indicate the threat group. However, the identification is not straightforward if combinations of materials are present. The latter can lead to misdetections. It is imperative to know what are the extent and the limit of the currently employed technology, and how to carry out …