Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

FIU Electronic Theses and Dissertations

2005

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Optimal Image Deconvolution By Range And Noise Moment Constraints, Angelica Maria Diaz Aug 2005

Optimal Image Deconvolution By Range And Noise Moment Constraints, Angelica Maria Diaz

FIU Electronic Theses and Dissertations

Image deconvolution, also known as image restoration, is concerned with the estimation of an uncorrupted image from a noisy, degraded one. The degradation of this image may be caused by defects of optical lenses, nonlinearity of the electro-optical sensor, relative motion between an object and camera, wrong focus, etc. By assuming a degradation model, one can formulate and develop a restoration algorithm. In this thesis, the developed algorithms are iterative deconvolution methods based on noise moment and pixel range constraints. The moments were used to ensure that noise associated with the deconvolution solution satisfies predetermined statistics. The pixel range constraints …


Secure Routing And Trust Computation In Multihop Infrastructureless Networks, Tirthankar Ghosh Jun 2005

Secure Routing And Trust Computation In Multihop Infrastructureless Networks, Tirthankar Ghosh

FIU Electronic Theses and Dissertations

Today's wireless networks rely mostly on infrastructural support for their operation. With the concept of ubiquitous computing growing more popular, research on infrastructureless networks have been rapidly growing. However, such types of networks face serious security challenges when deployed. This dissertation focuses on designing a secure routing solution and trust modeling for these infrastructureless networks.

The dissertation presents a trusted routing protocol that is capable of finding a secure end-to-end route in the presence of malicious nodes acting either independently or in collusion, The solution protects the network from active internal attacks, known to be the most severe types of …