Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Development Of An Algorithm For Switching Compensator Control Based On The Currents' Physical Components Theory, Samuel Pearce Jan 2008

Development Of An Algorithm For Switching Compensator Control Based On The Currents' Physical Components Theory, Samuel Pearce

LSU Master's Theses

Development of a three-phase switching compensator algorithm, based on the Currents’ Physical Components (CPC) power theory and capable of performing in real time, is the subject of this thesis. The compensator algorithm could be implemented to control a PWM Inverter, which would perform as a shunt switching compensator of harmonic, reactive and unbalanced currents or a customizable combination of the three. The hardware used to demonstrate the ability of the algorithm to perform within the restraints or real time operation is a Motorola DSP56F807 evaluation mode DSP board and a set of voltage and current sensors. The Evaluation Board was …


Adjustable Speed Drives Laboratory Based On Dspace Controller, Kiran Kumar Gunda Jan 2008

Adjustable Speed Drives Laboratory Based On Dspace Controller, Kiran Kumar Gunda

LSU Master's Theses

This thesis refers to the EE 4490 Adjustable Speed Drives course, which is taught at Louisiana State University (LSU). The part of this course is variable speed AC and DC drives laboratory. The objective of this thesis is to modify the existing DSP Based Electric Drives Lab Manual developed by Department of Electrical and Computer Engineering, University of Minnesota in order to adjust it to the EE 4490 course syllabus and to verify the experiments by carrying out the tests on the lab equipment available at the Elec. & Comp. Eng. Dept at LSU. There are four major components, of …


Enhancing Security In Quantum Cryptography, Partha Basuchowdhuri Jan 2008

Enhancing Security In Quantum Cryptography, Partha Basuchowdhuri

LSU Master's Theses

Quantum Key Distribution was named as one of the top ten emerging technologies by Technology Review Journal in 2003 in their annual edition. The growth in quantum cryptography since the beginning of the millennium has been expedited by new theories and ideas. The introduction of practical quantum cryptosystems offered by USA based company MagiQTech and its European rival idQuantique has changed the face of cryptography. With active experimental research in USA, Europe, Japan and Singapore, the scope of quantum cryptography seems to be growing daily. When Bennett and Brassard proposed their BB84 protocol in Bangalore in 1984, no one would …


A Capacity-Approaching Coded Modulation Scheme For Non-Coherent Fading Channels, Youngjeon Cho Jan 2008

A Capacity-Approaching Coded Modulation Scheme For Non-Coherent Fading Channels, Youngjeon Cho

LSU Master's Theses

Approaching the Shannon limit of the communication channels has been studied by many researchers to efficiently and reliably transmit data through the channels. To solve this problem, various methods and schemes have been proposed for approaching the theoretical limit for Shannon’s channel capacity. Among them, both low-density parity check (LDPC) codes and Turbo codes have been proposed to minimize the bit error rate (BER). Therefore, understanding of LDPC codes and Turbo codes is useful for their applications in modern communication systems. The study about non-coherent channels, which do not require explicit knowledge or estimation of the channel state information, has …


The Design And Fabrication Of Pentacene Acoustic Charge Transfer Devices, Hua Shao Jan 2008

The Design And Fabrication Of Pentacene Acoustic Charge Transfer Devices, Hua Shao

LSU Master's Theses

Acoustic charge transport (ACT) devices are used to transfer electrical signals by surface acoustic waves (SAW), which are generated by interdigital transducers (IDT) on piezoelectric crystal substrates. In order to reduce fabrication cost, pentacene ACT is desired to transfer charge packages because of its reduced cost in. As some researchers reported, pentacene is a p type organic semiconductor, and can get high carrier mobility by growing in very pure crystalline structure under some specified growing conditions. In this project, charge transfer channel was made of crystal pentacene to form and carry the charge packages following SAW propagation. The pentacene ACT …


Voltage Dip Mitigation For Motor Starters Using An Adaptive High Speed Relay Protection On The High Voltage Transmission System, Cesar Alberto Rincon Jan 2008

Voltage Dip Mitigation For Motor Starters Using An Adaptive High Speed Relay Protection On The High Voltage Transmission System, Cesar Alberto Rincon

LSU Master's Theses

Currently, the aging state of the protection systems for industrial facilities is calling for a system-wide review of the equipment and the protection schemes used in all these places, calling for a new approach in the design and implementation of these systems. Some of these facilities house critical processes that can be seriously affected by a misoperation of equipment or a disturbance in the system, aspects ranging from safety of plant workers to millions of dollars in loss of production. In this thesis different contingency situations were explored for problems in the utility transmission system that could affect large industrial …


Physical Layer Secrecy Channel Coding, Bandali K. Akkawi Jan 2008

Physical Layer Secrecy Channel Coding, Bandali K. Akkawi

LSU Master's Theses

Wireless communications is expanding and becoming an indispensable part of our daily life. However, due to its channel open nature, it is more vulnerable to attacks, such as eavesdropping and jamming which jeopardize the confidentiality of wireless data, compared to its counter-part, wireline communications. Security in wireless communication is thus a very important factor that should be perfected to accommodate the rapid growth of wireless communication today. Motivated by information theoretic secrecy definitions, we adopt a simple way to define the secrecy of a system by looking at its Bit-Error-Rate (BER) curves, the correlation of error vectors and Log Likelihood …