Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Automatic speech recognition | Speech synthesis | Neural networks (Computer science) (1)
- Carbon nanowalls (1)
- Computer network architectures | Business networks | Mobile computing | Wide area networks (Computer networks) (1)
- Cryptography | Cell phone systems | Wireless communication systems (1)
- Local area networks (Computer networks) | Wireless communication systems | Wireless LAN's | Radio frequency identification systems (1)
-
- Magnetic field distribution (1)
- Porous silicon (1)
- Radio frequency chemical vapor deposition (1)
- Radio frequency identification systems | Sensor networks | Freight and freightage -- Management | Inventory control -- Automation | Business logistics | Computer vision | Business logistics | Physical distribution of goods (1)
- Raman scattering (1)
- Semiconductor device structure (1)
- Wireless communication systems | Telecommunication | Computational intelligence (1)
- Wireless sensor networks | Computer network protocols (1)
Articles 1 - 10 of 10
Full-Text Articles in Engineering
A Two Dimensional Model Of Magnetic Field Assisted Assembly, Gaurev Devrani
A Two Dimensional Model Of Magnetic Field Assisted Assembly, Gaurev Devrani
Theses
A simplified model to simulate the magnetic field distribution for applications in magnetic field assisted assembly of semiconductor device structures, using commercial software (Vizimag), has been implemented. Solenoids have been utilized to serve as electromagnets that are responsible for the assembly process. Magnetic shielding techniques have been deployed to isolate the influence of one solenoid over another. These solenoids are used to move the devices that need to be placed in recesses within the substrate. The bottom of the devices and the recesses are coated with magnetic materials to facilitate the movement and placement of devices within the recesses in …
Synthesis And Analysis Of Carbon Nanowalls And Their Raman Spectroscopy, Amit Mahajan
Synthesis And Analysis Of Carbon Nanowalls And Their Raman Spectroscopy, Amit Mahajan
Theses
Growth of Carbon Nanowalls has been carried out by Radio Frequency Chemical Vapor Deposition (RF-PECVD) on various substrates. Hydrogen was used as an active gas for the growth where as Ethanol bubbled with Argon was used as carbon source for formation of Carbon Nanowalls (CNW). The growth was then confinned by Raman Spectroscopy and Scanning Electron Microscope (SEM) images. Also the need of using catalyst in CNW has been analyzed. The intensities of D and G bands obtained from Raman spectrum have been related to the length of Graphene walls, to study the CNW's length on different substrates.
The growth …
Raman Scattering In Free Standing Porous Si Films, Thenappan Chidambaram
Raman Scattering In Free Standing Porous Si Films, Thenappan Chidambaram
Theses
In this thesis, Raman Scattering of free standing porous silicon on sapphire samples of controllably varying porosity is studied. The free standing, fully crystalline porous silicon films were prepared by electrochemical etching and the porous structure were lifted-off by a procedure based on electro-polishing. During Raman scattering measurements, the samples are exposed to relatively high intensity laser radiation. Free-standing porous Si sample temperature and thermal conductivity are calculated by comparing intensities of Stokes and anti-Stokes Raman peaks. Compared to crystalline Si, we find strong decrease in thermal conductivity accompanied by a change in the phonon spectra. Also, comparing Stokes and …
Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan
Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan
Theses
Communication systems are undergoing constant and rapid innovation, both at the design stage and in the field. This in turn has led to an inereasing need for fast, efficient, portable and economic methods for the testing of these systems. For voice carrying communication systems the quality of the transmitted voice that the system produces is a large factor in the overall performance rating of the system. This measure is known as the ‘Quality of Voice’ (QoV) and can be evaluated either subjectively or objectively.
Speech quality is a complex subjective phenomenon that can be best quantified by subjective testing. A …
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Theses
Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.
Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer, Panneer Selvan Muthukumaran
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer, Panneer Selvan Muthukumaran
Theses
Wireless sensor network is a network of sensor nodes that function in a cooperative manner to monitor the changes in the physical environment. Wireless sensor networks are used in environment and habitat monitoring, healthcare applications, building automation, and traffic control to name a few. Typically, wireless sensor node is a low power embedded device which consists of a microcontroller, sensors, wireless transceiver and a battery. These devices are usually distributed in a physical environment which makes it difficult to maintain the network manually.
The IEEE 802.15.4 and Zigbee are considered as standard protocols for wireless sensor networks. The IEEE 802.15.4 …
Management Framework For Hybrid Wireless Networks, Chong Shen
Management Framework For Hybrid Wireless Networks, Chong Shen
Theses
The objective of the Hybrid Wireless Network with dedicated Relay Nodes (HWN*) architecture is to interface the Base Station (BS) Oriented Mobile Network (BSON) and the 802.fix based Mobile Ad hoc Wireless Network (MANET) so that one system can be utilised as an alternative radio access network for data transmissions, while the incorporation of Relay Nodes (RN) is to extend the communication coverage, optimise medium resource sharing, increase spatial reuse opportunity, stabilise MANET link and create more micro-cells. The HWN* keeps the existing cellular infrastructure and a Mobile Terminal (MT) can borrow radio resources from other cells via secure multi-hop …
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
Theses
The recent dramatic trend towards always-on-connectivity has driven the need for mobile ubiquitous computing environments with the advent of the Wireless Local Area Network (WLAN) seeing a shift from traditional wired networks to wireless networking. A WLAN typically contains a number of access points that allow wireless enabled clients access information and network resources such as the internet without the need for wires, offering flexibility and mobility to the users. Initial wireless networks were convenience based allowing users access to the primary wired network, and involved little planning prior to roll-out. The proliferation of low cost wireless devices combined wdth …
Container Management And Monitoring Using Sensor Networks, Daniel Rogóz
Container Management And Monitoring Using Sensor Networks, Daniel Rogóz
Theses
The purpose of this project was to develop a functional prototype of a container management and monitoring system, which allows identification and tracking of shipping containers in a port terminal from the moment they enter a port to when they depart for their final destination.
Such system can significantly reduce the labor and time costs associated with organizational mistakes that can occur when containers are being on/off-loaded, moved and stacked in tiers for transfer to the rail or road network. It can be used to streamline the container transport, optimize the order of container on/off-loading and placement, as well as …
Design, Implementation And Evaluation Of A Networking Context Aware Policy Environment, Asanga Dhammika Udugama
Design, Implementation And Evaluation Of A Networking Context Aware Policy Environment, Asanga Dhammika Udugama
Theses
Future mobile networks are anticipated to have support to access heterogeneous access technologies. An important question in such environments is the decisions on when to use what access network. These decisions must take the users and mobile network operators’ perspectives into consideration. The operators usually have a focus of always-best-managed networks while the users have an always-best-connected focus. A key enabler of such environments is the use of policies to perform these handover decisions. These policies, which must be dynamic in nature, should be configurable when the requirements change. Policy decisions are always made based on the current context of …