Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Engineering

Study Of Si/Sio2 Interface Passivation And Sio2 Reliability On Deuterium Implanted Silicon, Tias Kundu Aug 2005

Study Of Si/Sio2 Interface Passivation And Sio2 Reliability On Deuterium Implanted Silicon, Tias Kundu

Dissertations

One of the major defects that contribute to the interface states in the silicon band gap is the dangling bond, which degrades performance of MOS devices. Passivation of these bonds with hydrogen had been found to diminish their effect but the improvement degrades the operation due to hot electron effect. Passivation with deuterium annealing has proven to improve the lifetime of the metal oxide semiconductor devices but this technique is not very effective for a multi-level metal-dielectric structure. This work investigates and optimizes incorporation of deuterium by ion implantation into the silicon substrate before the growth of 6.5 nm thin …


Variable Permittivity Dielectric Material Loaded Stepped-Horn Antenna, Ozgur Ozdemir Aug 2005

Variable Permittivity Dielectric Material Loaded Stepped-Horn Antenna, Ozgur Ozdemir

Dissertations

Stepped-horn antenna loaded with dielectric material of variable permittivity is proposed to improve radiation characteristics and/or to increase the electrical dimensions of the radiating structure compared to unloaded empty one. A hybrid numerical technique is used to analyze such an antenna. The tapered section of the horn antenna is modeled by multi-stepped waveguide structures filled with variable dielectric constant material. Generalized scattering matrix representation of the tapered section of the horn antenna is obtained using mode matching technique. The radiating aperture problem is solved by the method of moments, under the assumption that the horn is terminated by an infinite …


Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li Aug 2005

Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li

Dissertations

The explosive growth of the Internet and the continued dramatic increase for all wireless services are fueling the demand for increased capacity, data rates, and support of different quality of service (QoS) requirements for different classes of services. Since in the current and future wireless communication infrastructures, the performances of the various services are strongly correlated, as the resources are shared among them, dynamic resource allocation methods should be employed. With the demand for high data rate and support of multiple QoS, the transmission scheduling plays a key role in the efficient resource allocation process in wireless systems. The fundamental …


Energy Efficient Organization And Modeling Of Wireless Sensor Networks, Jin Zhu Aug 2005

Energy Efficient Organization And Modeling Of Wireless Sensor Networks, Jin Zhu

Dissertations

With their focus on applications requiring tight coupling with the physical world, as opposed to the personal communication focus of conventional wireless networks, wireless sensor networks pose significantly different design, implementation and deployment challenges. Wireless sensor networks can be used for environmental parameter monitoring, boundary surveillance, target detection and classification, and the facilitation of the decision making process. Multiple sensors provide better monitoring capabilities about parameters that present both spatial and temporal variances, and can deliver valuable inferences about the physical world to the end user.

In this dissertation, the problem of the energy efficient organization and modeling of dynamic …


Multicodes For Improved Range Resolution In Radar, Rhiya Vitto Aug 2005

Multicodes For Improved Range Resolution In Radar, Rhiya Vitto

Theses

Third generation (3G) wireless systems are required to support a variety of communication services like voice, image, motion picture transmission, etc, each of which requires different transmission rates. Multi-code modulation has been introduced therefore as a means of supporting multi-rate services and operating in multi-cell environments [8, 9, 10]. This multi-rate multi-function capability may be used in Radar related applications, too. For example, a single transmitted waveform consisting of two orthogonal codes can be used to simultaneously track a target and obtain high range resolution. Tracking requires low bandwidth and high resolution needs a high bandwidth signal. Orthogonal codes like …


Enhancing End-To-End Quality Of Service Provisioning In Wireless Ad Hoc Networks Using Service Vectors, Didem Gozupek Aug 2005

Enhancing End-To-End Quality Of Service Provisioning In Wireless Ad Hoc Networks Using Service Vectors, Didem Gozupek

Theses

A cross-layer architecture that achieves significant power savings, while enhancing the end-to-end QoS provisioning and granularity in wireless ad hoc networks is proposed in this thesis. Recently, a new concept called service vector has been introduced, which enables an end host to choose different service classes along its data path. This scheme enhances the user benefits from the network services and network resource utilization, while maintaining the simplicity and scalability of the current Differentiated Services (DiffServ) network architecture. This thesis explores the application of this concept on wireless ad hoc networks and provides a cross-layer architecture based on the combination …


Deposition Of Tantalum Thin Films By Rf Sputtering With Substrate Bias, Savita Raina Aug 2005

Deposition Of Tantalum Thin Films By Rf Sputtering With Substrate Bias, Savita Raina

Theses

The effects of energetic ion bombardment on the crystallographic structure of RF sputtered tantalum thin films on different substrates, particularly aluminum and silicon, have been studied. The effect of substrate biasing on ion current and film thickness has been investigated. The study included comparison between substrate ion current of DC sputtering and RF sputtering and also was aimed at finding the process parameters, which could influence the crystallographic phase of Ta film. The characterization of Ta films is carried by RBS and x-ray diffraction techniques.

A magnetron sputtering system with a matching network between the source and the RF generator …


Automated Liquid Dispensing Pin For Dna Microarray Applications, Suganya Parthasarathy Aug 2005

Automated Liquid Dispensing Pin For Dna Microarray Applications, Suganya Parthasarathy

Theses

This thesis describes the research and development of a new liquid dispensing/aspiring system that is capable of producing micro sized spots/droplets for molecular biology research and analysis. In particular, the application is focused on DNA microarray fabrication with the goals of smaller spot size, higher yield, more efficient usage of biological materials, and capability to handle high viscosity liquids. The new system is based on active sensing and control and it is part of a fully integrated robotic microarray system for genomic and proteomic applications. The prototype system handles water as well as thick liquids such as 100% glycerol and …


Communications Over Fading Channels With Partial Channel Information : Performance And Design Criteria, Xinmin Deng May 2005

Communications Over Fading Channels With Partial Channel Information : Performance And Design Criteria, Xinmin Deng

Dissertations

The effects of system parameters upon the performance are quantified under the assumption that some statistical information of the wireless fading channels is available. These results are useful in determining the optimal design of system parameters. Suboptimal receivers are designed for systems that are constrained in terms of implementation complexity.

The achievable rates are investigated for a wireless communication system when neither the transmitter nor the receiver has prior knowledge of the channel state information (CSI). Quantitative results are provided for independent and identically distributed (i.i.d.) Gaussian signals. A simple, low-duty-cycle signaling scheme is proposed to improve the information rates …


Analysis And Characterization Of The Integrated Dielectric Slab Waveguide-Wedge Antenna Using Iterative Mode-Matching Technique, Chairat Pinthong May 2005

Analysis And Characterization Of The Integrated Dielectric Slab Waveguide-Wedge Antenna Using Iterative Mode-Matching Technique, Chairat Pinthong

Dissertations

A rigorous solution for the TB and TM polarization to the dielectric wedge antenna fed by a slab waveguide of the same material is presented. The method of solution involves modeling the wedge as a sequence of step discontinuities and using an iterative procedure to track forward and backward partial wave fields, expressed as modal expansions, to obtain the rigorous field solution. Radiation patterns of directive gain are presented. All patterns smoothly decrease from a maximum in the endfire direction and exhibit very low side lobes. Longer length wedges are shown to produce higher directivity and smaller half-power beamwidths (HPBW). …


Transceiver Design And System Optimization For Ultra-Wideband Communications, Hongshan Sheng May 2005

Transceiver Design And System Optimization For Ultra-Wideband Communications, Hongshan Sheng

Dissertations

This dissertation investigates the potential promises and proposes possible solutions to the challenges of designing transceivers and optimizing system parameters in ultra-wideband (UWB) systems. The goal is to provide guidelines for UWB transceiver implementations under constraints by regulation, existing interference, and channel estimation.

New UWB pulse shapes are invented that satisfy the Federal Communications Commission spectral mask. Parameters are designed to possibly implement the proposed pulses. A link budget is quantified based on an accurate frequency-dependent path loss calculation to account for variations across the ultra-wide bandwidth of the signal.

Achievable information rates are quantified as a function of transmission …


Quality-Of-Service Provisioning In High Speed Networks : Routing Perspectives, Gang Cheng May 2005

Quality-Of-Service Provisioning In High Speed Networks : Routing Perspectives, Gang Cheng

Dissertations

The continuous growth in both commercial and public network traffic with various quality-of-service (QoS) requirements is calling for better service than the current Internet's best effort mechanism. One of the challenging issues is to select feasible paths that satisfy the different requirements of various applications. This problem is known as QoS routing. In general, two issues are related to QoS routing: state distribution and routing strategy. Routing strategy is used to find a feasible path that meets the QoS requirements. State distribution addresses the issue of exchanging the state information throughout the network, and can be further divided into two …


On Rate Capacity And Signature Sequence Adaptation In Downlink Of Mc-Cdma System, Jianming Zhu May 2005

On Rate Capacity And Signature Sequence Adaptation In Downlink Of Mc-Cdma System, Jianming Zhu

Dissertations

This dissertation addresses two topics in the MC-CDMA system: rate capacity and adaptation of users' signature sequences. Both of them are studied for the downlink communication scenario with multi-code scheme.

The purpose of studying rate capacity is to understand the potential of applying MC-CDMA technique for high speed wireless data communications. It is shown that, to maintain high speed data transmission with multi-code scheme, each mobile should cooperatively decode its desired user's encoded data symbols which are spread with different signature sequences simultaneously. Higher data rate can be achieved by implementing dirty paper coding (DPC) to cooperatively encode all users' …


Stereo Vision Algorithm Using Propagation Of Correspondences Along An Array Of Cameras, Danyan Ganjali May 2005

Stereo Vision Algorithm Using Propagation Of Correspondences Along An Array Of Cameras, Danyan Ganjali

Theses

One well known problem in stereo vision is the trade-off between precision and accuracy.

In a conventional two camera model, as the baseline separating the two cameras becomes smaller, the images that both cameras produce become more identical. This results in a more accurate set of correspondences, however at the same time causing less precise depth measurement due to the small angle used for triangulation. Similarly, in a larger baseline model, the depth measurement is more precise while the correspondences are not as accurate as of the shorter baseline model. This thesis proposes a method that promises to solve the …


Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam May 2005

Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam

Theses

Multi-user codes are a widely used in transmitting user data from base station to mobile station and vice versa. In wireless communications a signal received by a mobile station goes through different fading channels resulting. These multi-paths add constructively and destructively with different delays and attenuation at the mobile station. The autocorrelation and cross correlation properties of the Multi-user codes play a significant role in extracting the user data from the signal corrupted by multipath fading channel.

The thesis presents a comparison of different Multi-user codes based on their autocorrelation and cross correlation properties. These codes are passed through a …


Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore May 2005

Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore

Theses

In the recent years, there has been a great deal of interest in developing a secure algorithm for hiding information in images, or steganography. There has also been a lot of research in steganalysis of images, which deals with the detection of hidden information in supposedly natural images. The first section of this thesis reviews the steganography algorithms and steganalysis techniques developed in the last few years. It discusses the breadth of steganographic algorithms and steganalytic techniques, starting with the earliest, based on LSB flipping of the DCT coefficients, to more recent and sophisticated algorithms for data hiding and equally …


Difference-Expansion Based Reversible Data Hiding And Its Steganalysis, Guangsen Tian May 2005

Difference-Expansion Based Reversible Data Hiding And Its Steganalysis, Guangsen Tian

Theses

A novel reversible data embedding method was reported in a recent IEEE journal article. The method was based on difference expansion (DE) technique. It used redundancy in digital images to achieve a high embedding capacity, while keeping visual distortion of the stego-image low. In this thesis, this technique was studied and experimentally evaluated. An effective steganalysis scheme for this DE-based reversible data embedding method was proposed, which used 12-dimensional feature vectors and a Bayes Classifier. The proposed steganalysis scheme steadily achieved a correct classification rate of 99%.


On Performance Analysis Of Optimal Diversity Combining With Imperfect Channel Estimation, Yong Peng May 2005

On Performance Analysis Of Optimal Diversity Combining With Imperfect Channel Estimation, Yong Peng

Theses

The optimal diversity combining technique is investigated for multipath Rayleigh and Ricean fading channel with additive white Gaussian noise where only imperfect channel knowledge is available at the receiver. The non-observable estimation error contributes as an additive source of noise which is not white. Therefore, the optimal combining weight is derived taking into consideration the imperfect channel knowledge.

The bit error rate for BPSK modulation over correlated Rayleigh and Ricean fading channel is derived for minimum mean square channel estimation using pilot symbol assisted modulation. Analytical result and Monte-Carlo simulation are presented for specific channel and estimation models to demonstrate …


Turbo Space-Time Coding For Mimo Systems : Designs And Analyses, Hangjun Chen Jan 2005

Turbo Space-Time Coding For Mimo Systems : Designs And Analyses, Hangjun Chen

Dissertations

Multiple input multiple output (MIMO) systems can provide high diversity, high data rate or a mix of both, for wireless communications. This dissertation combines both modes and suggests analyses and techniques that advance the state of the art of MIMO systems. Specifically, this dissertation studies turbo space-time coding schemes for MIMO systems.

Before the designs of turbo space-time codes are presented, a fundamental tool to analyze and design turbo coding schemes, the extrinsic information transfer (EXIT) chart method, is extended from the binary/nonbinary code case to coded modulation case. This extension prepares the convergence analysis for turbo space-time code.

Turbo …


Congestion Control In Resilient Packet Ring Networks, Alharbi Fahd Jan 2005

Congestion Control In Resilient Packet Ring Networks, Alharbi Fahd

Dissertations

The Resilient Packet Ring (RPR) is a new metro technology; RPR shares SONET's ability in providing fast recovery from link and node failures as well as inherits the cost and simplicity of Ethernet. RPR, like SONET/SDH, is a ring based architecture consisting of two optical rotating rings (uni-directional). In RPR, packets are removed from the ring at the destination so that different segments of the ring can be used at the same time for different flows; as a result, the spatial reuse feature is achieved. Enabling the spatial reuse feature introduces the challenge of guaranteeing fairness among the nodes sharing …


Detection Of Network Anomalies And Novel Attacks In The Internet Via Statistical Network Traffic Separation And Normality Prediction, Jun Jiang Jan 2005

Detection Of Network Anomalies And Novel Attacks In The Internet Via Statistical Network Traffic Separation And Normality Prediction, Jun Jiang

Dissertations

With the advent and the explosive growth of the global Internet and the electronic commerce environment, adaptive/automatic network and service anomaly detection is fast gaining critical research and practical importance. If the next generation of network technology is to operate beyond the levels of current networks, it will require a set of well-designed tools for its management that will provide the capability of dynamically and reliably identifying network anomalies. Early detection of network anomalies and performance degradations is a key to rapid fault recovery and robust networking, and has been receiving increasing attention lately.

In this dissertation we present a …


Image Data Hiding, Zhicheng Ni Jan 2005

Image Data Hiding, Zhicheng Ni

Dissertations

Image data hiding represents a class of processes used to embed data into cover images.

Robustness is one of the basic requirements for image data hiding. In the first part of this dissertation, 2D and 3D interleaving techniques associated with error-correction-code (ECC) are proposed to significantly improve the robustness of hidden data against burst errors.

In most cases, the cover image cannot be inverted back to the original image after the hidden data are retrieved. In this dissertation, one novel reversible (lossless) data hiding technique is then introduced. This technique is based on the histogram modification, which can embed a …


A Digital Signature And Watermarking Based Authentication System For Jpeg2000 Images, Rui Jing Jan 2005

A Digital Signature And Watermarking Based Authentication System For Jpeg2000 Images, Rui Jing

Theses

In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level.

The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis.


Optical Properties Of Sige Nanostructures, Varun Sharma Jan 2005

Optical Properties Of Sige Nanostructures, Varun Sharma

Theses

In this thesis, Raman Scattering (RS) and photoluminescence (PL) measurements of Ge nanowires (NWs) grown via vapor-liquid-solid (VLS) using chemical vapor deposition silicon substrates consisting of (100) and (111) crystallographic orientations are reported. Ge NWs grown are ~40 nm in diameter, approximately a micrometer in length, and a sharp narrow Raman peak at ~300cm-1 indicates single crystal quality. An absence of SiGe peak in the Raman spectra indicates that SiGe interdiffusion is insignificant for the NW volume. Low temperature PL-intensity-dependence spectra indicate that the observed emission originates at the Ge NW - Si substrate interface, where SiGe intermixing has …


Study Of Joint Embedding And Compression On Jpeg Compression Scheme Using Multiple Codebook Data Hiding, Amol Nishikant Sukerkar Jan 2005

Study Of Joint Embedding And Compression On Jpeg Compression Scheme Using Multiple Codebook Data Hiding, Amol Nishikant Sukerkar

Theses

This thesis studies a direct application of multiple codebook data hiding technique in the multimedia applications. It studies the practical implementation of a joint embedding and compression scheme. It presents a study of Type III data embedding technique using multiple codebook design on JPEG-85 compression scheme. The application of the above technique is compared with the Type III data embedding techniques using single codebook design. The comparison is carried out in tenns of the parameters such as mean square error and normalized correlation between the embedded and extracted watermark.

The performance of data hiding rate against the embedding distortion is …


Cyclic Prefix Assisted Block Transmission For Low Complexity Communication System Design, Haibin Huang Jan 2005

Cyclic Prefix Assisted Block Transmission For Low Complexity Communication System Design, Haibin Huang

Theses

This thesis presents new results on cyclic prefix (CP) assisted block transmission for low complexity communication system design. Two important aspects are studied: the CP based low-complexity schemes for channel equalization and channel estimation.

Specifically, based on the simple frequency domain equalization, a low complexity joint receiver is proposed for CP-CDMA system, which is a special application of block transmission.

And in this work the finite impulse response (FIR) model is used for the unknown communication channels. To identify an unknown FIR channel, a novel channel estimation method is proposed by exploiting the cyclic prefix technique. Compared to a conventional …


Study Of Steganalysis Methods, Wen Chen Jan 2005

Study Of Steganalysis Methods, Wen Chen

Theses

Steganography is the art and science of hiding the presence of conmunication by embedding secret message into digital images. The steganographic techniques can be applied in many areas. On one hand, people can benefit from their application. For example, they can be used for copyright protection. On the other hand, these techniques may be used by criminals or terrorists for malicious purposes. For example, terrorists may use the techniques to transmit the secret plan of terror attacks. Law enforcement and security authorities have concerns about such activities. It is necessary to devise the methods to detect steganographic systems. The detection …