Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Automated Liquid Dispensing Pin For Dna Microarray Applications, Suganya Parthasarathy Aug 2005

Automated Liquid Dispensing Pin For Dna Microarray Applications, Suganya Parthasarathy

Theses

This thesis describes the research and development of a new liquid dispensing/aspiring system that is capable of producing micro sized spots/droplets for molecular biology research and analysis. In particular, the application is focused on DNA microarray fabrication with the goals of smaller spot size, higher yield, more efficient usage of biological materials, and capability to handle high viscosity liquids. The new system is based on active sensing and control and it is part of a fully integrated robotic microarray system for genomic and proteomic applications. The prototype system handles water as well as thick liquids such as 100% glycerol and …


Enhancing End-To-End Quality Of Service Provisioning In Wireless Ad Hoc Networks Using Service Vectors, Didem Gozupek Aug 2005

Enhancing End-To-End Quality Of Service Provisioning In Wireless Ad Hoc Networks Using Service Vectors, Didem Gozupek

Theses

A cross-layer architecture that achieves significant power savings, while enhancing the end-to-end QoS provisioning and granularity in wireless ad hoc networks is proposed in this thesis. Recently, a new concept called service vector has been introduced, which enables an end host to choose different service classes along its data path. This scheme enhances the user benefits from the network services and network resource utilization, while maintaining the simplicity and scalability of the current Differentiated Services (DiffServ) network architecture. This thesis explores the application of this concept on wireless ad hoc networks and provides a cross-layer architecture based on the combination …


Deposition Of Tantalum Thin Films By Rf Sputtering With Substrate Bias, Savita Raina Aug 2005

Deposition Of Tantalum Thin Films By Rf Sputtering With Substrate Bias, Savita Raina

Theses

The effects of energetic ion bombardment on the crystallographic structure of RF sputtered tantalum thin films on different substrates, particularly aluminum and silicon, have been studied. The effect of substrate biasing on ion current and film thickness has been investigated. The study included comparison between substrate ion current of DC sputtering and RF sputtering and also was aimed at finding the process parameters, which could influence the crystallographic phase of Ta film. The characterization of Ta films is carried by RBS and x-ray diffraction techniques.

A magnetron sputtering system with a matching network between the source and the RF generator …


Multicodes For Improved Range Resolution In Radar, Rhiya Vitto Aug 2005

Multicodes For Improved Range Resolution In Radar, Rhiya Vitto

Theses

Third generation (3G) wireless systems are required to support a variety of communication services like voice, image, motion picture transmission, etc, each of which requires different transmission rates. Multi-code modulation has been introduced therefore as a means of supporting multi-rate services and operating in multi-cell environments [8, 9, 10]. This multi-rate multi-function capability may be used in Radar related applications, too. For example, a single transmitted waveform consisting of two orthogonal codes can be used to simultaneously track a target and obtain high range resolution. Tracking requires low bandwidth and high resolution needs a high bandwidth signal. Orthogonal codes like …


Difference-Expansion Based Reversible Data Hiding And Its Steganalysis, Guangsen Tian May 2005

Difference-Expansion Based Reversible Data Hiding And Its Steganalysis, Guangsen Tian

Theses

A novel reversible data embedding method was reported in a recent IEEE journal article. The method was based on difference expansion (DE) technique. It used redundancy in digital images to achieve a high embedding capacity, while keeping visual distortion of the stego-image low. In this thesis, this technique was studied and experimentally evaluated. An effective steganalysis scheme for this DE-based reversible data embedding method was proposed, which used 12-dimensional feature vectors and a Bayes Classifier. The proposed steganalysis scheme steadily achieved a correct classification rate of 99%.


Stereo Vision Algorithm Using Propagation Of Correspondences Along An Array Of Cameras, Danyan Ganjali May 2005

Stereo Vision Algorithm Using Propagation Of Correspondences Along An Array Of Cameras, Danyan Ganjali

Theses

One well known problem in stereo vision is the trade-off between precision and accuracy.

In a conventional two camera model, as the baseline separating the two cameras becomes smaller, the images that both cameras produce become more identical. This results in a more accurate set of correspondences, however at the same time causing less precise depth measurement due to the small angle used for triangulation. Similarly, in a larger baseline model, the depth measurement is more precise while the correspondences are not as accurate as of the shorter baseline model. This thesis proposes a method that promises to solve the …


Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore May 2005

Analysis Of Mhpdm Algorithm For Data Hiding In Jpeg Images, Pooja Gore

Theses

In the recent years, there has been a great deal of interest in developing a secure algorithm for hiding information in images, or steganography. There has also been a lot of research in steganalysis of images, which deals with the detection of hidden information in supposedly natural images. The first section of this thesis reviews the steganography algorithms and steganalysis techniques developed in the last few years. It discusses the breadth of steganographic algorithms and steganalytic techniques, starting with the earliest, based on LSB flipping of the DCT coefficients, to more recent and sophisticated algorithms for data hiding and equally …


On Performance Analysis Of Optimal Diversity Combining With Imperfect Channel Estimation, Yong Peng May 2005

On Performance Analysis Of Optimal Diversity Combining With Imperfect Channel Estimation, Yong Peng

Theses

The optimal diversity combining technique is investigated for multipath Rayleigh and Ricean fading channel with additive white Gaussian noise where only imperfect channel knowledge is available at the receiver. The non-observable estimation error contributes as an additive source of noise which is not white. Therefore, the optimal combining weight is derived taking into consideration the imperfect channel knowledge.

The bit error rate for BPSK modulation over correlated Rayleigh and Ricean fading channel is derived for minimum mean square channel estimation using pilot symbol assisted modulation. Analytical result and Monte-Carlo simulation are presented for specific channel and estimation models to demonstrate …


Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam May 2005

Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam

Theses

Multi-user codes are a widely used in transmitting user data from base station to mobile station and vice versa. In wireless communications a signal received by a mobile station goes through different fading channels resulting. These multi-paths add constructively and destructively with different delays and attenuation at the mobile station. The autocorrelation and cross correlation properties of the Multi-user codes play a significant role in extracting the user data from the signal corrupted by multipath fading channel.

The thesis presents a comparison of different Multi-user codes based on their autocorrelation and cross correlation properties. These codes are passed through a …


Cyclic Prefix Assisted Block Transmission For Low Complexity Communication System Design, Haibin Huang Jan 2005

Cyclic Prefix Assisted Block Transmission For Low Complexity Communication System Design, Haibin Huang

Theses

This thesis presents new results on cyclic prefix (CP) assisted block transmission for low complexity communication system design. Two important aspects are studied: the CP based low-complexity schemes for channel equalization and channel estimation.

Specifically, based on the simple frequency domain equalization, a low complexity joint receiver is proposed for CP-CDMA system, which is a special application of block transmission.

And in this work the finite impulse response (FIR) model is used for the unknown communication channels. To identify an unknown FIR channel, a novel channel estimation method is proposed by exploiting the cyclic prefix technique. Compared to a conventional …


Study Of Steganalysis Methods, Wen Chen Jan 2005

Study Of Steganalysis Methods, Wen Chen

Theses

Steganography is the art and science of hiding the presence of conmunication by embedding secret message into digital images. The steganographic techniques can be applied in many areas. On one hand, people can benefit from their application. For example, they can be used for copyright protection. On the other hand, these techniques may be used by criminals or terrorists for malicious purposes. For example, terrorists may use the techniques to transmit the secret plan of terror attacks. Law enforcement and security authorities have concerns about such activities. It is necessary to devise the methods to detect steganographic systems. The detection …


A Digital Signature And Watermarking Based Authentication System For Jpeg2000 Images, Rui Jing Jan 2005

A Digital Signature And Watermarking Based Authentication System For Jpeg2000 Images, Rui Jing

Theses

In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level.

The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis.


Optical Properties Of Sige Nanostructures, Varun Sharma Jan 2005

Optical Properties Of Sige Nanostructures, Varun Sharma

Theses

In this thesis, Raman Scattering (RS) and photoluminescence (PL) measurements of Ge nanowires (NWs) grown via vapor-liquid-solid (VLS) using chemical vapor deposition silicon substrates consisting of (100) and (111) crystallographic orientations are reported. Ge NWs grown are ~40 nm in diameter, approximately a micrometer in length, and a sharp narrow Raman peak at ~300cm-1 indicates single crystal quality. An absence of SiGe peak in the Raman spectra indicates that SiGe interdiffusion is insignificant for the NW volume. Low temperature PL-intensity-dependence spectra indicate that the observed emission originates at the Ge NW - Si substrate interface, where SiGe intermixing has …


Study Of Joint Embedding And Compression On Jpeg Compression Scheme Using Multiple Codebook Data Hiding, Amol Nishikant Sukerkar Jan 2005

Study Of Joint Embedding And Compression On Jpeg Compression Scheme Using Multiple Codebook Data Hiding, Amol Nishikant Sukerkar

Theses

This thesis studies a direct application of multiple codebook data hiding technique in the multimedia applications. It studies the practical implementation of a joint embedding and compression scheme. It presents a study of Type III data embedding technique using multiple codebook design on JPEG-85 compression scheme. The application of the above technique is compared with the Type III data embedding techniques using single codebook design. The comparison is carried out in tenns of the parameters such as mean square error and normalized correlation between the embedded and extracted watermark.

The performance of data hiding rate against the embedding distortion is …