Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Actuator (1)
- Asynchronous multi-master replication (1)
- Bilateral filter (1)
- Blocking artifacts reduction (1)
- CIC filter (1)
-
- Cipher (1)
- Decimator (1)
- Denial-of-Service Attack (1)
- Design Space Exploration (1)
- Digital terrestrial television (1)
- Distributed Detection (1)
- Distributed data storage (1)
- Feature Monitoring (1)
- Floating gate MOSFET (1)
- Geometric layout. (1)
- Hemalatha (1)
- Host-based Intrusion Detection System (1)
- Image denoising (1)
- Kasami sequence (1)
- MART-Aided Models (1)
- MEMS (1)
- Metadata replication (1)
- Multi-Level (1)
- Multiple input CMOS (1)
- Multipletransmitter identification (1)
- Multivalued logic (1)
- Optical scanner (1)
- Performance Prediction (1)
- Piezoelectric (1)
- Quasiconvexity (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass
Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass
LSU Master's Theses
The use of simulation is well established in processor design research to evaluate architectural design trade-offs. More importantly, Cycle by Cycle accurate simulation is widely used to evaluate the new designs in processor research because of its accurate and detailed processor performance measurement. However, only configuration in a subspace can be simulated in practice due to its long simulation time and limited resources, leading to suboptimal conclusions that might not be applied to the larger design space. In this thesis, we propose a performance prediction approach which employs a state-of-the-art technique from experimental design, machine learning and data mining. Our …
Bilateral Filter In Image Processing, Ming Zhang
Bilateral Filter In Image Processing, Ming Zhang
LSU Master's Theses
The bilateral filter is a nonlinear filter that does spatial averaging without smoothing edges. It has shown to be an effective image denoising technique. It also can be applied to the blocking artifacts reduction. An important issue with the application of the bilateral filter is the selection of the filter parameters, which affect the results significantly. Another research interest of bilateral filter is acceleration of the computation speed. There are three main contributions of this thesis. The first contribution is an empirical study of the optimal bilateral filter parameter selection in image denoising. I propose an extension of the bilateral …
Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala
Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala
LSU Master's Theses
A third order Cascaded Integrated Comb (CIC) filter has been designed in 0.5μm n-well CMOS process to interface with a second order oversampling sigma-delta ADC modulator. The modulator was designed earlier in 0.5μm technology. The CIC filter is designed to operate with 0 to 5V supply voltages. The modulator is operated with ±2.5V supply voltage and a fixed oversampling ratio of 64. The CIC filter designed includes integrator, differentiator blocks and a dedicated clock divider circuit, which divides the input clock by 64. The CIC filter is designed to work with an ADC that operates at a maximum oversampling clock …
Sophisticated Denial-Of-Service Attack Detections Through Integrated Architectural, Os, And Appplication Level Events Monitoring, Ran Tao
LSU Master's Theses
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well explored and widely used in both commercial tools and research works. Such IDS framework is built upon features extracted from the network traffic, which are application-level features, and is effective in detecting flooding-based DoS attacks. However, in a sophisticated DoS attack, where an attacker manages to bypass the network-based monitors and launch a DoS attack locally, sniffer-based methods have difficulty in differentiating attacks with normal behaviors, since the malicious connection itself behaves in the same manner of normal connections. In this work, we study a …
Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj
Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj
LSU Master's Theses
In this work, a ternary to binary converter circuit is designed in 0.5μm n-well CMOS technology. The circuit takes two inputs corresponding to the ternary bits and gives four outputs, which are the binary equivalent bits of the ternary inputs. The ternary inputs range from (-1,-1)3 to (1,1) 3 which are decimal -4 to 4 and the four binary output bits are the sign bit (SB), most significant bit (MSB), second significant bit (SSB) and the least significant bit (LSB). The ternary inputs (-1, 0 and 1) are represented in terms of voltages of -3V, 0V and 3V. Multiple …
Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song
Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song
LSU Master's Theses
For a wide range of application areas such as medical instruments, defense, communication networks, industrial equipment, and consumer electronics, microscanners have been a vibrant research topic. Among various fabrication methodologies, MEMS (microelectromechanical system) stands out for its small size and fast response characteristics. In this thesis, piezoelectric actuation mechanism is selected because of its low voltage and low current properties compared with other mechanisms, which are especially important for the target application of biomedical imaging. Although 1- and 2-dimensional microscanners with piezoelectric actuators have been studied by several other groups, this thesis introduces innovative improvements in design of the piezoelectric …
Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng
Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng
LSU Master's Theses
The transmitter identification of the DTV systems becomes crucial nowadays. Transmitter identification (TxID, or transmitter fingerprinting) technique is used to detect, diagnose and classify the operating status of any radio transmitter of interest. A pseudo random sequence was proposed to be embedded into the DTV signal before transmission. Thus, the transmitter identification can be realized by invoking the cross-correlation functions between the received signal and the possible candidates of the pseudo random sequences. Gold sequences and Kasami sequences are two excellent candidates for the transmitter ID sequences as they provide a large family of nearly-orthogonal codes. In order to investigate …
Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla
Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla
LSU Master's Theses
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the outputs are encrypted using a probabilistic cipher. The third party (enemy) fusion centers are unaware of the presence of the probabilistic encipher. We find the optimal (minimum-probability-of-error) fusion rule for the ally (friendly) fusion center subject to a lower bound on the the probability of error for the third-party fusion centers. To obtain the minimum probability of error, we first prove the quasi-convexity of error probability with respect to the sensor's threshold for a given …
Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk
Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk
LSU Master's Theses
In recent years, scientific applications have become increasingly data intensive. The increase in the size of data generated by scientific applications necessitates collaboration and sharing data among the nation's education and research institutions. To address this, distributed storage systems spanning multiple institutions over wide area networks have been developed. One of the important features of distributed storage systems is providing global unified name space across all participating institutions, which enables easy data sharing without the knowledge of actual physical location of data. This feature depends on the ``location metadata'' of all data sets in the system being available to all …