Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass Jan 2009

Processor Design Space Exploration And Performance Prediction, Balachandran Ramadass

LSU Master's Theses

The use of simulation is well established in processor design research to evaluate architectural design trade-offs. More importantly, Cycle by Cycle accurate simulation is widely used to evaluate the new designs in processor research because of its accurate and detailed processor performance measurement. However, only configuration in a subspace can be simulated in practice due to its long simulation time and limited resources, leading to suboptimal conclusions that might not be applied to the larger design space. In this thesis, we propose a performance prediction approach which employs a state-of-the-art technique from experimental design, machine learning and data mining. Our …


Bilateral Filter In Image Processing, Ming Zhang Jan 2009

Bilateral Filter In Image Processing, Ming Zhang

LSU Master's Theses

The bilateral filter is a nonlinear filter that does spatial averaging without smoothing edges. It has shown to be an effective image denoising technique. It also can be applied to the blocking artifacts reduction. An important issue with the application of the bilateral filter is the selection of the filter parameters, which affect the results significantly. Another research interest of bilateral filter is acceleration of the computation speed. There are three main contributions of this thesis. The first contribution is an empirical study of the optimal bilateral filter parameter selection in image denoising. I propose an extension of the bilateral …


Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala Jan 2009

Third Order Cmos Decimator Design For Sigma Delta Modulators, Hemalatha Mekala

LSU Master's Theses

A third order Cascaded Integrated Comb (CIC) filter has been designed in 0.5μm n-well CMOS process to interface with a second order oversampling sigma-delta ADC modulator. The modulator was designed earlier in 0.5μm technology. The CIC filter is designed to operate with 0 to 5V supply voltages. The modulator is operated with ±2.5V supply voltage and a fixed oversampling ratio of 64. The CIC filter designed includes integrator, differentiator blocks and a dedicated clock divider circuit, which divides the input clock by 64. The CIC filter is designed to work with an ADC that operates at a maximum oversampling clock …


Sophisticated Denial-Of-Service Attack Detections Through Integrated Architectural, Os, And Appplication Level Events Monitoring, Ran Tao Jan 2009

Sophisticated Denial-Of-Service Attack Detections Through Integrated Architectural, Os, And Appplication Level Events Monitoring, Ran Tao

LSU Master's Theses

As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well explored and widely used in both commercial tools and research works. Such IDS framework is built upon features extracted from the network traffic, which are application-level features, and is effective in detecting flooding-based DoS attacks. However, in a sophisticated DoS attack, where an attacker manages to bypass the network-based monitors and launch a DoS attack locally, sniffer-based methods have difficulty in differentiating attacks with normal behaviors, since the malicious connection itself behaves in the same manner of normal connections. In this work, we study a …


Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj Jan 2009

Ternary To Binary Converter Design In Cmos Using Multiple Input Floating Gate Mosfets, Josephine Ratna Sathiaraj

LSU Master's Theses

In this work, a ternary to binary converter circuit is designed in 0.5μm n-well CMOS technology. The circuit takes two inputs corresponding to the ternary bits and gives four outputs, which are the binary equivalent bits of the ternary inputs. The ternary inputs range from (-1,-1)3 to (1,1) 3 which are decimal -4 to 4 and the four binary output bits are the sign bit (SB), most significant bit (MSB), second significant bit (SSB) and the least significant bit (LSB). The ternary inputs (-1, 0 and 1) are represented in terms of voltages of -3V, 0V and 3V. Multiple …


Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song Jan 2009

Two-Dimensional Microscanners With T-Shaped Hinges And Piezoelectric Actuators, Wenyu Song

LSU Master's Theses

For a wide range of application areas such as medical instruments, defense, communication networks, industrial equipment, and consumer electronics, microscanners have been a vibrant research topic. Among various fabrication methodologies, MEMS (microelectromechanical system) stands out for its small size and fast response characteristics. In this thesis, piezoelectric actuation mechanism is selected because of its low voltage and low current properties compared with other mechanisms, which are especially important for the target application of biomedical imaging. Although 1- and 2-dimensional microscanners with piezoelectric actuators have been studied by several other groups, this thesis introduces innovative improvements in design of the piezoelectric …


Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng Jan 2009

Geometric Capacity Studies For Dtv Transmitter Identification By Using Kasami Sequences, Xiaoyu Feng

LSU Master's Theses

The transmitter identification of the DTV systems becomes crucial nowadays. Transmitter identification (TxID, or transmitter fingerprinting) technique is used to detect, diagnose and classify the operating status of any radio transmitter of interest. A pseudo random sequence was proposed to be embedded into the DTV signal before transmission. Thus, the transmitter identification can be realized by invoking the cross-correlation functions between the received signal and the possible candidates of the pseudo random sequences. Gold sequences and Kasami sequences are two excellent candidates for the transmitter ID sequences as they provide a large family of nearly-orthogonal codes. In order to investigate …


Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla Jan 2009

Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla

LSU Master's Theses

We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the outputs are encrypted using a probabilistic cipher. The third party (enemy) fusion centers are unaware of the presence of the probabilistic encipher. We find the optimal (minimum-probability-of-error) fusion rule for the ally (friendly) fusion center subject to a lower bound on the the probability of error for the third-party fusion centers. To obtain the minimum probability of error, we first prove the quasi-convexity of error probability with respect to the sensor's threshold for a given …


Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk Jan 2009

Asynchronous Replication Of Metadata Across Multi-Master Servers In Distributed Data Storage Systems, Ismail Akturk

LSU Master's Theses

In recent years, scientific applications have become increasingly data intensive. The increase in the size of data generated by scientific applications necessitates collaboration and sharing data among the nation's education and research institutions. To address this, distributed storage systems spanning multiple institutions over wide area networks have been developed. One of the important features of distributed storage systems is providing global unified name space across all participating institutions, which enables easy data sharing without the knowledge of actual physical location of data. This feature depends on the ``location metadata'' of all data sets in the system being available to all …