Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Asynchronous circuits -- Design and construction<br />Electronic circuit design<br />Logic circuits -- Design and construction (2)
- NULL Convention Logic (2)
- <p>Asynchronous circuits -- Testing<br />Field programmable gate arrays</p> (1)
- <p>Image processing -- Computer programs<br />Melanoma -- Diagnosis<br />Skin -- Cancer -- Diagnosis</p> (1)
- Adaptive signal processing<br />Detectors<br />Improvised explosive devices -- Detection<br />Terahertz technology (1)
-
- Authentication<br />Routers (Computer networks)<br />Sensor networks -- Security measures<br />Wireless communication systems -- Security measures (1)
- Automobiles -- Motors -- Computer control systems<br />Automobiles -- Motors -- Exhaust gas<br />Neural networks (Computer science)<br />Reinforcement learning (Machine learning) (1)
- Computer network architectures<br />Electric lighting -- Energy conservation<br />Electric power consumption -- Management (1)
- Computer networks -- Security measures -- Design (1)
- Computer networks -- Security measures<br />Computer security<br />Electronic books<br />Electronic dissertations<br />Firewalls (Computer security) (1)
- Data transmission systems<br />Position-finders<br />Wireless communication systems (1)
- Direct energy conversion<br />Energy transfer<br />Microprocessors -- Energy consumption<br />Sensor networks<br />Wireless LANs (1)
- Electronic circuit design<br />Microwave transmission lines<br />Model theory -- Analysis -- Mathematical models<br />Strip transmission lines (1)
- Energy harvesting (1)
- Exhaust gas recirculation (EGR) (1)
- Image processing -- Computer programs<br />Wildfires -- Prevention and control -- Computer programs<br />Wireless communication systems (1)
- Indoor geolocation (1)
- Information flow (1)
- Spatial diversity (1)
- Publication
Articles 1 - 14 of 14
Full-Text Articles in Engineering
Energy-Aware And Secure Routing With Trust Levels For Wireless Ad Hoc And Sensor Networks, Eyad Taqieddin
Energy-Aware And Secure Routing With Trust Levels For Wireless Ad Hoc And Sensor Networks, Eyad Taqieddin
Doctoral Dissertations
"This dissertation focuses on the development of routing algorithms for secure and trusted routing in wireless ad hoc and sensor network. The first paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivability of the wireless network...The second paper analyzes both OLSR and TLR in terms of survivability and reliability to emphasize the improved performance of the network in terms of lifetime and proper delivery of data...The third paper proposes a statistical reputation model that uses the watchdog mechanism to observe the cooperation of the neighboring …
Design For Test Techniques For Asynchronous Ncl Designs And Fpgas, Sindhu Kakarla
Design For Test Techniques For Asynchronous Ncl Designs And Fpgas, Sindhu Kakarla
Masters Theses
"Testing of an electronic chip is an important step in the design process, as it can detect faults and ensure reliability. Design for Test (DFT) methods are used to modify existing designs to enable their testing by Automatic Test Pattern Generators. This thesis focuses on developing testing techniques for design automation of NULL Conventional Logic (NCL) circuits and for detection of capacitive crosstalk effects in Field Programmable Gate Arrays (FPGAs).
A novel technique is developed for testing asynchronous NCL designs aimed at good fault coverage with acceptable gate overhead. The technique focuses on testing stuck-at-faults in the internal feedback paths …
Identification Of Radial Streaming And Pseudopods In Dermoscopy Images, Sayali Prabhakar Deshpande
Identification Of Radial Streaming And Pseudopods In Dermoscopy Images, Sayali Prabhakar Deshpande
Masters Theses
"This thesis demonstrates an algorithm to identify the features of radial streaming and pseudopods found in dermoscopy images of malignant melanoma. The algorithm includes preprocessing images using the Principal Component Transform and an application of mathematical techniques to extract the desired features from the lesion image on the basis of color, size, shape, and orientation with respect to the lesion boundary. These identified features are further used to classify the lesion as malignant or benign. The proposed algorithm has produced a diagnostic accuracy of 90.50% for the training set of 31 malignant and 109 benign images and a diagnostic accuracy …
Terahertz Data Processing For Standoff Detection Of Improvised Explosive Devices, Amit Bipin Shah
Terahertz Data Processing For Standoff Detection Of Improvised Explosive Devices, Amit Bipin Shah
Masters Theses
"Improvised Explosive Devices (IEDs) are homemade, non-conventional explosive devices, which are used to destruct and incapacitate individuals and property. IEDs are becoming a popular weapon of attack among terrorists and insurgents due to their easy of making and capability to cause major damage. Hence, is has become necessary to develop efficient systems for detecting and disarming these devices. The Terahertz technology which uses electromagnetic radiations between 0.3 THz to 10 THz for imaging is one of the most recently developed detection techniques and is ideally suitable for detection of IEDs and similar devices. Although a lot of work has been …
Design And Implementation Of A Hardened Distributed Network Endpoint Security System For Improving The Security Of Internet Protocol-Based Networks, William Dee Atkins
Design And Implementation Of A Hardened Distributed Network Endpoint Security System For Improving The Security Of Internet Protocol-Based Networks, William Dee Atkins
Masters Theses
"This thesis proposes a distributed approach to securing computer networks by delegating the role of a conventional firewall to a collection of nodes and controllers placed throughout the networks they are intended toprotect from attack. This distributed firewall system is a specific application of a generalized distriubted system framework that is also proposed in this thesis. The design and implementation of both the generalized framework and the application of the framework in creating a distributed firewall system for use on Ethernet-based networks that rely on the Internet Protocol are discussed. Conclusions based upon the preliminary implementation of the proposed systems …
Generic Algorithms And Null Convention Logic Hardware Implementation For Unsigned And Signed Quad-Rail Multiplication, Samarsen Reddy Mallepalli
Generic Algorithms And Null Convention Logic Hardware Implementation For Unsigned And Signed Quad-Rail Multiplication, Samarsen Reddy Mallepalli
Masters Theses
"This thesis focuses on designing generic quad-rail arithmetic circuits, such as signed and unsigned multipliers and Multiply and Accumulate (MAC) units, using the asynchronous delay-insensitive NULL Convention Logic (NCL) paradigm. This work helps to build a library of reusable components to be used for automated NCL circuit synthesis, which will aid in the integration of asynchronous design paradigms into the semiconductor industry"--Abstract, page iii.
A Simulation Environment Modeling The Use Of Wireless Sensor Networks For The Detection And Mapping Of Wildfires, Matthew Gann
A Simulation Environment Modeling The Use Of Wireless Sensor Networks For The Detection And Mapping Of Wildfires, Matthew Gann
Masters Theses
"Over the past 5 years, billions of dollars have been spent fighting wildfires which consume thousands of acres. Currently, satellites are the primary source of information regarding the location of large scale wildfires. The satellites in use are capable of reporting the location of the wildfire, but these reports are generated infrequently and have a low spatial resolution, where the reported location of the fire can be off by 500 meters. Timely detection (latency) and frequent report (throughput) are needed to help prevent the destruction caused by wildfires. This thesis, a system is described based on an ad-hoc wireless sensor …
Delay-Insensitive Ternary Logic (Ditl), Ravi Sankar Parameswaran Nair
Delay-Insensitive Ternary Logic (Ditl), Ravi Sankar Parameswaran Nair
Masters Theses
"This thesis focuses on development of a Single Rail Ternary Voltage Delay-Insensitive paradigm called Delay-Insensitive Ternary Logic (DITL), which is based on NULL Convention Logic (NCL). Single rail asynchronous logic has potential advantages over Dual-Rail logic such as reduction of Power and Interconnect as well as Logic Area. The DITL concept is developed in steps of individual circuit components. These components are designed at the transistor level and are connected together to form a registered pipeline system. Some variations in pipeline design are also investigated"--Abstract, page iii.
Energy Efficient Processor Operation And Vibration Based Energy Harvesting Schemes For Wireless Sensor Nodes, Phani Kumar Gajjala
Energy Efficient Processor Operation And Vibration Based Energy Harvesting Schemes For Wireless Sensor Nodes, Phani Kumar Gajjala
Masters Theses
"A wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors deployed in the environment in order to cooperatively monitor physical or environmental conditions such as temperature, sound, pressure, motion or pollutants at different locations. Each node in a sensor network is equipped with a radio transceiver, a microprocessor and an energy source such as a battery which should be replaced periodically. To increase the lifetime of the network keeping the small size in mind, methods should be put in place to reduce the power consumption of the sensor node or increase the node life and/or to supply …
A Network Infrastructure For Real-Time Monitoring Of Campus Energy Consumption, Sandeep Kunchum
A Network Infrastructure For Real-Time Monitoring Of Campus Energy Consumption, Sandeep Kunchum
Masters Theses
"Pressing environmental concerns and rising energy costs have led many organizations to carefully review their energy consumption. Conservation requires that energy use be monitored accurately and continuously, to identify areas with higher energy consumption. Lighting has repeatedly been identified as such an area. A simple, yet effective method for reducing lighting energy consumption is retrofitting existing light fixtures with modern energy-efficient versions. The University of Missouri-Rolla is currently carrying out a lighting retrofit of all fixtures on campus. The pilot building for this project is McNutt Hall, as it has the single highest consumption of lighting energy. The results of …
Diversity Techniques For Signal-Strength Based Indoor Location Determination, Anil Ramachandran
Diversity Techniques For Signal-Strength Based Indoor Location Determination, Anil Ramachandran
Masters Theses
"Diversity techniques have been found in the literature to be suitable for compensating channel uncertainties such as multipath fading. In this thesis, we exploit spatial and frequency diversity techniques for improving accuracy in locating stationary and mobile objects in the indoor environment"--Abstract, page iv.
Printed Circuit Board (Pcb) Loss Characterization Up-To 20 Ghz And Modeling, Analysis And Validation, Abhilash Rajagopal
Printed Circuit Board (Pcb) Loss Characterization Up-To 20 Ghz And Modeling, Analysis And Validation, Abhilash Rajagopal
Masters Theses
"Dielectric properties and losses are increasingly more important in signal link path characterization, as data rates increases. High-frequency effects such as dielectric losses, dispersion and skin-effect losses need to be considered. For ensuring signal integrity, it is important to characterize losses of printed circuit board (PCB) dielectrics. To extract dielectric properties of a stripline transmission medium, an analytical technique was used...Two test materials were studied, and the extraction procedure was refined. This technique was applied to microstrip transmission lines. Two analytical solutions were derived for extracting practical material parameters. A microstrip test vehicle was designed and the two extraction methods …
Reinforcement-Learning Based Output-Feedback Controller For Nonlinear Discrete-Time System With Application To Spark Ignition Engines Operating Lean And Egr, Peter Shih
Masters Theses
"A spark ignition (SI) engine can be described by non-strict feedback nonlinear discrete-time system with the output dependent upon on the states in a nonlinear manner. The controller developed in this thesis utilizes the inherent universal approximation property of neural networks (NN) to simplify the design process and solve the non-causality problem inherent with traditional designs. It also exploits a long-term performance index called the strategic utility function to minimize and assist in updating of the NN weights; therefore, an optimal controller can be realized. Finally, through Lyapunov equations, the controller guarantees stability"--Abstract, page iv.
Security Analysis Of A Cyber-Physical System, Han Tang
Security Analysis Of A Cyber-Physical System, Han Tang
Masters Theses
"Cyber-Physical Systems (CPSs) are an integration of computing and physical processes. Information flow is an inherent property of CPSs and is of particular interest at their cyber-physical boundaries. This thesis focuses on discovering information flow properties and proposes a process to model the information flow in CPSs. A Cooperating FACTS Power System serves as a tangible example to illustrate modeling information flow using the proposed process. The proposed process can be used to model the information flow security, help analyze current information flow security requirements, and aid in the design of further security policies in CPS"--Abstract, page iii.