Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2007

Missouri University of Science and Technology

Computer Engineering

Keyword
Publication

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Energy-Aware And Secure Routing With Trust Levels For Wireless Ad Hoc And Sensor Networks, Eyad Taqieddin Jan 2007

Energy-Aware And Secure Routing With Trust Levels For Wireless Ad Hoc And Sensor Networks, Eyad Taqieddin

Doctoral Dissertations

"This dissertation focuses on the development of routing algorithms for secure and trusted routing in wireless ad hoc and sensor network. The first paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivability of the wireless network...The second paper analyzes both OLSR and TLR in terms of survivability and reliability to emphasize the improved performance of the network in terms of lifetime and proper delivery of data...The third paper proposes a statistical reputation model that uses the watchdog mechanism to observe the cooperation of the neighboring …


Design For Test Techniques For Asynchronous Ncl Designs And Fpgas, Sindhu Kakarla Jan 2007

Design For Test Techniques For Asynchronous Ncl Designs And Fpgas, Sindhu Kakarla

Masters Theses

"Testing of an electronic chip is an important step in the design process, as it can detect faults and ensure reliability. Design for Test (DFT) methods are used to modify existing designs to enable their testing by Automatic Test Pattern Generators. This thesis focuses on developing testing techniques for design automation of NULL Conventional Logic (NCL) circuits and for detection of capacitive crosstalk effects in Field Programmable Gate Arrays (FPGAs).

A novel technique is developed for testing asynchronous NCL designs aimed at good fault coverage with acceptable gate overhead. The technique focuses on testing stuck-at-faults in the internal feedback paths …


Identification Of Radial Streaming And Pseudopods In Dermoscopy Images, Sayali Prabhakar Deshpande Jan 2007

Identification Of Radial Streaming And Pseudopods In Dermoscopy Images, Sayali Prabhakar Deshpande

Masters Theses

"This thesis demonstrates an algorithm to identify the features of radial streaming and pseudopods found in dermoscopy images of malignant melanoma. The algorithm includes preprocessing images using the Principal Component Transform and an application of mathematical techniques to extract the desired features from the lesion image on the basis of color, size, shape, and orientation with respect to the lesion boundary. These identified features are further used to classify the lesion as malignant or benign. The proposed algorithm has produced a diagnostic accuracy of 90.50% for the training set of 31 malignant and 109 benign images and a diagnostic accuracy …


Terahertz Data Processing For Standoff Detection Of Improvised Explosive Devices, Amit Bipin Shah Jan 2007

Terahertz Data Processing For Standoff Detection Of Improvised Explosive Devices, Amit Bipin Shah

Masters Theses

"Improvised Explosive Devices (IEDs) are homemade, non-conventional explosive devices, which are used to destruct and incapacitate individuals and property. IEDs are becoming a popular weapon of attack among terrorists and insurgents due to their easy of making and capability to cause major damage. Hence, is has become necessary to develop efficient systems for detecting and disarming these devices. The Terahertz technology which uses electromagnetic radiations between 0.3 THz to 10 THz for imaging is one of the most recently developed detection techniques and is ideally suitable for detection of IEDs and similar devices. Although a lot of work has been …


Design And Implementation Of A Hardened Distributed Network Endpoint Security System For Improving The Security Of Internet Protocol-Based Networks, William Dee Atkins Jan 2007

Design And Implementation Of A Hardened Distributed Network Endpoint Security System For Improving The Security Of Internet Protocol-Based Networks, William Dee Atkins

Masters Theses

"This thesis proposes a distributed approach to securing computer networks by delegating the role of a conventional firewall to a collection of nodes and controllers placed throughout the networks they are intended toprotect from attack. This distributed firewall system is a specific application of a generalized distriubted system framework that is also proposed in this thesis. The design and implementation of both the generalized framework and the application of the framework in creating a distributed firewall system for use on Ethernet-based networks that rely on the Internet Protocol are discussed. Conclusions based upon the preliminary implementation of the proposed systems …


Generic Algorithms And Null Convention Logic Hardware Implementation For Unsigned And Signed Quad-Rail Multiplication, Samarsen Reddy Mallepalli Jan 2007

Generic Algorithms And Null Convention Logic Hardware Implementation For Unsigned And Signed Quad-Rail Multiplication, Samarsen Reddy Mallepalli

Masters Theses

"This thesis focuses on designing generic quad-rail arithmetic circuits, such as signed and unsigned multipliers and Multiply and Accumulate (MAC) units, using the asynchronous delay-insensitive NULL Convention Logic (NCL) paradigm. This work helps to build a library of reusable components to be used for automated NCL circuit synthesis, which will aid in the integration of asynchronous design paradigms into the semiconductor industry"--Abstract, page iii.


A Simulation Environment Modeling The Use Of Wireless Sensor Networks For The Detection And Mapping Of Wildfires, Matthew Gann Jan 2007

A Simulation Environment Modeling The Use Of Wireless Sensor Networks For The Detection And Mapping Of Wildfires, Matthew Gann

Masters Theses

"Over the past 5 years, billions of dollars have been spent fighting wildfires which consume thousands of acres. Currently, satellites are the primary source of information regarding the location of large scale wildfires. The satellites in use are capable of reporting the location of the wildfire, but these reports are generated infrequently and have a low spatial resolution, where the reported location of the fire can be off by 500 meters. Timely detection (latency) and frequent report (throughput) are needed to help prevent the destruction caused by wildfires. This thesis, a system is described based on an ad-hoc wireless sensor …


Delay-Insensitive Ternary Logic (Ditl), Ravi Sankar Parameswaran Nair Jan 2007

Delay-Insensitive Ternary Logic (Ditl), Ravi Sankar Parameswaran Nair

Masters Theses

"This thesis focuses on development of a Single Rail Ternary Voltage Delay-Insensitive paradigm called Delay-Insensitive Ternary Logic (DITL), which is based on NULL Convention Logic (NCL). Single rail asynchronous logic has potential advantages over Dual-Rail logic such as reduction of Power and Interconnect as well as Logic Area. The DITL concept is developed in steps of individual circuit components. These components are designed at the transistor level and are connected together to form a registered pipeline system. Some variations in pipeline design are also investigated"--Abstract, page iii.


Energy Efficient Processor Operation And Vibration Based Energy Harvesting Schemes For Wireless Sensor Nodes, Phani Kumar Gajjala Jan 2007

Energy Efficient Processor Operation And Vibration Based Energy Harvesting Schemes For Wireless Sensor Nodes, Phani Kumar Gajjala

Masters Theses

"A wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors deployed in the environment in order to cooperatively monitor physical or environmental conditions such as temperature, sound, pressure, motion or pollutants at different locations. Each node in a sensor network is equipped with a radio transceiver, a microprocessor and an energy source such as a battery which should be replaced periodically. To increase the lifetime of the network keeping the small size in mind, methods should be put in place to reduce the power consumption of the sensor node or increase the node life and/or to supply …


A Network Infrastructure For Real-Time Monitoring Of Campus Energy Consumption, Sandeep Kunchum Jan 2007

A Network Infrastructure For Real-Time Monitoring Of Campus Energy Consumption, Sandeep Kunchum

Masters Theses

"Pressing environmental concerns and rising energy costs have led many organizations to carefully review their energy consumption. Conservation requires that energy use be monitored accurately and continuously, to identify areas with higher energy consumption. Lighting has repeatedly been identified as such an area. A simple, yet effective method for reducing lighting energy consumption is retrofitting existing light fixtures with modern energy-efficient versions. The University of Missouri-Rolla is currently carrying out a lighting retrofit of all fixtures on campus. The pilot building for this project is McNutt Hall, as it has the single highest consumption of lighting energy. The results of …


Diversity Techniques For Signal-Strength Based Indoor Location Determination, Anil Ramachandran Jan 2007

Diversity Techniques For Signal-Strength Based Indoor Location Determination, Anil Ramachandran

Masters Theses

"Diversity techniques have been found in the literature to be suitable for compensating channel uncertainties such as multipath fading. In this thesis, we exploit spatial and frequency diversity techniques for improving accuracy in locating stationary and mobile objects in the indoor environment"--Abstract, page iv.


Printed Circuit Board (Pcb) Loss Characterization Up-To 20 Ghz And Modeling, Analysis And Validation, Abhilash Rajagopal Jan 2007

Printed Circuit Board (Pcb) Loss Characterization Up-To 20 Ghz And Modeling, Analysis And Validation, Abhilash Rajagopal

Masters Theses

"Dielectric properties and losses are increasingly more important in signal link path characterization, as data rates increases. High-frequency effects such as dielectric losses, dispersion and skin-effect losses need to be considered. For ensuring signal integrity, it is important to characterize losses of printed circuit board (PCB) dielectrics. To extract dielectric properties of a stripline transmission medium, an analytical technique was used...Two test materials were studied, and the extraction procedure was refined. This technique was applied to microstrip transmission lines. Two analytical solutions were derived for extracting practical material parameters. A microstrip test vehicle was designed and the two extraction methods …


Reinforcement-Learning Based Output-Feedback Controller For Nonlinear Discrete-Time System With Application To Spark Ignition Engines Operating Lean And Egr, Peter Shih Jan 2007

Reinforcement-Learning Based Output-Feedback Controller For Nonlinear Discrete-Time System With Application To Spark Ignition Engines Operating Lean And Egr, Peter Shih

Masters Theses

"A spark ignition (SI) engine can be described by non-strict feedback nonlinear discrete-time system with the output dependent upon on the states in a nonlinear manner. The controller developed in this thesis utilizes the inherent universal approximation property of neural networks (NN) to simplify the design process and solve the non-causality problem inherent with traditional designs. It also exploits a long-term performance index called the strategic utility function to minimize and assist in updating of the NN weights; therefore, an optimal controller can be realized. Finally, through Lyapunov equations, the controller guarantees stability"--Abstract, page iv.


Security Analysis Of A Cyber-Physical System, Han Tang Jan 2007

Security Analysis Of A Cyber-Physical System, Han Tang

Masters Theses

"Cyber-Physical Systems (CPSs) are an integration of computing and physical processes. Information flow is an inherent property of CPSs and is of particular interest at their cyber-physical boundaries. This thesis focuses on discovering information flow properties and proposes a process to model the information flow in CPSs. A Cooperating FACTS Power System serves as a tangible example to illustrate modeling information flow using the proposed process. The proposed process can be used to model the information flow security, help analyze current information flow security requirements, and aid in the design of further security policies in CPS"--Abstract, page iii.