Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cognitive radio (4)
- Spectrum sensing (4)
- Machine learning (3)
- Spectrum sharing (3)
- Wireless sensor networks (3)
-
- Cognitive radio networks (2)
- Computer vision (2)
- Deep learning (2)
- Energy detection (2)
- Face recognition (2)
- Multicast (2)
- Scheduling (2)
- Security (2)
- Sensor networks (2)
- Super-resolution (2)
- Wireless communications (2)
- 3D (1)
- 5G networks (1)
- AVISPA (1)
- Ab initio electronic structure calculations (1)
- Accelerator physics (1)
- Accuracy (1)
- Actuators (1)
- Adiabatic circuits (1)
- Adjacent quadratic shortest path (1)
- Airborne vehicle (1)
- Aircraft control (1)
- Analytical models (1)
- Architecture software (1)
- Artificial neural networks (1)
- Publication Year
- Publication
-
- Electrical & Computer Engineering Theses & Dissertations (36)
- Electrical & Computer Engineering Faculty Publications (7)
- Computational Modeling & Simulation Engineering Faculty Publications (3)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Computer Science Theses & Dissertations (3)
-
- Engineering Management & Systems Engineering Faculty Publications (3)
- Engineering Technology Faculty Publications (3)
- Information Technology & Decision Sciences Faculty Publications (2)
- Modeling, Simulation and Visualization Student Capstone Conference (2)
- VMASC Publications (2)
- Mechanical & Aerospace Engineering Theses & Dissertations (1)
- Physics Faculty Publications (1)
- Publication Type
Articles 61 - 66 of 66
Full-Text Articles in Computer Engineering
Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto
Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto
Engineering Management & Systems Engineering Faculty Publications
This paper describes how to enable diverse enterprise customers for voice-data switch to achieve in configuration a balance among users, features, and perceived reliability subject to extremes of traffic. The analysis entailed the simulation of the voice-data switch with embedded priority system, generation of latency times for various configurations and transaction traffic rates, and the development of a framework and theoretical propositions for configuration of super-saturated systems. It was shown that the concept of tolerance levels defined in the risk of extreme events can be applied for embedded priority systems and was the basis for the application of the zone-configuration …
Robust Face Representation And Recognition Under Low Resolution And Difficult Lighting Conditions, Mohammad Moinul Islam
Robust Face Representation And Recognition Under Low Resolution And Difficult Lighting Conditions, Mohammad Moinul Islam
Electrical & Computer Engineering Theses & Dissertations
This dissertation focuses on different aspects of face image analysis for accurate face recognition under low resolution and poor lighting conditions. A novel resolution enhancement technique is proposed for enhancing a low resolution face image into a high resolution image for better visualization and improved feature extraction, especially in a video surveillance environment. This method performs kernel regression and component feature learning in local neighborhood of the face images. It uses directional Fourier phase feature component to adaptively lean the regression kernel based on local covariance to estimate the high resolution image. For each patch in the neighborhood, four directional …
A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi
A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi
Electrical & Computer Engineering Theses & Dissertations
This work presents an abstract formal model of the interconnection structure of the Open Systems Interconnection Reference Model (OSI-RM) developed using Object-Oriented modeling principles permitting it to serve as a re-usable platform in supporting the development of simulations and formal methods applied to layered network protocols. A simulation of the object model using MODSIM III was developed and Prototype Verification System (PVS) was used to show the applicability of the object model to formal methods by formally specifying and verifying a Global Systems for Mobile communications (GSM) protocol. This application has proved to be successful in two aspects. The first …
The Cluster Multipole Algorithm For Far-Field Computations, Rakesh R. Patel
The Cluster Multipole Algorithm For Far-Field Computations, Rakesh R. Patel
Electrical & Computer Engineering Theses & Dissertations
Computer simulations of N-body systems are beneficial to study the overall behavior of a number of physical systems in fields such as astrophysics, molecular dynamics, and computational fluid dynamics. A new approach for computer simulations of N-body systems is proposed in this research. The new algorithm is called the Cluster Multipole Algorithm (CMA). The goals of the new algorithm are to improve the applicability to non-point sources and to provide more control on the accuracy over current algorithms. The algorithm is targeted to applications that do not require rebuilding the data structure about the system every time step due to …
Atomic Broadcast In Heterogeneous Distributed Systems, Osman Zeineldine
Atomic Broadcast In Heterogeneous Distributed Systems, Osman Zeineldine
Computer Science Theses & Dissertations
Communication services have long been recognized as possessing a dominant effect on both performance and robustness of distributed systems. Distributed applications rely on a multitude of protocols for the support of these services. Of crucial importance are multicast protocols. Reliable multicast protocols enhance the efficiency and robustness of distributed systems. Numerous reliable multicast protocols have been proposed, each differing in the set of assumptions adopted, especially for the communication network. These assumptions make each protocol suitable for a specific environment. The presence of different distributed applications that run on different LANs and single distributed applications that span different LANs mandate …
Design And Implementation Of Fuzzy Logic Controllers. Thesis Final Report, 27 July 1992 - 1 January 1993, Osama A. Abihana, Oscar R. Gonzalez
Design And Implementation Of Fuzzy Logic Controllers. Thesis Final Report, 27 July 1992 - 1 January 1993, Osama A. Abihana, Oscar R. Gonzalez
Electrical & Computer Engineering Faculty Publications
The main objectives of our research are to present a self-contained overview of fuzzy sets and fuzzy logic, develop a methodology for control system design using fuzzy logic controllers, and to design and implement a fuzzy logic controller for a real system. We first present the fundamental concepts of fuzzy sets and fuzzy logic. Fuzzy sets and basic fuzzy operations are defined. In addition, for control systems, it is important to understand the concepts of linguistic values, term sets, fuzzy rule base, inference methods, and defuzzification methods. Second, we introduce a four-step fuzzy logic control system design procedure. The design …