Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Microcontroller (2)
- Ad hoc networks (Computer networks)--Simulation methods (1)
- Audio (1)
- Cartography data processing (1)
- Clustering; Computer networks; Distributed algorithms; Group membership; Network partitioning; Self-stabilizing algorithm (1)
-
- Computer security (1)
- Computers--Access control (1)
- Data encryption (Computer science) (1)
- Deadlocks (1)
- GNU Radio Project (1)
- Image processing--Digital techniques (1)
- Livelock (1)
- Microprocessors (1)
- Mobile geographic information systems (1)
- Multimedia cartography (1)
- NOC (1)
- Network (1)
- Networks on a chip (1)
- Nexsys (1)
- OFDM WiMAX MATLAB simulation PSK (1)
- Pattern recognition systems (1)
- Picoblaze (1)
- Routing protocols (Computer network protocols) (1)
- Signal Processing (1)
- Socket (1)
- Software Defined Radio (1)
- Three-dimensional imaging (1)
- Torus (1)
- Touch Screen (1)
- USRP (1)
Articles 1 - 11 of 11
Full-Text Articles in Computer Engineering
Mobile Map Browsers: Anticipated User Interaction For Data Pre-Fetching, Benjamin T. Weber
Mobile Map Browsers: Anticipated User Interaction For Data Pre-Fetching, Benjamin T. Weber
Electronic Theses and Dissertations
When browsing a graphical display of geospatial data on mobile devices, users typically change the displayed maps by panning, zooming in and out, or rotating the device. Limited storage space on mobile devices and slow wireless communications, however, impede the performance of these operations. To overcome the bottleneck that all map data to be displayed on the mobile device need to be downloaded on demand, this thesis investigates how anticipated user interactions affect intelligent pre-fetching so that an on-demand download session is extended incrementally. User interaction is defined as a set of map operations that each have corresponding effects on …
Self-Stabilizing Group Membership Protocol, Mahesh Subedi
Self-Stabilizing Group Membership Protocol, Mahesh Subedi
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this thesis, we consider the problem of partitioning a network into groups of bounded diameter.
Given a network of processes X and a constant D, the group partition problem is the problem of finding a D-partition of X, that is, a partition of X into disjoint connected subgraphs, which we call groups, each of diameter no greater than D. The minimal group partition problem is to find a D-partition {G1, ... Gm} of X such that no two groups can be combined; that is, for any Gi and Gj, where i ≠ j, either Gi U Gj is disconnected …
Data Routing In Multicore Processors Using Dimension Increment Method, Arpita H. Kadakia
Data Routing In Multicore Processors Using Dimension Increment Method, Arpita H. Kadakia
UNLV Theses, Dissertations, Professional Papers, and Capstones
A Deadlock-free routing algorithm can be generated for arbitrary interconnection network using the concept of virtual channels but the virtual channels will lead to more complex algorithms and more demands of NOC resource.
In this thesis, we study a Torus topology for NOC application, design its structure and propose a routing algorithm exploiting the characteristics of NOC. We have chosen a typical 16 (4 by 4) routers Torus and propose the corresponding route algorithm. In our algorithm, all the channels are assigned 4 different dimensions (n0,n1,n2 & n3). By following the dimension increment method, we break the dependent route circles, …
Applying Image Matching To Video Analysis, Adam J. Behring
Applying Image Matching To Video Analysis, Adam J. Behring
Theses and Dissertations
Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …
Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber
Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber
Theses and Dissertations
Mobile Ad-hoc Networks (MANET) are comprised of wireless systems that communicate without the assistance of centrally managed routers or base stations. MANET research and development has increased due to computing technologies offering smaller, faster, smarter, and more power efficient platforms to operate on. Largely the testing and evaluation of new and existing MANET protocols has resided in simulation environments. This is due in part to the complexities and expenses incurred when conducting real world tests. Many researchers have come to recognize that these current simulations tend to assume away critical components of the MANET domain. These assumptions are made either …
Characterization Of The Rfx400 For Use In Software Defined Radio, Edward Adams
Characterization Of The Rfx400 For Use In Software Defined Radio, Edward Adams
Computer Engineering
While software defined radio is an extremely flexible technology that is fairly rarely used, as a single purpose radio is much cheaper, it provides an excellent means of learning RF and communications skills through the lens of digital electronics, and it would behoove a Cal Poly student interested in these areas to take on a project in software defined radio. This project aims to lower the barrier to entry for future students to undertake such a project. The use of an up-converter/down-converter is documented for future students to interface with.
Ofdm Simulation In Matlab, Paul Guanming Lin
Ofdm Simulation In Matlab, Paul Guanming Lin
Electrical Engineering
The objective of this project is to demonstrate the concept and feasibility of an OFDM system, and investigate how its performance is changed by varying some of its major parameters. This objective is met by developing a MATLAB program to simulate a basic OFDM system. From the process of this development, the mechanism of an OFDM system can be studied; and with a completed MATLAB program, the characteristics of an OFDM system can be explored.
Touch Screen Sound Controller, James Fenley, Jonathan Law
Touch Screen Sound Controller, James Fenley, Jonathan Law
Electrical Engineering
The Touch Screen Sound Controller sets out to explore the use of a touch screen as a sound control interface for the disk jockey profession. In addition, the project aims to provide an alternate means of transferring audio data by way of TCP/IP communications as opposed to MIDI. By applying our method, a user may stream pulse-code modulated data from a server onto a client’s RAM via an Ethernet connection. A 32bit, 200MHz ARM9 microprocessor addresses data from the RAM and proceeds with executing DSP instructions from the user. The connection between the touch screen and the central microprocessor is …
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Theses and Dissertations
Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Theses and Dissertations
To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to …
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Theses and Dissertations
Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …