Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Understanding Quadrature Modulation By Designing A 7mhz Iq Test Bench To Encode The Polybius Square, William Lee Bradley Feb 2024

Understanding Quadrature Modulation By Designing A 7mhz Iq Test Bench To Encode The Polybius Square, William Lee Bradley

Dissertations and Theses

This thesis outlines the design of an IQ Test Bench that allows for experimentation of quadrature modulation techniques. Quadrature modulation utilizes two signals I and Q, 90° out of phase from each other, to greatly increase communication data rates. Using Desmos, a thorough mathematical analysis of waveform mixing is presented, and constellation diagrams are plotted from the results. From this an ancient fire signaling technique known as the Polybius Square is encoded into the system. The IQ Test Bench is built from fundamental components that would be contained within an RFFE: a local oscillator and two frequency mixers. The LO …


Making Software, Making Regions: Labor Market Dualization, Segmentation, And Feminization In Austin, Portland And Seattle, Dillon Mahmoudi Sep 2017

Making Software, Making Regions: Labor Market Dualization, Segmentation, And Feminization In Austin, Portland And Seattle, Dillon Mahmoudi

Dissertations and Theses

Through mixed-methods research, this dissertation details the regionally variegated and place-specific software production processes in three second-tier US software regions. I focus on the relationship between different industrial, firm, and worker production configurations and broad-based economic development, prosperity, and inequality. I develop four main empirical findings.

First, I argue for a periodization of software production that tracks with changes in software laboring activity, software technologies, and wage-employment relationships. Through a GIS-based method, I use the IPUMS-USA to extensively measure the amount and type of software labor in industries across the US between 1970 and 2015. I map the uneven geography …


Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande Aug 2015

Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande

Dissertations and Theses

Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.

The purpose of this dissertation is to investigate how online social networks …


Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua Sep 2013

Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua

Dissertations and Theses

Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …


Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast Jr. Jul 1972

Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast Jr.

Dissertations and Theses

It is known that the entropy of English text can be reduced by arranging the text into groups of two or more letters each. The higher the order of the grouping the greater is the entropy reduction. Using this principle in a computer text compressing system brings about difficulties, however, because the number of entries required in the translation table increases exponentially with group size. This experiment examined the possibility of using a translation table containing only selected entries of all group sizes with the expectation of obtaining a substantial entropy reduction with a relatively small table.

An expression was …