Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii Dec 2007

Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii

Theses and Dissertations

In criminal investigations, it is not uncommon for investigators to obtain a photograph or image that shows a crime being committed. Additionally, thousands of pictures may exist of a location, taken from the same or varying viewpoints. Some of these images may even include a criminal suspect or witness. One mechanism to identify criminals and witnesses is to group the images found on computers, cell phones, cameras, and other electronic devices into sets representing the same location. One or more images in the group may then prove the suspect was at the crime scene before, during, and/or after a crime. …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …