Open Access. Powered by Scholars. Published by Universities.®

Electrical and Electronics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Electrical and Electronics

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips Dec 2008

A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

A tool flow is presented for deriving simulated annealing accelerator circuits on a field programmable gate array (FPGA) from C source code by exploring architecture solutions that conform to a preset template through scheduling and mapping algorithms. A case study carried out on simulated annealing-based Autonomous Mission Planning and Scheduling (AMPS) software used for autonomous spacecraft systems is explained. The goal of the research is an automated method for the derivation of a hardware design that maximizes performance while minimizing the FPGA footprint. Results obtained are compared with a peer C to register transfer level (RTL) logic tool, a state-of-the-art …


Evaluation Of An Image Processing Algorithm For Scene Change Detection, Daniel Flores Jan 2008

Evaluation Of An Image Processing Algorithm For Scene Change Detection, Daniel Flores

Open Access Theses & Dissertations

Despite the efforts to reduce traffic accidents by government entities and automobile manufactures, the numbers of accidents are not considerably reduced. An evaluation of an algorithm based on the fly's eye is done on this research applying its principles to detect scene change on images for printed circuit boards providing initial steps to implement this algorithm on vehicular traffic to keep track of objects moving on the field for collision avoidance purposes. The effectiveness of the algorithm is addressed through a comparison of its performance with that found in experimental data.


Management Framework For Hybrid Wireless Networks, Chong Shen Jan 2008

Management Framework For Hybrid Wireless Networks, Chong Shen

Theses

The objective of the Hybrid Wireless Network with dedicated Relay Nodes (HWN*) architecture is to interface the Base Station (BS) Oriented Mobile Network (BSON) and the 802.fix based Mobile Ad hoc Wireless Network (MANET) so that one system can be utilised as an alternative radio access network for data transmissions, while the incorporation of Relay Nodes (RN) is to extend the communication coverage, optimise medium resource sharing, increase spatial reuse opportunity, stabilise MANET link and create more micro-cells. The HWN* keeps the existing cellular infrastructure and a Mobile Terminal (MT) can borrow radio resources from other cells via secure multi-hop …


Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann Jan 2008

Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann

Theses

Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.

Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …


A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney Jan 2008

A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney

Theses

The recent dramatic trend towards always-on-connectivity has driven the need for mobile ubiquitous computing environments with the advent of the Wireless Local Area Network (WLAN) seeing a shift from traditional wired networks to wireless networking. A WLAN typically contains a number of access points that allow wireless enabled clients access information and network resources such as the internet without the need for wires, offering flexibility and mobility to the users. Initial wireless networks were convenience based allowing users access to the primary wired network, and involved little planning prior to roll-out. The proliferation of low cost wireless devices combined wdth …