Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Ontology-Based Methodology For Error Detection In Software Design, Allyson M. Hoss Jan 2006

Ontology-Based Methodology For Error Detection In Software Design, Allyson M. Hoss

LSU Doctoral Dissertations

Improving the quality of a software design with the goal of producing a high quality software product continues to grow in importance due to the costs that result from poorly designed software. It is commonly accepted that multiple design views are required in order to clearly specify the required functionality of software. There is universal agreement as to the importance of identifying inconsistencies early in the software design process, but the challenge is how to reconcile the representations of the diverse views to ensure consistency. To address the problem of inconsistencies that occur across multiple design views, this research introduces …


A Computational Framework For The Structural Change Analysis Of 3d Volumes Of Microscopic Specimens, Madhusudhanan Balasubramanian Jan 2006

A Computational Framework For The Structural Change Analysis Of 3d Volumes Of Microscopic Specimens, Madhusudhanan Balasubramanian

LSU Doctoral Dissertations

Glaucoma, commonly observed with an elevation in the intraocular pressure level (IOP), is one of the leading causes of blindness. The lamina cribrosa is a mesh-like structure that provides axonal support for the optic nerves leaving the eye. The changes in the laminar structure under IOP elevations may result in the deaths of retinal ganglion cells, leading to vision degradation and loss. We have developed a comprehensive computational framework that can assist the study of structural changes in microscopic structures such as lamina cribrosa. The optical sectioning property of a confocal microscope facilitates imaging thick microscopic specimen at various depths …


Effective Bootstrapping Of Peer-To Peer Networks Over Mobile Ad-Hoc Networks, Wei Ding Jan 2006

Effective Bootstrapping Of Peer-To Peer Networks Over Mobile Ad-Hoc Networks, Wei Ding

LSU Doctoral Dissertations

Mobile Ad-hoc Networks (MANETs) and Peer-to-Peer (P2P) networks are vigorous, revolutionary communication technologies in the 21st century. They lead the trend of decentralization. Decentralization will ultimately win clients over client/server model, because it gives ordinary network users more control, and stimulates their active participation. It is a determinant factor in shaping the future of networking. MANETs and P2P networks are very similar in nature. Both are dynamic, distributed. Both use multi-hop broadcast or multicast as major pattern of traffic. Both set up connection by self-organizing and maintain connection by self-healing. Embodying the slogan "networking without networks," both abandoned traditional client/server …


An Architecture For Adaptive Real Time Communication With Embedded Devices, Amol S. Patwardhan Jan 2006

An Architecture For Adaptive Real Time Communication With Embedded Devices, Amol S. Patwardhan

LSU Master's Theses

The virtual testbed is designed to be a cost-effective rapid development environment as well as a teaching tool for embedded systems. Teaching and development of embedded systems otherwise requires dedicated real time operating systems and costly infrastructure for hardware simulation. Writing control software for embedded systems with such a setup takes prolonged development cycles. Moreover, actual hardware may get damaged while writing the control software. On the contrary, in a virtual testbed environment, a simulator running on the host machine is used instead of the actual hardware, which then interacts with an embedded processor through serial communication. This hardware-in-the-loop setup …


Adaptive Scalable Protocols For Heterogeneous Wireless Networks, Vamsi Krishna Paruchuri Jan 2006

Adaptive Scalable Protocols For Heterogeneous Wireless Networks, Vamsi Krishna Paruchuri

LSU Doctoral Dissertations

The focus of this dissertation is to propose analytical models to study the impact of collisions and interference in heterogeneous wireless networks and propose simple scalable and lightweight protocols that use these models to adapt to network conditions thus increasing efficiency, decreasing energy consumption and prolonging network lifetime. The contributions of this dissertation are multifold and are summarized as follows: - Analytical models to study the impact of collisions and interference on both broadcast and unicast messages. These analytical models are incorporated into the proposed protocols to adapt to the prevailing network conditions to improve their performance. - Optimized Flooding …


Computer-Aided Diagnostic Systems For Digital Mammograms, Nicholas Jabari Lee Jan 2006

Computer-Aided Diagnostic Systems For Digital Mammograms, Nicholas Jabari Lee

LSU Master's Theses

A computer-aided diagnostic (CAD) system that uses a unique shape-based classification scheme, the Ellipse-Closed Curve Fitting (ECCF) algorithm, is developed for digital mammogram image analysis. The system is developed to work as a post-processing extension to a previously developed CAD system that locates and segments mass lesions, or tumors, found in digital mammograms into separate images. The ECCF system is implemented in the MATLAB mathematical scripting language and is thus capable of running on multiple platforms. The ECCF algorithm detects edges in tumor images and casts them into closed curve functions. Parameters for an ellipse of best fit for a …


Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan G. Shamanna Jan 2006

Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan G. Shamanna

LSU Master's Theses

A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application …


Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan Shamanna Jan 2006

Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan Shamanna

LSU Master's Theses

A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application …


Evaluation Of Tcp Based Congestion Control Algorithms Over High-Speed Networks, Yaaser Ahmed Mohammed Jan 2006

Evaluation Of Tcp Based Congestion Control Algorithms Over High-Speed Networks, Yaaser Ahmed Mohammed

LSU Master's Theses

The Additive Increase Multiplicative Decrease (AIMD) algorithm of the Transport Control Protocol (TCP) had worked remarkably well over low speed networks and had guaranteed fairness to the users all over these years, but at present, the demands for transferring large quantities of data over very high-speed networks are increasing at a tremendous rate. Because of its AIMD algorithm to control its window growth function accompanied by a slow response function which is inadequate over high-speed links, TCP has been proven to underutilize the available network bandwidth and leave a considerable amount of unused bandwidth. To overcome this limitation of TCP, …


Numerical Techniques For Fresnel Diffraction In Computational Holography, Richard Patrick Muffoletto Jan 2006

Numerical Techniques For Fresnel Diffraction In Computational Holography, Richard Patrick Muffoletto

LSU Doctoral Dissertations

Optical holography can produce very realistic virtual images due to its capability to properly convey the depth cues that we use to interpret three-dimensional objects. Computational holography is the use of digital representations plus computational methods to carry out the holographic operations of construction and reconstruction. The large computational requirements of holographic simulations prohibit present-day existence of real-time holographic displays comparable in size to traditional two-dimensional displays. Fourier-based approaches to calculate the Fresnel diffraction of light provide one of the most efficient algorithms for holographic computations because this permits the use of the fast Fourier transform (FFT). The limitations on …


Security In Heterogeneous Wireless Networks, Vijay Bulusu Jan 2006

Security In Heterogeneous Wireless Networks, Vijay Bulusu

LSU Master's Theses

The proliferation of a range of wireless devices, from the cheap low power resource starved sensor nodes to the ubiquitous cell phones and PDA's has resulted in their use in many applications. Due to their inherent broadcast nature Security and Privacy in wireless networks is harder than the wired networks. Along with the traditional security requirements like confidentiality, integrity and non-repudiation new requirements like privacy and anonymity are important in wireless networks. These factors combined with the fact that nodes in a wireless network may have different resource availabilities and trust levels makes security in wireless networks extremely challenging. The …