Now showing items 84-103 of 221

  • Face recognition with Gabor phase 

    Venkata, Anjaneya Subha Chaitanya Konduri (Wichita State University, 2009-07)
    Face recognition is an attractive biometric measure due to its capacity to recognize individuals without their cooperation. This thesis proposes a method to dynamically recognize a facial image with the help of its valid ...
  • Facilitating secure multicasting for mobile networks using Trusted Multicast Agents 

    Mosharraf, Arif (WIchita State University, 2007-07)
    Recent advances in wireless data and real time communication have stimulated the need to allow mobile users to send multicast data by using secure and seamless connectivity to the global Internet and with one another without ...
  • A fast flexible simulation platform for multi-core systems 

    Gavara, Phanendra Sandeep Naidu (Wichita State University, 2012-05)
    As the popularity and demand grow, high-performance systems are adopting more processing cores. IBM Roadrunner, a petascale supercomputer, has 130K+ cores. No wonder, designing and/or analyzing such a gigantic system is ...
  • Frequency estimation using subspace methods 

    Shatnawi, Heba Awad Addad (Wichita State University, 2009-05)
    Complex frequency estimation problem plays a significant role in many engineering applications. The estimation process was traditionally achieved by the Eigenvalue Decomposition (EVD) of the spatial correlation matrix ...
  • Frequency offset effects on Maximin and MOSTLE 

    Yang, Dong-Hyeuk (2006-07)
    The Maximin algorithm, proposed by Dr. Torrieri and Bakhru, adaptively updates the weights of an antenna array to provide simultaneous interference suppression and beamforming in a frequency hopping (FH) communication ...
  • General logical linear nearest neighbor (LLNN) architecture for fault-tolerant quantum computation 

    Mudbhari, Pratima Kumari (Wichita State University, 2008-12)
    We present a general scheme for implementing fault-tolerant quantum computation. We discuss a general two-dimensional architecture of qubits involving only linear nearest neighbor interactions. Between the qubits by using ...
  • Guidelines for performance based distribution reliability analysis for present and future grid 

    Aravinthan, Visvakumar (Wichita State University, 2010-08)
    The electric power system has experienced many changes in the last decade. The notable changes are deregulation of the industry, penetration of renewable energy sources, demand side management, stricter regulations on ...
  • H2 control of singularly perturbed aircraft system 

    Zaveri, Viral Shailesh (Wichita State University, 2011-07)
    The objective of this research is to develop an analytical approach to control two-time-scale systems operating under certain noise parameters. This approach addresses two important design criteria: augmentation of large-scale ...
  • A hybrid approach to forecasting wind power using Artificial Neural Networks and Numeric Weather Prediction 

    Pfeifer, Mark B. (Wichita State University, 2011-07)
    A methodology to forecast wind power production 24 hours ahead is developed using a hybrid approach of an artificial neural network (ANN) and numerical weather prediction (NWP). The methodology is simple and designed to ...
  • I-ALOHA: intelligent ALOHA protocol for efficient RFID tag reading 

    Alavi, Khubaib Ahmad (Wichita State University, 2011-05)
    Radio-Frequency Identification (RFID) has made a revolutionary mark in identifying and tracking number of different industry objects, which has reduced the manual tracking to much higher extent. The key problem which is ...
  • I-broadcast: broadcasting scheme for vehicular ad-hoc networks 

    Srikumar, Aravind (Wichita State University, 2010-05)
    With the rapid development of wireless technology and the wide availability of low cost wireless devices, the domain of mobile computer networks has expanded in the recent past. Mobile ad-hoc networks promise to be the ...
  • Image change detection using wireless sensor networks 

    Yelisetty, Sree Ramya (2007-05)
    Change detection in images is of great interest because of its relevance in many applications such as video surveillance. This thesis presents the underlying theoretical problem of distributed image change detection using ...
  • Image registration in low resolution visual sensor networks 

    Balasubramanian, Harini (Wichita State University, 2007-12)
    Image registration is the process of integrating data from different coordinate systems into one coordinate system. It is of great interest in video surveillance because of its capability to combine images and generate a ...
  • Impact of calling locations on energy consumption of VoIP over wireless LAN 

    Devalla, Aashish Raj (Wichita State University, 2009-12)
    Currently there are a wide range of applications for mobile devices. However, mobile devices with an inbuilt wireless interface card are known to have very small operating life. Energy plays a vital role especially for the ...
  • Impact of hypervisor cache locking on performance 

    Suryanarayana, Vidya (Wichita State University, 2013-12)
    Server virtualization has become the modern trend in various industries. Industries are resorting to the deployment of virtualized servers in order to cut the cost of additional, expensive hardware and consolidate the ...
  • The impact of MAC contention and route failures on burst losses in saturated ad hoc networks 

    Zaman, Shahid (Wichita State University, 2011-05)
    Medium access contention and route failures in the saturated wireless ad hoc networks increase the average number of transmission attempts required to successfully deliver a frame. MAC contention and route failures also ...
  • The impact of MAC service-time and route discovery time on packet queuing delay in saturated ad hoc networks 

    Siddiqui, Usman Ghani (Wichita State University, 2011-05)
    This thesis presents a quantitative analysis of packet queuing delays in saturated DCF networks. It presents the relationship between medium access control (MAC) delays, routing delays, and the packet queuing delays, in ...
  • Implementation of a channel selection algorithm using cognitive radios 

    Cabrejos, David (Wichita State University, 2011-05)
    With the increase of wireless devices, the wireless spectrum is becoming overloaded causing users to experience delays and performance degradation. Typically, a device will start transmitting data on a frequency and ...
  • Implementation of location identifier separation protocol (LISP) routing protocol in network simulator 2 

    Manduva, Prithvi (Wichita State University, 2014-05)
    The Internet, which has had an impact on almost every facet of our lives. It has grown at a rapid pace and devices connecting to in direct proportion, in turn increasing the routing tables. The Location Identifier Separation ...
  • Implementation of secure Home Area Network in a smart grid 

    Mohapatra, Surya Narayan (Wichita State University, 2011-12)
    A smart gird improves reliability and efficiency of the power network by actively engaging with customers. Increasing demand for energy, availability of untapped renewable energy, and an aging electric grid infrastructure ...