Now showing items 85-104 of 231

  • Enhancement of cache utilization by isolation and thin provisioning of hypervisor cache 

    Mylar Balasubramanya, Karthik (Wichita State University, 2012-07)
    Storage resources are being consolidated and have led to the increased demand in sharing storage, depending on the type of application or class of customers. In such a scenario, cache consolidation becomes increasingly ...
  • Equipment condition assessment and its importance in estimation and prediction of power system reliability 

    Dongale, Prasad J. (WIchita State University, 2008-05)
    Transmission and Distribution Electric Utilities have a vast amount of assets distributed over their system in the form of various equipment. As part of an asset management program, electric utilities keep focusing on the ...
  • Estimation of path duration in mobile ad-hoc networks: A theoretical study 

    Devaraj, Sreekalyan (Wichita State University, 2009-12)
    Mobile ad hoc networks (MANETs) are widely deployed for different purposes. Some of these areas are for the military, emergency rescue operations, etc. These networks are established "on the fly" and, therefore, play a ...
  • Experimental evaluation of 802.11e quality of service in a large-scale network 

    Chung, Pui See (Wichita State University, 2010-08)
    IEEE 802.11e is a fairly recent amendment to the IEEE 802.11 WLAN standard that supports quality of service (QoS) (or service differentiation) based on medium-access control (MAC) and contention-based channel access. While ...
  • An experimental study of EPCglobal class-1 generation-2 anti-collision protocol for RFID systems 

    De Silva, M. H. Maheesha H. (Wichita State University, 2010-08)
    Radio frequency identification (RFID) is used to identify, track, and manage tagged animate or inanimate objects automatically using wireless communication technology. RFID is similar to existing barcode identification, ...
  • Face recognition with Gabor phase 

    Venkata, Anjaneya Subha Chaitanya Konduri (Wichita State University, 2009-07)
    Face recognition is an attractive biometric measure due to its capacity to recognize individuals without their cooperation. This thesis proposes a method to dynamically recognize a facial image with the help of its valid ...
  • Facilitating secure multicasting for mobile networks using Trusted Multicast Agents 

    Mosharraf, Arif (WIchita State University, 2007-07)
    Recent advances in wireless data and real time communication have stimulated the need to allow mobile users to send multicast data by using secure and seamless connectivity to the global Internet and with one another without ...
  • A fast flexible simulation platform for multi-core systems 

    Gavara, Phanendra Sandeep Naidu (Wichita State University, 2012-05)
    As the popularity and demand grow, high-performance systems are adopting more processing cores. IBM Roadrunner, a petascale supercomputer, has 130K+ cores. No wonder, designing and/or analyzing such a gigantic system is ...
  • Frequency estimation using subspace methods 

    Shatnawi, Heba Awad Addad (Wichita State University, 2009-05)
    Complex frequency estimation problem plays a significant role in many engineering applications. The estimation process was traditionally achieved by the Eigenvalue Decomposition (EVD) of the spatial correlation matrix ...
  • Frequency offset effects on Maximin and MOSTLE 

    Yang, Dong-Hyeuk (2006-07)
    The Maximin algorithm, proposed by Dr. Torrieri and Bakhru, adaptively updates the weights of an antenna array to provide simultaneous interference suppression and beamforming in a frequency hopping (FH) communication ...
  • General logical linear nearest neighbor (LLNN) architecture for fault-tolerant quantum computation 

    Mudbhari, Pratima Kumari (Wichita State University, 2008-12)
    We present a general scheme for implementing fault-tolerant quantum computation. We discuss a general two-dimensional architecture of qubits involving only linear nearest neighbor interactions. Between the qubits by using ...
  • Guidelines for performance based distribution reliability analysis for present and future grid 

    Aravinthan, Visvakumar (Wichita State University, 2010-08)
    The electric power system has experienced many changes in the last decade. The notable changes are deregulation of the industry, penetration of renewable energy sources, demand side management, stricter regulations on ...
  • H2 control of singularly perturbed aircraft system 

    Zaveri, Viral Shailesh (Wichita State University, 2011-07)
    The objective of this research is to develop an analytical approach to control two-time-scale systems operating under certain noise parameters. This approach addresses two important design criteria: augmentation of large-scale ...
  • A hybrid approach to forecasting wind power using Artificial Neural Networks and Numeric Weather Prediction 

    Pfeifer, Mark B. (Wichita State University, 2011-07)
    A methodology to forecast wind power production 24 hours ahead is developed using a hybrid approach of an artificial neural network (ANN) and numerical weather prediction (NWP). The methodology is simple and designed to ...
  • I-ALOHA: intelligent ALOHA protocol for efficient RFID tag reading 

    Alavi, Khubaib Ahmad (Wichita State University, 2011-05)
    Radio-Frequency Identification (RFID) has made a revolutionary mark in identifying and tracking number of different industry objects, which has reduced the manual tracking to much higher extent. The key problem which is ...
  • I-broadcast: broadcasting scheme for vehicular ad-hoc networks 

    Srikumar, Aravind (Wichita State University, 2010-05)
    With the rapid development of wireless technology and the wide availability of low cost wireless devices, the domain of mobile computer networks has expanded in the recent past. Mobile ad-hoc networks promise to be the ...
  • Image change detection using wireless sensor networks 

    Yelisetty, Sree Ramya (2007-05)
    Change detection in images is of great interest because of its relevance in many applications such as video surveillance. This thesis presents the underlying theoretical problem of distributed image change detection using ...
  • Image registration in low resolution visual sensor networks 

    Balasubramanian, Harini (Wichita State University, 2007-12)
    Image registration is the process of integrating data from different coordinate systems into one coordinate system. It is of great interest in video surveillance because of its capability to combine images and generate a ...
  • Impact of calling locations on energy consumption of VoIP over wireless LAN 

    Devalla, Aashish Raj (Wichita State University, 2009-12)
    Currently there are a wide range of applications for mobile devices. However, mobile devices with an inbuilt wireless interface card are known to have very small operating life. Energy plays a vital role especially for the ...
  • Impact of hypervisor cache locking on performance 

    Suryanarayana, Vidya R. (Wichita State University, 2013-12)
    Server virtualization has become the modern trend in various industries. Industries are resorting to the deployment of virtualized servers in order to cut the cost of additional, expensive hardware and consolidate the ...