Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Swarm behavior indicates the direct or indirect interactions among relatively simple agents to perform a particular task that is unknown to the individual agent. The study of swarm behavior originates from the research of swarms in...
The along-track resolution of a sonar system is proportional to the aperture length in the along-track direction. Synthetic aperture sonar (SAS) coherently sum samples from multiple physical locations to form a synthesized aperture which...
In this thesis, an approach is proposed for the design and implementation of fuzzy traffic controllers using Field Programmable Gate Arrays (FPGAs).The focus of this study is to develop an effective traffic signaling strategy to be...
Many pattern recognition tasks employ artificial neural networks based on radial basis functions. The statistical characteristics of pattern generating processes are determined by neural networks. The Gaussian potential function is the...
This thesis presents and evaluates a bio-inspired vision system design to increase the depth field of a stereoscopic ranging imager. Two key attributes of the human vision system are leveraged in this design. The first attribute is image...
Bridges in Florida are exposed to high amounts of humidity due to the state's geography. This excess moisture results in a high incidence of corrosion on the bridge's steel support cables. Also, the inclusion of ineffective waterproofing...
Thus far, capacity fade has been ascribed to various mechanisms that include (i) the dissolution of highly resistive surface films on the electrode surface which result from side reactions; (ii) loss in active electrode materials; (iii)...
Motion control of robot manipulators is typically accomplished by sensing and regulating the positions of the joint actuators to cause the end-effector to follow a programmed trajectory. Unfortunately, position control schemes usually...
Demand for decentralized, wireless, ad-hoc systems, where hosts are free to leave or join, to replace wired communication systems has seen a phenomenal growth. Such networks need little or no infrastructure support to operate. Deploying...
The microstructure of the catalyst layer in proton exchange membrane fuel cells (PEMFCs) greatly influences the utilization of the catalyst (Pt) and the overall cell performance. Research focused on two key components in optimizing the...
Electrical power systems utilizing electromagnetic devices, namely those of electrical ships, are subject to nonlinearities from regenerative loads, distributed energy storage systems, and onboard loads such as air handling and fluid...
Common military radar systems transmit sophisticated pulse compression waveforms for range information. Although much progress has been made in suppressing the platform radar cross section to avoid detection by enemy active radar, little...
Many non-communication fiber optic applications use single optic fibers bundled together. There exist two types of fiber bundles namely coherent and non-coherent fiber bundles. In the non-coherent fiber bundles, the individual fibers are...
In this master's thesis a performance analysis of Optical CDMA systems is conducted. This is accomplished by simulating and analyzing various CDMA code sequences. These are modified and implemented for all optical networks, in OCDMA...
The purpose of the research conducted in the thesis is to study the effectiveness of a text-dependent identification system making use of cepstral coefficients and vector quantization. The identification system will make use of Mel...
This thesis is intended to cover two of the most basic, important and highly applied multiple access communication techniques in modern age. It will provide an in-depth literature on the history, evolution, present and future of FDMA ...
Typical adaptive algorithms attempt to exploit some characteristic of a desired mobile user's signal incident upon an array of antenna elements to form a blind estimate of the user's signal, wherein this estimate is used to update...
The conditions that arise in the Cocktail Party Problem prevail across many fields creating a need for of Blind Source Separation. The need for BSS has become prevalent in several fields of work. These fields include array processing, ...
Efficient hardware/software codesign framework will greatly facilitate not only the design but also the verification early in the embedded system deign cycle. With these electric design automation (EDA) tools, the hardware can be...
The semiconductor industry currently uses optical lithography processes at the 130 nm node (90 nm gate length) for fabricating integrated circuits (ICs). This lithography process uses a 248nm wavelength light source to write features on...
Wireless Communication has been a rapidly growing industry over the past decade. The mobile and portable device market has boomed with the advent of new data, multi-media and voice technologies. The technical advances in mobile and...
This thesis examines security threats facing wireless networks and the effectiveness of security protocols deployed to combat these threats. The thesis will base its study on Wireless Local Area Network (WLAN) as defined by IEEE...
Adding force feedback to a teleoperation system can greatly improve a user's ability to complete tasks. However, operating in the presence of time delay can cause serious problems for bilateral teleoperation systems. Even a small amount...
For a number of years, high performance disaster recovery networks have been unavailable to all but the largest and wealthiest organizations. However, a recently adopted IETF standard known as iSCSI promises to not only provide...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.