Mason Archival Repository Service

Browsing The Volgenau School of Engineering by Title

Browsing The Volgenau School of Engineering by Title

Sort by: Order: Results:

  • Charankar, Nikita (2010-06-08)
    The data collected by the NIITEK GPR, high range resolution (HRR) ground-penetrating radar (GPR), results in a digitized raw video representing signals re ected at the surface of as well as internal to the landmine due ...
  • Blasiak, Samuel J. (2013-08)
    The need to operate on sequence data is prevalent across a range of real world applications including protein/DNA classification, speech recognition, intrusion detection, and text classification. Sequence data can be ...
  • Liu, Guilin (2017)
    A vast amount of 2D images and 3D meshes and points are created every day. Many applications require us to extract more semantic information beyond the original raw discrete representation of pixels, facets and points from ...
  • Saha, Tanwistha (2014)
    Classification of nodes in relational networks is an important task because it involves applications in multiple areas that can impact people's lives on a daily basis. The inability to use traditional classification ...
  • Le, Thuykhanh
    The problem of recovering samples lost from time series or sensor data is important in signal processing. When the underlying signal is known to be bandlimited, and the sample rate is higher than the Nyquist rate, the ...
  • Mamidi, Upendarreddy (2016-03-04)
    Traditionally, authenticated encryption was achieved by using two seperate algorithms for encryption and authentication. Recently, modes that combine encryption and authentication together are being proposed. This feature ...
  • Surapathi, Kishore Kumar (2012-02-23)
    The National Institute of Standards and Technology (NIST) has opened a public competition for a new Secure Hash Standard, SHA-3 on Nov 2, 2007. Out of the 64 submissions, 51 were selected for the first round in Dec 2008. ...
  • Gurung, Smriti (2012-07-17)
    The Secure Hash Algorithm (SHA) is a cryptographic hash function published by the National Institute of Standard and Technology (NIST) as a U.S Federal Information and Processing Standard (FIPS). In the past few years, ...
  • Olson, Brian (2012-01-26)
    Modeling of protein molecules in silico for the purpose of elucidating the three-dimensional structure where the protein is biologically active employs the knowledge that the protein conformational space has an underlying ...
  • Erpek, Tugba (2007-12-17)
    Wireless spectrum has become a scarce resource due to the exponential growth of the number and type of devices that utilize the electromagnetic spectrum. The cost of long term leasing of spectrum has proven to be a major ...
  • Kotari, Vikas (2017)
    T2- lesion volume on magnetic resonance images is one of the surrogate markers that is routinely used for monitoring Multiple Sclerosis disease progression. Studies suggest that in addition to T2-lesion volume, individual ...
  • Xi, Zhonghua (2017)
    Recent advances in robotics engineering and material science accelerate the development of self-folding machines, the robots that can fold themselves from flat materials to functional 3D shapes. However, designing such ...
  • Aljammaz, Muhammad (2013-08-20)
    Most research discussing malware detection completely dismisses signatures as being a thing of the past, accusing signatures of suffering from a weak ability to detect zero-day malware. This indeed could be the case if we ...
  • Guedes, Felipe Bombarda (2015-08-06)
    This thesis describes an approach to manage the use of the Brazilian Air Force’s fleet of F-5M fighter aircraft during the period of 2014 to 2019. Until December 2010 Brazil had two types of supersonic fighter aircraft ...
  • Esfahani, Naeem (2014-08)
    The ever-growing complexity of software systems coupled with the need to maintain their quality of service (QoS) characteristics, even under adverse conditions and highly uncertain environments, have instigated the emergence ...
  • Tzeng, Sean (2015)
    The great amounts of data and the large number of artifacts generated during the execution of defense acquisition programs serve as evidence of program progress and decision support. However, acquisition decision makers ...
  • Altaleb, Hesham (2015)
    With the introduction of power energy markets deregulation, innovations have transformed once a static network into a more flexible grid. Microgrids have also been deployed to serve various purposes (e.g., reliability, ...
  • Wheelock, Richard J. (2008-08-21)
    Detection and bearing estimation in shallow water is difficult due to multipath. As array aperture increases, angular resolution increases and observation of multipath becomes more likely. The SWellEx-96 experiment ...
  • Eranki, Avinash (2010-11-10)
    The goal of this project is to develop, characterize and validate vector tissue Doppler imaging (vTDI) to measure dynamic musculoskeletal motion. We have developed a vector tissue Doppler imaging system using a ...
  • Rafi, Muhammad Faraz (2010-06-08)
    This thesis work proposes a technique based on concept maps, meta-models, and ontologies to develop a theoretical foundation for the use of multiple interacting models in order to determine the valid interaction between ...

Search MARS


Browse

My Account