Improving the performance of the wireless multihop ad hoc networks faces several challenges. In omni-directional antenna based solutions, the use of the RTS/CTS mechanism does not completely eliminate the hidden-terminal ...
We present a Markov chain analysis for studying the performance of wireless ad
hoc networks. The models presented in this dissertation support an arbitrary backoff
strategy. We found that the most important parameter ...
Galois fields are essential blocks of building many of cryptographic schemes. The main advantage of applying Galois fields over cryptographic applications are to reduce cost and increase the sufficiency of the performance. ...
This dissertation discusses some techniques to improve the medium access control in infrastructure multi channel wireless local area networks. Medium Access Control protocols (MAC) coordinate the stations and resolve the ...
In this dissertation, four approaches to improve Voice over Internet Protocol (VoIP) security is proposed. The first two approaches are aimed at encrypting/decrypting and authenticating VoIP packets, whereas the last two ...
A network processor unit (NPU) is a programmable device that consists of several hardware accelerators for wire-speed networking operations. One of the most important functional units in an NPU is packet classification ...
In this work we review the problem of radar imaging satellites' dependency on ground stations to transfer the image data. Since synthetic aperture radar images are very big, only ground stations are equipped to transfer ...
This dissertation considers radar detection and tracking of weak fluctuating targets
using dynamic programming (DP) based track-before-detect (TBD). TBD combines target
detection and tracking by integrating data over ...
Portugal is highly dependent on imported fuels when it comes to the energy sector. The
government continuously aims at creating a sustainable and competitive renewable energy
system. The need for balancing the supply and ...
With the increase in globalization of Integrated Circuit (IC) design and production,
hardware trojans have become a serious threat to manufacturers as well as
consumers. These trojans could be intensionally or accidentally ...
Cryptographic protocols are implemented in hardware to ensure low-area, high speed and reduced power consumption especially for mobile devices. Elliptic Curve Cryptography (ECC) is the most commonly used public-key ...
This thesis focuses on the Binary Integer Modulo-Division Algorithm that is essential for the
permutation process in Sunar-Koc ONB Type II Multiplier and also for other general purposes.
This thesis explains the new ...
3D-NoC architectures are the amalgamation of the 3D integration (Die stacking of 3D-IC Technology) with the increased scalability found in NoC. Originally, it was proposed to tackle the problem of increasing the number of ...
This dissertation discusses techniques to improve the effectiveness and the efficiency of spam control. Specifically, layer-3 e-mail content classification is proposed to allow e-mail pre-classification (for fast spam ...
Division is one of the most fundamental arithmetic operations and is used extensively in engineering, scientific, mathematical and cryptographic applications. The implementation of arithmetic operation such as division, ...
This thesis is devoted to efficient VHDL design of Systolic Array Architecture for Polynomial GF(2^m) multiplication. The hardware implements the Processor Elements(PE) and Systolic Array design for Progressive Product ...
In this work, we propose a new scheduling algorithm (the virtual frame algorithm) for handling different types of traffic using an optimization technique based on the transportation problem with upper bounds. The proposed ...