A three-dimensional (3-D) visualization system for serial microscope images is developed with special reference to its application in microscopy and cell biology. The 3-D visualization system involves three process stages, ...
The development of large dense arrays of smaller antennas and moderate-sized antennas equipped with multi-beam arrays in the next generation of radio telescopes, such as the square kilometre array (SKA), is making 3D ...
This dissertation presents a novel underwater machine vision technique which uses
the optical properties of water to extract range information from colour images. By
exploiting the fact that the attenuation of light in ...
Testimonies of “wireless catching up with wireline” have begun. However, the nonstationary and hostile nature of the wireless channel impose the greatest threat to reliable data transmission over wireless links. The ...
Quality of service (QoS) means packets are classified and sent to the destination based on the priority of the packet. Before the advent of this standard data packets were sent on a standard namely "Best effort". In this ...
The concept of reciprocal acoustical travel-time measurements as a means of determining path-averaged currents is well established. We have designed an instrument to exploit this principle in studies of the boundary layer ...
The work presented in this thesis consists of two parts: development and application of a novel passive acoustical approach for field measurement of breaking surface waves, and interpretation of the resulting observations ...
The thesis focuses on fast acquisition techniques for spread spectrum packet radio communications systems. Matched filters are often used to achieve fast acquisitions. A new synchronizer using multiple acquisition detection ...
The field of Adaptive Music Technology is rapidly expanding and evolving. While there have been a number of theses and dissertations devoted to the study of new computer music instrument design for persons with disabilities, ...
Internet traffic is increasing exponentially, driven by new technologies such as Internet of Things (IoT) and rich streaming media. The traditional IP router becomes a bottleneck for further Internet expansion due to its ...
The field of digital image compression has been intensively explored to obtain ever improved performance corresponding to a given bit budget. The DCT-based JPEG standard remains to be one of the most popular image compression ...
The wide usage of computer vision in many perspectives has been attracted in
the recent years. One of the areas of computer vision that has been studied is facial
emotion recognition, which plays a crucial role in the ...
This thesis introduces novel automated visual defect detection approaches that effectively address the challenges of data scarcity and imbalance. In the manufacturing industry, conventional defect detection systems rely ...
GPU Computing promises very high performance per watt for highly-parallelizable workloads.
Nowadays, there are various programming models developed to utilize the computational power of GPGPUs.
Low-level programming ...
Cryptography provides users with secure communications and data transmission
privacy and authenticity (Coron, 2006). Today the most widely used algorithm for private
key encryption is the Advanced Encryption Standard ...
This thesis presents new procedures and guidelines for the design of advanced microwave filters. Practical implementations include dual-band, multi-band and ultra-wideband filters for applications in wireless and ...
Organisations worldwide continue to face a diverse range of attacks. Traditionally,
these have been attacks of opportunity that quickly act upon weaker targets whenever
possible. However, in the past decade, advanced ...
Wideband beamforming have been widely used in modern radar systems. One of the powerful wideband beamforming techniques that is capable of achieving a high selectivity over a wide bandwidth is the nested array (NA) beamformer. ...
Existing endpoint security monitors use agents that must be installed on every
computing host or endpoint. However, as the number of monitored hosts increases,
agents installation, con figuration and maintenance become ...
With the rise in the frequency and sophistication of cyberattacks, host intrusion detection systems (HIDSs) have become an essential component in monitoring and protecting endpoints in the network security perimeter. Current ...