Search Results

open access

Joint Schemes for Physical Layer Security and Error Correction

Description: The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities… more
Date: August 2011
Creator: Adamo, Oluwayomi Bamidele
Partner: UNT Libraries
open access

Scene Analysis Using Scale Invariant Feature Extraction and Probabilistic Modeling

Description: Conventional pattern recognition systems have two components: feature analysis and pattern classification. For any object in an image, features could be considered as the major characteristic of the object either for object recognition or object tracking purpose. Features extracted from a training image, can be used to identify the object when attempting to locate the object in a test image containing many other objects. To perform reliable scene analysis, it is important that the features extr… more
Date: August 2011
Creator: Shen, Yao
Partner: UNT Libraries
open access

Indoor Localization Using Magnetic Fields

Description: Indoor localization consists of locating oneself inside new buildings. GPS does not work indoors due to multipath reflection and signal blockage. WiFi based systems assume ubiquitous availability and infrastructure based systems require expensive installations, hence making indoor localization an open problem. This dissertation consists of solving the problem of indoor localization by thoroughly exploiting the indoor ambient magnetic fields comprising mainly of disturbances termed as anomalies … more
Date: December 2011
Creator: Pathapati Subbu, Kalyan Sasidhar
Partner: UNT Libraries
open access

Physical-Layer Network Coding for MIMO Systems

Description: The future wireless communication systems are required to meet the growing demands of reliability, bandwidth capacity, and mobility. However, as corruptions such as fading effects, thermal noise, are present in the channel, the occurrence of errors is unavoidable. Motivated by this, the work in this dissertation attempts to improve the system performance by way of exploiting schemes which statistically reduce the error rate, and in turn boost the system throughput. The network can be studied us… more
Date: May 2011
Creator: Xu, Ning
Partner: UNT Libraries
open access

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Description: Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and use these services. Two of the popular models of information flow in LBS are the client-server model and the peer-to-peer model, in both of which, existing approaches do not always provide privacy for all parties concerned. In this work, I study the feasibility of applying cryptographic protocols to design privacy-preserving solutions for … more
Date: May 2011
Creator: Vishwanathan, Roopa
Partner: UNT Libraries
Back to Top of Screen