• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 362
  • 211
  • 43
  • 1
  • 1
  • Tagged with
  • 646
  • 646
  • 646
  • 572
  • 521
  • 133
  • 110
  • 104
  • 79
  • 72
  • 71
  • 68
  • 66
  • 65
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

New techniques using artificial neural nets for image processing

Desai, Pradeep V 04 1900 (has links)
Aartificial neural nets
2

Information technology for rural development : A system's approach

Sangameshwara, B G 05 1900 (has links)
Information technology
3

Design of algorithms for optimum area utilization in ASIC’s

Chiplunkar, Niranjan N 05 1900 (has links)
optimum area utilization in ASIC’s
4

Coding of satellite image data

Jagannathan, S 04 1900 (has links)
satellite image data
5

A scalable resource management framework for QoS-enabled multidomain networks.

Mantar, Haci Ali. Chapin, Stephen J. Hwang, Junseok January 2003 (has links)
Thesis (PH.D.)--Syracuse University, 2003. / "Publication number AAT 3099739."
6

Congestion driven global routing and cross point assignment

Krishna, Bharat. January 2005 (has links)
Thesis (Ph. D.)--Syracuse University, 2005. / "Publication number AAT 3177003."
7

Acquisition of 3D models from a set of 2D images

Cheng, Yong-Qing 01 January 1997 (has links)
The acquisition of accurate 3D models from a set of images is an important and difficult problem in computer vision. The general problems considered in this thesis are how to compute the camera parameters and build 3D models given a set of 2D images. The first set of algorithms presented in this thesis deal with the problem of camera calibration in which some or all of the camera parameters must be determined. A new analytical technique is derived to find relative camera poses for three images, given only calibrated 2D image line correspondences across three images. Then, a general non-linear algorithm is developed to estimate relative camera poses over a set of images. Finally, the presented algorithms are extended to simultaneously compute the intrinsic camera parameters and relative camera poses from 2D image line correspondences over multiple uncalibrated images. To reconstruct and refine 3D lines of the models, a multi-image and multi-line triangulation method using known correspondences is presented. A novel non-iterative line reconstruction algorithm is proposed. Then, a robust algorithm is presented to simultaneously estimate a model consisting of a set of 3D lines while satisfying object-level constraints such as angular, coplanar, and other geometric 3D constraints. Finally, to make the proposed approach widely applicable, an integrated approach to matching and triangulation from noisy 2D image points across two images is first presented by introducing an affinity measure between image point features, based on their distance from a hypothetical projected 3D pseudo-intersection point. A similar approach to matching and triangulation from noisy 2D image line segments across three images is proposed by introducing an affinity measure among 2D image line segments via a 3D pseudo-intersection line.
8

Matching affine-distorted images

Manmatha, Raghavan 01 January 1997 (has links)
Many visual tasks involve the matching of image patches derived from imaging a scene from different viewpoints. Matching two image patches can, however, be a difficult task. This is because changes in the relative orientation of a surface with respect to a camera cause deformations in the image of the surface. Thus this deformation needs to be taken into account when matching or registering two image patches of an object under changes in viewpoint. Up to first order these deformations can be described using an affine transform. Here, a computational scheme to match two image patches under an affine transform is presented. The two image patches are filtered with Gaussian and derivative of Gaussian filters. The problem of matching the two image patches is then recast as one of finding amount by which these filters must be deformed so that the filtered outputs from the two images are equal. For robustness, it is necessary to use the filter outputs from many points in a small region to obtain an overconstrained system of equations. The resulting equations are linearized with respect to the affine transforms and then iteratively solved for the affine transforms. The method is local and can match image patches in situations where other algorithms fail. It is also shown that the same framework may be used to match points and lines.
9

Data flow analysis for verification of application-specific properties of concurrent software

Naumovich, Gleb N 01 January 1999 (has links)
With the proliferation of concurrent software systems, automated finite state verification techniques for checking that a software system conforms to a behavior specification become extremely important in improving software quality. Such techniques can be used both for detecting faults of certain kinds and proving that such faults are absent from the given software system. In this thesis, we adapt the promising approach of FLAVERS, a data flow analysis-based finite state verification technique, to the analysis of concurrent Java programs. We investigate two alternative approaches to modeling Java concurrency with FLAVERS and demonstrate experimentally that one of these two approaches is more efficient. In addition, we present three general optimizations of the general approach of FLAVERS. One of these optimizations improves the space requirements of the FLAVERS analysis by about an order of magnitude and all three optimizations combined reduce the analysis time approximately in half. Finally, we describe three case studies evaluating the applicability of FLAVERS to several application domains: communication protocols, high-level software architectures, and user interfaces. We demonstrate that FLAVERS is an efficient tool for detecting faults or proving the absence of faults of certain kind in these domains. We also describe two polynomial data flow algorithms for computing a conservative estimate of which pairs of statements may execute in parallel in concurrent programs. One of these algorithms computes such pairs for concurrent Ada programs and the other algorithm computes such pairs for concurrent Java programs. The empirical comparison of each of the algorithms with a precise exponential-time algorithm shows that our algorithms are very precise in practice. In addition, we compare our algorithm for Ada with the most precise of the previously proposed approaches. It turns out that our algorithm tends to be more precise in practice.
10

Scalable reliable multicast in wide area networks

Kasera, Sneha Kumar 01 January 1999 (has links)
Many applications including one-to-many file transfer, information dissemination (e.g., stock quotes and web cache updates), distance learning, shared whiteboards, multi-party games, and distributed computing can benefit from reliable multicast. The goal of this dissertation is to design and evaluate large scale multicast loss recovery architectures and protocols for IP multicast capable networks, that make efficient use of both the network and end-system resources and scale to applications that can have thousands of receivers spanning wide area networks. One of the important problems in multicast loss recovery is that of a receiver receiving unwanted retransmissions of packets lost at other receivers. We present a new approach to scoping retransmissions in which a single multicast channel is used for the original transmission of packets and separate multicast channels are used for scoping retransmissions to “interested” receivers only. We find that a small to moderate number of multicast channels can be recycled to achieve almost perfect retransmission scoping for a wide range of system parameters. We also propose two mechanisms for implementing retransmission channels, one using multiple IP multicast groups and the other using a single IP multicast group in conjunction with additional router support. We show that the second approach reduces both host processing costs and network bandwidth usage. Another problem arises when the sender alone bears the burden of handling loss-feedback and supplying retransmissions to a large group of receivers. Local recovery approaches, in which entities other than the sender aid in loss recovery, distribute the loss recovery burden and also reduce network bandwidth consumption and recovery latency. We propose a new local recovery approach that co-locates designated repair servers with routers at strategic locations inside the network. We demonstrate the superior performance of our approach over traditional approaches. We address the important issues of repair server placement, repair server resource requirements, and performance degradation due to insufficient resources. We also demonstrate how the repair server functionality can be provided as a dynamically invocable/revocable service with minimal router support.

Page generated in 0.1517 seconds