• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 46
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 116
  • 89
  • 64
  • 33
  • 27
  • 20
  • 18
  • 18
  • 14
  • 13
  • 12
  • 12
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Digital Compositing for Photorealism and Lighting in Chroma key film studio

Andrijasevic, Neda, Johansson, Mirjam January 2012 (has links)
Photorealism is what visual effects are all about most of the time. This report entails digital compositing and studio lighting, in relation to Chroma key film material, aimed to give a photorealistic impression.    One of the identified problems in this report is that compositors may get Chroma key footage where the lighting is done poorly, which means a lot of extra work for the compositors and it might even make it impossible to create the desired end result.    Another problem recognized is that the knowledge that these professions possess is often tacit, not available in texts or even functionally defined.    Considering these problems, the purpose of this report is to articulate and try the tacit knowledge found in respect to these research questions: Which factors can alter the photorealistic impression of filmed Chroma key material? To what extent can different factors be altered in the compositing process, for a photorealistic result? How can a photorealistic result from composited Chroma key material be enabled and facilitated, with focus on studio lighting?       Methods used to answer these questions are interviews with compositors, a case study of a small video production, and the production of video clips, including studio lighting and compositing.    While professionals often write about the importance of consistency in image characteristics between different element that are composited together, this report defines which specific features that ought to be consistent, for a photorealistic result.    Further findings are focused on the limitations of the compositor; i.e. the features that are possible to manipulate and the features that have to be set correctly when filming in the studio, to enable a photorealistic outcome. Nonetheless, the main focus will be on the features of lighting set in the Chroma key film studio.    In fact, there are many features that are crucial for enabling and facilitating the compositing of a photorealistic end product. While some of the findings are new, others confirm what has already been presented.
62

Bootstrapping Secure Multicast using Kerberized Multimedia Internet Keying

Woo, Jeffrey Lok Tin January 2012 (has links)
We address bootstrapping secure multicast in enterprise and public-safety settings. Our work is motivated by the fact that secure multicast has important applications in such settings, and that the application setting significantly influences the design of security systems and protocols. This document presents and analyzes two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY). The two designs are denoted to be KM1 and KM2 . The main aspect in which the objective impacts the design is the assumption of an additional trusted third party (called a Key Server) that is the final arbiter on whether a principal is authorized to receive a key. Secure composition can be a challenge, and therefore the designs were kept to be simple so they have intuitive appeal. Notwithstanding this, it was recognized that even simple, seemingly secure protocols can have flaws. Two main security properties of interest called safety and avail- ability were articulated. A rigorous analysis of KM1 and KM2 was conducted using Protocol Composition Logic (PCL), a symbolic approach to analyzing security protocols, to show that the designs have those properties. The value of the analysis is demonstrated by a possible weakness in KM1 that was discovered which lead to the design of KM2 . A prototype of KM1 and KM2 was implemented starting with the publicly available reference implementation of Kerberos, and an open-source implementation of MIKEY. This document also discusses the experience from the implementation, and present empirical results which demonstrate the inherent trade-off between security and performance in the design of KM1 and KM2 .
63

When bacteria talk : time elapse communication for super-slow networks

Krishnaswamy, Bhuvana 13 January 2014 (has links)
In this work we consider nano-scale communication using bacterial popula- tions as transceivers. We demonstrate using a microfluidic test-bed and a population of genetically engineered Escherichia coli bacteria serving as the communication re- ceiver that a simple modulation like on-off keying (OOK) is indeed achievable, but suffers from very poor data-rates. We explore an alternative communication strategy called time elapse communication (TEC) that uses the time period between signals to encode information. We identify the severe limitations of TEC under practical non-zero error conditions in the target environment, and propose an advanced communication strategy called smart time elapse communication (TEC-SMART) that achieves over a 10x improvement in data-rate over OOK.
64

Color Range Determination and Alpha Matting for Color Images

Luo, Zhenyi 02 November 2011 (has links)
This thesis proposes a new chroma keying method that can automatically detect background, foreground, and unknown regions. For background color detection, we use K-means clustering in color space to calculate the limited number of clusters of background colors. We use spatial information to clean the background regions and minimize the unknown regions. Our method only needs minimum inputs from user. For unknown regions, we implement the alpha matte based on Wang's robust matting algorithm, which is considered one of the best algorithms in the literature, if not the best. Wang's algorithm is based on modified random walk. We proposed a better color selection method, which improves matting results in the experiments. In the thesis, a detailed implementation of robust matting is provided. The experimental results demonstrate that our proposed method can handle images with one background color, images with gridded background, and images with difficult regions such as complex hair stripes and semi-transparent clothes.
65

Bootstrapping Secure Multicast using Kerberized Multimedia Internet Keying

Woo, Jeffrey Lok Tin January 2012 (has links)
We address bootstrapping secure multicast in enterprise and public-safety settings. Our work is motivated by the fact that secure multicast has important applications in such settings, and that the application setting significantly influences the design of security systems and protocols. This document presents and analyzes two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY). The two designs are denoted to be KM1 and KM2 . The main aspect in which the objective impacts the design is the assumption of an additional trusted third party (called a Key Server) that is the final arbiter on whether a principal is authorized to receive a key. Secure composition can be a challenge, and therefore the designs were kept to be simple so they have intuitive appeal. Notwithstanding this, it was recognized that even simple, seemingly secure protocols can have flaws. Two main security properties of interest called safety and avail- ability were articulated. A rigorous analysis of KM1 and KM2 was conducted using Protocol Composition Logic (PCL), a symbolic approach to analyzing security protocols, to show that the designs have those properties. The value of the analysis is demonstrated by a possible weakness in KM1 that was discovered which lead to the design of KM2 . A prototype of KM1 and KM2 was implemented starting with the publicly available reference implementation of Kerberos, and an open-source implementation of MIKEY. This document also discusses the experience from the implementation, and present empirical results which demonstrate the inherent trade-off between security and performance in the design of KM1 and KM2 .
66

Symbol Synchronization For Msk Signals Based On Matched Filtering

Sezginer, Serdar 01 January 2003 (has links) (PDF)
In this thesis, symbol timing recovery in MSK signals is investigated making use of matched filtering. A decision-directed symbol synchronizer cascaded with an MLSE receiver is proposed for fine timing. Correlation (matched filter) method is used to recover the timing epoch from the tentative decisions obtained from the Viterbi algorithm. The fractional delays are acquired using interpolation and an iterative maximum search process. In order to investigate the tracking performance of the proposed symbol synchronizer, a study is carried out on three possible optimum timing phase criteria: (i) Mazo criterion, (ii) the minimum squared ISI criterion (msISI), and (iii) the minimum BER criterion. Moreover, a discussion is given about the timing sensitivity of the MLSE receiver. The performance of the symbol synchronizer is assessed by computer simulations. It is observed that the proposed synchronizer tracks the variations of the channels almost the same as the msISI criterion. The proposed method eliminates the cycle slips very succesfully and is robust to frequency-selective multipath fading channel conditions even in moderate signal-to-noise ratios.
67

Grid-Based RFID Indoor Localization Using Tag Read Count and Received Signal Strength Measurements

Jeevarathnam, Nanda Gopal 26 October 2017 (has links)
Passive ultra-high frequency (UHF) radio frequency identification (RFID) systems have gained immense popularity in recent years for their wide-scale industrial applications in inventory tracking and management. In this study, we explore the potential of passive RFID systems for indoor localization by developing a grid-based experimental framework using two standard and easily measurable performance metrics: received signal strength indicator (RSSI) and tag read count (TRC). We create scenarios imitating real life challenges such as placing metal objects and other RFID tags in two different read fields (symmetric and asymmetric) to analyze their impacts on location accuracy. We study the prediction potential of RSSI and TRC both independently and collaboratively. In the end, we demonstrate that both signal metrics can be used for localization with sufficient accuracy whereas the best performance is obtained when both metrics are used together for prediction on an artificial neural network especially for more challenging scenarios. Experimental results show an average error of as low as 0.286 (where consecutive grid distance is defined as unity) which satisfies the grid-based localization benchmark of less than 0.5.
68

Four-dimensional Q2PSK modulation and coding for mobile digital communication

Van Wyk, Daniel Jacobus 27 October 2005 (has links)
Please read the abstract in the section 00front of this document. / Dissertation (MEng (Electronic Engineering))--University of Pretoria, 2006. / Electrical, Electronic and Computer Engineering / unrestricted
69

Multi-dimensional lattice equaliser for Q2 PSK

Cilliers, Jacques Etienne 10 November 2005 (has links)
The aim of this dissertation was the design, implementation and performance evaluation of a Recursive Least Squares (RLS), lattice based, adaptive, multidimensional, decision feedback equaliser (DFE) for the spectrally efficient four-dimensional digital modulation technique, re¬ferred to as Quadrature-Quadrature Phase-Shift Keying, Q2pSK. Q2PSK constitutes a relatively new modulation technique, and the application of adaptive equalisation to this technique has not yet been considered in the open literature. This dissertation represents an in depth study into the Q2PSK modulation technique, as well as the optimal implementation, in simulation, of such a modem to aid the inclusion of the adap¬tive lattice DFE, for application to high speed mobile digital communication over the V /UHF channel in the presence of multi path propagation. Specific aspects of synchronization applicable to this modem platform are also addressed. An in depth study was also conducted into the realisation of a V /UHF channel simulation, capable of producing a Ricean and/or Rayleigh fad¬ing multipath propagation environment for the evaluation of the modem platform and adaptive equaliser structure. The theoretical analysis of the effect of multi path on a Q2PSK signal led to the correct design of the adaptive lattice structure, as well as the correct interfacing of the equaliser to the receiver platform. The performance of the proposed synchronisation strategies, in tandem with the equalisation technique were evaluated for several static, as well as fading multipath channels. The simulation results obtained show the equaliser operates correctly, and can give large performance gains over the static matched filter (matched to the transmitted waveform) implementation of the modem platform. Several simulations were specifically designed to highlight the performance limitations of the adaptive equalisation technique. / Dissertation (MEng (Digital Communication))--University of Pretoria, 2006. / Electrical, Electronic and Computer Engineering / unrestricted
70

Color Range Determination and Alpha Matting for Color Images

Luo, Zhenyi January 2011 (has links)
This thesis proposes a new chroma keying method that can automatically detect background, foreground, and unknown regions. For background color detection, we use K-means clustering in color space to calculate the limited number of clusters of background colors. We use spatial information to clean the background regions and minimize the unknown regions. Our method only needs minimum inputs from user. For unknown regions, we implement the alpha matte based on Wang's robust matting algorithm, which is considered one of the best algorithms in the literature, if not the best. Wang's algorithm is based on modified random walk. We proposed a better color selection method, which improves matting results in the experiments. In the thesis, a detailed implementation of robust matting is provided. The experimental results demonstrate that our proposed method can handle images with one background color, images with gridded background, and images with difficult regions such as complex hair stripes and semi-transparent clothes.

Page generated in 0.0856 seconds