• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 159
  • 81
  • 15
  • 12
  • 11
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 363
  • 363
  • 53
  • 51
  • 50
  • 46
  • 46
  • 33
  • 32
  • 30
  • 28
  • 26
  • 24
  • 22
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Mapping textures on 3d terrains: a hybrid cellular automata approach

Sinvhal, Swapnil 25 April 2007 (has links)
It is a time consuming task to generate textures for large 3D terrain surfaces in computer games, flight simulations and computer animations. This work explores the use of cellular automata in the automatic generation of textures for large surfaces. I propose a method for generating textures for 3D terrains using various approaches - in particular, a hybrid approach that integrates the concepts of cellular automata, probabilistic distribution according to height and Wang tiles. I also look at other hybrid combinations using cellular automata to generate textures for 3D terrains. Work for this thesis includes development of a tool called "Texullar" that allows users to generate textures for 3D terrain surfaces by configuring various input parameters and choosing cellular automata rules. I evaluate the effectiveness of the approach by conducting a user survey to compare the results obtained by using different inputs and analyzing the results. The findings show that incorporating concepts of cellular automata in texture generation for terrains can lead to better results than random generation of textures. The analysis also reveals that incorporating height information along with cellular automata yields better results than using cellular automata alone. Results from the user survey indicate that a hybrid approach incorporating height information along with cellular automata and Wang tiles is better than incorporating height information along with cellular automata in the context of texture generation for 3D meshes. The survey did not yield enough evidence to suggest whether the use of Wang tiles in combination with cellular automata and probabilistic distribution according to height results in a higher mean score than the use of only cellular automata and probabilistic distribution. However, this outcome could have been influenced by the fact that the survey respondents did not have information about the parameters used to generate the final image - such as probabilistic distributions, the population configurations and rules of the cellular automata.
22

Pattern formation in cellular automata and three dimensional lattice dynamical systems

Thomas, Diana M. 05 1900 (has links)
No description available.
23

Towards a framework for intuitive programming of cellular automata

Torbey, Sami 05 December 2007 (has links)
The ability to obtain complex global behaviour from simple local rules makes cellular automata an interesting platform for massively parallel computation. However, manually designing a cellular automaton to perform a given computation can be extremely tedious, and automated design techniques such as genetic programming have their limitations because of the absence of human intuition. In this thesis, we propose elements of a framework whose goal is to make the manual synthesis of cellular automata rules exhibiting desired global characteristics more programmer-friendly, while maintaining the simplicity of local processing elements. We also demonstrate the power of that framework by using it to provide intuitive yet effective solutions to the two-dimensional majority classification problem, the convex hull of disconnected points problem, and various problems pertaining to node placement in wireless sensor networks. / Thesis (Master, Computing) -- Queen's University, 2007-12-05 10:26:09.591
24

Quantum cellular automata and few-donor devices in silicon

Mitic, Mladen , Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2008 (has links)
This thesis investigates advanced silicon devices fabricated using phosphorous ion implantation. The novel devices presented are the silicon quantum cellular automata cell and the few-donor device implanted with controlled numbers of phosphorous donors. In addition, the thesis presents novel measurements of a phosphorous implanted silicon double-dot device, a crucial building block of a quantum cellular automata cell. The devices were fabricated using standard lithographic techniques and, in the case of few-donor devices, a new method of controlled single ion implantation using on-chip detector electrodes. The positional accuracy of the implanted ions was achieved using a resist mask defined by electron beam lithography. A series of subsequent process steps has also been developed to repair the substrate implantation damage, define surface control gates, and to define single electron transistors used for readout via the detection of sub-electron charge transfer signals in the device. The device operations were achieved at mK-temperatures using various measurement techniques. In the case of quantum cellular automata cells, the device operation was demonstrated directly by switching the polarization of the cells from one logic state to another and detecting the corresponding change in the electrostatic environment using single-electron transistors. The control gate limits necessary for stable QCA cell operation were also determined, indirectly demonstrating QCA logic state switching. The double-dot device operation was demonstrated using SET detection in both linear and for the first time in non-linear regimes. In addition, source-drain conductance detection of charge states, simultaneous detection using single-electron transistors and source-drain conductance, and source-drain bias spectroscopy measurements of these systems were also achieved. In the case of few-donor implanted devices, isolated charge transfers were detected in both MOS and PIN based devices. The signals corresponded to between 0.01 and 0.05 of a single electron charge, induced on the islands of the SETs. The magnetic field dependence of the charge transfers detected in few-donor implanted devices was also investigated, along with basic phosphorous donor ionization experiments. The devices were also measured using SETs operated in rf mode, yielding consistent results. The work presented in this thesis is a step towards realizing a silicon charge-based quantum computer and other advanced single-electron devices based on phosphorous ion-implantation in silicon.
25

From form generators to automated diagrams using cellular automata to support architectural design /

Herr, Christiane Margerita. January 2008 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2008. / Also available in print.
26

Investigations of cellular automata-based stream ciphers /

Testa, Joseph S. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 119-137).
27

A 3D computer model investigation of biofilm detachment and protection mechanisms

Chambless, Jason Daniel. January 2008 (has links) (PDF)
Thesis (PhD)--Montana State University--Bozeman, 2008. / Typescript. Chairperson, Graduate Committee: Philip S. Stewart. Includes bibliographical references.
28

Network Decontamination Using Cellular Automata

Rakotomalala, Livaniaina Hary January 2016 (has links)
We consider the problem of decontaminating a network where all nodes are infected by a virus. The decontamination strategy is performed using a Cellular Automata (CA) model in which each node of the network is represented by the automata cell and thus, the network host status is also mapped to the CA state (contaminated, decontaminating, decontaminated). All hosts are assumed to be initially contaminated and the status of each cell is synchronously updated according to a set of local rules, based on the state of its neighbourhood. Our goal is to find the set of local rules that will accomplish the decontamination in an optimal way. The metrics used to define optimality is the minimization of three metrics: the maximum number of decontaminating cells at each step, the required value of the immunity time of each cell and the number of steps to complete the sanitization algorithm. In our research, we explore the designing of these local decontamination rules by refining the concept of the neighbourhood radius of CA with the addition of two new dimensions: Visibility Hop and Contamination Distance. Additionally, a research tool that help us manage our study have been developed.
29

Network Decontamination with Temporal Immunity

Yassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
30

Network Decontamination with Temporal Immunity

Yassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.

Page generated in 0.0691 seconds