• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 865
  • 201
  • 126
  • 110
  • 73
  • 25
  • 17
  • 16
  • 7
  • 6
  • 6
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 1715
  • 407
  • 309
  • 239
  • 222
  • 183
  • 172
  • 166
  • 163
  • 155
  • 152
  • 152
  • 152
  • 150
  • 139
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Bounds for the nonlinear filtering problem.

Klebanoff, Victor Franklin January 1976 (has links)
Thesis. 1976. M.S.--Massachusetts Institute of Technology. Dept. of Mathematics. / Microfiche copy available in Archives and Science. / Bibliography: leaves 53-54. / M.S.
72

Subband acoustic echo cancellation

Huo, Jiaquan January 2004 (has links)
The main theme of this thesis is the control of acoustic echoes for modem voice communication systems by means of echo cancellation. Two important issues in acoustic echo cancellation, namely the efficient adaptation of the echo cancellation filter and the reliable adaptation of the echo cancellation filter in double talk environment, are investigated. The delayless subband adaptive filter architecture is studied. Efficient implementation of the analysis filter bank and the time domain filtering are derived. The transforming of the subband filter weights to a fullhand counterpart is examined. It is shown that the weight transform is a synthesis filtering procedure. Two new weight transform schemes that deliver substantial performance improvements are proposed. The open-loop optimal subband filter impulse responses are shown to be non-causal and several anti-causal laps in the subband filters are required to model this non-causality. Because of the inevitable double talk detection errors, adaptive filtering algorithms with built-in double talk robustness measures are needed for the reliable operation of the echo canceller. The basic idea of robust adaptive filtering is examined. A comparison of different existing time domain robust adaptive filtering algorithms demonstrates that excellent trade-off between the convergence and the tracking properties and the double talk robustness of the adaptive filtering algorithm can he achieved by using Huher’s method for both the update of the echo cancellation filter and the estimation of scale. A delayless closed-loop robust sub- hand adaptive filter is proposed. / By independently adapting the scale estimates and normalizing the adaptation in each subband, significant improvement in terms of the convergence and tracking speed over the time domain robust NLMS algorithm can be obtained without sacrificing the double talk robustness. Moreover, it is demonstrated that by using different thresholds in the update of the echo cancellation filter and the scales, the robust algorithms converge and track echo path variation as fast as their non-robust counter part while still maintaining a sufficiently low sensitivity to double talk detection errors. The application of two path adaptive filters to acoustic echo cancellation is examined. An analysis of the original two path adaptive filtering algorithm shows that it suffers from two kinds of performance degradation due to the divergence of the background filter during double talk, namely the slow tracking of echo path variation and the false filter coefficient copying after double talk. A robust two path adaptive filter is proposed to mitigate these problems.
73

Silicon firewall prototype

Cheng, Jin 18 December 2003
The Internet is a technological advance that provides access to information, and the ability to publish information, in revolutionary ways. There is also a major danger that provides the ability to corrupt and destroy information as well. When a computer is connected to the Internet, three things are put at risk: the data storage, the computing resources and the users reputation. In order to balance the advantages and risks, the contact between a computer and the Internet or the contact between different networks should be controlled carefully. <p>A firewall is a form of protection that allows a network to connect to the Internet or to another network while maintaining a degree of security. The firewall is an effective type of network security, and in most situations, it is the most effective tool for doing that. <p>With the availability of larger bandwidth, it is becoming more and more difficult for traditional software firewalls to function over a high-speed connection. In addition, the advances in network hardware technology, such as routers, and new applications of firewalls have caused the software firewall to be an impediment to high throughput. This network bottleneck leads to the requirement for new solutions to balance performance and security. Replacing software with hardware could lead to improved performance, enabling the firewalls to handle significantly larger amounts of data. <p> The goal of this project is to investigate if and how existing desktop computer firewall technology could be improved by replacing software functionality with hardware (i.e., silicon). A hardware-based Silicon Firewall system has been designed by choosing the appropriate architecture and implemented using Altera FPGA (Field Programmable Gate Array) on a SOPC (System On a Programmable Chip) Board. The performance of the Silicon Firewall is tested and compared with the software firewall.
74

Silicon firewall prototype

Cheng, Jin 18 December 2003 (has links)
The Internet is a technological advance that provides access to information, and the ability to publish information, in revolutionary ways. There is also a major danger that provides the ability to corrupt and destroy information as well. When a computer is connected to the Internet, three things are put at risk: the data storage, the computing resources and the users reputation. In order to balance the advantages and risks, the contact between a computer and the Internet or the contact between different networks should be controlled carefully. <p>A firewall is a form of protection that allows a network to connect to the Internet or to another network while maintaining a degree of security. The firewall is an effective type of network security, and in most situations, it is the most effective tool for doing that. <p>With the availability of larger bandwidth, it is becoming more and more difficult for traditional software firewalls to function over a high-speed connection. In addition, the advances in network hardware technology, such as routers, and new applications of firewalls have caused the software firewall to be an impediment to high throughput. This network bottleneck leads to the requirement for new solutions to balance performance and security. Replacing software with hardware could lead to improved performance, enabling the firewalls to handle significantly larger amounts of data. <p> The goal of this project is to investigate if and how existing desktop computer firewall technology could be improved by replacing software functionality with hardware (i.e., silicon). A hardware-based Silicon Firewall system has been designed by choosing the appropriate architecture and implemented using Altera FPGA (Field Programmable Gate Array) on a SOPC (System On a Programmable Chip) Board. The performance of the Silicon Firewall is tested and compared with the software firewall.
75

Mutilple Sensor Anomaly Correlation

Tsai, Min-ying 10 January 2012 (has links)
IDS (Intrusion Detection System) detect intrusions and generate alerts to administrator. With Internet more and more popular, IDS products a lot of alerts make administrators spend much time to analyze to understand the network situation. Many online services record services details on the log, as the same administrators spend much time to analyze logs. IDS suffer from several limitations : amount of alerts, most of the alerts are false positive, certain attacks may not be detected by IDS. To solve limitations of IDS, four alert correlation techniques : alert attributions similarity, predefined attack scenarios, multi-stage approaches, verification to filter positive alerts. Network attack consist of multiple steps, each step may leave evidences on log or detected by IDS. Service logs record normal and abnormal detail behaviors, IDS alerts record single attack step. Alerts and logs first merge into meta-alert and meta-log. Second, we use two features to filter meta-log. Then, correlate meta-alert and filtered meta-log to produce report to administrators.
76

ASW fusion on a PC /

Mann, Joelle J. January 2004 (has links) (PDF)
Thesis (M.S. in Applied Science (Operations Research))--Naval Postgraduate School, June 2004. / Thesis advisor(s): Alan Washburn. Includes bibliographical references (p. 49-50). Also available online.
77

Mitigation of spacecraft attitude estimation error via Kalman filtering /

Watson, Vincent C. January 2003 (has links) (PDF)
Thesis (M.S. in Astronautical Engineering)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Roberto Cristi, Brij Agrawal. Includes bibliographical references (p. 53). Also available online.
78

Adaptive data association methods for pulse train analysis and deinterleaving

Slocumb, Benjamin J. 05 1900 (has links)
No description available.
79

The application of Kalman filtering to pilot assisted channel estimation for orthogonal frequency division multiplexing

Markus, Patrick Wayne 08 1900 (has links)
No description available.
80

Multirate machine vision based Kalman filtering and state feedback control

Mashner, Michael 12 1900 (has links)
No description available.

Page generated in 0.065 seconds