Now showing items 1250-1269 of 1981

    • Object Histories in Java 

      Nair, Aakarsh (University of Waterloo, 2010-04-30)
      Developers are often faced with the task of implementing new features or diagnosing problems in large software systems. Convoluted control and data flows in large object-oriented software systems, however, make even simple ...
    • Objective Quality Assessment and Optimization for High Dynamic Range Image Tone Mapping 

      Ma, Kede (University of Waterloo, 2014-06-06)
      Tone mapping operators aim to compress high dynamic range (HDR) images to low dynamic range ones so as to visualize HDR images on standard displays. Most existing works were demonstrated on specific examples without being ...
    • Observers on linear Lie groups with linear estimation error dynamics 

      Koldychev, Mikhail (University of Waterloo, 2012-09-20)
      A major motivation for Lie group observers is their application as sensor fusion algorithms for an inertial measurement unit which can be used to estimate the orientation of a rigid-body. In the first part of this thesis ...
    • An Offshore Wind Farm Featuring Differential Power Processing 

      Pape, Marten (University of Waterloo, 2021-12-22)
      Offshore wind farms are a rapidly growing technology used to harvest wind energy on the open seas where wind speeds are significantly higher and steadier than onshore. Current wind farms located far away from shore (e.g., ...
    • On A New Approach to Model Reference Adaptive Control 

      Naghmeh, Mansouri (University of Waterloo, 2008-08-12)
      The objective of adaptive control is to design a controller that can adjust its behaviour to tolerate uncertain or time-varying parameters. An adaptive controller typically consists of a linear time-invariant (LTI) compensator ...
    • On Achieving Secure Message Authentication for Vehicular Communications 

      Zhang, Chenxi (University of Waterloo, 2010-05-19)
      Vehicular Ad-hoc Networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences, optimize traffic flow control systems, etc. Addressing security and privacy ...
    • On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches 

      Wen, Hong (University of Waterloo, 2018-02-12)
      Due to the broadcast nature, wireless links are open to malicious intrusions from outsiders, which makes the security issues a critical concern in the wireless communicationsover them. Physical-layer security techniques, ...
    • On Capacity-Achieving Input Distributions to Additive Vector Gaussian Noise Channels Under Peak and Even Moment Constraints 

      Eisen, Jonah Sean (University of Waterloo, 2021-08-25)
      We investigate the support of the capacity-achieving input distribution to a vector-valued Gaussian noise channel. The input is subject to a radial even-moment constraint and, in some cases, is additionally restricted ...
    • On Causal Video Coding with Possible Loss of the First Encoded Frame 

      Eslamifar, Mahshad (University of Waterloo, 2014-01-21)
      Multiple Description Coding (MDC) was fi rst formulated by A. Gersho and H. Witsenhausen as a way to improve the robustness of telephony links to outages. Lots of studies have been done in this area up to now. Another ...
    • On Constructing Low-Density Parity-Check Codes 

      Ma, Xudong (University of Waterloo, 2007-12-13)
      This thesis focuses on designing Low-Density Parity-Check (LDPC) codes for forward-error-correction. The target application is real-time multimedia communications over packet networks. We investigate two code design ...
    • On Cyclic Delay Diversity OFDM Based Channels 

      Yousefi, Rozhin (University of Waterloo, 2012-10-22)
      Orthogonal Frequency Division Multiplexing, so called OFDM, has found a prominent place in various wireless systems and networks as a method of encoding data over multiple carrier frequencies. OFDM-based communication ...
    • On Efficient Polynomial Multiplication and Its Impact on Curve based Cryptosystems 

      Alrefai, Ahmad Salam (University of Waterloo, 2013-12-13)
      Secure communication is critical to many applications. To this end, various security goals can be achieved using elliptic/hyperelliptic curve and pairing based cryptography. Polynomial multiplication is used in the underlying ...
    • On Error Detection and Recovery in Elliptic Curve Cryptosystems 

      Alkhoraidly, Abdulaziz Mohammad (University of Waterloo, 2011-08-16)
      Fault analysis attacks represent a serious threat to a wide range of cryptosystems including those based on elliptic curves. With the variety and demonstrated practicality of these attacks, it is essential for cryptographic ...
    • On Fault-based Attacks and Countermeasures for Elliptic Curve Cryptosystems 

      Dominguez Oviedo, Agustin (University of Waterloo, 2008-05-23)
      For some applications, elliptic curve cryptography (ECC) is an attractive choice because it achieves the same level of security with a much smaller key size in comparison with other schemes such as those that are based on ...
    • On Large Polynomial Multiplication in Certain Rings 

      Shagufa, Khan Shagufta (University of Waterloo, 2018-04-11)
      Multiplication of polynomials with large integer coefficients and very high degree is used in cryptography. Residue number system (RNS) helps distribute a very large integer over a set of smaller integers, which makes ...
    • On Legible and Predictable Robot Navigation in Multi-Agent Environments 

      Bastarache, Jean-Luc (University of Waterloo, 2022-11-24)
      Legibility has recently become an important property to consider in the design of social navigation planners. Legible motion is intent-expressive, which when employed during social robot navigation, allows others to quickly ...
    • On Message Authentication in 4G LTE System 

      Wu, Teng (University of Waterloo, 2015-08-26)
      After decades of evolution, the cellular system has become an indispensable part of modern life. Together with the convenience brought by the cellular system, many security issues have arisen. Message integrity protection ...
    • On MMSE Approximations of Stationary Time Series 

      Datta Gupta, Syamantak (University of Waterloo, 2014-01-20)
      In a large number of applications arising in various fields of study, time series are approximated using linear MMSE estimates. Such approximations include finite order moving average and autoregressive approximations as ...
    • On Non-Binary Constellations for Channel Encoded Physical Layer Network Coding 

      Faraji-Dana, Zahra (University of Waterloo, 2012-04-23)
      This thesis investigates channel-coded physical layer network coding, in which the relay directly transforms the noisy superimposed channel-coded packets received from the two end nodes, to the network-coded combination ...
    • On Nonlinear Time-Invariant Behavioural Models of Power Transistors Used in the Computer-Aided Design of Power Amplifiers 

      Amini, Amir-Reza (University of Waterloo, 2023-06-01)
      The Radio Frequency (RF) Power Amplifier (PA) is the main consumer of power in a wireless transmitter. Energy efficient PA design aided with circuit simulation tools requires accurate nonlinear models of the power transistors ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages