Now showing items 1-9 of 9

    • Design & Implementation of a PDF to Excel Conversion Tool (P2X) 

      Penny, Latoyia Devonne (Oklahoma State University, 2009-07-01)
      The conversion of a portable document structures into an editable format is formally described. Conversion of paper based documents to electronic form is a necessity encountered by public and private sectors. The converted ...
    • Load Scheduling for Bioinformatics Applications in Large Scale Networks 

      Gunturu, Sudha (Oklahoma State University, 2008-12-01)
      A load scheduling strategy with near-optimal processing time is designed to explore the computational characteristics of DNA sequence alignment algorithms, specifically, the Needleman-Wunsch Algorithm. Following the divisible ...
    • New Software Process Model Designed from the Basics of Evolutionary Biology and Software Evolution 

      Ramanathan, Murugappan (Oklahoma State University, 2007-12-01)
      The process of software development is achieved by using different software life cycle models to design, code and test the software. Process models like the water fall model, spiral model and prototyping are used by ...
    • Optimal Bandwidth Utilization in Wireless Token Ring Networks 

      Raja, Ravichandran (Oklahoma State University, 2005-05-01)
      Wireless Token Ring Protocol (WTRP) is the medium access protocol that enables the mobile nodes to communicate in Ad-hoc networks. The major focus of Wireless Token Ring Protocol is to support mobility of nodes in ad-hoc ...
    • Optimized Naive-Bayes Detection System 

      Kunnel, Toni (Oklahoma State University, 2005-12-01)
      A Masquerader is a malicious user who tries to gain access or control of a system from a proper user. The objective of this thesis is to increase the accuracy of the existing Nave-Bayes Algorithm for detecting Masquerade ...
    • Performance Evaluation of a Secured Ad-hoc Routing Protocol 

      Gulluru, Dheeraj Babu (Oklahoma State University, 2006-05-01)
      The purpose of this research is to find out how security affects the performance of an ad-hoc routing protocol. To study the impacts, an existing ad-hoc routing protocol AODV has been chosen and its performance is evaluated ...
    • Secure Key Transfer Protocol Using Goldbach Sequences 

      Kanchu, Krishnama Raju (Oklahoma State University, 2013-05-01)
      Cryptography has been most successfully deployed in protocols where a client-server relationship exists, such as Secure Socket Layer(SSL) and Transport Layer security(TSL). A data can be encrypted using an encryption ...
    • Study on the Image Quality of Liquid Crystal Display 

      Cai, Yingchao (Oklahoma State University, 2006-05-01)
      In this thesis, an analytical LCD mode, the Polymer-Dispersed Dual-Scan Liquid Crystal Display (PDDS-LCD) mode, is proposed. In the proposed PDDS-LCD mode, the Polymer-Dispersed technology [2] is employed to achieve a ...
    • Using Emerging Technologies to Find a Geographic Parking Location in a Dynamic Environment 

      Kalakuntla, Prajwala (Oklahoma State University, 2013-12-01)
      GPS (Global Positioning System) has now-a-days become very popular because of the ease it provides to find the best and most easiest way to the destination of the user. The most widely used applications based on GPS that ...