Now showing items 1-20 of 74

    • Zou, Le (2009-05-15)
      In this dissertation, we focus on two related parts of a 3D face recognition system with wireless transportation. In the first part, the core components of the system, namely, the feature extraction and classification ...
    • Mayerich, David Matthew (Texas A&M University, 2004-09-30)
      A fast method for gathering large-scale data sets through the serial sectioning of brain tissue is described. These data sets are retrieved using knife-edge scanning microscopy, a new technique developed in the Brain ...
    • Li, Yue (2014-04-29)
      The evolution of data storage technologies has been extraordinary. Hard disk drives that fit in current personal computers have the capacity that requires tons of transistors to achieve in 1970s. Today, we are at the ...
    • Yan, Muxi (2016-05-02)
      Network coding is a novel technique that has a significant potential to improve throughput, robustness and security of both wireless and wireline networks. With network coding the intermediate nodes in the network have the ...
    • Al-Najjar, Camelia (Texas A&M University, 2006-10-30)
      The emerging popularity and interest in Voice-over-IP (VoIP) has been accompanied by customer concerns about voice quality over these networks. The lack of an appropriate real-time capable infrastructure in packet networks ...
    • Guo, Peihong (2018-04-26)
      Facial rigs are essential to facial animation in movies, games and virtual reality applications. Among various facial models, blendshape models are widely adopted in many applications because artists can easily create ...
    • Huang, Qin (2022-07-26)
      In this thesis, we will propose a new (theoretical) computational model to study massive data processing. Our model has limited “local" computing resources (e.g., a normal computer) that characterizes the computational ...
    • Kimball, James Lee (2009-05-15)
      In 1998, J. P. Hansen introduced the construction of an error-correcting code over a finite field Fq from a convex integral polytope in R2. Given a polytope P ⊂ R2, there is an associated toric variety XP , and Hansen used ...
    • Grimley, Lauren Elizabeth (2016-04-08)
      The Hochschild cohomology of an associative algebra is a Gerstenhaber algebra, having a graded ring structure given by the cup product and a compatible graded Lie algebra structure given by the Gerstenhaber bracket. The ...
    • Chang, Juntao (2009-05-15)
      Cooperative effect in the radiation process has been studied in for more than half a century. It is important in the sense of both basic physics and applied science. In this work, we study the dynamics of the cooperative ...
    • Lu, Yipeng (2021-12-08)
      The topic of this research is to detect chest pain action in YouTube videos. Chest pain detection is very important in smart home applications. However, chest pain detection in YouTube videos is very challenging due to the ...
    • Geng, Runshi (2023-03-06)
      Geometric Rank of tensors was introduced by Kopparty et al. as a useful tool to study algebraic complexity theory, extremal combinatorics and quantum information theory. This dissertation studies the classification of ...
    • Ketkar, Avanti Ulhas (Texas A&M University, 2005-11-01)
      Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer ...
    • Cheng, Szeming (Texas A&M University, 2005-11-01)
      Source coding and channel coding are two important problems in communications. Although side information exists in everyday scenario, the effect of side information is not taken into account in the conventional setups. ...
    • Raja, Nouman Saeed (Texas A&M University, 2005-02-17)
      This thesis proposes a framework for combined source-channel coding under power and bandwidth constrained noisy channel. The framework is then applied to progressive image coding transmission using constant envelope M-ary ...
    • Pickett, Marshall B. (Texas A&M University. Libraries, 2019-05)
      This thesis discussess Quantum Error Correction and why it is essential for the development of quantum computation. The introduction will cover the basics of quantum computing and classical error correction. In the second ...
    • Creamer, Daniel Edward (2018-08-07)
      The dissertation introduces a computational approach to classifying low rank modular categories up to their modular data. The modular data of a modular category is a pair of matrices, (S; T). Virtually all the numerical ...
    • Holcomb, Trae (Texas A&M University, 2004-09-30)
      In 1997, Drs. G. R. Blakley and I. Borosh published two papers whose stated purpose was to present a general formulation of the notion of a code that depends only upon a code's structure and not its functionality. In doing ...
    • Nix, Timothy Glen (2013-08-02)
      A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, ...
    • Wang, Yue (2013-05-02)
      Recent years have witnessed a proliferation of flash memories as an emerging storage technology with wide applications in many important areas. Like magnetic recording and optimal recording, flash memories have their own ...