Dissertations / Theses on the topic 'Regular architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 25 dissertations / theses for your research on the topic 'Regular architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
DeBrunner, Linda Sumners. "Modeling reconfiguration algorithms for regular architecture." Diss., Virginia Tech, 1991. http://hdl.handle.net/10919/29254.
Full textPh. D.
Haddad, Nicholas. "Transmission of digital images using data-flow architecture." Ohio : Ohio University, 1985. http://www.ohiolink.edu/etd/view.cgi?ohiou1184007755.
Full textTao, Zhixiang. "Theoretical and experimental investigations of large amplitude ship motions and loads in regular head seas." Thesis, University of Glasgow, 1996. http://theses.gla.ac.uk/6900/.
Full textPoláková, Simona. "Příprava perovskitových solárních článků se standardní n-i-p strukturou a jejich optimalizace." Master's thesis, Vysoké učení technické v Brně. Fakulta chemická, 2021. http://www.nusl.cz/ntk/nusl-444539.
Full textNayak, Amiyaranjan Carleton University Dissertation Engineering Electrical. "On reconfigurability of some regular architectures." Ottawa, 1991.
Find full textLai, Pengjie. "Improvement of Sigma Voltage Regulator - A New Power Architecture." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/31412.
Full textMaster of Science
Masson, Juliette. "Geoffroi du Loroux et l'architecture religieuse en Aquitaine au XIIème siècle." Phd thesis, Université Michel de Montaigne - Bordeaux III, 2012. http://tel.archives-ouvertes.fr/tel-00735961.
Full textDzimitrowicz, Natasha. "Investigating proteins that regulate the architecture of the plant endoplasmic reticulum." Thesis, University of Warwick, 2018. http://wrap.warwick.ac.uk/100895/.
Full textGishto, Arsela. "SCAFFOLD COMPOSITION AND ARCHITECTURE CRITICALLY REGULATE EXTRACELLULAR MATRIX SYNTHESIS BY CARDIOMYOCYTES." Cleveland State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=csu1386941945.
Full textSun, Julu. "Investigation of Alternative Power Architectures for CPU Voltage Regulators." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/30119.
Full textPh. D.
Ahmed, Mohamed Hassan Abouelella. "Power Architectures and Design for Next Generation Microprocessors." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/103175.
Full textDoctor of Philosophy
With the rapid increase of cloud computing and the high demand for digital content, it is estimated that the power consumption of the IT industry will reach 10 % of the total electric power in the USA by 2020. Multi-core processors (CPUs) and graphics processing units (GPUs) are the key elements in fulfilling all of the digital content requirements but come with a price of more power-hungry processors, driving the power per server rack to 20 KW levels. The need for more efficient power management solutions on the architecture level, down to the converter level, is inevitable. The data center manufacturers have recently adopted a more efficient architecture that supplies a 48V DC server rack distribution instead of a 12V DC distribution to the server motherboard. This helped reduce costs and losses, but as a consequence, raised a challenge in the design of the DC/DC voltage regulator modules (VRM) supplied by the 48V, in order to power the CPU and GPU. In this work, different architectures will be explored for the 48V VRM, and the trade-off between them will be evaluated. The main target is to design the VRM with very high-efficiency and high-power density to reduce the cost and size of the CPU/GPU motherboards. First, a two-stage power conversion structure will be used. The benefit of this structure is that it relies on existing technology using the 12V VRM for powering the CPU. The only modification required is the addition of another converter to step the 48V to the 12V level. This architecture can be easily adopted by industry, with only small modifications required on the system design level. Secondly, a single-stage power conversion structure is proposed that achieves higher efficiency and power density compared to the two-stage approach; however, the structure is very challenging to design and to meet all requirements by the CPU/GPU applications. All of these challenges will be addressed and solved in this work. The proposed architectures will be designed using an optimized magnetic structure. These structures achieve very high efficiency and power density in their designed architectures, compared to state-of-art solutions. In addition, they can be easily manufactured using automated manufacturing processes.
Makara, Michael A. "Molecular physiology of ankyrin-G in the heart:Critical regulator of cardiac cellular excitability and architecture." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1455812677.
Full textLo, Giudice Danielle. "The Impact of Prohexadione-calcium on Grape Vegetative and Reproductive Development and Wine Chemistry." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/42768.
Full textMaster of Science
Kuan-ChiehFeng and 馮冠傑. "Two-Phase Pipelined Architecture for Regular Expression Matching." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/93q266.
Full textLin, Cheng-Hung, and 林政宏. "Efficient Algorithm and Architecture Design for Regular Expression Matching." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/96833736069418492225.
Full text國立清華大學
資訊工程學系
96
The main purpose of a network intrusion detection system (NIDS) is to inspect the packet header and payload against thousands of predefined malicious or suspicious patterns. These patterns describe behaviors such as denial of service attacks, port scans, or malware. To efficiently represent suspicious patterns, regular expressions are commonly adopted such as Snort[22], Bro[24], and ClamAV[25] because they have better expressive power and flexibility than explicit string patterns. Due to the increasing complexity of network traffic and the growing number of attacks, traditional software-based NIDS will become inadequate for networking needs due to its slowness. To speed up pattern matching, many researchers have proposed hardware approaches which can be classified into two main categories, the logic and the memory architectures. The logic architectures are mostly implemented on Field-Programmable Gate Array (FPGA) because FPGA allows for updating new attack patterns. In addition, the logic architecture is easy to handle certain types of regular expressions containing meta-characters, such as ‘*’, ‘|’, and ‘+’, etc. However, due to the increasing number of attacks, it is important to develop a new methodology to minimize the circuit area of the large number of regular expressions. Although the minimization of logic equations has been studied intensively in the area of computer-aided design (CAD), the minimization of multiple regular expressions has been largely neglected. In the first part of this dissertation, we present a novel sharing architecture allowing our algorithm to extract and share common sub-regular expressions. On the other hand, the memory architecture is also widely adopted by NIDS because of the advantages of easy re-configurability and scalability. Due to the increasing number of attacks, the required memory increases tremendously. Because the performance, cost, and power consumption of the memory architecture are directly related to the memory size, reducing the memory size has become imperative. In the second part of this dissertation, we propose a memory-efficient pattern-matching algorithm which can significantly reduce the memory requirement for the memory architecture. However, the memory architecture suffers the problem of memory explosion caused by certain types of regular expressions. It is well known that the number of states and transitions of a DFA can be exponential to the size of its corresponding regular expression. Implementing such regular expression pattern leads to extremely large memory requirements for storing the corresponding state transition table. In the third part of this dissertation, we propose a novel memory architecture which inserts marginal logic elements to improve the ability of traditional memory architecture to deal with complex regular expressions.
Wang, Yen-Kai, and 王彥凱. "A Regular Expression Pattern Matching Architecture with Common String Sharing Scheme." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/94488437576039050418.
Full text國立臺灣大學
電機工程學研究所
97
Regular expressions are very suitable to describe the features of network attacks in an Intrusion Detection System (IDS). NFA-based hardware architectures might cause two problems. 1. NFA-based architectures occupy too much hardware area.2. NFA-based architecture can not add new rule dynamically. This paper focus on these two issues .For the first one, we propose a string mechanism to improve the hardware area of NFA circuit. The experiment results of the proposed Regular Expression matching engine can scan the payload up to the rate of 2.4 Gbps, and have 23.51% space improvement (for the snort 2.8) For the second one, we also propose a matching architecture that can support dynamic updating of new rule sets.this comparator is going to support new rule in the future.
Kumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. http://etd.iisc.ernet.in/handle/2005/2321.
Full textHsu, Shu-Wei, and 許書維. "A Fast Two-Phase Multi-Character Dynamically Reconfigurable Regular Expression Matching Architecture." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/20687772642911555399.
Full text國立臺灣大學
電機工程學研究所
97
Network security has recently become an important issue. With the growing of high-speed networks, there is a growing demand for high performance network intrusion detection systems (NIDSs). Some NIDSs may use regular expressions to describe the signatures of security threats. Traditionally, we can build finite-state automaton corresponding to these regular expressions to identify the suspicious packets. Deterministic finite-state automata (DFA) and non-deterministic finite-state automata (NFA) are commonly used for regular expressions matching. The DFA does one-pass scanning with a larger storage cost, while the NFA does multi-pass scanning with a less storage cost. This thesis focuses on the state explosion problem existing in the common signature patterns of an NIDS, and how to reduce the state storage cost from the exponential complexity to linear complexity. Through the common string states sharing, we propose a two-phases matching architecture combining DFA and NFA. This architecture constructs circuit-based parallel matching with prefix sharing, while the remains state transition tables stored in off-chip memory spaces. Furthermore, with multiplexers, fully system matching patterns are dynamically reconfigurable. We also implement the two-phase matching engine in a field programmable gate array (FPGA). Through parallel state operations, the optimized architecture will process four characters at 230 MHz, resulting in a concurrent throughput of 1.84 Gbps. If the 4-character processing module is implemented, higher throughput can be achieved.
Narasiman, Veynu Tupil. "An enhanced GPU architecture for not-so-regular parallelism with special implications for database search." Thesis, 2014. http://hdl.handle.net/2152/24877.
Full texttext
Tsai, Hsiang-Jen, and 蔡翔任. "A Feature-Rich and Energy-Efficient Regular Expression Matching Accelerator via Non-Volatile Memory Architecture." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/66747988408551117452.
Full textChang, Ching-Liang, and 張清諒. "The Design and Implementation of a Perl Compatible Regular Expression Pattern Matching Engine with Pipeline Architecture using FPGAs." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/66585314611629707358.
Full text國立臺灣大學
電機工程學研究所
96
A regular expression is powerful to describe signature patterns used in an Intrusion Detection System (IDS). This paper focuses on how to employ a pipeline architecture to NFA-based hardware implementations in order to increase the system performance. We propose a comparator that shares comparison operators including the ASCII decoder, the static pattern matching, and the char classes, and then we partition the comparator into two stages. As a result, we apply a three-stage pipeline to our Perl compatible regular expression pattern matching engine (PCRE engine) including a two-stage pipeline comparator and a one-stage NFA-based pattern recognizer. In addition, we can easily implement Caret meta-character (means the beginning of a string) when using the three-stage pipeline architecture. Finally, experimental results show that the proposed three-stage PCRE engine has a throughput of 2.4 Gbps as compared with the 1.8 Gpbs of the original PCRE engine in an Altera DE2 platform. This means that the proposed approach can have 30% performance increase in the current implementation with respect to the non-pipeline one.
WANG, DE-HONG, and 王德弘. "Parallel algorithms for regular architectures." Thesis, 1988. http://ndltd.ncl.edu.tw/handle/21053648751898130963.
Full textDeshpande, Gauravi M. "Functional Characterization of RFL as a Regulator of Rice Plant Architecture." Thesis, 2014. http://hdl.handle.net/2005/3264.
Full textSilva, Hugo Alexandre Paredes Guedes da. "Uma arquitectura de software dinâmica para a criação de ambientes de interacção social regulada na Web." Doctoral thesis, 2008. http://hdl.handle.net/1822/7636.
Full textNas últimas décadas assistimos a uma mudança paradigmática na utilização das tecnologias da informação e comunicação que potenciaram a criação de uma sociedade de informação e conhecimento, abrangendo e influenciando praticamente todos os domínios da sociedade. O tradicional uso das tecnologias de informação e comunicação no auxílio à execução de actividades de âmbito profissional, numa interacção restrita entre homem e máquina, deu lugar a ambientes virtuais de interacção social, onde pessoas interagem com pessoas, criando relações estreitas e realizando as mais diversas actividades. O crescimento da Internet e das tecnologias associadas fomentou o crescimento e difusão dos ambientes virtuais de interacção social, tornando-os acessíveis `a grande maioria da população. Actualmente estes ambientes estão espalhados por toda a Internet e abrangem um vasto leque de áreas, da educação ao entretenimento. Contudo, a imaturidade associada ao rápido crescimento destes ambientes levou a que fossem descurados factores que actualmente condicionam a interacção social, nomeadamente ao nível da sua coordenação e regulação. A regulação e coordenação da interacção social nos ambientes virtuais pode constituir uma solução possível para organização da actual interacção “ad hoc”, que persiste nestes ambientes, contribuindo inerentemente para o aumento da sua credibilidade. Nesta tese é proposto um modelo para a regulação da interacção social e controlo dos ambientes virtuais: o modelo dos Teatros Sociais. O conceito de Teatro Social resulta da aplicação da metáfora teatral a ambientes virtuais de interacção social destinados a reproduzir virtualmente situações do quotidiano. Dentro destes ambientes os utilizadores tornam-se actores, desempenhando papéis bem definidos, num cenário virtual de interacção conhecido e, idealmente, estabelecido de forma comum. O modelo dos Teatros Sociais é implementado por uma arquitectura de software dinâmica que permite a criação de ambientes de interacção regulados e assegura a adaptação dos conteúdos da interacção aos canais de comunicação dos utilizadores, embora condicionados pelas restrições tecnológicas dos dispositivos usados na interacção. Para a validação do modelo e da arquitectura de suporte foram criados dois casos de estudo que suportaram um conjunto de experiências realizadas com utilizadores reais.
Throughout the last decades we have observed a paradigmatic change on the use of information and communication technologies, which have powered the creation of an information and knowledge society, covering and influencing almost every domain of society. The traditional usage of information and communication technologies as an aid to the execution of professional activities, in a restrictive man-machine interaction, has given way to social interaction virtual environments where people interact with each other, creating close relationships and doing the most different activities. The growth of the Internet and its associated technologies encouraged the expansion and diffusion of virtual environments where social interaction takes place, allowing easy access to the great majority of population. Nowadays these environments are spread all over the Internet and cover a vast rage of areas, from education to entertainment. However, immaturity together with the fast growth of these environments led to the disregard of factors, which condition interaction today, namely the coordination and regulation of interaction activities. The regulation and coordination of interaction in social, virtual interaction environments may be a possible solution to the organisation of today’s “ad hoc” interaction, which persists in these environments, inherently contributing to the increase of its credibility. In this Thesis a model to regulate social interaction and control virtual environments is proposed: the Social Theatres model. Social Theatres stand for the application of the theatrical metaphor to social virtual environments, intended to virtually reproduce some of the common and useful people’s interaction contexts. Inside these environments, users become actors, playing previously well defined roles within a well known, commonly established virtual interaction scenario. The Social Theatres model is implemented by a dynamic software architecture that allows the creation of regulated interaction environments and guarantees adaptation to users’ devices and input channels. In order to validate the model and the supporting architecture two case studies were created, which supported a group of experiments carried out with real users.
Fundação para a Ciência e Tecnologia (FCT) - no âmbito do III Quadro Comunitário de Apoio, comparticipado pelo Fundo Social Europeu
Ministério da Ciência e do Ensino Superior (MCES) - Bolsa de Doutoramento com a referência SFRH/BD/10304/2002
da, Silva Airton R. Jr. "Design and Control of a Two-Wheeled Robotic Walker." 2014. https://scholarworks.umass.edu/masters_theses_2/79.
Full text