Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

4,369 Full-Text Articles 4,156 Authors 1,019,658 Downloads 76 Institutions

All Articles in Computer Engineering

Faceted Search

4,369 full-text articles. Page 1 of 92.

Decaf: A New Event Detection Logic For The Purpose Of Fusing Delineated-Continuous Spatial Information, Kerry Q. Hart 2014 University of Nebraska - Lincoln

Decaf: A New Event Detection Logic For The Purpose Of Fusing Delineated-Continuous Spatial Information, Kerry Q. Hart

Computer Science and Engineering: Theses, Dissertations, and Student Research

Geospatial information fusion is the process of synthesizing information from complementary data sources located at different points in space and time. Spatial phenomena are often measured at discrete locations by sensor networks, technicians, and volunteers; yet decisions often require information about locations where direct measurements do not exist. Traditional methods assume the spatial phenomena to be either discrete or continuous, an assumption that underlies and informs all subsequent analysis. Yet certain phenomena defy this dichotomy, alternating as they move across spatial and temporal scales. Precipitation, for example, appears continuous at large scales, but it can be temporally decomposed into discrete ...


The Astral Box, Patrick C. Davis, Marshall J. Underwood, Zack R. Hicks, Jahan Z. Hussaini 2014 University of Tennessee, Knoxville

The Astral Box, Patrick C. Davis, Marshall J. Underwood, Zack R. Hicks, Jahan Z. Hussaini

University of Tennessee Honors Thesis Projects

No abstract provided.


Model-Iq: Uncertainty Propagation From Sensing To Modeling And Control In Buildings., Madhur Behl, Truong Nghiem, Rahul Mangharam 2014 University of Pennsylvania

Model-Iq: Uncertainty Propagation From Sensing To Modeling And Control In Buildings., Madhur Behl, Truong Nghiem, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

A fundamental problem in the design of closed-loop Cyber-Physical Systems (CPS) is in accurately capturing the dynamics of the underlying physical system. To provide optimal control for such closed-loop systems, model-based controls require accurate physical plant models. It is hard to analytically establish (a) how data quality from sensors affects model accuracy, and consequently, (b) the effect of model accuracy on the operational cost of model-based controllers. We present the Model-IQ toolbox which, given a plant model and real input data, automatically evaluates the effect of this uncertainty propagation from sensor data to model accuracy to controller performance. We apply ...


Probabilistic Graphical Models For Prognosis And Diagnosis Of Breast Cancer, MAHMOUD KHADEMI 2014 McMaster University

Probabilistic Graphical Models For Prognosis And Diagnosis Of Breast Cancer, Mahmoud Khademi

Open Access Dissertations and Theses

One in nine women is expected to be diagnosed with breast cancer during her life. In 2013, an estimated 23, 800 Canadian women will be diagnosed with breast cancer and 5, 000 will die of it. Making decisions about the treatment for a patient is difficult since it depends on various clinical features, genomic factors, and pathological and cellular classification of a tumor.

In this research, we propose a probabilistic graphical model for prognosis and diagnosis of breast cancer that can help medical doctors make better decisions about the best treatment for a patient. Probabilistic graphical models are suitable for ...


Formal Proof Of The Fundamental Theorem Of Decorated Interval Arithmetic, Bingzhou Zheng, Bingzhou Zheng 2014 McMaster University

Formal Proof Of The Fundamental Theorem Of Decorated Interval Arithmetic, Bingzhou Zheng, Bingzhou Zheng

Open Access Dissertations and Theses

Interval arithmetic is used to enclose roundoff, truncation, and modeling errors in interval methods, thus obtaining numerical methods with automatic verification of the results. The Fundamental Theorem of Interval Arithmetic (FTIA) shows that, when evaluating an expression using interval arithmetic, the computed result contains the mathematically correct value of the expression.

Decorations were introduced in the IEEE P1788 working group for standardizing interval arithmetic. Their role is to help track properties of interval evaluations. That is, we wish to say if a function is defined, undefined, or continuous in its inputs. Moreover, decorations act as local exception flags and do ...


The Use Of The Blackboard Architecture For A Decision Making System For The Control Of Craft With Various Actuator And Movement Capabilities, Jeremy Straub, Hassan Reza 2014 SelectedWorks

The Use Of The Blackboard Architecture For A Decision Making System For The Control Of Craft With Various Actuator And Movement Capabilities, Jeremy Straub, Hassan Reza

Jeremy Straub

This paper provides an overview of an approach to the control of multiple craft with heterogeneous movement and actuation characteristics that is based on the Blackboard software architecture. An overview of the Blackboard architecture is provided. Then, the operational and mission requirements that dictate the need for autonomous control are characterized and the utility of the Blackboard architecture is for meeting these requirements is discussed. The performance of a best-path solver and naïve solver are compared. The results demonstrate that the best-path solver outperforms the naïve solver in the amount of time taken to generate a solution; however, the number ...


Crossmobile: A Cross-Layer Architecture For Next-Generation Wireless Systems, Bob Iannucci, Patrick Tague, Ole J. Mengshoel, Jason Lohn 2014 Carnegie Mellon University

Crossmobile: A Cross-Layer Architecture For Next-Generation Wireless Systems, Bob Iannucci, Patrick Tague, Ole J. Mengshoel, Jason Lohn

Silicon Valley Campus

Commercial cellular networks emerged from the wired public switched telephone networks (PSTN) in an evolutionary manner. Market pressures fueled upgrades in bandwidth and functionality. Four decades later, these networks maintain historical artifacts from PSTN networks, and the artifacts work against the fundamental needs of today’s wireless systems. Noncellular wireless networks are used beneficially within geographically limited domains (enterprise, at home), but such networks lack the architecture to scale geographically.

In this paper, we step back and re-evaluate existing wireless network architectures, identifying inherent limitations and offering a new set of architectural principles that, we contend, will lead to significantly ...


Cluster-Based Epidemic Control Through Smartphone-Based Body Area Networks, Zhaoyang Zhang, Honggang Wang, Chonggang Wang, Hua (Julia) Fang 2014 University of Massachusetts Medical School

Cluster-Based Epidemic Control Through Smartphone-Based Body Area Networks, Zhaoyang Zhang, Honggang Wang, Chonggang Wang, Hua (Julia) Fang

Quantitative Health Sciences Publications and Presentations

Increasing population density, closer social contact, and interactions make epidemic control difficult. Traditional offline epidemic control methods (e.g., using medical survey or medical records) or model-based approach are not effective due to its inability to gather health data and social contact information simultaneously or impractical statistical assumption about the dynamics of social contact networks, respectively. In addition, it is challenging to find optimal sets of people to be isolated to contain the spread of epidemics for large populations due to high computational complexity. Unlike these approaches, in this paper, a novel cluster-based epidemic control scheme is proposed based on ...


Peak Power Reduction In Hybrid Energy Systems With Limited Load Forecasts, Yash Vardhan Pant, Truong X Nghiem, Rahul Mangharam 2014 University of Pennsylvania

Peak Power Reduction In Hybrid Energy Systems With Limited Load Forecasts, Yash Vardhan Pant, Truong X Nghiem, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Hybrid energy systems, which consist of a load powered by a source and a form of energy storage, find applications in many systems, e.g., the electric grid and electric vehicles. A key problem for hybrid energy systems is the reduction of peak power consumption to ensure cost-efficient operation as peak power draws require additional resources and adversely affect the system reliability and lifetime. Furthermore, in some cases such as electric vehicles, the load dynamics are fast, not perfectly known in advance and the on-board computation power is often limited, making the implementation of traditional optimal control difficult. We aim ...


Software Group Of The Openorbiter Project, Christoffer Korvald, Jeremy Straub 2014 SelectedWorks

Software Group Of The Openorbiter Project, Christoffer Korvald, Jeremy Straub

Jeremy Straub

This poster provides an update regarding software development work for the OpenOrbiter project. The software development effort for the OpenOrbiter project currently consists of four teams: payload software development, operating software development, ground station software development and testing. The teams are designing and developing the software needed to create and operate a small spacecraft which can be produced for under USD $5,000 by students, faculty and others around the world. Participating students are gaining valuable real-world experience through the process of designing and developing the spacecraft. Each team is headed by a team lead that is responsible for conducting ...


Openorbiter Operating Software, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh 2014 SelectedWorks

Openorbiter Operating Software, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

The operating software team of the OpenOrbiter project has been tasked with developing software for general spacecraft maintenance, performing mission tasks and the monitoring of system critical aspects of the spacecraft. To do so, the team is developing an autonomous system that will be able to continuously check sensors for data, and schedule tasks that pertain to the current mission and general maintenance of the onboard systems. Development in support of these objectives is ongoing with work focusing on the completion of the development of a stable system. This poster will present an overview of current work on the project ...


A Vector-Based Approach To Virtual Machine Arrangement, Nicholas Cerilli 2014 Western University

A Vector-Based Approach To Virtual Machine Arrangement, Nicholas Cerilli

University of Western Ontario - Electronic Thesis and Dissertation Repository

Cloud based data centres benefit from minimizing operating costs and service level agreement violations. Vector-based data centre management policies have been shown to assist with these goals. Vector-based data centre management policies arrange virtual machines in a data centre to minimize the number of hosts being used which translates to greater power efficiency and reduced costs for the data centre overall. I propose an improved vector-based virtual machine arrangement algorithm with two novel additions, namely a technique that changes what it means for a host to be balanced and a concept that excludes undesirable target hosts, thereby improving the arrangement ...


Impact: Inverse Model Accuracy And Control Performance Toolbox For Buildings, Madhur Behl, Truong X Nghiem, Rahul Mangharam 2014 University of Pennsylvania

Impact: Inverse Model Accuracy And Control Performance Toolbox For Buildings, Madhur Behl, Truong X Nghiem, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Uncertainty affects all aspects of building performance: from the identification of models, through the implementation of model-based control, to the operation of the deployed systems. Learning models of buildings from sensor data has a fundamental property that the model can only be as accurate and reliable as the data on which it was trained. For small and medium size buildings, a low-cost method for model capture is necessary to take advantage of optimal model-based supervisory control schemes. We present IMpACT, a methodology and a toolbox for analysis of uncertainty propagation for building inverse modeling and controls. Given a plant model ...


Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman 2014 California Polytechnic State University

Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman

Physics

The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.


Twill: A Hybrid Microcontroller-Fpga Framework For Parallelizing Single- Threaded C Programs, Douglas S. Gallatin 2014 California Polytechnic State University

Twill: A Hybrid Microcontroller-Fpga Framework For Parallelizing Single- Threaded C Programs, Douglas S. Gallatin

Master's Theses and Project Reports

Increasingly System-On-A-Chip platforms which incorporate both micropro- cessors and re-programmable logic are being utilized across several fields ranging from the automotive industry to network infrastructure. Unfortunately, the de- velopment tools accompanying these products leave much to be desired, requiring knowledge of both traditional embedded systems languages like C and hardware description languages like Verilog. We propose to bridge this gap with Twill, a truly automatic hybrid compiler that can take advantage of the parallelism inherent in these platforms. Twill can extract long-running threads from single threaded C code and distribute these threads across the hardware and software domains to more ...


Compacting Loads And Stores For Code Size Reduction, Isaac Asay 2014 California Polytechnic State University

Compacting Loads And Stores For Code Size Reduction, Isaac Asay

Master's Theses and Project Reports

It is important for compilers to generate executable code that is as small as possible, particularly when generating code for embedded systems. One method of reducing code size is to use instruction set architectures (ISAs) that support combining multiple operations into single operations. The ARM ISA allows for combining multiple memory operations to contiguous memory addresses into a single operation. The LLVM compiler contains a specific memory optimization to perform this combining of memory operations, called ARMLoadStoreOpt. This optimization, however, relies on another optimization (ARMPreAllocLoadStoreOpt) to move eligible memory operations into proximity in order to perform properly. This mover optimization ...


Minibox: A Two-Way Sandbox For X86 Native Code (Cmu-Cylab-14-001), Yanlin Li, Adrian Perrig, Jonathan M. McCune, James Newsome, Brandon Baker, Will Drewry 2014 Carnegie Mellon University

Minibox: A Two-Way Sandbox For X86 Native Code (Cmu-Cylab-14-001), Yanlin Li, Adrian Perrig, Jonathan M. Mccune, James Newsome, Brandon Baker, Will Drewry

CyLab

This paper presents MiniBox, the first two-way sandbox for x86 native code. MiniBox not only isolates the memory space between OS protection modules and an application, but also provides a minimized and secure communication interface between OS protection modules and the application. MiniBox is cross-platform and can be applied in Platform-as-a-Service (PaaS) cloud computing to provide two-way protection between a customer’s application and the cloud platform OS. We implement a prototype of MiniBox on both Intel and AMD multi-core systems and port several applications toMiniBox. Evaluation results show thatMiniBox is efficient and practical.


Battery Free Wireless Sensor Networks: Theory And Applications, Ali Abedi 2014 The University of Maine

Battery Free Wireless Sensor Networks: Theory And Applications, Ali Abedi

WiSe-Net Laboratory

One of the major hurdles in wide spread use of wireless sensor networks is power consumption, i.e., the battery limitations. For several years, researchers tried to minimize power consumption of wireless nodes by designing more efficient data collection, transmission, storage, and processing methods. In this position paper, we will review the paradigm changing battery-free wireless sensing, which was originally designed for monitoring NASA’s inflatable lunar habitat and ended up being commercialized for monitoring jet engines, brain injury detection, and indoor navigation. Theory and practical applications presented in this paper will cover basic research in a University lab to ...


Resilient Multidimensional Sensor Fusion Using Measurement History, Radoslav Ivanov, Miroslav Pajic, Insup Lee 2014 University of Pennsylvania

Resilient Multidimensional Sensor Fusion Using Measurement History, Radoslav Ivanov, Miroslav Pajic, Insup Lee

Departmental Papers (CIS)

This work considers the problem of performing resilient sensor fusion using past sensor measurements. In particular, we consider a system with n sensors measuring the same physical variable where some sensors might be attacked or faulty. We consider a setup in which each sensor provides the controller with a set of possible values for the true value. Here, more precise sensors provide smaller sets. Since a lot of modern sensors provide multidimensional measurements (e.g., position in three dimensions), the sets considered in this work are multidimensional polyhedra.

Given the assumption that some sensors can be attacked or faulty, the ...


Attack-Resilient Sensor Fusion, Radoslav Ivanov, Miroslav Pajic, Insup Lee 2014 University of Pennsylvania

Attack-Resilient Sensor Fusion, Radoslav Ivanov, Miroslav Pajic, Insup Lee

Departmental Papers (CIS)

This work considers the problem of attack-resilient sensor fusion in an autonomous system where multiple sensors measure the same physical variable. A malicious attacker may corrupt a subset of these sensors and send wrong measurements to the controller on their behalf, potentially compromising the safety of the system. We formalize the goals and constraints of such an attacker who also wants to avoid detection by the system. We argue that the attacker’s capabilities depend on the amount of information she has about the correct sensors’ measurements. In the presence of a shared bus where messages are broadcast to all ...


Digital Commons powered by bepress