Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,577 Full-Text Articles 38,383 Authors 8,340,641 Downloads 263 Institutions

All Articles in Computer Engineering

Faceted Search

23,577 full-text articles. Page 751 of 930.

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou TENG, Ah-hwee TAN, Loo-Nin TEOW 2013 Singapore Management University

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi 2013 California Polytechnic State University - San Luis Obispo

Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi

Electrical Engineering

This senior project involves the complete system design and construction of a "Nerf" sentry gun to replace an armed guard. We aimed to develop a compact and highly mobile defense system that allows operational flexibility. The sentry gun can autonomously track and shoot at moving targets, while also allowing a user to remotely access and control the gun via computer. The mobility, hardiness, and functionality of this system allows a reliable replacement for human beings in harsh and hostile environments; ultimately sparing a life.


Face Recognition Using Statistical Adapted Local Binary Patterns., Abdallah Abd-Elghafar Mohamed 2013 University of Louisville

Face Recognition Using Statistical Adapted Local Binary Patterns., Abdallah Abd-Elghafar Mohamed

Electronic Theses and Dissertations

Biometrics is the study of methods of recognizing humans based on their behavioral and physical characteristics or traits. Face recognition is one of the biometric modalities that received a great amount of attention from many researchers during the past few decades because of its potential applications in a variety of security domains. Face recognition however is not only concerned with recognizing human faces, but also with recognizing faces of non-biological entities or avatars. Fortunately, the need for secure and affordable virtual worlds is attracting the attention of many researchers who seek to find fast, automatic and reliable ways to identify …


Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah 2013 University of Arkansas, Fayetteville

Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah

Graduate Theses and Dissertations

Finding rising stars in academia early in their careers has many implications when hiring new faculty, applying for promotion, and/or requesting grants. Typically, the impact and productivity of a researcher are assessed by a popular measurement called the h-index that grows linearly with the academic age of a researcher. Therefore, h-indices of researchers in the early stages of their careers are almost uniformly low, making it difficult to identify those who will, in future, emerge as influential leaders in their field. To overcome this problem, we make use of Social network analysis to identify young researchers most likely to become …


Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, Venkittaraman Vivek Pallipuram Krishnamani 2013 Clemson University

Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, Venkittaraman Vivek Pallipuram Krishnamani

All Dissertations

The current trend in High-Performance Computing (HPC) is to extract concurrency from clusters that include heterogeneous resources such as General Purpose Graphical Processing Units (GPGPUs) and Field Programmable Gate Array (FPGAs). Although these heterogeneous systems can provide substantial performance for massively parallel applications, much of the available computing resources are often under-utilized due to inefficient application mapping, load balancing, and tuning. While several performance prediction models exist to efficiently tune applications, they often require significant computing architecture knowledge for reliable prediction. In addition, they do not address multiple levels of design space abstraction and it is often difficult to choose …


Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, Fang Qi 2013 Clemson University

Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, Fang Qi

All Theses

In peer-to-peer (P2P) file sharing systems, many autonomous peers without preexisting trust relationships share files with each other. Due to their open environment and distributed structure, these systems are vulnerable to the significant impact from selfish and misbehaving nodes. Free-riding, whitewash, collusion and Sybil attacks are common and serious threats, which severely harm non-malicious users and degrade the system performance. Many trust systems were proposed for P2P file sharing systems to encourage cooperative behaviors and punish non-cooperative behaviors. However, querying reputation values usually generates latency and overhead for every user. To address this problem, a social network based trust system …


An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith 2013 University of Arkansas, Fayetteville

An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith

Graduate Theses and Dissertations

Remote Direct Memory Access (RDMA) is the transfer of data into buffers between two compute nodes that does not require the involvement of a CPU or Operating System (OS). The idea is borrowed from Direct Memory Access (DMA) which allows memory within a compute node to be transferred without transiting through the CPU. RDMA is termed a zero-copy protocol as it eliminates the need to copy data between buffers within the protocol stack. Because of this and other features, RDMA promotes reliable, high throughput and low latency transfer for packet-switched networking. While the benefits of RMDA are well known and …


Parsing Of Natural Language Requirements, Jamie L. Patterson 2013 California Polytechnic State University, San Luis Obispo

Parsing Of Natural Language Requirements, Jamie L. Patterson

Master's Theses

The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.


Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, Brian M. Wihl 2013 California Polytechnic State University, San Luis Obispo

Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, Brian M. Wihl

Master's Theses

Each year, thousands of cargo containers are broken into during shipping, costing billions of dollars in lost and damaged goods. In addition to removing its contents, intruders can also add unwanted and dangerous materials to a container, posing a threat to National Security. The possibilities of cargo container break-ins require that the containers go through check points at which they are physically searched. These searches often require the opening of the container, unloading and inspecting all cargo, and then loading the container and resealing it. This is a long and costly process.

Because of the high costs of break-ins and …


Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia 2013 California Polytechnic State University, San Luis Obispo

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford 2013 University of Arkansas, Fayetteville

Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford

Graduate Theses and Dissertations

As three-dimensional virtual environments become both more prevalent and more fragmented, studying how users are connected via their avatars and how they benefit from the virtual world community has become a significant area of research. An in-depth analysis of virtual world Social networks is needed to evaluate how users interact in virtual worlds, to better understand the impact of avatar Social networks on the virtual worlds, and to improve future online Social networks.

Our current efforts are focused on building and exploring the Social network aspects of virtual worlds. In this thesis, we build a Social network of avatars based …


Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel 2013 University of Nevada, Las Vegas

Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel

UNLV Theses, Dissertations, Professional Papers, and Capstones

Topic of this master's thesis is connected with task allocation algorithms and mesh networks. Author of this work has already graduated from Wroclaw, University of Technology (Poland) where during his studies he created software simulation environment for two different task allocation algorithms for mesh networks:Adaptive ScanandFrame Sliding. Those algorithms were compared by two, main parame- ters: simulation time and average mesh fulfillment (utilization level). All simulations were done in software environment which was developed specially for that research. This application was based on few, different types of objects: task (width, height, processing time), task queue (different number of tasks), task …


Computer-Based Stereoscopic Parts Recognition For Robotic Applications, Ahmad A. Fayed 2013 University of Nevada, Las Vegas

Computer-Based Stereoscopic Parts Recognition For Robotic Applications, Ahmad A. Fayed

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most of robotic handling and assembly operations are based on sensors such as range and touch sensors. In certain circumstances, such as in the presence of ionizing radiation where most customary sensors will degrade over time due to radiation exposure, these sensors won't function properly. Utilizing two or more cameras (stereo vision) located outside the target zone and analyzing their images to identify location and dimensions of parts within the robot workspace is an alternative for using sensors. Object Recognition is affected by the light condition which oftentimes causes the gray-scale or red, green, and blue values to have a …


Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava 2013 University of Nevada, Las Vegas

Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most of digital image applications demand on high image quality. Unfortunately, images often are degraded by noise during the formation, transmission, and recording processes. Hence, image denoising is an essential processing step preceding visual and automated analyses. Image denoising methods can reduce image contrast, create block or ring artifacts in the process of denoising. In this dissertation, we develop high performance non-linear diffusion based image denoising methods, capable to preserve edges and maintain high visual quality. This is attained by different approaches: First, a nonlinear diffusion is presented with robust M-estimators as diffusivity functions. Secondly, the knowledge of textons derived …


On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu 2013 University of Nevada, Las Vegas

On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu

UNLV Theses, Dissertations, Professional Papers, and Capstones

High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.

Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …


Clustering And Classification Of Multi-Domain Proteins, Neethu Shah 2013 University of Nebraska-Lincoln

Clustering And Classification Of Multi-Domain Proteins, Neethu Shah

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Rapid development of next-generation sequencing technology has led to an unprecedented growth in protein sequence data repositories over the last decade. Majority of these proteins lack structural and functional characterization. This necessitates design and development of fast, efficient, and sensitive computational tools and algorithms that can classify these proteins into functionally coherent groups.

Domains are fundamental units of protein structure and function. Multi-domain proteins are extremely complex as opposed to proteins that have single or no domains. They exhibit network-like complex evolutionary events such as domain shuffling, domain loss, and domain gain. These events therefore, cannot be represented in the …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi 2013 University of Nebraska-Lincoln

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., Artur Abdullin 2013 University of Louisville

An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., Artur Abdullin

Electronic Theses and Dissertations

We propose an Inter-Domain Supervision (IDS) clustering framework to discover clusters within diverse data formats, mixed-type attributes and different sources of data. This approach can be used for combined clustering of diverse representations of the data, in particular where data comes from different sources, some of which may be unreliable or uncertain, or for exploiting optional external concept set labels to guide the clustering of the main data set in its original domain. We additionally take into account possible incompatibilities in the data via an automated inter-domain compatibility analysis. Our results in clustering real data sets with mixed numerical, categorical, …


A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb 2013 Western Kentucky University

A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb

Masters Theses & Specialist Projects

Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe 2013 University of Southern Mississippi

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


Digital Commons powered by bepress