Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

24,207 Full-Text Articles 39,639 Authors 8,639,315 Downloads 271 Institutions

All Articles in Computer Engineering

Faceted Search

24,207 full-text articles. Page 939 of 955.

Embedding Gps Data Into Speech Signal, Kagan Can 2010 Old Dominion University

Embedding Gps Data Into Speech Signal, Kagan Can

Electrical & Computer Engineering Theses & Dissertations

Communication between deployed troops is very important on a battlefield. The real time knowledge of the location of the communicating patter is also very important in many situations because if you do not know the exact position of your units you cannot give correct orders. A minor error in an order can cause fatal results or lead to defeat. In many cases the position of the units is given through the speech channel by simply speaking the coordinates of the location. This can cause misunderstandings due to misinterpretation of the speech and makes it unsafe to rely on such communications. …


A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur 2010 Old Dominion University

A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur

Electrical & Computer Engineering Theses & Dissertations

Genetic Algorithms find several applications in a variety of fields, such as engineering, management, finance, chemistry, scheduling, data mining and so on, where optimization plays a key role. This technique represents a numerical optimization technique that is modeled after the natural process of selection based on the Darwinian principle of evolution. The Genetic Algorithm (GA) is one among several optimization techniques and attempts to obtain the desired solution by generating a set of possible candidate solutions or populations. These populations are then compared and the best solutions from the set are retained. Subsequently, new candidate solutions are produced, and the …


Selective Phase-Based De-Weathering (Spdw), Christopher Morris 2010 Old Dominion University

Selective Phase-Based De-Weathering (Spdw), Christopher Morris

Electrical & Computer Engineering Theses & Dissertations

No Abstract.


Determining The Utility Of Technology For Education, Brian Spencer Dillon 2010 Old Dominion University

Determining The Utility Of Technology For Education, Brian Spencer Dillon

Computational Modeling & Simulation Engineering Theses & Dissertations

There is a substantial debate concerning the place of technology in education. This debate has been going on over every technology introduced through at least three millennia although the modern version takes place in journal articles. Technology, in the general sense, is already in the educational arena 1n ways which have become so commonplace that we hardly question them today. More modern technologies, however, meet perpetual resistance in achieving their potential. This paper calls into question the most recent trend in research and suggests a new research paradigm which focuses not only on student achievement, but on a variety of …


Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed 2010 Old Dominion University

Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed

Electrical & Computer Engineering Theses & Dissertations

A new face recognition algorithm using a synthetic discriminant function based shifted phase-encoded fringe-adjusted joint transform correlation (SDF-SPFJTC) technique is proposed. The dark region in an input image is enhanced by using a nonlinear technique named ratio enhancement in gaussian neighborhood (REIGN). Histogram equalization and Gaussian smoothing are then performed to the enhanced face images and the synthetic discriminant function (SDF) image before they are subjected to the joint transform correlation process. The two distinct correlation peaks produced on extreme ends of the SPFJTC plane signifies the recognition of a potential target. A post processing step utilizes the peak-to-clutter ratio …


Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan 2010 Old Dominion University

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan

Computer Science Theses & Dissertations

Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well …


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson 2010 University of Georgia School of Law Library

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Continuing Legal Education Presentations

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.


Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen 2010 Huazhong University of Science and Technology

Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen

CSE Technical Reports

This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stores global access control lists (ACLs) in a centralized decisionmaking server and pushes pre-authorization lists (PALs) into storage devices. Thus DSFS allows users to flexibly set any access control policy for the global ACL or even change the global ACL system without having to upgrade the security code in their storage devices. With pre-authorization lists, DSFS enables a networkattached storage device to immediately authorize I/O, instead of demanding a client to acquire an authorization from a centralized authorization server at a crucial time. The client needs …


A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo 2010 Vrije Universiteit Brussel (VUB), Belgium

A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo

Dr. Eng. Omar Hegazy

In this paper, a novel inverter topology, Eight Switches Inverter (ESI), is proposed for HEV, especially PHEV system to reduce the number of switches, and to achieve high performance during discharging mode, braking mode and charging mode from grid. Thereby, this topology gives the ability to connect the vehicle with grid at home or at work to charge the Energy Storage System (ESS) easily, especially the battery unit. In addition, the cost and the volume of the power electronics unit (PEU) have reduced. In this research, there are two control strategies have tested to validate the performance of the proposed …


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana 2010 The University of the South Pacific

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of the RDB …


Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady 2010 Air Force Institute of Technology

Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady

Theses and Dissertations

Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …


A Distributed Network Logging Topology, Nicholas E. Fritts 2010 Air Force Institute of Technology

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …


Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly 2010 Air Force Institute of Technology

Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly

Theses and Dissertations

In an ever-increasing data rich environment, actionable information must be extracted, filtered, and correlated from massive amounts of disparate often free text sources. The usefulness of the retrieved information depends on how we accomplish these steps and present the most relevant information to the analyst. One method for extracting information from free text is Latent Dirichlet Allocation (LDA), a document categorization technique to classify documents into cohesive topics. Although LDA accounts for some implicit relationships such as synonymy (same meaning) it often ignores other semantic relationships such as polysemy (different meanings), hyponym (subordinate), meronym (part of), and troponomys (manner). To …


Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr. 2010 Air Force Institute of Technology

Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr.

Theses and Dissertations

Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java …


Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung 2010 Air Force Institute of Technology

Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung

Theses and Dissertations

In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence …


Using Decision Analysis To Select Facility Maintenance Management Information Systems, Marchello T. Graddy 2010 Air Force Institute of Technology

Using Decision Analysis To Select Facility Maintenance Management Information Systems, Marchello T. Graddy

Theses and Dissertations

Maintenance organizations, charged with preserving the built environment, are receiving a shrinking portion of an organization’s operational budget to do its job. It has been demonstrated through various studies that efficiencies can be gained by implementing a maintenance management information system (MMIS). However, with so many choices available, maintenance organizations often select the wrong system. This research effort used value-focused thinking decision analysis to create a model based on values from the Air Force Civil Engineer career field. Data for values and weights were collected from official documents and interviews. The resulting model is highly flexible, allowing the ultimate decision-maker …


Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber 2010 Air Force Institute of Technology

Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber

Theses and Dissertations

Errors within circuits caused by radiation continue to be an important concern to developers. A new methodology of real time fault detection and diagnostics utilizing FPGA based architectures while under radiation were investigated in this research. The contributions of this research are focused on three areas; a full test platform to evaluate a circuit while under irradiation, an algorithm to detect and diagnose fault locations within a circuit, and finally to characterize Triple Design Triple Modular Redundancy (TDTMR), a new form of TMR. Five different test setups, injected fault test, gamma radiation test, thermal radiation test, optical laser test, and …


Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr. 2010 Air Force Institute of Technology

Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.

Theses and Dissertations

Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …


Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski 2010 Air Force Institute of Technology

Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski

Theses and Dissertations

This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents …


Visually Managing Ipsec, Peter J. Dell'Accio 2010 Air Force Institute of Technology

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …


Digital Commons powered by bepress