Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Theses/Dissertations

2013

Institution
Keyword
Publication

Articles 31 - 60 of 302

Full-Text Articles in Entire DC Network

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia Dec 2013

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison Nov 2013

Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison

USF Tampa Graduate Theses and Dissertations

Programmable reversible logic is emerging as a prospective logic design style for implementation in modern nanotechnology and quantum computing with minimal impact on circuit heat generation. Adiabatic logic is a design methodology for reversible logic in CMOS where the current flow through the circuit is controlled such that the energy dissipation due to switching and capacitor dissipation is minimized. Recent advances in reversible logic using and quantum computer algorithms allow for improved computer architectures. Production of cost-effective Secure Integrated Chips, such as Smart Cards, requires hardware designers to consider tradeoffs in size, security, and power consumption. In order to design …


Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman Nov 2013

Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman

Electronic Thesis and Dissertation Repository

The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …


A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques Nov 2013

A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques

Electronic Thesis and Dissertation Repository

In recent years, numerous researchers have been working towards adapting technology developed for robotic control to use in the creation of high-technology assistive devices for the visually impaired. These types of devices have been proven to help visually impaired people live with a greater degree of confidence and independence. However, most prior work has focused primarily on a single problem from mobile robotics, namely navigation in an unknown environment. In this work we address the issue of the design and performance of an assistive device application to aid the visually-impaired with a guided reaching task. The device follows an eye-in-hand, …


Diseño E Implementación De Un Sistema De Información Para La Federación Colombiana De Tiro, Cesar Augusto Prieto Henríquez, Alix Leonela Salazar Manrique Nov 2013

Diseño E Implementación De Un Sistema De Información Para La Federación Colombiana De Tiro, Cesar Augusto Prieto Henríquez, Alix Leonela Salazar Manrique

Ingeniería en Automatización

La Federación Colombiana de Tiro ha contado a través de la historia con bases de datos ambiguas, administradas a través de software no especializado que restringe el manejo y accesibilidad de la información de cada uno de los miembros. Actualmente la Federación Colombiana de Tiro no cuenta con una base de datos actualizada que le permita tener acceso a los datos completos de cada uno de sus miembros; se presenta dificultad para adquirir información precisa acerca del histórico de cada uno de los deportistas, de acuerdo con los diferentes eventos que se realizan y en los cuales ellos son participantes …


Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver Nov 2013

Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver

College of Computing and Digital Media Dissertations

Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.

To respond to this problem, …


Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury Nov 2013

Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury

Electronic Thesis and Dissertation Repository

The amount of data that we use in everyday life (social media, stock analysis, satellite communication etc.) are increasing day by day. As a result, the amount of data needs to be traverse through electronic media as well as to store are rapidly growing and there exist several environmental effects that can damage these important data during travelling or while in storage devices. To recover correct information from noisy data, we do use error correcting codes. The most challenging work in this area is to have a decoding algorithm that can decode the code quite fast, in addition with the …


A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi Nov 2013

A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi

Master's Theses and Doctoral Dissertations

Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …


Dexterous Hexrotor Uav Platform, Guangying Jiang Nov 2013

Dexterous Hexrotor Uav Platform, Guangying Jiang

Electronic Theses and Dissertations

Mobile manipulation is a hot area of study in robotics as it unites the two classes of robots: locomotors and manipulators. An emerging niche in the field of mobile manipulation is aerial mobile manipulation. Although there has been a fair amount of study of free-flying satellites with graspers, the more recent trend has been to outfit UAVs with graspers to assist various manipulation tasks. While this recent work has yielded impressive results, it is hampered by a lack of appropriate testbeds for aerial mobile manipulation, similar to the state of ground-based mobile manipulation a decade ago. Typical helicopters or quadrotors …


Digital Control Board For Phased Array Antenna Beam Steering In Adaptive Communication Applications, Mayur Bansal Nov 2013

Digital Control Board For Phased Array Antenna Beam Steering In Adaptive Communication Applications, Mayur Bansal

Master's Theses

The application of adaptive communication techniques for mobile communications has attracted considerable interest in the last decade. One example of these techniques is spatial filtering through planar antenna array beam forming.

This thesis describes the development of a digital system that adaptively controls a phased array antenna. The radiating structure of the phased antenna array is tetrahedral-shaped and contains four antenna elements on each of its three faces. The overall system comprises of a digital control board with an external computer interface, an RF control board, and the phased antenna array. The RF controls the main lobe direction on the …


Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu Oct 2013

Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu

Open Access Dissertations

Humans not only outperform AI and computer-vision systems, but use an unknown computational mechanism to perform tasks for which no suitable approaches exist. I present work investigating both novel tasks and how humans approach them in the context of computer vision and linguistics. I demonstrate a system which, like children, acquires high-level linguistic knowledge about the world. Robots learn to play physically-instantiated board games and use that knowledge to engage in physical play. To further integrate language and vision I develop an approach which produces rich sentential descriptions of events depicted in videos. I then show how to simultaneously detect …


Improving Multicore Resource Efficiency And Performance, Syed Ali Raza Jafri Oct 2013

Improving Multicore Resource Efficiency And Performance, Syed Ali Raza Jafri

Open Access Dissertations

With clock speeds stagnating for the last few years and multi-cores having replaced uniprocessors, software development must now turn towards shared memory parallel programming to continue enhancing performance. Shared memory parallel programming; however is significantly more challenging than its sequential counterpart. Conventional shared memory parallel programs can fall victim to deadlocks, livelocks and data races which are hard to detect and debug. Aside from programming complexity chipmultiprocessors need a scalable, low latency, high bandwidth interconnect fabric to deliver performance. Conventional interconnects such as crossbars and buses can deliver low latency but do not scale with increasing number of cores. Researchers …


Automatically Optimizing Tree Traversal Algorithms, Youngjoon Jo Oct 2013

Automatically Optimizing Tree Traversal Algorithms, Youngjoon Jo

Open Access Dissertations

Many domains in computer science, from data-mining to graphics to computational astrophysics, focus heavily on irregular applications. In contrast to regular applications, which operate over dense matrices and arrays, irregular programs manipulate and traverse complex data structures like trees and graphs. As irregular applications operate on ever larger datasets, their performance suffers from poor locality and parallelism. Programmers are burdened with the arduous task of manually tuning such applications for better performance. Generally applicable techniques to optimize irregular applications are highly desired, yet scarce.

In this dissertation, we argue that, for an important subset of irregular programs which arises in …


Resource-Aware Distributed Particle Filtering For Cluster-Based Object Tracking In Wireless Camera Networks, Kihyun Hong Oct 2013

Resource-Aware Distributed Particle Filtering For Cluster-Based Object Tracking In Wireless Camera Networks, Kihyun Hong

Open Access Dissertations

The proliferation of miniaturized low-power computing devices, advances in wireless communications, and the availability of inexpensive imaging sensors have enabled the development of wireless camera networks (WCN). In this dissertation, we consider the problem of real-time object tracking with a WCN. Existing object tracking methods designed for multi-camera systems do not take into account the unique constraints of WCNs. Specifically, an effective object tracking system for WCNs must anticipate unreliable network communication, limited memory, and limited computational power in each camera node. In particular, unreliable communication degrades the quality of the visual information shared by the cameras, which ultimately degrades …


Source Code Retrieval From Large Software Libraries For Automatic Bug Localization, Bunyamin Sisman Oct 2013

Source Code Retrieval From Large Software Libraries For Automatic Bug Localization, Bunyamin Sisman

Open Access Dissertations

This dissertation advances the state-of-the-art in information retrieval (IR) based approaches to automatic bug localization in software. In an IR-based approach, one first creates a search engine using a probabilistic or a deterministic model for the files in a software library. Subsequently, a bug report is treated as a query to the search engine for retrieving the files relevant to the bug. With regard to the new work presented, we first demonstrate the importance of taking version histories of the files into account for achieving significant improvements in the precision with which the files related to a bug are located. …


Transition Faults And Transition Path Delay Faults: Test Generation, Path Selection, And Built-In Generation Of Functional Broadside Tests, Bo Yao Oct 2013

Transition Faults And Transition Path Delay Faults: Test Generation, Path Selection, And Built-In Generation Of Functional Broadside Tests, Bo Yao

Open Access Dissertations

As the clock frequency and complexity of digital integrated circuits increase rapidly, delay testing is indispensable to guarantee the correct timing behavior of the circuits. In this dissertation, we describe methods developed for three aspects of delay testing in scan-based circuits: test generation, path selection and built-in test generation.

We first describe a deterministic broadside test generation procedure for a path delay fault model named the transition path delay fault model, which captures both large and small delay defects. Under this fault model, a path delay fault is detected only if all the individual transition faults along the path are …


Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin Oct 2013

Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin

Open Access Dissertations

Energy efficiency dominates practically every aspect of the design of wireless camera networks (WCNs), and duty cycling of radios and cameras is an important tool for achieving high energy efficiencies. However, duty cycling in WCNs is made complex by the camera nodes having to anticipate the arrival of the objects in their field-of-view. What adds to this complexity is the fact that radio duty cycling and camera duty cycling are tightly coupled notions in WCNs.

Abstract In this dissertation, we present a predictive framework to provide camera nodes with an ability to anticipate the arrival of an object in the …


Ant: A Framework For Increasing The Efficiency Of Sequential Debugging Techniques With Parallel Programs, Jae-Woo Lee Oct 2013

Ant: A Framework For Increasing The Efficiency Of Sequential Debugging Techniques With Parallel Programs, Jae-Woo Lee

Open Access Dissertations

Bugs in sequential programs cost the software industry billions of dollars in lost productivity each year. Even if simple parallel programming models are created, they will not reduce the level of sequential bugs in programs below that of sequential programs. It can be argued that the complexity of current parallel programming models may increase the number of sequential bugs in parallel programs because they distract the programmer from the core logic of the program.

Tools exist that identify statements related to sequential bugs and allow those bugs to be more quickly located and fixed. Their use in parallel programs will …


Mitigating The Cost, Performance, And Power Overheads Induced By Load Variations In Multicore Cloud Servers, Yu-Ju Hong Oct 2013

Mitigating The Cost, Performance, And Power Overheads Induced By Load Variations In Multicore Cloud Servers, Yu-Ju Hong

Open Access Dissertations

Load variations whether in space or time pose a significant challenge to system designers. These load variations may induce inefficiencies such as load imbalance and over-provisioning, resulting in performance/power/cost overheads. The goal of my research is to mitigate such variation-induced overheads in multicore cloud servers.

First, I focus on power/performance overheads in on-chip networks of a multicore chip. We design an on-chip network that is robust in both performance and energy across applications for time- and space-varying loads. Existing flow control mechanisms that perform well at high (low) loads suffer power and/or energy overheads at low (high) loads. In contrast, …


Hypothesize-And-Verify Based Solutions For Place Recognition And Mobile Robot Self-Localization In Interior Hallways, Khalil Mustafa Ahmad Yousef Oct 2013

Hypothesize-And-Verify Based Solutions For Place Recognition And Mobile Robot Self-Localization In Interior Hallways, Khalil Mustafa Ahmad Yousef

Open Access Dissertations

There is much research interest currently in having mobile robots build accurate and visually dense models ofinterior space as they traverse through such spaces. One of the interesting problems that has came out of this research is that of visual place recognition and self-localization. This is the problem that forms the focus of the present dissertation. We show how dense and accurate 3D models of the interior space can be constructed using a hierarchical sensor-fusion architecture. Our system fuses images from a single photometric camera with range data from a laser scanning sensor. The range data used is rudimentary--the range …


Multi-Segment Multi-Criteria Approach For Selection Of Trenchless Construction Methods, Ashikul Islam Oct 2013

Multi-Segment Multi-Criteria Approach For Selection Of Trenchless Construction Methods, Ashikul Islam

Doctoral Dissertations

The research work presented in this thesis has two broad objectives as well as five individual goals. The first objective is to search and determine the minimum cost and corresponding goodness-of-fit by using a different combination of methods that are capable of resolving the problem that exists in multiple segments. This approach can account for variations in unit price and the cost of the design and the inspection associated with multiple methods. The second objective is to calculate the minimum risk for the preferred solution set. The five individual goals are 1) reduction in total cost, 2) application of Genetic …


Design Synthesis And Optimization Of Permanent Magnet Synchronous Machines Based On Computationally-Efficient Finite Element Analysis, Gennadi Sizov Oct 2013

Design Synthesis And Optimization Of Permanent Magnet Synchronous Machines Based On Computationally-Efficient Finite Element Analysis, Gennadi Sizov

Dissertations (1934 -)

In this dissertation, a model-based multi-objective optimal design of permanent magnet ac machines, supplied by sine-wave current regulated drives, is developed and implemented. The design procedure uses an efficient electromagnetic finite element-based solver to accurately model nonlinear material properties and complex geometric shapes associated with magnetic circuit design. Application of an electromagnetic finite element-based solver allows for accurate computation in intricate performance parameters and characteristics. The first contribution of this dissertation is the development of a rapid computational method that allows accurate and efficient exploration of large multi-dimensional design spaces in search of optimum design(s). The computationally efficient finite element-based …


Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios Oct 2013

Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios

Dental Hygiene Theses & Dissertations

Purpose: The purpose of this study was to determine the effectiveness of immersive visualization (IV) therapy, a technique that provides visual and stereoscopic display through the use of eyewear, in anxious patients during an oral prophylaxis. Methods: A convenience sample of thirty adults was enrolled. A split mouth design was utilized. Subjects were randomly divided into two groups: group A (use of IV for the right side of the mouth), and group B (use of IV for the left side of the mouth). Subjects received a full mouth oral prophylaxis (removal of supra and subgingival calculus and selective polishing), always …


Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua Sep 2013

Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua

Dissertations and Theses

Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …


Self-Timed Dram Data Interface, Rajesh Nerkar Sep 2013

Self-Timed Dram Data Interface, Rajesh Nerkar

Dissertations and Theses

A DRAM communicates with a processing unit via two interfaces: a data interface and a command interface. In today's DRAMs, also known as synchronous DRAMs (SDRAMs), both interfaces use a clock to communicate with the processing unit. The clock times the communication between the processing unit and the SDRAM on both the data interface and the command interface.

We propose a self-timed DRAM. The self-timed DRAM introduces more flexibility into the DRAM interface by eliminating the clock. The command interface and the data interface each communicate with the processing unit using a handshake protocol rather than a clock.

This thesis …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum Sep 2013

Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum

Open Access Dissertations

Robots exhibit flexible behavior largely in proportion to their degree of semantic knowledge about the world. Such knowledge is often meticulously hand-coded for a narrow class of tasks, limiting the scope of possible robot competencies. Thus, the primary limiting factor of robot capabilities is often not the physical attributes of the robot, but the limited time and skill of expert programmers. One way to deal with the vast number of situations and environments that robots face outside the laboratory is to provide users with simple methods for programming robots that do not require the skill of an expert.

For this …


Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan Sep 2013

Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan

Open Access Dissertations

Modern web applications are marked by distinct networking and computing characteristics. As applications evolve, they continue to operate over a large monolithic framework of networking and computing equipment built from general-purpose microprocessors and Application Specific Integrated Circuits (ASICs) that offers few architectural choices. This dissertation presents techniques to diversify the next-generation Internet infrastructure by integrating Field-programmable Gate Arrays (FPGAs), a class of reconfigurable integrated circuits, with general-purpose microprocessor-based techniques. Specifically, our solutions are demonstrated in the context of two applications - network virtualization and distributed cluster computing.

Network virtualization enables the physical network infrastructure to be shared among several …


Hybrid Radio Frequency And Video Framework For Identity-Aware Augmented Perception In Disaster Management And Assistive Technologies, Xunyi Yu Sep 2013

Hybrid Radio Frequency And Video Framework For Identity-Aware Augmented Perception In Disaster Management And Assistive Technologies, Xunyi Yu

Open Access Dissertations

In this dissertation, we introduce a hybrid radio frequency and video framework that enables identity aware-augmented perception. Identity-aware augmented perception enhances users' perception of the surrounding by collecting and analyzing information pertaining to each identifiable or tractable target nearby aggregated from various sensors, and presents it visually or audibly augmenting users' own sensory perceptions. We target two application areas of disaster management and assistive technologies. Incident commanders and first responders can use the technology to perceive information specific to a victim, e.g. triage level, critical conditions, visually superimposed on third person or first person video. The blind and visually impaired …


Online Management Of Resilient And Power Efficient Multicore Processors, Rance Rodrigues Sep 2013

Online Management Of Resilient And Power Efficient Multicore Processors, Rance Rodrigues

Open Access Dissertations

The semiconductor industry has been driven by Moore's law for almost half a century. Miniaturization of device size has allowed more transistors to be packed into a smaller area while the improved transistor performance has resulted in a significant increase in frequency. Increased density of devices and rising frequency led, unfortunately, to a power density problem which became an obstacle to further integration. The processor industry responded to this problem by lowering processor frequency and integrating multiple processor cores on a die, choosing to focus on Thread Level Parallelism (TLP) for performance instead of traditional Instruction Level Parallelism (ILP).

While …