Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 871 - 899 of 899

Full-Text Articles in Engineering

Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson Jan 2011

Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson

Engineering Technology Faculty Publications

Wireless communication becomes popular and widely used in almost every electronic product in our daily life. The RF communication is one of the major wireless applications in consumer products. Usually, it is integrated with an embedded system (microcontroller) to control various applications such as temperature sensing, data logging, data exchange, actuator activation, and user interaction wirelessly. A project based model can be used as an effective instructional strategy to enhance learning about complex RF concepts and technologies. The project method can lead to improved understanding and create interest by actively engaging the student with hands-on and problem solving and critical …


Generic Trace Logics, Christian Kissig, Alexander Kurz Jan 2011

Generic Trace Logics, Christian Kissig, Alexander Kurz

Engineering Faculty Articles and Research

We combine previous work on coalgebraic logic with the coalgebraic traces semantics of Hasuo, Jacobs, and Sokolova.


Protection Models For Web Applications, Karthick Jayaraman Jan 2011

Protection Models For Web Applications, Karthick Jayaraman

Electrical Engineering and Computer Science - Dissertations

Early web applications were a set of static web pages connected to one another. In contrast, modern applications are full-featured programs that are nearly equivalent to desktop applications in functionality. However, web servers and web browsers, which were initially designed for static web pages, have not updated their protection models to deal with the security consequences of these full-featured programs. This mismatch has been the source of several security problems in web applications.

This dissertation proposes new protection models for web applications. The design and implementation of prototypes of these protection models in a web server and a web browser …


Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu Jan 2011

Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu

Public Policy and Leadership Faculty Presentations

Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.

Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …


Predictive And Adaptive Game Development A Practical Application Of Development Models To The Independent Video Game Industry, Liam A. Hunt Jan 2011

Predictive And Adaptive Game Development A Practical Application Of Development Models To The Independent Video Game Industry, Liam A. Hunt

Theses : Honours

Through the process of researching a number of game and system development models, this study defines two archetypical development models - the predictive and the adaptive. Using each of these models, two video games have been developed in order to measure the practical effect that they can have on the design, development process and player experience of a game. Using the knowledge gained through playtesting and an analysis of the relationship between each game and its development methodology, a number of development guidelines and recommendations have been specifically constructed for use by independent games developers. The practical development and written …


An Investigation Into Internetworking Education, Woratat Makasiranondh Jan 2011

An Investigation Into Internetworking Education, Woratat Makasiranondh

Theses: Doctorates and Masters

Computer network technology and the Internet grew rapidly in recent years. Their growth created a large demand from industry for the development of IT and internetworking professionals. These professionals need to be equipped with both technical hands-on skills and non-technical or soft skills. In order to supply new professionals to the industry, educational institutions need to address these skills training in their curricula. Technical hands-on skills in internetworking education can be emphasised through the practical use of equipment in classrooms. The provision of the networking equipment to the internetworking students is a challenge. Particularly, university students in developing countries may …


Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole Jan 2011

Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Operating system performance and scalability on sharedmemory many-core systems depends critically on efficient access to shared data structures. Scalability has proven difficult to achieve for many data structures. In this paper we present a novel and highly scalable concurrent red-black tree. Red-black trees are widely used in operating systems, but typically exhibit poor scalability. Our red-black tree has linear read scalability, uncontended read performance that is at least 25% faster than other known approaches, and deterministic lookup times for a given tree size, making it suitable for realtime applications.


The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney Jan 2011

The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney

Computer Science Faculty Publications and Presentations

The semantics of reader-writer locks allow read-side concurrency. Unfortunately, the locking primitives serialize access to the lock variable to an extent that little or no concurrency is realized in practice for small critical sections. Relativistic programming is a methodology that also allows read- side concurrency. Relativistic programming uses dfferent ordering constraints than reader-writer locking. The different ordering constraints allow relativistic readers to proceed without synchronization so relativistic readers scale even for very short critical sections. In this paper we explore the diferences between the ordering constraints for reader-writer locking and relativistic programs. We show how and why the dfferent ordering …


Concept-Driven Multi-Modality Fusion For Video Search, Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo Jan 2011

Concept-Driven Multi-Modality Fusion For Video Search, Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

As it is true for human perception that we gather information from different sources in natural and multi-modality forms, learning from multi-modalities has become an effective scheme for various information retrieval problems. In this paper, we propose a novel multi-modality fusion approach for video search, where the search modalities are derived from a diverse set of knowledge sources, such as text transcript from speech recognition, low-level visual features from video frames, and high-level semantic visual concepts from supervised learning. Since the effectiveness of each search modality greatly depends on specific user queries, prompt determination of the importance of a modality …


Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo Jan 2011

Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Autonomous Mobility And Manipulation Of A 9-Dof Wmra, William Garrett Pence Jan 2011

Autonomous Mobility And Manipulation Of A 9-Dof Wmra, William Garrett Pence

USF Tampa Graduate Theses and Dissertations

The wheelchair-mounted robotic arm (WMRA) is a 9-degree of freedom (DoF) assistive system that consists of a 2-DoF modified commercial power wheelchair and a custom 7-DoF robotic arm. Kinematics and control methodology for the 9-DoF system that combine mobility and manipulation have been previously developed and implemented. This combined control allows the wheelchair and robotic arm to follow a single trajectory based on weighted optimizations. However, for the execution of activities of daily living (ADL) in the real-world environment, modified control techniques have been implemented.

In order to execute macro ADL tasks, such as a "go to and pick up" …


A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding Jan 2011

A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding

USF Tampa Graduate Theses and Dissertations

A dynamic hierarchical web-based portal was created to house a suite of web-based supply chain management applications. The portal was designed in a hierarchical manner to match the structure of large companies. Administrators of the the portal have the ability to form the portal in such a way to mimic the existing structure of their company. Access rights to the applications in the portal may be granted or denied per division and the users of the portal are placed in these divisions based on their duty in the company. In addition, users are granted roles which dictate their ability to …


Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal Jan 2011

Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal

USF Tampa Graduate Theses and Dissertations

Reversible circuits are similar to conventional logic circuits except that they are built from reversible gates. In reversible gates, there is a unique, one-to-one mapping between the inputs and outputs, not the case with conventional logic. Also, reversible gates require constant ancilla inputs for reconfiguration of gate functions and garbage outputs that help in keeping reversibility. Reversible circuits hold promise in futuristic computing technologies like quantum computing, quantum dot cellular automata, DNA computing, optical computing, etc. Thus, it is important to minimize parameters such as ancilla and garbage bits, quantum cost and delay in the design of reversible circuits.

The …


Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko Jan 2011

Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko

USF Tampa Graduate Theses and Dissertations

Testing gait rehabilitation devices on humans can be a difficult task, due to the effects of the neurological controls of the human body. This thesis advances the use of a passive dynamic walker (PDW) tuned to have asymmetric gait patterns similar to those with physical impairments to test rehabilitation devices. A passive dynamic walker is a multipendulum system that has a stable gait pattern when walking down a slope without any energy inputs except the forces due to gravity. A PDW model is better suited for testing rehabilitation devices because it has been shown to resemble human gait and separates …


Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger Jan 2011

Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger

USF Tampa Graduate Theses and Dissertations

With the rise autonomous and robotic systems in field applications, the need for dexterous, highly adaptable end effectors has become a major research topic. Control mechanisms of robotics hands with a high number independent actuators is recognized as a complex, high dimensional problem, with exponentially complex algorithms. However, recent studies have shown that human hand motion possesses very high joint correlation which translates into a set of predefined postures, or synergies. The hand produces a motion using a complementing contribution of multiple joints, called synergies. The similarities place variables onto a common dimensional space, effectively reducing the number of independent …


Design Of Multi Agent Based Crowd Injury Model, Emin Kugu Jan 2011

Design Of Multi Agent Based Crowd Injury Model, Emin Kugu

Electrical & Computer Engineering Theses & Dissertations

A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary.

In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules …


Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi Jan 2011

Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi

Electrical & Computer Engineering Theses & Dissertations

The explosion of high-data-rate-demanding wireless applications such as smart-phones and wireless Internet access devices, together with growth of existing wireless services, are creating a shortage of the scarce Radio Frequency (RF) spectrum. However, several spectrum measurement campaigns revealed that current spectrum usage across time and frequency is inefficient, creating the artificial shortage of the spectrum because of the traditional exclusive "command-and-control" model of using the spectrum. Therefore, a new concept of Cognitive Radio (CR) has been emerging recently in which unlicensed users temporarily borrow spectrum from the licensed Primary Users (PU) based on the Dynamic Spectrum Access (DSA) technique that …


Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner Jan 2011

Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner

Browse all Theses and Dissertations

This dissertation develops and demonstrates a method to measure the uncertainty of secondary structure of protein sequences using Shannon's information theory. This method is applied to a newly developed large dataset of chameleon sequences and to several protein hinges culled from the Hinge Atlas. The uncertainty of the central residue in each tripeptide is computed for each amino acid in a sequence using Cuff and Barton's CB513 as the reference set. It is shown that while secondary structure uncertainty is relatively high in chameleon regions [avg = 1.27 bits] it is relatively low in the regions 1-7 residues nearest a …


A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer Jan 2011

A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer

Browse all Theses and Dissertations

While mobile reading devices have been on the market and investigated by researchers in recent years, there is still work required to make these devices highly accessible to the visually impaired. A usability test with one such device revealed gaps in the current state of the art devices. These gaps focus mostly on the user interaction and his or her ability to quickly consume written reading material. In this dissertation a voice user interface (VUI) is presented that improves the ability of a blind user of a mobile reading device to interact with written material. The image processing techniques required …


Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire Jan 2011

Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire

Browse all Theses and Dissertations

This thesis investigates the use of an artificial neural network (ANN), in particular a Multi-Layer Perceptron (MLP), to perform function approximation on truth data representing a weapon engagement zone's (WEZ) maximum launch range. The WEZ of an air-to-air missile represents the boundaries and zones of effectiveness for a one-vs-one air-to-air combat engagement [13]. The intent is for the network to fuse table lookup and interpolation functionality into a physically compact and computationally efficient package, while improving approximation accuracy over conventional methods. Data was collected from simulated firings of a notional air-to-air missile model and used to train a two layer …


Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi Jan 2011

Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi

Browse all Theses and Dissertations

Fall related injuries are the leading cause of death and hospitalization among the elderly. Falls among older people become a major problem facing hospitals and nursing homes. In this study we put an effort to design a wireless device capable of detecting falls with the hope that this study will provide a path towards better healthcare monitoring and better independent living for the elderly.

In this project I showed how the fall detection device can be interfaced with different systems to achieve functionality without adding extra cost. For seniors who prefer to stay at their homes and live independently, the …


3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp Jan 2011

3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp

Browse all Theses and Dissertations

A method to automatically characterize and identify 3-D range scans based on intrinsic landmarks is presented. Intrinsic landmarks represent locally unique, intrinsic properties of a scanned surface, regardless of scale or rotation. The number, location, and characteristics of landmarks are used to characterize the scanned models. This method contains a selection process to identify stable, intrinsic landmarks for range scans as well as the identification of those scans. The selection process requires no user interaction or surface assumptions. It uses the principal curvatures at the range points to select the landmarks. First, a large number of landmarks are generated by …


A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha Jan 2011

A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha

Browse all Theses and Dissertations

Computing has changed. Lately, a slew of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources has become available at the disposal of the common man. The latter commonly called Cloud Computing (or just Cloud) is democratizing computing by making large computing power accessible to people and corporations around the world easily and economically.

However, taking full advantage of this computing landscape, especially for the data intensive domains, has been hampered by many factors, the primary one being the complexity in developing applications for the variety of available platforms.

This thesis …


Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano Dec 2010

Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano

Todd Sedano

Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss Dec 2010

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss

Ray Bareiss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu Dec 2010

Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu

Hong-Ning Dai

This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …


Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong Dec 2010

Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …


Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni Dec 2010

Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni

Faith Joel Shimba

Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …


Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary Dec 2010

Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary

Faith Joel Shimba

A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …