Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

2013

Institution
Keyword
Publication

Articles 1 - 30 of 311

Full-Text Articles in Engineering

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith Dec 2013

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith

Department of Electrical and Computer Engineering: Faculty Publications

Colloidally synthesized nanocubes strongly coupled to conducting films hold great promise for enhancing different nonlinear optical processes. They exhibit a robust and sensitive scattering response that can be easily controlled by their geometrical and material parameters. Strong local field enhancement is generated at the gap regions between the nanocubes and the metallic film. We show that strong optical bistability and all-optical switching behavior can be obtained by loading these nanogaps with Kerr nonlinear materials. Relatively low input intensities are required to obtain these nonlinear effects. The proposed design can lead to efficient, low-power, and ultrafast all-optical memories and scattering nanoswitches.


Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball Dec 2013

Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball

AFIT Patents

An apparatus, method and program product are provided for securing a computer system. A digital signature of an application is checked, which is loaded into a memory of the computer system configured to contain memory pages. In response to finding a valid digital signature, memory pages containing instructions of the application are set as executable and memory pages other than those containing instructions of the application are set as non-executable. Instructions in executable memory pages are executed. Instructions in non-executable memory pages are prevented from being executed. A page fault is generated in response to an attempt to execute an …


Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons Dec 2013

Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons

University of Maine Office of Research Administration: Grant Reports

The goals of the project were to increase the level and volume of information technologies in the classroom and to promote inquiry-based learning. The project was tightly integrated with the Maine Learning Technology Initiative that puts a laptop computer into the hands of every 7th and 8th grade student and teacher. It was also tightly integrated with the University of Maine Supercomputer. Through the use of technology, students were able to ask “what if questions and find and visualize the answers to their questions. The focus of the inquiry was dynamic Earth modelling. This included geological evolution of the earth …


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz Dec 2013

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Electrical and Computer Engineering Publications

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …


Multiplexed Fiber-Ring Laser Sensors For Ultrasonic Detection, Tongqing Liu, Lingling Hu, Ming Han Dec 2013

Multiplexed Fiber-Ring Laser Sensors For Ultrasonic Detection, Tongqing Liu, Lingling Hu, Ming Han

Department of Electrical and Computer Engineering: Faculty Publications

We propose and demonstrate a multiplexing method for ultrasonic sensors based on fiber Bragg gratings (FBGs) that are included inside the laser cavity of a fiber-ring laser. The multiplexing is achieved using add-drop filters to route the light signals, according to their wavelengths, into different optical paths, each of which contains a separate span of erbium-doped fiber (EDF) as the gain medium. Because a specific span of EDF only addresses a single wavelength channel, mode completion is avoided and the FBG ultrasonic sensors can be simultaneously demodulated. The proposed method is experimentally demonstrated using a two-channel system with two sensing …


Reduced Row Echelon Form And Non-Linear Approximation For Subspace Segmentation And High-Dimensional Data Clustering, Akram Aldroubi, Ali Sekmen Dec 2013

Reduced Row Echelon Form And Non-Linear Approximation For Subspace Segmentation And High-Dimensional Data Clustering, Akram Aldroubi, Ali Sekmen

Computer Science Faculty Research

Given a set of data W={w1,…,wN}∈RD drawn from a union of subspaces, we focus on determining a nonlinear model of the form U=⋃i∈ISi, where {Si⊂RD}i∈I is a set of subspaces, that is nearest to W. The model is then used to classify W into clusters. Our approach is based on the binary reduced row echelon form of data matrix, combined with an iterative scheme based on a non-linear approximation method. We prove that, in absence of noise, our approach can find the number of subspaces, their dimensions, and an orthonormal basis for each subspace Si. We provide a comprehensive analysis …


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


Intensity-Demodulated Fiber-Ring Laser Sensor System For Acoustic Emission Detection, Ming Han, Tongqing Liu, Lingling Hu, Qi Zhang Dec 2013

Intensity-Demodulated Fiber-Ring Laser Sensor System For Acoustic Emission Detection, Ming Han, Tongqing Liu, Lingling Hu, Qi Zhang

Department of Electrical and Computer Engineering: Faculty Publications

We theoretically and experimentally demonstrate a fiber-optic ultrasonic sensor system based on a fiber-ring laser whose cavity consisting of a regular fiber Bragg grating (FBG) and a tunable optical band-pass filter (TOBPF). The FBG is the sensing element and the TOBPF is used to set the lasing wavelength at a point on the spectral slope of the FBG. The ultrasonic signal is detected by the variations of the laser output intensity in response to the cold-cavity loss modulations from the ultrasonicallyinduced FBG spectral shift. The system demonstrated here has a simple structure and low cost, making it attractive for acoustic …


Exploiting Contextual Information For Prosodic Event Detection Using Auto-Context, Junhong Zhao, Wei-Qiang Zhang, Hua Yang, Michael T. Johnson, Jia Liu, Shanhong Xia Dec 2013

Exploiting Contextual Information For Prosodic Event Detection Using Auto-Context, Junhong Zhao, Wei-Qiang Zhang, Hua Yang, Michael T. Johnson, Jia Liu, Shanhong Xia

Electrical and Computer Engineering Faculty Research and Publications

Prosody and prosodic boundaries carry significant information regarding linguistics and paralinguistics and are important aspects of speech. In the field of prosodic event detection, many local acoustic features have been investigated; however, contextual information has not yet been thoroughly exploited. The most difficult aspect of this lies in learning the long-distance contextual dependencies effectively and efficiently. To address this problem, we introduce the use of an algorithm called auto-context. In this algorithm, a classifier is first trained based on a set of local acoustic features, after which the generated probabilities are used along with the local features as contextual information …


Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei Dec 2013

Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei

Computer Science Faculty Publications

Broadcasting in vehicular networks has attracted great interest in research community and industry. Broadcasting on disseminating information to individual vehicle beyond the transmission range is based on inter-vehicle communication systems. It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of …


A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb Dec 2013

A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb

Masters Theses & Specialist Projects

Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Clustering And Classification Of Multi-Domain Proteins, Neethu Shah Dec 2013

Clustering And Classification Of Multi-Domain Proteins, Neethu Shah

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Rapid development of next-generation sequencing technology has led to an unprecedented growth in protein sequence data repositories over the last decade. Majority of these proteins lack structural and functional characterization. This necessitates design and development of fast, efficient, and sensitive computational tools and algorithms that can classify these proteins into functionally coherent groups.

Domains are fundamental units of protein structure and function. Multi-domain proteins are extremely complex as opposed to proteins that have single or no domains. They exhibit network-like complex evolutionary events such as domain shuffling, domain loss, and domain gain. These events therefore, cannot be represented in the …


A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen Dec 2013

A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen

Research Collection School Of Computing and Information Systems

Identifying potential customers among a huge number of users in microblogging is a fundamental problem for microblog marketing. One challenge in potential customer detection in microblogging is how to generate an accurate characteristic description for users, i.e., user profile generation. Intuitively, the preference of a user’s friends (i.e., the person followed by the user in microblogging) is of great importance to capture the characteristic of the user. Also, a user’s self-defined tags are often concise and accurate carriers for the user’s interests. In this paper, for identifying potential customers in microblogging, we propose a method to generate user profiles via …


Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow Dec 2013

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson Nov 2013

Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson

Senior Honors Theses

Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.

Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …


Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet Nov 2013

Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet

FIU Electronic Theses and Dissertations

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or “dirty” sensor data. The dirty …


Calculation Of Magnet Losses In Concentrated-Winding Permanent-Magnet Synchronous Machines Using A Computationally Efficient Finite-Element Method, Peng Zhang, Gennadi Y. Sizov, Jiangbiao He, Dan M. Ionel, Nabeel Demerdash Nov 2013

Calculation Of Magnet Losses In Concentrated-Winding Permanent-Magnet Synchronous Machines Using A Computationally Efficient Finite-Element Method, Peng Zhang, Gennadi Y. Sizov, Jiangbiao He, Dan M. Ionel, Nabeel Demerdash

Electrical and Computer Engineering Faculty Research and Publications

The proposed hybrid method combines computationally efficient finite-element analysis (CE-FEA) with a new analytical formulation for eddy-current losses in the permanent magnets (PMs) of sine-wave current-regulated brushless synchronous motors. The CE-FEA only employs a reduced set of magnetostatic solutions yielding substantial reductions in the computational time, as compared with the conventional FEA. The 3-D end effects and the effect of pulsewidth-modulation switching harmonics are incorporated in the analytical calculations. The algorithms are applied to two fractional-slot concentrated-winding interior PM motors with different circumferential and axial PM block segmentation arrangements. The method is validated against 2-D and 3-D time-stepping FEA.


An Adaptive Packet Aggregation Algorithm (Aam) For Wireless Networks, Jianhua Deng Nov 2013

An Adaptive Packet Aggregation Algorithm (Aam) For Wireless Networks, Jianhua Deng

Doctoral

Packet aggregation algorithms are used to improve the throughput performance by combining a number of packets into a single transmission unit in order to reduce the overhead associated with each transmission within a packet-based communications network. However, the throughput improvement is also accompanied by a delay increase. The biggest drawback of a significant number of the proposed packet aggregation algorithms is that they tend to only optimize a single metric, i.e. either to maximize throughput or to minimize delay. They do not permit an optimal trade-off between maximizing throughput and minimizing delay. Therefore, these algorithms cannot achieve the optimal network …


Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian M. Lyons, Ronald C. Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, J. Deeb Nov 2013

Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian M. Lyons, Ronald C. Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, J. Deeb

Faculty Publications

Certain robot missions need to perform predictably in a physical environment that may only be poorly characterized in advance. We have previously developed an approach to establishing performance guarantees for behaviorbased controllers in a process-algebra framework. We extend that work here to include random variables, and we show how our prior results can be used to generate a Dynamic Bayesian Network for the coupled system of program and environment model. Verification is reduced to a filtering problem for this network. Finally, we present validation results that demonstrate the effectiveness of the verification of a multiple waypoint robot mission using this …


Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian Lyons, Ron Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, Julia Deeb Nov 2013

Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian Lyons, Ron Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, Julia Deeb

Faculty Publications

Abstract—Certain robot missions need to perform predictably in a physical environment that may only be poorly characterized in advance. We have previously developed an approach to establishing performance guarantees for behavior-based controllers in a process-algebra framework. We extend that work here to include random variables, and we show how our prior results can be used to generate a Dynamic Bayesian Network for the coupled system of program and environment model. Verification is reduced to a filtering problem for this network. Finally, we present validation results that demonstrate the effectiveness of the verification of a multiple waypoint robot mission using this …


Approximate Techniques In Solving Optimal Camera Placement Problems, Jian Zhao, Ruriko Yoshida, Sen-Ching Samson Cheung, David Haws Nov 2013

Approximate Techniques In Solving Optimal Camera Placement Problems, Jian Zhao, Ruriko Yoshida, Sen-Ching Samson Cheung, David Haws

Statistics Faculty Publications

While the theoretical foundation of the optimal camera placement problem has been studied for decades, its practical implementation has recently attracted significant research interest due to the increasing popularity of visual sensor networks. The most flexible formulation of finding the optimal camera placement is based on a binary integer programming (BIP) problem. Despite the flexibility, most of the resulting BIP problems are NP-hard and any such formulations of reasonable size are not amenable to exact solutions. There exists a myriad of approximate algorithms for BIP problems, but their applications, efficiency, and scalability in solving camera placement are poorly understood. Thus, …


Social Listening For Customer Acquisition, Juan Du, Biying Tan, Feida Zhu, Ee-Peng Lim Nov 2013

Social Listening For Customer Acquisition, Juan Du, Biying Tan, Feida Zhu, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Social network analysis has received much attention from corporations recently. Corporations are trying to utilize social media platforms such as Twitter, Facebook and Sina Weibo to expand their own markets. Our system is an online tool to assist these corporations to 1) find potential customers, and 2) track a list of users by specific events from social networks. We employ both textual and network information, and thus produce a keyword-based relevance score for each user in pre-defined dimensions, which indicates the probability of the adoption of a product. Based on the score and its trend, out tool is able to …


An Autonomous Channel Selection Algorithm For Wlans, Fuhu Deng Nov 2013

An Autonomous Channel Selection Algorithm For Wlans, Fuhu Deng

Doctoral

IEEE 802.11 wireless devices need to select a channel in order to transmit their packets. However, as a result of the contention-based nature of the IEEE 802.11 CSMA/CA MAC mechanism, the capacity experienced by a station is not fixed. When a station cannot win a sufficient number of transmission opportunities to satisfy its traffic load, it will become saturated. If the saturation condition persists, more and more packets are stored in the transmit queue and congestion occurs. Congestion leads to high packet delay and may ultimately result in catastrophic packet loss when the transmit queue’s capacity is exceeded. In this …


Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin Oct 2013

Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin

FIU Electronic Theses and Dissertations

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …


Microelectromechanical Systems (Mems) Resistive Heaters As Circuit Protection Devices, Ronald A. Coutu Jr., Scott A. Ostrow Oct 2013

Microelectromechanical Systems (Mems) Resistive Heaters As Circuit Protection Devices, Ronald A. Coutu Jr., Scott A. Ostrow

Electrical and Computer Engineering Faculty Research and Publications

With increased opportunities for the exploitation (i.e., reverse engineering) of vulnerable electronic components and systems, circuit protection has become a critical issue. Circuit protection techniques are generally software-based and include cryptography (encryption/decryption), obfuscation of codes, and software guards. Examples of hardware-based circuit protection include protective coatings on integrated circuits, trusted foundries, and macro-sized components that self-destruct, thus destroying critical components. This paper is the first to investigate the use of microelectromechanical systems (MEMS) to provide hardware-based protection of critical electronic components to prevent reverse engineering or other exploitation attempts. Specifically, surface-micromachined polycrystalline silicon to be used as meandering resistive heaters …


Advances In The Redcat Software Package, Chris Schmidt, Stephanie J. Irausquin, Homayoun Valafar Oct 2013

Advances In The Redcat Software Package, Chris Schmidt, Stephanie J. Irausquin, Homayoun Valafar

Faculty Publications

Background

Residual Dipolar Couplings (RDCs) have emerged in the past two decades as an informative source of experimental restraints for the study of structure and dynamics of biological macromolecules and complexes. The REDCAT software package was previously introduced for the analysis of molecular structures using RDC data. Here we report additional features that have been included in this software package in order to expand the scope of its analyses. We first discuss the features that enhance REDCATs user-friendly nature, such as the integration of a number of analyses into one single operation and enabling convenient examination of a structural ensemble …


Performance Guarantees For C-Wmd Robot Missions, Shu Jiang, Ronald C. Arkin, Damian M. Lyons, Tsung-Ming Liu, Dagon Harrington Oct 2013

Performance Guarantees For C-Wmd Robot Missions, Shu Jiang, Ronald C. Arkin, Damian M. Lyons, Tsung-Ming Liu, Dagon Harrington

Faculty Publications

Robotics has been considered as one of the five key technology areas for defense against attacks with weapons of mass destruction (WMD). However, due to the mass impact nature of WMD, failures of counter-WMD (C-WMD) missions can have catastrophic consequences.To ensure robot's success in carrying out C-WMD missions, we have developed a novel verification framework in providing performance guarantees for behavior-based and probabilistic robot algorithms in complex real-world environments. This paper describes the system architecture and discusses how the verification framework can be used to provide pre-mission performance guarantees for robots in executing C-WMD missions.


S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan Oct 2013

S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin Oct 2013

Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin

MPA Capstone Projects 2006 - 2015

The Broome County Department of Public Works- Engineering Division is currently preparing to implement an Electronic Document and Records Management System (EDRMS) to store their increasing number of digital records and to manage existing paper records as they are digitized. This study examines Division integrate electronic document and record management into their organization.