Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Computer Engineering

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi Nov 2018

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi

Graduate Theses and Dissertations

Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via ...


Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang Jun 2018

Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang

Graduate Theses and Dissertations

The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel ...


Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj May 2018

Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj

Graduate Theses and Dissertations

With CMOS technology scaling reaching its limitations rigorous research of alternate and competent technologies is paramount to push the boundaries of computing. Spintronic and resistive memories have proven to be effective alternatives in terms of area, power and performance to CMOS because of their non-volatility, ability for logic computing and easy integration with CMOS. However, deeper investigations to understand their physical phenomenon and improve their properties such as writability, stability, reliability, endurance, uniformity with minimal device-device variations is necessary for deployment as memories in commercial applications. Application of these technologies beyond memory and logic are investigated in this thesis i ...


Strong-Dism: A First Attempt To A Dynamically Typed Assembly Language (D-Tal), Ivory Hernandez Nov 2017

Strong-Dism: A First Attempt To A Dynamically Typed Assembly Language (D-Tal), Ivory Hernandez

Graduate Theses and Dissertations

Dynamically Typed Assembly Language (D-TAL) is not only a lightweight and effective solution to the gap generated by the drop in security produced by the translation of high-level language instructions to low-level language instructions, but it considerably eases up the burden generated by the level of complexity required to implement typed assembly languages statically. Although there are tradeoffs between the static and dynamic approaches, focusing on a dynamic approach leads to simpler, easier to reason about, and more feasible ways to understand deployment of types over monomorphically-typed or untyped intermediate languages. On this occasion, DISM, a simple but powerful and ...


Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady May 2017

Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady

Graduate Theses and Dissertations

Microscopy image processing is an emerging and quickly growing field in medical imaging research area. Recent advancements in technology including higher computation power, larger and cheaper storage modules, and more efficient and faster data acquisition devices such as whole-slide imaging scanners contributed to the recent microscopy image processing research advancement. Most of the methods in this research area either focus on automatically process images and make it easier for pathologists to direct their focus on the important regions in the image, or they aim to automate the whole job of experts including processing and classifying images or tissues that leads ...


Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam Jun 2016

Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam

Graduate Theses and Dissertations

This thesis presents a new security policy enforcer designed for securing parallel computation on CUDA GPUs. We show how the very features that make a GPGPU desirable have already been utilized in existing exploits, fortifying the need for security protections on a GPGPU. An aspect weaver was designed for CUDA with the goal of utilizing aspect-oriented programming for security policy enforcement. Empirical testing verified the ability of our aspect weaver to enforce various policies. Furthermore, a performance analysis was performed to demonstrate that using this policy enforcer provides no significant performance impact over manual insertion of policy code. Finally, future ...


Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal Apr 2016

Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal

Graduate Theses and Dissertations

The reversible logic has promising applications in emerging computing paradigms, such as quantum computing, quantum dot cellular automata, optical computing, etc. In reversible logic gates, there is a unique one-to-one mapping between the inputs and outputs. To generate a useful gate function, the reversible gates require some constant ancillary inputs called ancilla inputs. Also to maintain the reversibility of the circuits some additional unused outputs are required that are referred to as the garbage outputs. The number of ancilla inputs, the number of garbage outputs and quantum cost plays an important role in the evaluation of reversible circuits. Thus minimizing ...


Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur Oct 2015

Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur

Graduate Theses and Dissertations

The primary objective of this work is to design a parking guidance system to reliably detect entering/exiting vehicles to a parking garage in a cost-efficient manner. Existing solutions (inductive loops, RFID based systems, and video image processors) at shopping malls, universities, airports etc., are expensive due to high installation and maintenance costs. There is a need for a parking guidance system that is reliable, accurate, and cost-effective. The proposed parking guidance system is designed to optimize the use of parking spaces and to reduce wait times. Based on a literature review we identify that the ultrasonic sensor is suitable ...


Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada Mar 2015

Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada

Graduate Theses and Dissertations

Despite the fact that Molecular Simulation systems represent a major research tool in multiple scientific and engineering fields, there is still a lack of systems for effective data management and fast data retrieval and processing. This is mainly due to the nature of MS which generate a very large amount of data - a system usually encompass millions of data information, and one query usually runs for tens of thousands of time frames. For this purpose, we designed and developed a new application, DCMS (A data Analytics and Management System for molecular Simulation), that intends to speed up the process of ...


Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton Jan 2015

Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton

Graduate Theses and Dissertations

Terrestrial robots must be capable of negotiating rough terrain if they are to become autonomous outside of the lab. Although the control mechanism offered by wheels is attractive in its simplicity, any wheeled system is confined to relatively flat terrain. Wheels will also only ever be useful for rolling, while limbs observed in nature are highly multimodal. The robust locomotive utility of legs is evidenced by the many animals that walk, run, jump, swim, and climb in a world full of challenging terrain.

On the other hand, legs with multiple degrees of freedom (DoF) require much more complex control and ...


Scene-Dependent Human Intention Recognition For An Assistive Robotic System, Kester Duncan Jan 2014

Scene-Dependent Human Intention Recognition For An Assistive Robotic System, Kester Duncan

Graduate Theses and Dissertations

In order for assistive robots to collaborate effectively with humans for completing everyday tasks, they must be endowed with the ability to effectively perceive scenes and more importantly, recognize human intentions. As a result, we present in this dissertation a novel scene-dependent human-robot collaborative system capable of recognizing and learning human intentions based on scene objects, the actions that can be performed on them, and human interaction history. The aim of this system is to reduce the amount of human interactions necessary for communicating tasks to a robot. Accordingly, the system is partitioned into scene understanding and intention recognition modules ...


Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar Jan 2013

Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar

Graduate Theses and Dissertations

In this dissertation work, a methodology is proposed to enable a robot to identify an object to be grasped and its intended grasp configuration while a human is teleoperating a robot towards the desired object. Based on the detected object and grasp configuration, the human is assisted in the teleoperation task. The environment is unstructured and consists of a number of objects, each with various possible grasp configurations. The identification of the object and the grasp configuration is carried out in real time, by recognizing the intention of the human motion. Simultaneously, the human user is assisted to preshape over ...


Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish Jan 2013

Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish

Graduate Theses and Dissertations

Many physical and algorithmic swarms utilize inter-agent communication to achieve advanced swarming behaviors. These swarms are inspired by biological swarms that can be seen throughout nature and include bee swarms, ant colonies, fish schools, and bird flocks. These biological swarms do not utilize inter-agent communication like their physical and algorithmic counterparts. Instead, organisms in nature rely on a local awareness of other swarm members that facilitates proper swarm motion and behavior. This research aims to pursue an effective swarm algorithm using only line-of-sight proximity information and no inter-agent communication. It is expected that the swarm performance will be lower than ...


Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang Jan 2013

Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang

Graduate Theses and Dissertations

This thesis presents a framework to verify asynchronous real-time systems based on model checking. These systems are modeled by using a common modeling formalism named Labeled Petri-nets(LPNs).

In order to verify the real-time systems algorithmically, the zone-based timing analysis method is used for LPNs. It searches the state space with timing information (represented by zones). When there is a high degree of concurrency in the model, firing concurrent enabled transitions in different order may result in different zones, and these zones may be combined without affecting the verification result. Since the zone-based method could not deal with this problem ...


Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes Jan 2013

Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes

Graduate Theses and Dissertations

This work analyzes human-in-the-loop robotic systems to determine where human input can be most beneficial to a collaborative task. This is accomplished by implementing a pick-and-place task using a human-in-the-loop robotic system and determining which segments of the task, when replaced by human guidance, provide the most improvement to overall task performance and require the least cognitive effort.

The first experiment entails implementing a pick and place task on a commercial robotic arm. Initially, we look at a pick-and-place task that is segmented into two main areas: coarse approach towards a goal object and fine pick motion. For the fine ...


Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun Jan 2013

Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun

Graduate Theses and Dissertations

Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy

resources and also restricted by the ad-hoc network operational

environment. They pose unique challenges, due to limited power

supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the ...


Fpca Based Human-Like Trajectory Generating, Wei Dai Jan 2013

Fpca Based Human-Like Trajectory Generating, Wei Dai

Graduate Theses and Dissertations

This thesis presents a new human-like upper limb and hand motion generating method. The work is based on Functional Principal Component Analysis and Quadratic Programming. The human-like motion generating problem is formulated in a framework of minimizing the difference of the dynamic profile of the optimal trajectory and the known types of trajectory. Statistical analysis is applied to the pre-captured human motion records to work in a low dimensional space. A novel PCA FPCA hybrid motion recognition method is proposed. This method is implemented on human grasping data to demonstrate its advantage in human motion recognition. One human grasping hierarchy ...


Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar Jan 2013

Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar

Graduate Theses and Dissertations

Large amount of data is generated by applications used in basic-science research and development applications. The size of data introduces great challenges in storage, analysis and preserving privacy. This dissertation proposes novel techniques to efficiently analyze the data and reduce storage space requirements through a data compression technique while preserving privacy and providing data security.

We present an efficient technique to compute an analytical query called spatial distance histogram (SDH) using spatiotemporal properties of the data. Special spatiotemporal properties present in the data are exploited to process SDH efficiently on the fly. General purpose graphics processing units (GPGPU or just ...


Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi Jan 2013

Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi

Graduate Theses and Dissertations

Electricity generation for Information and Communications Technology (ICT) contributes over 2% of the human-generated CO2 to the atmosphere. Energy costs are rapidly becoming the major operational expense for ICT and may soon dwarf capital expenses as software and hardware continue to drop in price. In this dissertation, three new approaches to achieving energy-proportional operation of network links and data servers are explored.

Ethernet is the dominant wireline communications technology for Internet connectivity. IEEE 802.3az Energy Efficient Ethernet (EEE) describes a Low Power Idle (LPI) mechanism for allowing Ethernet links to sleep. A method of coalescing packets to consolidate link ...


Algorithms For Visual Maritime Surveillance With Rapidly Moving Camera, Sergiy Fefilatyev Jan 2012

Algorithms For Visual Maritime Surveillance With Rapidly Moving Camera, Sergiy Fefilatyev

Graduate Theses and Dissertations

Visual surveillance in the maritime domain has been explored for more than a decade. Although it has produced a number of working systems and resulted in a mature technology, surveillance has been restricted to the port facilities or areas close to the coastline assuming a fixed-camera scenario. This dissertation presents several contributions in the domain of maritime surveillance. First, a novel algorithm for open-sea visual maritime surveillance is introduced. We explore a challenging situation with a camera mounted on a buoy or other floating platform. The developed algorithm detects, localizes, and tracks ships in the field of view of the ...


Overcoming Limitations Of Serial Audio Search, Isabela Cordeiro Ribeiro Moura Hidalgo Jan 2012

Overcoming Limitations Of Serial Audio Search, Isabela Cordeiro Ribeiro Moura Hidalgo

Graduate Theses and Dissertations

The typical approach for finding audio recordings, such as music and sound effects, in a database is to enter some textual information into a search field. The results appear summarized in a list of textual descriptions of the audio files along with a function for playing back the recordings. Exploring such a list sequentially is a time-consuming and tedious way to search for sounds. This research evaluates whether searching for audio information can become more effective with a user interface capable of presenting multiple audio streams simultaneously.

A prototype audio player was developed with a user interface suitable for both ...


A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications, Sean J. Barbeau Jan 2012

A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications, Sean J. Barbeau

Graduate Theses and Dissertations

This dissertation presents LAISYC, a modular location-aware architecture for intelligent real-time mobile applications that is fully-implementable by third party mobile app developers and supports high-precision and high-accuracy positioning systems such as GPS. LAISYC significantly improves device battery life, provides location data authenticity, ensures security of location data, and significantly reduces the amount of data transferred between the phone and server. The design, implementation, and evaluation of LAISYC using real mobile phones include the following modules: the GPS Auto-Sleep module saves battery energy when using GPS, maintaining acceptable movement tracking (approximately 89% accuracy) with an approximate average doubling of battery life ...


Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari Jan 2012

Basal Graph Structures For Geometry Based Organization Of Wide-Baseline Image Collections, Aveek Shankar Brahmachari

Graduate Theses and Dissertations

We propose algorithms for organization of images in wide-area sparse-view datasets. In such datasets, if the images overlap in scene content, they are related by wide-baseline geometric transformations. The challenge is to identify these relations even if the images sparingly overlap in their content. The images in a dataset are then grouped into sets of related images with the relations captured in each set as a basal (minimal and foundational) graph structures. Images form the vertices in the graph structure and the edges define the geometric relations between the images. We use these basal graphs for geometric walkthroughs and detection ...


A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding Jan 2011

A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding

Graduate Theses and Dissertations

A dynamic hierarchical web-based portal was created to house a suite of web-based supply chain management applications. The portal was designed in a hierarchical manner to match the structure of large companies. Administrators of the the portal have the ability to form the portal in such a way to mimic the existing structure of their company. Access rights to the applications in the portal may be granted or denied per division and the users of the portal are placed in these divisions based on their duty in the company. In addition, users are granted roles which dictate their ability to ...


Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger Jan 2011

Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger

Graduate Theses and Dissertations

With the rise autonomous and robotic systems in field applications, the need for dexterous, highly adaptable end effectors has become a major research topic. Control mechanisms of robotics hands with a high number independent actuators is recognized as a complex, high dimensional problem, with exponentially complex algorithms. However, recent studies have shown that human hand motion possesses very high joint correlation which translates into a set of predefined postures, or synergies. The hand produces a motion using a complementing contribution of multiple joints, called synergies. The similarities place variables onto a common dimensional space, effectively reducing the number of independent ...


Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy Aug 2010

Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy

Graduate Theses and Dissertations

Power gating is a technique commonly used for runtime leakage reduction in digital CMOS circuits. In microprocessors, power gating can be implemented by using sleep transistors to selectively deactivate circuit modules when they are idle during program execution. In this dissertation, a framework for power gating arithmetic functional units in embedded microprocessors with architecture and compiler support is proposed. During compile time, program regions are identified where one or more functional units are idle and sleep instructions are inserted into the code so that those units can be put to sleep during program execution. Subsequently, when their need is detected ...


Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova Sep 2009

Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova

Graduate Theses and Dissertations

The ow of a liquid _lm over a rapidly rotating horizontal disk has numerous industrial applications including pharmaceuticals, chemical engineering, bioengineering, etc. The analysis and control of complex uid ows over a rapidly rotating horizontal disk is an important issue in the experimental uid mechanics. The spinning disk reactor exploits the bene_ts of centrifugal force, which produces thin highly sheared _lms due to radial acceleration. The hydrodynamics of the _lm results in excellent uid mixing and high heat or mass transfer rates.

This work focuses on developing a novel approach for uid ow tracking and analysis. Speci_cally, the developed algorithm ...