Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 71 of 71

Full-Text Articles in Computer Engineering

Multi-Sensory Deep Learning Architectures For Slam Dunk Scene Classification, Paul Minogue Jan 2019

Multi-Sensory Deep Learning Architectures For Slam Dunk Scene Classification, Paul Minogue

Dissertations

Basketball teams at all levels of the game invest a considerable amount of time and effort into collecting, segmenting, and analysing footage from their upcoming opponents previous games. This analysis helps teams identify and exploit the potential weaknesses of their opponents and is commonly cited as one of the key elements required to achieve success in the modern game. The growing importance of this type of analysis has prompted research into the application of computer vision and audio classification techniques to help teams classify scoring sequences and key events using game footage. However, this research tends to focus on classifying …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …


Investigating The Impact Of Unsupervised Feature-Extraction From Multi-Wavelength Image Data For Photometric Classification Of Stars, Galaxies And Qsos, Annika Lindh Sep 2016

Investigating The Impact Of Unsupervised Feature-Extraction From Multi-Wavelength Image Data For Photometric Classification Of Stars, Galaxies And Qsos, Annika Lindh

Dissertations

This thesis reviews the current state of photometric classification in Astronomy and identifies two main gaps: a dependence on handcrafted rules, and a lack of interpretability in the more successful classifiers. To address this, Deep Learning and Computer Vision were used to create a more interpretable model, using unsupervised training to reduce human bias.

The main contribution is the investigation into the impact of using unsupervised feature-extraction from multi-wavelength image data for the classification task. The feature-extraction is achieved by implementing an unsupervised Deep Belief Network to extract lower-dimensionality features from the multi-wavelength image data captured by the Sloan Digital …


Predicting Intake Of Applications For First Registration In The Property Registration Authority, Orlaith Mernagh Jan 2016

Predicting Intake Of Applications For First Registration In The Property Registration Authority, Orlaith Mernagh

Dissertations

The motivation for this dissertation is rooted in a real business need. The Property Registration Authority is the state organisation tasked with maintaining a register of land ownership on the island of Ireland. The PRA currently faces a series of challenges; a high level of staff retiring and the inherent loss of knowledge associated with this trend, a lack of recruitment in recent years and a large increase in lodgement of applications for first registration as a result of legislation. The organisation therefore requires a reliable system for predicting future intake. Prior to this project, there has also been a …


Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan Dec 2015

Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan

Dissertations

Wireless has become one of the most pervasive core technologies in the modern world. Demand for faster data rates, improved spectrum efficiency, higher system access capacity, seamless protocol integration, improved security and robustness under varying channel environments has led to the resurgence of programmable software defined radio (SDR) as an alternative to traditional ASIC based radios. Future SDR implementations will need support for multiple standards on platforms with multi-Gb/s connectivity, parallel processing and spectrum sensing capabilities. This dissertation implemented key technologies of importance in addressing these issues namely development of cost effective multi-mode reconfigurable SDR and providing a framework to …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Opportunistic Service Differentiation And Cloud Resource Management In Support Of Enhanced Vehicular Applications, Mohammad Ali Salahuddin Jun 2014

Opportunistic Service Differentiation And Cloud Resource Management In Support Of Enhanced Vehicular Applications, Mohammad Ali Salahuddin

Dissertations

An integral part of Intelligent Transportation Systems (ITS) are Vehicular Ad hoc Networks (VANETs), which consist of vehicles with on-board units (OBUs) and fixed road-side units (RSUs). Wireless Access in Vehicular Environment (WAVE) offers QoS via service differentiation by using application defined priorities. However, WAVE has unbounded delay and is oblivious to network load and severity of vehicles with respect to their environment. Our context severity metric innovatively enhances WAVE to be sensitive to vehicle and environment interactions. Our novel Opportunistic Service Differentiation (OSD) technique, dynamically readjusts the WAVE packet priorities to improve utilization of lower latency queues, prioritizing packets …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe Dec 2013

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond May 2012

Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond

Dissertations

In this paper, I propose to demonstrate a means of error estimation preprocessing in the assembly of overlapping aerial image mosaics. The mosaic program automatically assembles several hundred aerial images from a data set by aligning them, via image registration using a pattern search method, onto a GIS grid.

The method presented first locates the images from a data set that it predicts will not align well via the mosaic process, then it uses a correlation function, optimized by a modified Hooke and Jeeves algorithm, to provide a more optimal transformation function input to the mosaic program. Using this improved …


Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr Jan 2011

Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr

Dissertations

Operational lifetime of a wireless sensor network (WSN) depends on its energy resources. Significant improvement of WSN lifetime can be achieved by adding spare sensor nodes to WSN. Spares are ready to be switched on when any primary (a node that is not a spare) exhausts its energy. A spare replacing a primary becomes a primary itself.

The LEACH-SM protocol (Low-Energy Adaptive Clustering Hierarchy with Spare Management) proposed by us is a modification of the prominent LEACH protocol. LEACH extends WSN lifetime via rotation of cluster heads but allows for inefficiencies due to redundant sensing target coverage. There are two …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …