Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 70

Full-Text Articles in Computer Engineering

Embedding Runtime Verification Post-Deployment For Real-Time Health Management Of Safety-Critical Systems, Brian Christopher Schwinkendorf Kempa Jan 2019

Embedding Runtime Verification Post-Deployment For Real-Time Health Management Of Safety-Critical Systems, Brian Christopher Schwinkendorf Kempa

Graduate Theses and Dissertations

As cyber-physical systems increase in both complexity and criticality, formal methods have gained traction for design-time verification of safety properties.

A lightweight formal method, runtime verification (RV), embeds checks necessary for safety-critical system health management; however, these techniques have been slow to appear in practice despite repeated calls by both industry and academia to leverage them.

Additionally, the state-of-the-art in RV lacks a best practice approach when a deployed system requires increased flexibility due to a change in mission, or in response to an emergent condition not accounted for at design time.

Human-robot interaction necessitates stringent safety guarantees to protect ...


On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi Nov 2018

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi

Graduate Theses and Dissertations

Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via ...


Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang Jun 2018

Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang

Graduate Theses and Dissertations

The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel ...


Optimal Resource Scheduling For Energy-Efficient Next Generation Wireless Networks, Taewoon Kim Jan 2018

Optimal Resource Scheduling For Energy-Efficient Next Generation Wireless Networks, Taewoon Kim

Graduate Theses and Dissertations

Cellular networks can provide highly available and reliable communication links to the Internet of Things (IoT) applications, letting the connected Things paradigm gain much more momentum than ever. Also, the rich information collected from the Things with sensing capabilities can guide the network operator to an unforeseen direction, allowing the underlying cellular networks to be further optimized. In this regard, the cellular networks and IoT are conceived as the key components of the beyond-4G and future 5G networks. Therefore, in this dissertation, we study each of the two components in depth, focusing on how to optimize the networking resources for ...


A Software Architecture For Cloud-Based Text Annotation: The Aflex Tag Tool Architecture (Atta), Mahmood Ramezani Jan 2018

A Software Architecture For Cloud-Based Text Annotation: The Aflex Tag Tool Architecture (Atta), Mahmood Ramezani

Graduate Theses and Dissertations

Text annotation is a valuable method of adding metadata to an existing text or document. However, there is no standard text annotation tool across disciplines, in part because of the variety of disciplinary needs. This document presents the AFLEX Tag Tool Architecture (ATTA), a modular software system to allow the development of text annotation tools across disciplines that vary in user interface according the needs of the disciplinary users, but share a common technical back end, ATTA.

This research describes the development of ATTA, along with the development of four different ATTA-based software tools related to text annotation that meet ...


Exploring Granger Causality In Dynamical Systems Modeling And Performance Monitoring, Homagni Saha Jan 2018

Exploring Granger Causality In Dynamical Systems Modeling And Performance Monitoring, Homagni Saha

Graduate Theses and Dissertations

Data-driven approaches are becoming increasingly crucial for modeling and performance

monitoring of complex dynamical systems. Such necessity stems from complex interactions

among sub-systems and high dimensionality that render majority of rst-principle based

methods insucient. This work explores the capability of a recently proposed probabilistic

graphical modeling technique called spatiotemporal pattern network (STPN) in capturing

Granger causality among observations in a dynamical system. In this context, we introduce

the notion of Granger-STPN (G-STPN) inspired by the notion of Granger causality. We

compare the metrics used in the two frameworks for increasing memory in a dynamical

system, and show that the metric ...


Host Managed Storage Solutions For Big Data, Pratik Mishra Jan 2018

Host Managed Storage Solutions For Big Data, Pratik Mishra

Graduate Theses and Dissertations

The performance gap between Compute and Storage is fairly considerable. With multi-core computing capabilities, CPUs have scaled with the proliferation of Big Data, but storage still remains the bottleneck. The physical media characteristics are mostly blamed for storage being slow, but this is partially true. The full potential of storage devices cannot be harnessed till all layers of I/O hierarchy function efficiently. Despite advanced optimizations applied across various layers along the odyssey of data access, the I/O stack still remains volatile. The problems associated due to the inefficiencies in data management get amplified in multi-tasking Big Data shared ...


Reducing Labeling Complexity In Streaming Data Mining, Yesdaulet Izenov Jan 2018

Reducing Labeling Complexity In Streaming Data Mining, Yesdaulet Izenov

Graduate Theses and Dissertations

Supervised machine learning is an approach where an algorithm estimates a mapping

function by using labeled data i.e. utilizing data attributes and target values. One of the major

obstacles in supervised learning is the labeling step. Obtaining labeled data is an expensive

procedure since it typically requires human effort. Training a model with too little data tends

to overfit therefore in order to achieve a reasonable accuracy of prediction we need a minimum

number of labeled examples. This is also true for streaming machine learning models. Maintaining

a model without rebuilding and performing a prediction task without ever storing ...


Strong-Dism: A First Attempt To A Dynamically Typed Assembly Language (D-Tal), Ivory Hernandez Nov 2017

Strong-Dism: A First Attempt To A Dynamically Typed Assembly Language (D-Tal), Ivory Hernandez

Graduate Theses and Dissertations

Dynamically Typed Assembly Language (D-TAL) is not only a lightweight and effective solution to the gap generated by the drop in security produced by the translation of high-level language instructions to low-level language instructions, but it considerably eases up the burden generated by the level of complexity required to implement typed assembly languages statically. Although there are tradeoffs between the static and dynamic approaches, focusing on a dynamic approach leads to simpler, easier to reason about, and more feasible ways to understand deployment of types over monomorphically-typed or untyped intermediate languages. On this occasion, DISM, a simple but powerful and ...


Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady May 2017

Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady

Graduate Theses and Dissertations

Microscopy image processing is an emerging and quickly growing field in medical imaging research area. Recent advancements in technology including higher computation power, larger and cheaper storage modules, and more efficient and faster data acquisition devices such as whole-slide imaging scanners contributed to the recent microscopy image processing research advancement. Most of the methods in this research area either focus on automatically process images and make it easier for pathologists to direct their focus on the important regions in the image, or they aim to automate the whole job of experts including processing and classifying images or tissues that leads ...


Computational Modeling Of Impact And Deformation, Feifei Wang Jan 2017

Computational Modeling Of Impact And Deformation, Feifei Wang

Graduate Theses and Dissertations

This thesis tackles several problems arising in robotics and mechanics: analysis and computation of two- and muti-body impacts, planning a contact velocity for robotic batting, impact of an elastic rod onto a fixed foundation, robotic pickup of soft three-dimensional objects, and recovery of their gravity-free shapes.

Impact is an event that lasts a very short period of time but generates a very large interaction force. Assuming Stronge’s energy-based restitution, a formal impulse-based analysis is presented for the collision of two rigid bodies at single contact point under Coulomb friction in three dimensions (3D). Based on this analysis, we describe ...


Simpal: A Compositional Reasoning Framework For Imperative Programs, Lucas G. Wagner Jan 2017

Simpal: A Compositional Reasoning Framework For Imperative Programs, Lucas G. Wagner

Graduate Theses and Dissertations

The Static IMPerative AnaLyzer (SIMPAL) is a tool for performing compositional reasoning over software programs that utilize preexisting software components. SIMPAL features a specification language, called Limp, for modeling programs that utilize preexisting components. Limp is an extension of the Lustre synchronous data flow language. Limp extends Lustre by introducing control flow elements, global variables, and syntax specifying preconditions, postconditions, and global variable interactions of preexisting components.

SIMPAL translates Limp programs to an equivalent Lustre representation which can be passed to the JKind model checking tool to perform assume-guarantee reasoning, reachability, and viability analyses. The feedback from these analyses can ...


Efficient Similarity Computations On Parallel Machines Using Data Shaping, Parijat Shukla Jan 2017

Efficient Similarity Computations On Parallel Machines Using Data Shaping, Parijat Shukla

Graduate Theses and Dissertations

Similarity computation is a fundamental operation in all forms of data. Big Data is, typically, characterized by attributes such as volume, velocity, variety, veracity, etc. In general, Big Data variety appears as structured, semi-structured or unstructured forms. The volume of Big Data in general, and semi-structured data in particular, is increasing at a phenomenal rate. Big Data phenomenon is posing new set of challenges to similarity computation problems occurring in semi-structured data.

Technology and processor architecture trends suggest very strongly that future processors shall have ten's of thousands of cores (hardware threads). Another crucial trend is that ratio between ...


Leveraging Bluetooth As A Second Factor In Two-Factor Authentication, Cimone Le Wright-Hamor Jan 2017

Leveraging Bluetooth As A Second Factor In Two-Factor Authentication, Cimone Le Wright-Hamor

Graduate Theses and Dissertations

Passwords have been the dominant single-factor authentication method for decades but are no longer sufficient to validate a user's identity. The simplistic nature of passwords perpetuate their existence and makes them an easy attack vector. However, Two-Factor Authentication (2FA) augments passwords and adds a layer of security. Although 2FA has the potential to increase security, traditional second factors require user interaction at every login attempt, which may contribute to slow adaptation. Traditional second factors drastically alter the user authentication experience and typically require the user to navigate away from the login screen. Therefore, we present a new second-factor method ...


Evaluation Of A Soc For Real-Time 3d Slam, Benjamin Williams Jan 2017

Evaluation Of A Soc For Real-Time 3d Slam, Benjamin Williams

Graduate Theses and Dissertations

SLAM, or Simultaneous Localization and Mapping, is the combined problem of constructing a map of an agent’s environment while localizing, or tracking that same agent’s pose in tandem. It is among the most challenging and fundamental tasks in computer vision, with applications ranging from augmented reality to robotic navigation. With the increasing capability and ubiquity of mobile computers such as cell phones, portable 3D SLAM systems are becoming feasible for widespread use. The Microsoft Hololens, Google Project Tango, and other 3D aware devices are modern day examples of the potential of SLAM and the challenges it has yet ...


Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam Jun 2016

Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam

Graduate Theses and Dissertations

This thesis presents a new security policy enforcer designed for securing parallel computation on CUDA GPUs. We show how the very features that make a GPGPU desirable have already been utilized in existing exploits, fortifying the need for security protections on a GPGPU. An aspect weaver was designed for CUDA with the goal of utilizing aspect-oriented programming for security policy enforcement. Empirical testing verified the ability of our aspect weaver to enforce various policies. Furthermore, a performance analysis was performed to demonstrate that using this policy enforcer provides no significant performance impact over manual insertion of policy code. Finally, future ...


Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal Apr 2016

Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal

Graduate Theses and Dissertations

The reversible logic has promising applications in emerging computing paradigms, such as quantum computing, quantum dot cellular automata, optical computing, etc. In reversible logic gates, there is a unique one-to-one mapping between the inputs and outputs. To generate a useful gate function, the reversible gates require some constant ancillary inputs called ancilla inputs. Also to maintain the reversibility of the circuits some additional unused outputs are required that are referred to as the garbage outputs. The number of ancilla inputs, the number of garbage outputs and quantum cost plays an important role in the evaluation of reversible circuits. Thus minimizing ...


Testing Non-Termination In Multi-Threaded Programs, Priyanka Thyagarajan Jan 2016

Testing Non-Termination In Multi-Threaded Programs, Priyanka Thyagarajan

Graduate Theses and Dissertations

We study the problem of detecting non - termination in multi - threaded programs due to unwanted race conditions. We claim that the cause of non-termination can be attributed to the presence of at least two loops in two different threads, where the valuations of the loop controlling parameters are inter-dependent, i.e., value of one parameter in one thread depends on the execution sequence in the other thread and vice versa. In this thesis, we propose a testing based technique to analyze finite execution sequences and infer the likelihood of non-termination scenarios. Our technique is a light weight, flexible testing based ...


Green Cooperative Spectrum Sensing And Scheduling In Heterogeneous Cognitive Radio Networks, Abdulkadir Celik Jan 2016

Green Cooperative Spectrum Sensing And Scheduling In Heterogeneous Cognitive Radio Networks, Abdulkadir Celik

Graduate Theses and Dissertations

The motivation behind the cognitive radio networks (CRNs) is rooted in scarcity of the radio spectrum and inefficiency of its management to meet the ever increasing high quality of service demands. Furthermore, information and communication technologies have limited and/or expensive energy resources and contribute significantly to the global carbon footprint. To alleviate these issues, energy efficient and energy harvesting (EEH) CRNs can harvest the required energy from ambient renewable sources while collecting the necessary bandwidth by discovering free spectrum for a minimized energy cost. Therefore, EEH-CRNs have potential to achieve green communications by enabling spectrum and energy self-sustaining networks ...


Device Fingerprinting Identification And Authentication: A Two-Fold Use In Multi-Factor Access Control Schemes, Paul Eugene Manning Jan 2016

Device Fingerprinting Identification And Authentication: A Two-Fold Use In Multi-Factor Access Control Schemes, Paul Eugene Manning

Graduate Theses and Dissertations

Network security has always had an issue with secure authentication and identification. In the current mixed device network of today, the number of nodes on a network has expanded but these nodes are often unmanaged from a network security perspective. The solution proposed requires a paradigm shift, a recognition of what has already happened, identity is for sale across the internet. That identity is the users’ network ID, their behavior, and even their behavior in using the networks. Secondly a majority of the devices on the Internet have been fingerprinted. Use of device fingerprinting can help secure a network if ...


Evidence-Enabled Verification For The Linux Kernel, Ahmed Yousef Tamrawi Jan 2016

Evidence-Enabled Verification For The Linux Kernel, Ahmed Yousef Tamrawi

Graduate Theses and Dissertations

Formal verification of large software has been an elusive target, riddled with problems of low accuracy and high computational complexity. With growing dependence on software in embedded and cyber-physical systems where vulnerabilities and malware can lead to disasters, an efficient and accurate verification has become a crucial need. The verification should be rigorous, computationally efficient, and automated enough to keep the human effort within reasonable limits, but it does not have to be completely automated. The automation should actually enable and simplify human cross-checking which is especially important when the stakes are high. Unfortunately, formal verification methods work mostly as ...


Massive Model Visualization: A Practical Solution, Jeremy S. Bennett Jan 2016

Massive Model Visualization: A Practical Solution, Jeremy S. Bennett

Graduate Theses and Dissertations

The ever-increasingly complex designs emanating from various companies are leading to a data explosion that is far outstripping the growth in computing processing power. The traditional large model visualization approaches used for rendering these data sets are quickly becoming insufficient, thus leading to a greater adoption of the new massive model visualization approaches designed to handle these arbitrarily sized data sets. Most new approaches utilize GPU occlusion queries that limit the data needed for loading and rendering to only those which can potentially contribute to the final image. By doing so, these approaches introduce disocclusion artifacts that often reduce the ...


Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur Oct 2015

Embedded System Design Of A Real-Time Parking Guidance System, Omkar Dokur

Graduate Theses and Dissertations

The primary objective of this work is to design a parking guidance system to reliably detect entering/exiting vehicles to a parking garage in a cost-efficient manner. Existing solutions (inductive loops, RFID based systems, and video image processors) at shopping malls, universities, airports etc., are expensive due to high installation and maintenance costs. There is a need for a parking guidance system that is reliable, accurate, and cost-effective. The proposed parking guidance system is designed to optimize the use of parking spaces and to reduce wait times. Based on a literature review we identify that the ultrasonic sensor is suitable ...


Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada Mar 2015

Dcms: A Data Analytics And Management System For Molecular Simulation, Meryem Berrada

Graduate Theses and Dissertations

Despite the fact that Molecular Simulation systems represent a major research tool in multiple scientific and engineering fields, there is still a lack of systems for effective data management and fast data retrieval and processing. This is mainly due to the nature of MS which generate a very large amount of data - a system usually encompass millions of data information, and one query usually runs for tens of thousands of time frames. For this purpose, we designed and developed a new application, DCMS (A data Analytics and Management System for molecular Simulation), that intends to speed up the process of ...


Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton Jan 2015

Reducing The Control Burden Of Legged Robotic Locomotion Through Biomimetic Consonance In Mechanical Design And Control, Caitrin Elizabeth Eaton

Graduate Theses and Dissertations

Terrestrial robots must be capable of negotiating rough terrain if they are to become autonomous outside of the lab. Although the control mechanism offered by wheels is attractive in its simplicity, any wheeled system is confined to relatively flat terrain. Wheels will also only ever be useful for rolling, while limbs observed in nature are highly multimodal. The robust locomotive utility of legs is evidenced by the many animals that walk, run, jump, swim, and climb in a world full of challenging terrain.

On the other hand, legs with multiple degrees of freedom (DoF) require much more complex control and ...


An Initial Matching And Mapping For Dense 3d Object Tracking In Augmented Reality Applications, Timothy Daniel Garrett Jan 2015

An Initial Matching And Mapping For Dense 3d Object Tracking In Augmented Reality Applications, Timothy Daniel Garrett

Graduate Theses and Dissertations

Augmented Reality (AR) applications rely on efficient and robust methods of tracking. One type of tracking uses dense 3D point data representations of the object to track. As opposed to sparse, dense tracking approaches are highly accurate and precise by considering all of the available data from a camera. A major challenge to dense tracking is that it requires a rough initial matching and mapping to begin. A matching means that from a known object, we can determine the object exists in the scene, and a mapping means that we can identify the position and orientation of an object with ...


Robot Dexterity: From Deformable Grasping To Impulsive Manipulation, Huan Lin Jan 2015

Robot Dexterity: From Deformable Grasping To Impulsive Manipulation, Huan Lin

Graduate Theses and Dissertations

Nowadays, it is fairly common for robots to manipulate different objects and perform sophisticated tasks. They lift up massive hard and soft objects, plan the motion with specific speed, and repeat complex tasks with high precision. However, without carefully control, even the most sophisticated robots would not be able to achieve a simple task.

Robot grasping of deformable objects is an under-researched area. The difficulty comes from both mechanics and computation. First, deformation caused by grasping motions changes the global geometry of the object. Second, different from rigid body grasping whose torques are invariant, the torques exerted by the grasping ...


A Cruel Angel's Thesis: A Quantitative Study Of Online Privacy Values Dependent On Social Factors, Arielle Elyse Czalbowski Jan 2015

A Cruel Angel's Thesis: A Quantitative Study Of Online Privacy Values Dependent On Social Factors, Arielle Elyse Czalbowski

Graduate Theses and Dissertations

Online privacy is an idea that is difficult to quantify, and simply asking people how they feel about their privacy often yields answers that are vague at best and do not give an overall look into how people view their own privacy or security online, much less a way to quantify it. The purpose of this study was to find a way to quantify how different societal factors may have an effect on computer and internet privacy. Five social factors were compared against seven privacy factors in order to determine if there was any correlation between them.

To meet this ...


Engaging Developers In Open Source Software Projects: Harnessing Social And Technical Data Mining To Improve Software Development, Patrick Eric Carlson Jan 2015

Engaging Developers In Open Source Software Projects: Harnessing Social And Technical Data Mining To Improve Software Development, Patrick Eric Carlson

Graduate Theses and Dissertations

As software development has evolved, an increasing amount of collaboration and management is done online. Open source software, in particular, has benefited greatly from communication and collaboration on the Internet. As software projects increase in size, the codebase complexity and required communication between developers increases. The barriers of entry for development participation are not only technical in nature but involve understanding the changing dynamics of the community.

Social Technical Congruence (STC) attempts to understand and model the synergies between technical development and communication. Motivated by this theory, three algorithms were developed that leverage data from version control history and email ...


Scene-Dependent Human Intention Recognition For An Assistive Robotic System, Kester Duncan Jan 2014

Scene-Dependent Human Intention Recognition For An Assistive Robotic System, Kester Duncan

Graduate Theses and Dissertations

In order for assistive robots to collaborate effectively with humans for completing everyday tasks, they must be endowed with the ability to effectively perceive scenes and more importantly, recognize human intentions. As a result, we present in this dissertation a novel scene-dependent human-robot collaborative system capable of recognizing and learning human intentions based on scene objects, the actions that can be performed on them, and human interaction history. The aim of this system is to reduce the amount of human interactions necessary for communicating tasks to a robot. Accordingly, the system is partitioned into scene understanding and intention recognition modules ...