Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat Dec 2016

Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat

Open Access Theses

Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.

This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal Apr 2016

User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal

Open Access Theses

Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …


A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq Apr 2016

A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq

Open Access Theses

Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …


Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami Apr 2015

Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami

Open Access Theses

Lane-change maneuver is one of the most thoroughly investigated automatic driving operations that can be used by an autonomous self-driving vehicle as a primitive for performing more complex operations like merging, entering/exiting highways or overtaking another vehicle. This thesis focuses on two coherent problems that are associated with the trajectory generation for lane-change maneuvers of autonomous vehicles in a highway scenario: (i) an effective velocity estimation of neighboring vehicles under different road scenarios involving linear and curvilinear motion of the vehicles, and (ii) trajectory generation based on the estimated velocities of neighboring vehicles for safe operation of self-driving cars during …


Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang Apr 2015

Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang

Open Access Theses

While there has been much work done on analyzing and transforming regular programs that operate over linear arrays and dense matrices, comparatively little has been done to try to carry these optimizations over to programs that operate over heap-based data structures using pointers. Previous work has shown that point blocking, a technique similar to loop tiling in regular programs, can help increase the temporal locality of repeated tree traversals. Point blocking, however, has only been shown to work on tree traversals where each traversal is fully independent and would allow parallelization, greatly limiting the types of applications that this transformation …


Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony Oct 2014

Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony

Open Access Theses

Trajectory optimization is a field which can benefit greatly from the advantages offered by parallel computing. The current state-of-the-art in trajectory optimization focuses on the use of direct optimization methods, such as the pseudo-spectral method. These methods are favored due to their ease of implementation and large convergence regions while indirect methods have largely been ignored in the literature in the past decade except for specific applications in astrodynamics. It has been shown that the shortcomings conventionally associated with indirect methods can be overcome by the use of a continuation method in which complex trajectory solutions are obtained by solving …


Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton Oct 2014

Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton

Open Access Theses

Open source software plays an important part in the modern world, powering businesses large and small. However, little work has been done to evaluate the quality of open source software. Two different license paradigms exist within the open source world, and this study examines the difference in software quality between them. In this thesis, the author uses technical debt as a measure of software quality. Eighty open source projects (40 from each paradigm) were downloaded from the popular open source hosting website SourceForge. Using complexity, code duplication, comments, and unit test coverage as inputs to the SonarQube technical debt model, …


Wi-Fi Real Time Location Systems, Benjamin A. Doll Oct 2014

Wi-Fi Real Time Location Systems, Benjamin A. Doll

Open Access Theses

This thesis objective was to determine the viability of utilizing an untrained Wi-Fi real time location system as a GPS alternative for indoor environments. Background research showed that GPS is rarely able to penetrate buildings to provide reliable location data. The benefit of having location information in a facility and how they might be used for disaster or emergency relief personnel and their resources motivated this research. A building was selected with a well-deployed Wi-Fi infrastructure and its untrained location feature was used to determine the distance between the specified test points and the system identified location. It was found …


Paxos Based Directory Updates For Geo-Replicated Cloud Storage, Srivathsava Rangarajan Jul 2014

Paxos Based Directory Updates For Geo-Replicated Cloud Storage, Srivathsava Rangarajan

Open Access Theses

Modern cloud data stores (e.g., Spanner, Cassandra) replicate data across geographically distributed data centers for availability, redundancy and optimized latencies.^ An important class of cloud data stores involves the use of directories to track the location of individual data objects. Directory-based datastores allow flexible data placement, and the ability to adapt placement in response to changing workload dynamics. However, a key challenge is maintaining and updating the directory state when replica placement changes.^ In this thesis, we present the design and implementation of a system to address the problem of correctly updating these directories. Our system is built around JPaxos, …


Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe Apr 2014

Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe

Open Access Theses

Due to their human-like structure, humanoid robots are capable of doing some complex tasks. Since a humanoid robot has a large number of actuators and sensors, controlling it is a difficult task. For various tasks like balancing, driving a car, and interacting with humans, real-time response of the robot is essential. Efficiently controlling a humanoid robot requires a software that guarantees real-time interface and control mechanism so that real-time response of the robot is possible. Addition- ally, to reduce the development effort and time, the software should be open-source, multi-lingual and should have high-level constructs inbuilt in it.

Currently Robot …


Analysis Of Eye Tracking Data Obtained By Customers’ Product Evaluations, Shweta Sanjay Sareen Apr 2014

Analysis Of Eye Tracking Data Obtained By Customers’ Product Evaluations, Shweta Sanjay Sareen

Open Access Theses

Within the mechanical engineering discipline, product representational studies have been used to inform engineers on the suitability of their product designs for prospective customers. Mainly based in customers' oral responses, engineers would modify the product design accordingly. The incorporation of eye tracking data, in addition to the oral responses, in these product representational studies is a recent addition. This case study performs data analysis of a product representational study conducted by Reid, MacDonald and Du (2012), which considers the impact of 2D and 3D product representation on customer judgments with associated eye gaze patterns. The aim of this thesis is …


Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran Apr 2014

Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran

Open Access Theses

In high performance computing systems, parallel applications request a large number of resources for long time periods. In this scenario, if a resource fails during the application runtime, it would cause all applications using this resource to fail. The probability of application failure is tied to the inherent reliability of resources used by the application. Our investigation of high performance computing systems operating in the field has revealed a significant difference in the measured operational reliability of individual computing nodes. By adding awareness of the individual system nodes' reliability to the scheduler along with the predicted reliability needs of parallel …


Interactive Multivariate Data Exploration For Risk-Based Decision Making, Silvia Oliveros Torres Jan 2013

Interactive Multivariate Data Exploration For Risk-Based Decision Making, Silvia Oliveros Torres

Open Access Theses

Risk-based decision making is a data-driven process used to gather data about outcomes, analyze different scenarios, and deliver informed decisions to mitigate risk.

An interactive visual analytics system can help derive insights from large amounts of data and facilitate the risk management process thereby providing a suitable solution to examine different decision factors. This work introduces two separate systems that

incorporate visual analytics techniques to help the users in the tasks of identifying patterns, finding correlations, designing mitigation strategies, and assisting in the long term planning and assessment process. The first system looks at the National Health

and Nutrition Examination …