Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2013

Institution
Keyword
Publication

Articles 1 - 30 of 64

Full-Text Articles in Computer Engineering

Disaster Data Management In Cloud Environments, Katarina Grolinger Dec 2013

Disaster Data Management In Cloud Environments, Katarina Grolinger

Electronic Thesis and Dissertation Repository

Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.

In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering …


On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar Dec 2013

On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar

Electronic Thesis and Dissertation Repository

This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms. …


Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg Dec 2013

Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg

Honors Theses

No abstract provided.


Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava Dec 2013

Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most of digital image applications demand on high image quality. Unfortunately, images often are degraded by noise during the formation, transmission, and recording processes. Hence, image denoising is an essential processing step preceding visual and automated analyses. Image denoising methods can reduce image contrast, create block or ring artifacts in the process of denoising. In this dissertation, we develop high performance non-linear diffusion based image denoising methods, capable to preserve edges and maintain high visual quality. This is attained by different approaches: First, a nonlinear diffusion is presented with robust M-estimators as diffusivity functions. Secondly, the knowledge of textons derived …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe Dec 2013

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi Dec 2013

Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi

Graduate Theses and Dissertations

Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.

The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …


Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury Nov 2013

Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury

Electronic Thesis and Dissertation Repository

The amount of data that we use in everyday life (social media, stock analysis, satellite communication etc.) are increasing day by day. As a result, the amount of data needs to be traverse through electronic media as well as to store are rapidly growing and there exist several environmental effects that can damage these important data during travelling or while in storage devices. To recover correct information from noisy data, we do use error correcting codes. The most challenging work in this area is to have a decoding algorithm that can decode the code quite fast, in addition with the …


A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi Nov 2013

A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi

Master's Theses and Doctoral Dissertations

Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …


Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu Oct 2013

Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu

Open Access Dissertations

Humans not only outperform AI and computer-vision systems, but use an unknown computational mechanism to perform tasks for which no suitable approaches exist. I present work investigating both novel tasks and how humans approach them in the context of computer vision and linguistics. I demonstrate a system which, like children, acquires high-level linguistic knowledge about the world. Robots learn to play physically-instantiated board games and use that knowledge to engage in physical play. To further integrate language and vision I develop an approach which produces rich sentential descriptions of events depicted in videos. I then show how to simultaneously detect …


Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin Oct 2013

Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin

Open Access Dissertations

Energy efficiency dominates practically every aspect of the design of wireless camera networks (WCNs), and duty cycling of radios and cameras is an important tool for achieving high energy efficiencies. However, duty cycling in WCNs is made complex by the camera nodes having to anticipate the arrival of the objects in their field-of-view. What adds to this complexity is the fact that radio duty cycling and camera duty cycling are tightly coupled notions in WCNs.

Abstract In this dissertation, we present a predictive framework to provide camera nodes with an ability to anticipate the arrival of an object in the …


Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios Oct 2013

Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios

Dental Hygiene Theses & Dissertations

Purpose: The purpose of this study was to determine the effectiveness of immersive visualization (IV) therapy, a technique that provides visual and stereoscopic display through the use of eyewear, in anxious patients during an oral prophylaxis. Methods: A convenience sample of thirty adults was enrolled. A split mouth design was utilized. Subjects were randomly divided into two groups: group A (use of IV for the right side of the mouth), and group B (use of IV for the left side of the mouth). Subjects received a full mouth oral prophylaxis (removal of supra and subgingival calculus and selective polishing), always …


Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua Sep 2013

Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua

Dissertations and Theses

Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum Sep 2013

Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum

Open Access Dissertations

Robots exhibit flexible behavior largely in proportion to their degree of semantic knowledge about the world. Such knowledge is often meticulously hand-coded for a narrow class of tasks, limiting the scope of possible robot competencies. Thus, the primary limiting factor of robot capabilities is often not the physical attributes of the robot, but the limited time and skill of expert programmers. One way to deal with the vast number of situations and environments that robots face outside the laboratory is to provide users with simple methods for programming robots that do not require the skill of an expert.

For this …


Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan Sep 2013

Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan

Open Access Dissertations

Modern web applications are marked by distinct networking and computing characteristics. As applications evolve, they continue to operate over a large monolithic framework of networking and computing equipment built from general-purpose microprocessors and Application Specific Integrated Circuits (ASICs) that offers few architectural choices. This dissertation presents techniques to diversify the next-generation Internet infrastructure by integrating Field-programmable Gate Arrays (FPGAs), a class of reconfigurable integrated circuits, with general-purpose microprocessor-based techniques. Specifically, our solutions are demonstrated in the context of two applications - network virtualization and distributed cluster computing.

Network virtualization enables the physical network infrastructure to be shared among several …


Reliability Models Applied To Smartphone Applications, Sonia Meskini Aug 2013

Reliability Models Applied To Smartphone Applications, Sonia Meskini

Electronic Thesis and Dissertation Repository

Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose Aug 2013

Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose

Doctoral Dissertations

Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …


Human Action Recognition Via Fused Kinematic Structure And Surface Representation, Salah R. Althloothi Aug 2013

Human Action Recognition Via Fused Kinematic Structure And Surface Representation, Salah R. Althloothi

Electronic Theses and Dissertations

Human action recognition from visual data has remained a challenging problem in the field of computer vision and pattern recognition. This dissertation introduces a new methodology for human action recognition using motion features extracted from kinematic structure, and shape features extracted from surface representation of human body. Motion features are used to provide sufficient information about human movement, whereas shape features are used to describe the structure of silhouette. These features are fused at the kernel level using Multikernel Learning (MKL) technique to enhance the overall performance of human action recognition. In fact, there are advantages in using multiple types …


Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise Aug 2013

Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise

Masters Theses

An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.


Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp Aug 2013

Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp

Theses

Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide …


Http Mailbox - Asynchronous Restful Communication, Sawood Alam Jul 2013

Http Mailbox - Asynchronous Restful Communication, Sawood Alam

Computer Science Theses & Dissertations

Traditionally, general web services used only the GET and POST methods of HTTP while several other HTTP methods like PUT, PATCH, and DELETE were rarely utilized. Additionally, the Web was mainly navigated by humans using web browsers and clicking on hyperlinks or submitting HTML forms. Clicking on a link is always a GET request while HTML forms only allow GET and POST methods. Recently, several web frameworks/libraries have started supporting RESTful web services through APIs. To support HTTP methods other than GET and POST in browsers, these frameworks have used hidden HTML form fields as a workaround to convey the …


A Multi-Configuration Display Methodology Incorporating Reflection For Real-Time Haptic-Interactive Virtual Environments, Mohammad F. Obeid Jul 2013

A Multi-Configuration Display Methodology Incorporating Reflection For Real-Time Haptic-Interactive Virtual Environments, Mohammad F. Obeid

Computational Modeling & Simulation Engineering Theses & Dissertations

There is a natural need for real-time min-or reflection in many interactive virtual reality applications to achieve visuo-haptic collocation through optical reflection. Its use, however, calls for adjustments to the original model since a mirror reverses image characteristics. This thesis introduces a design and implementation of a generic configuration component for virtual environments that adjusts image characteristics and haptic interfaces to accommodate various display setups while preserving the correct orientation and properties of the original models in the graphical scene. Four different but related approaches were developed for image connection and are compared and contrasted against primary criteria. The haptic …


Applied Hypergame Theory For Network Defense, Alan S. Gibson Jun 2013

Applied Hypergame Theory For Network Defense, Alan S. Gibson

Theses and Dissertations

Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …


Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao Jun 2013

Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao

Dissertations and Theses

The rapidly increasing complexities of hardware designs are forcing design methodologies and tools to move to the Electronic System Level (ESL), a higher abstraction level with better productivity than the state-of-the-art Register Transfer Level (RTL). Behavioral synthesis, which automatically synthesizes ESL behavioral specifications to RTL implementations, plays a central role in this transition. However, since behavioral synthesis is a complex and error-prone translation process, the lack of designers' confidence in its correctness becomes a major barrier to its wide adoption. Therefore, techniques for establishing equivalence between an ESL specification and its synthesized RTL implementation are critical to bring behavioral synthesis …


Channels: Easy Video Content Consumption, Alexander R. Ledwith Jun 2013

Channels: Easy Video Content Consumption, Alexander R. Ledwith

Computer Engineering

The idea for this project is to take a user’s digital movie and television show library, and organize the individual videos into lists that will continuously and concurrently play like cable TV channels. This means that when a list of channels is switched to, video content will automatically start playing, possibly in the middle, based on a schedule. It should serve the needs of the user by allowing the user to quickly watch any of their existing channels, easily add a new channel based on chosen criteria or manual selection, and easily add new video content. In addition, the product …


Inform 7 Usability Precompiler, Chad Robert Brantley, Timothy Phan Jun 2013

Inform 7 Usability Precompiler, Chad Robert Brantley, Timothy Phan

Computer Engineering

Inform 7 Usability Precompiler or I7UP is a project which helps Inform 7 authors with their stories by diversifying the possibilities in the author’s interactive fiction. I7UP reads and analyzes the Inform story that is passed in through python and natural language processing then provides the user with a selection of choices to add to his story and lastly automatically generates the corresponding Inform 7 code. By utilizing the combination of Python, Django, and HTML/CSS, I7UP is able to provide an easytouse interface which helps generate additional "Understand" statements and "Conjugated Verb" statements. I7UP is an authoring aid for Inform …


Protocases, Christopher M. Polis Jun 2013

Protocases, Christopher M. Polis

Computer Engineering

Design and implementation of a 3D printing web application.


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …


Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton May 2013

Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton

Masters Theses

The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …