Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair Jan 2018

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair

UNF Graduate Theses and Dissertations

Powerful, handheld computing devices have proliferated among consumers in recent years. Combined with new cameras and sensors capable of detecting objects in three-dimensional space, new gesture-based paradigms of human computer interaction are becoming available. One possible application of these developments is an automated sign language recognition system. This thesis reviews the existing body of work regarding computer recognition of sign language gestures as well as the design of systems for speech recognition, a similar problem. Little work has been done to apply the well-known architectural patterns of speech recognition systems to the domain of sign language recognition. This work creates …


Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais Jan 2018

Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais

UNF Graduate Theses and Dissertations

Network security is an ongoing major problem in today’s Internet world. Even though there have been simulation studies related to denial of service and cache attacks, studies of attacks on real networks are still lacking in the research. In this thesis, the effects of cache attacks in real information-centric networking systems were investigated. Cache attacks were implemented in real networks with different cache sizes and with Least Recently Used, Random and First In First Out algorithms to fill the caches in each node. The attacker hits the cache with unpopular content, making the user request that the results be fetched …


Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri Jan 2018

Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri

UNF Graduate Theses and Dissertations

Energy consumption by various modern symmetric key encryption protocols (DES,

3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work

is directed towards redesigning or modifying the underlying algorithms for these

protocols to make them consume less energy than they currently do. This research

takes the approach of reducing energy consumption by parallelizing the

consecutive memory accesses of symmetric key encryption algorithms. To achieve

parallelization, an existing energy complexity model is applied to symmetric key

encryption algorithms. Inspired by the popular DDR3 architecture, the model assumes

that main memory is divided into multiple banks, each of which can …