Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 85 of 85

Full-Text Articles in Computer Engineering

High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep Mar 2010

High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep

Theses and Dissertations

Integrated circuits (ICs) are inherently complicated and made worse by increasing transistor quantity and density. This trend potentially enhances concomitant effects of high energy radiation and local or impressed electromagnetic interference (EMI). The reduced margin for signal error may counter any gain in radiation hardness from smaller device dimensions. Isolated EMI and ionizing radiation studies on circuits have been conducted extensively over the past 30 years. However, little focus has been placed on the combined effects. To investigate the effect of combined EMI and ionizing radiation, two complementary metal oxide semiconductor (CMOS) inverter technologies (CD4069 and SN74AUC1G04) were analyzed for …


Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung Mar 2010

Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung

Theses and Dissertations

In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence …


Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr. Mar 2010

Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.

Theses and Dissertations

Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …


Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski Mar 2010

Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski

Theses and Dissertations

This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents …


A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez Dec 2009

A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez

Theses and Dissertations

For this research we created a human skin reflectance model in the VIS and NIR. We then modeled sensor output for an RGB sensor based on output from the skin reflectance model. The model was also used to create a skin detection algorithm and a skin pigmentation level (skin reflectance at 685nm) estimation algorithm. The average root mean square error across the VIS and NIR between the skin reflectance model and measured data was 2%. The skin reflectance model then allowed us to generate qualitatively accurate responses for an RGB sensor for different biological and lighting conditions. To test the …


Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith Sep 2009

Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith

Theses and Dissertations

When a camera is affixed on a dynamic mobile robot, image stabilization is the first step towards more complex analysis on the video feed. This thesis presents a novel electronic image stabilization (EIS) algorithm for small inexpensive highly dynamic mobile robotic platforms with onboard camera systems. The algorithm combines optical flow motion parameter estimation with angular rate data provided by a strapdown inertial measurement unit (IMU). A discrete Kalman filter in feedforward configuration is used for optimal fusion of the two data sources. Performance evaluations are conducted by a simulated video truth model (capturing the effects of image translation, rotation, …


Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese Mar 2009

Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese

Theses and Dissertations

This research effort examines, models, and proposes options to enhance command and control for decision makers when applied to the communications network. My goal is to research the viability of combining three students’ past research efforts and expanding and enhancing those efforts. The area of this research is predicting a snapshot of the communications network, context-aware routing between network nodes, and Quality of Service-based routing optimization in order to create an intelligent routing protocol platform. It will consolidate efforts from an Intelligent Agent Based Framework to Maximize Information Utility by Captain John Pecarina, Dialable Cryptography for Wireless Networks by Major …


Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck Mar 2009

Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck

Theses and Dissertations

This thesis investigates how to incorporate aspects of an Air Tasking Order (ATO), a Communications Tasking Order (CTO), and a Network Tasking Order (NTO) within a cognitive network framework. This was done in an effort to aid the commander and or network operator by providing automation for battlespace management to improve response time and potential inconsistent problem resolution. In particular, autonomous weapon systems such as unmanned aerial vehicles (UAVs) were the focus of this research This work implemented a simple cognitive process by incorporating aspects of behavior based robotic control principles to solve the multi-objective optimization problem of balancing both …


Unified Behavior Framework In An Embedded Robot Controller, Stephen S. Lin Mar 2009

Unified Behavior Framework In An Embedded Robot Controller, Stephen S. Lin

Theses and Dissertations

Robots of varying autonomy have been used to take the place of humans in dangerous tasks. While robots are considered more expendable than human beings, they are complex to develop and expensive to replace if lost. Recent technological advances produce small, inexpensive hardware platforms that are powerful enough to match robots from just a few years ago. There are many types of autonomous control architecture that can be used to control these hardware platforms. One in particular, the Unified Behavior Framework, is a flexible, responsive control architecture that is designed to simplify the control system’s design process through behavior module …


The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen Mar 2009

The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen

Theses and Dissertations

Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This thesis advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. These requirements are likely to be derived from the Air Tasking Order (ATO), which gives insight into the plan for physical assets in a military mission. In this research we illustrate the benefit …


Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos Mar 2009

Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos

Theses and Dissertations

This thesis investigates the performance of the Optimized Link State Routing (OLSR) protocol on Voice over Internet Protocol (VoIP) applications in Mobile Ad hoc Networks (MANETs). Using VoIP over MANETs takes advantage of the mobility and versatility of a MANET environment and the flexibility and interoperability a digital voice format affords. Research shows that VoIP-like traffic can be routed through an ad hoc network using the Ad hoc On-demand Distance Vector routing protocol. This research determines the suitability of OLSR as a routing protocol for MANETs running VoIP applications. Representative VoIP traffic is submitted to a MANET and end-to-end delay …


Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim Mar 2009

Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim

Theses and Dissertations

Captain Nathan C. Stuckey implemented the idea of the stochastic estimation and control for network in OPNET simulator. He used extended Kalman filter to estimate packet size and packet arrival rate of network queue to regulate queue size. To validate stochastic theory, network estimator and controller is designed by OPNET model. These models validated the transient queue behavior in OPNET and work of Kalman filter by predicting the queue size and arrival rate. However, it was not enough to verify a theory by experiment. So, it needed to validate the stochastic control theory with other tools to get high validity. …


Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class Mar 2009

Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class

Theses and Dissertations

This thesis investigates the application of a Exponential Weighted Moving Average (EWMA) to be used as a memory buffer in conjunction with Special Protection Schemes (SPS) using the Electric Power and Communication Synchronizing Simulator (EPOCHS). It is proposed that using an SPS incorporating EWMA can compensate for the network layer lack of guarantee of packet delivery and provide for the stability and integrity of the power grid under a catastrophic event. The performance of the proposed SPS is evaluated using a discrete event computer simulation developed using the NS2 network simulator and the Power System Simulator for Engineering (PSS/E) power …


The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh Mar 2009

The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh

Theses and Dissertations

This thesis investigates the impact of using three different rekeying protocols–pair-wise, hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the three rekeying protocols on the number of bits transmitted across the network and the amount of battery power consumed in WSN nodes during rekey operations is investigated. Baseline pair-wise rekeying performance can be improved by using either Secure Lock or hierarchical rekeying. The best choice depends on the size of the WSN and the size of the key used. Hierarchical rekeying is the best choice for …


Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez Feb 2009

Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez

Theses and Dissertations

Adaptive optics applies advanced sensing and control to improve the ability of optical systems to collect images through a turbulent atmosphere. The results of this research effort demonstrate that the combination of two recent approaches improves the performance of adaptive optics in directed energy and laser communication scenarios. The first approach is adaptive control, which offers improved performance over fixed-gain controllers in the presence of rapidly changing turbulence. The second approach incorporated into the study is a dual-mirror system. The two mirrors are a high-bandwidth, low-actuator-stroke (tweeter) mirror and a low-bandwidth, large actuator-stroke (woofer) mirror. The woofer-tweeter combination allows for …


Subjective Audio Quality Over A Secure Ieee 802.11n Draft 2.0 Wireless Local Area Network, Benjamin W. Ramsey Feb 2009

Subjective Audio Quality Over A Secure Ieee 802.11n Draft 2.0 Wireless Local Area Network, Benjamin W. Ramsey

Theses and Dissertations

This thesis investigates the quality of audio generated by a G.711 codec and transmission over an IEEE 802.11n draft 2.0 wireless local area network (WLAN). Decline in audio quality due to additional calls or by securing the WLAN with transport mode Internet Protocol Security (IPsec) is quantified. Audio quality over an IEEE 802.11n draft 2.0 WLAN is also compared to that of IEEE 802.11b and IEEE 802.11g WLANs under the same conditions. Audio quality is evaluated by following International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Recommendation P.800, where human subjects rate audio clips recorded during various WLAN configurations. The Mean …


Characterization And Design Of High-Level Vhdl I/Q Frequency Downconverter Via Special Sampling Scheme, Jesse P. Somann Mar 2006

Characterization And Design Of High-Level Vhdl I/Q Frequency Downconverter Via Special Sampling Scheme, Jesse P. Somann

Theses and Dissertations

This study explores the characterization and implementation of a Special Sampling Scheme (SSS) for In-Phase and Quad-Phase (I/Q) down conversion utilizing top-level, portable design strategies. The SSS is an under-developed signal sampling methodology that can be used with military and industry receiver systems, specifically, United States Air Force (USAF) video receiver systems. The SSS processes a digital input signal-stream sampled at a specified sampling frequency, and down converts it into In-Phase (I) and Quad-Phase (Q) output signal-streams. Using the theory and application of the SSS, there are three main objectives that will be accomplished: characterization of the effects of input, …


Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen Mar 2006

Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen

Theses and Dissertations

Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are limited by the resources available to the sensor nodes that make up the WSN. The most significant resource is energy. A WSN may be deployed to an inhospitable or unreachable area, leaving it with a non-replenishable power source. This research examines a way of reducing energy consumption by augmenting the nodes with radio frequency identification (RFID) tags that contain routing information. It was expected that RFID tags would reduce the network throughput, the ad hoc on-demand distance vector (AODV) routing traffic sent, and …


An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr. Mar 2004

An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr.

Theses and Dissertations

Military communications require the rapid deployment of mobile, high-bandwidth systems. These systems must provide anytime, anywhere capabilities with minimal interference to existing military, private, and commercial communications. Ultra Wideband (UWB) technology is being advanced as the next generation radio technology and has the potential to revolutionize indoor wireless communications. The ability of UWB to mitigate multipath fading, provide high-throughput data rates (e.g., greater than 100 Mbps), provide excellent signal penetration (e.g., through walls), and low implementation costs makes it an ideal technology for a wide range of private and public sector applications. Preliminary UWB studies conducted by The Institute for …


Wavelet Domain Communication System (Wdcs): Packet-Based Wavelet Spectral Estimation And M-Ary Signaling, Marion Jay F. Lee Mar 2002

Wavelet Domain Communication System (Wdcs): Packet-Based Wavelet Spectral Estimation And M-Ary Signaling, Marion Jay F. Lee

Theses and Dissertations

A recently proposed Wavelet Domain Communication System (WDCS) using transform domain processing demonstrated excellent interference avoidance capability under adverse environmental conditions. This work extends previous results by: 1) incorporating a wavelet packet decomposition technique, 2) demonstrating M-Ary signaling capability, and 3) providing increased adaptivity over a larger class of interference signals. The newly proposed packet-based WDCS is modeled and its performance characterized using MATLAB®. In addition, the WDCS response to two scenarios simulating Doppler effects and physical separation of transceivers are obtained. The fundamental metric for analysis and performance evaluation is bit error rate (Pb). Relative to …


Performance Analysis Of Tcp Enhancements In Satellite Data Networks, Ren H. Broyles Mar 1999

Performance Analysis Of Tcp Enhancements In Satellite Data Networks, Ren H. Broyles

Theses and Dissertations

This research examines two proposed enhancements to the well-known Transport Control Protocol (TCP) in the presence of noisy communication links. The Multiple Pipes protocol is an application-level adaptation of the standard TCP protocol, where several TCP links cooperate to transfer data. The Space Communication Protocol Standard - Transport Protocol (SCPS-TP) modifies TCP to optimize performance in a satellite environment. While SCPS-TP has inherent advantages that allow it to deliver data more rapidly than Multiple Pipes, the protocol, when optimized for operation in a high-error environment, is not compatible with legacy TCP systems, and requires changes to the TCP specification. This …


A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart Dec 1997

A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart

Theses and Dissertations

The traditional approach to parallel processing has been to use Massively Parallel Processors (MPPs). An alternative design is commercial-off-the-shelf (COTS) workstations connected to high-speed networks. These networks of workstations (NOWs) typically have faster processors, heterogeneous environments, and most importantly, offer a lower per node cost. This thesis compares the performance of MPPs and NOWs for the two-dimensional fast Fourier transform (2-D FFT). Three original, high-performance, portable 2-D FFTs have been implemented: the vector-radix, row-column and pipeline. The performance of these algorithms was measured on the Intel Paragon, IBM SP2 and the AFIT NOW, which consists of 6 Sun Ultra workstations …


Accelerating Conservative Parallel Simulation Of Vhdl Circuits, Joel F. Hurford Dec 1994

Accelerating Conservative Parallel Simulation Of Vhdl Circuits, Joel F. Hurford

Theses and Dissertations

This research effort considers heuristic and cost model based techniques for the optimal partitioning of VHDL circuits for parallel simulation. Correlation statistics are gathered on a wide variety of graph-based a priori parameters. Linear regression is used to identify significant parameters for inclusion in a representative cost model. Driving a greedy search, this cost model is used to improve upon initial heuristic partitions. The influence of feedback dominated previous research so a no-feedback algorithm is used to create the initial partition The circuits studied range from 1,050 to 4,243 gates.


Partitioning Structural Vhdl Circuits For Parallel Execution On Hypercubes, Kevin L. Kapp Dec 1993

Partitioning Structural Vhdl Circuits For Parallel Execution On Hypercubes, Kevin L. Kapp

Theses and Dissertations

Distributing simulations among multiple processors is one approach to reducing VHDL simulation time for large VLSI circuit designs. However, parallel simulation introduces the problem of how to partition the logic gates and system behaviors among the available processors in order to obtain maximum speedup. This research investigates deliberate partitioning algorithms that account for the complex inter-dependency structure of the circuit behaviors. Once an initial partition has been obtained, a border annealing algorithm is used to iteratively improve the partition. In addition, methods of measuring the cost of a partition and relating it to the resulting simulation performance are investigated. Structural …


Design And Development Of A High-Speed Winograd Fast Fourier Transform Processor Board, James F. Herron Dec 1992

Design And Development Of A High-Speed Winograd Fast Fourier Transform Processor Board, James F. Herron

Theses and Dissertations

Since 1985, the Air Force Institute of Technology has pursued a project to develop a 4080-point Discrete Fourier Transform processor using the Winograd Fourier Transform Algorithm (WFTA) and Good-Thomas Prime Factoring Algorithm (PFA). In the first attempt to build a working system, this research effort designed and constructed, in part, a modified single processor architecture in order to demonstrate the proof of concept of the WFTA system design. This prototype architecture is simpler in implementation but uses the same principles and procedures as those of the 4080-point WFTA design. The design developed in this thesis was validated using the Very …