Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu Jan 2019

Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu

Wayne State University Dissertations

Cloud computing is becoming a fundamental facility of society today. Large-scale public or private cloud datacenters spreading millions of servers, as a warehouse-scale computer, are supporting most business of Fortune-500 companies and serving billions of users around the world. Unfortunately, modern industry-wide average datacenter utilization is as low as 6% to 12%. Low utilization not only negatively impacts operational and capital components of cost efficiency, but also becomes the scaling bottleneck due to the limits of electricity delivered by nearby utility. It is critical and challenge to improve multi-resource efficiency for global datacenters.

Additionally, with the great commercial success of …


Video Stream Adaptation In Computer Vision Systems, Yousef Sharrab Sharrab Jan 2017

Video Stream Adaptation In Computer Vision Systems, Yousef Sharrab Sharrab

Wayne State University Dissertations

Computer Vision (CV) has been deployed recently in a wide range of applications, including surveillance and automotive industries. According to a recent report, the market for CV technologies will grow to $33.3 billion by 2019. Surveillance and automotive industries share over 20% of this market. This dissertation considers the design of real-time CV systems with live video streaming, especially those over wireless and mobile networks. Such systems include video cameras/sensors and monitoring stations. The cameras should adapt their captured videos based on the events and/or available resources and time requirement. The monitoring station receives video streams from all cameras and …


Integrative Pathway Analysis Pipeline For Mirna And Mrna Data, Diana Mabel Diaz Herrera Jan 2017

Integrative Pathway Analysis Pipeline For Mirna And Mrna Data, Diana Mabel Diaz Herrera

Wayne State University Theses

The identification of pathways that are involved in a particular phenotype helps us understand the underlying biological processes. Traditional pathway analysis techniques aim to infer the impact on individual pathways using only mRNA levels. However, recent studies showed that gene expression alone is unable to capture the whole picture of biological phenomena. At the same time, MicroRNAs (miRNAs) are newly discovered gene regulators that have shown to play an important role in diagnosis, and prognosis for different types of diseases. Current pathway analysis techniques do not take miRNAs into consideration. In this project, we investigate the effect of integrating miRNA …


Evaluation Of An Architectural-Level Approach For Finding Security Vulnerabilities, Mohammad Anamul Haque Jan 2015

Evaluation Of An Architectural-Level Approach For Finding Security Vulnerabilities, Mohammad Anamul Haque

Wayne State University Theses

The cost of security vulnerabilities of a software system is high. As a result,

many techniques have been developed to find the vulnerabilities at development time. Of particular interest are static analysis techniques that can consider all possible executions of a system. But, static analysis can suffer from a large number of false positives.

A recently developed approach, Scoria, is a semi-automated static analysis that requires security architects to annotate the code, typecheck the annotations, extract a hierarchical object graph and write constraints in order to find security vulnerabilities in a system.

This thesis evaluates Scoria on three systems (sizes …


Building Computing-As-A-Service Mobile Cloud System, Kun Wang Jan 2015

Building Computing-As-A-Service Mobile Cloud System, Kun Wang

Wayne State University Dissertations

The last five years have witnessed the proliferation of smart mobile devices, the explosion of various mobile applications and the rapid adoption of cloud computing in business, governmental and educational IT deployment. There is also a growing trends of combining mobile computing and cloud computing as a new popular computing paradigm nowadays. This thesis envisions the future of mobile computing which is primarily affected by following three trends: First, servers in cloud equipped with high speed multi-core technology have been the main stream today. Meanwhile, ARM processor powered servers is growingly became popular recently and the virtualization on ARM systems …


Building A Scalable And High-Performance Key-Value Store System, Yuehai Xu Jan 2014

Building A Scalable And High-Performance Key-Value Store System, Yuehai Xu

Wayne State University Dissertations

Contemporary web sites can store and process very large amounts of data. To provide timely service to their users, they have adopted key-value (KV) stores, which is a simple but effective caching infrastructure atop the conventional databases that store these data, to boost performance. Examples are Facebook, Twitter and Amazon. As yet little is known about the realistic workloads outside of the companies that operate them, this dissertation work provides a detailed workload study on Facebook's Memcached, which is one of the world's largest KV deployment. We analyze the Memcached workload from the perspective of server-side performance, request composition, caching …


Mission Aware Energy Saving Strategies For Army Ground Vehicles, Macam Dattathreya Jan 2013

Mission Aware Energy Saving Strategies For Army Ground Vehicles, Macam Dattathreya

Wayne State University Dissertations

Fuel energy is a basic necessity for this planet and the modern technology to perform many activities on earth. On the other hand, quadrupled automotive vehicle usage by the commercial industry and military has increased fuel consumption. Military readiness of Army ground vehicles is very important for a country to protect its people and resources. Fuel energy is a major requirement for Army ground vehicles. According to a report, a department of defense has spent nearly $13.6 billion on fuel and electricity to conduct ground missions. On the contrary, energy availability on this plant is slowly decreasing. Therefore, saving energy …


Learning With An Insufficient Supply Of Data Via Knowledge Transfer And Sharing, Samir Al-Stouhi Jan 2013

Learning With An Insufficient Supply Of Data Via Knowledge Transfer And Sharing, Samir Al-Stouhi

Wayne State University Dissertations

As machine learning methods extend to more complex and diverse set of problems, situations arise where the complexity and availability of data presents a situation where the information source is not "adequate" to generate a representative hypothesis. Learning from multiple sources of data is a promising research direction as researchers leverage ever more diverse sources of information. Since data is not readily available, knowledge has to be transferred from other sources and new methods (both supervised and un-supervised) have to be developed to selectively share and transfer knowledge. In this dissertation, we present both supervised and un-supervised techniques to tackle …


Rethinking The Design And Implementation Of The I/O Software Stack For High-Performance Computing, Xuechen Zhang Jan 2012

Rethinking The Design And Implementation Of The I/O Software Stack For High-Performance Computing, Xuechen Zhang

Wayne State University Dissertations

Current I/O stack for high-performance computing is composed of multiple software layers in order to hide users from complexity of I/O performance optimization. However, the design and implementation of a specific layer is usually carried out separately with limited consideration of its impact on other layers, which could result in suboptimal I/O performance because data access locality is weakened, if not lost, on hard disk, a widely used storage medium in high-end storage systems.

In this dissertation, we experimentally demonstrated such issues in four different layers, including operating system process management layer and MPI-IO middleware layer on compute server side, …


Querying And Managing Opm-Compliant Scientific Workflow Provenance, Chunhyeok Lim Jan 2012

Querying And Managing Opm-Compliant Scientific Workflow Provenance, Chunhyeok Lim

Wayne State University Dissertations

Provenance, the metadata that records the derivation history of scientific results, is important in scientific workflows to interpret, validate, and analyze the result of scientific computing. Recently,

to promote and facilitate interoperability among heterogeneous provenance systems, the Open Provenance Model (OPM) has been proposed and has played an important role in the community.

In this dissertation, to efficiently query and manage OPM-compliant provenance, we first propose a provenance collection framework that collects both prospective provenance, which captures

an abstract workflow specification as a recipe for future data derivation and retrospective provenance, which captures past workflow execution and data derivation information. …


Techniques For Sensor-Integrated Robotic Systems: Raman Spectra Analysis, Image Guidance, And Kinematic Calibration, Luke Anthony Reisner Jan 2012

Techniques For Sensor-Integrated Robotic Systems: Raman Spectra Analysis, Image Guidance, And Kinematic Calibration, Luke Anthony Reisner

Wayne State University Dissertations

Robotics and sensor technology have made impressive advancements over the years. There are now robotic systems that help perform surgeries or explore the surface of Mars, and there are sensors that detect trace amounts of explosives or identify diseased human tissue. The most powerful systems integrate robots and sensors, which are natural complements to each other. Sensors can provide information that might otherwise be unavailable due to indirect robotic manipulation (e.g., images of the target environment), and robots can provide suitably precise positioning of an analytical sensor.

To have an effective sensor-integrated robotic system, multiple capabilities are needed in the …


Efficient Channel Allocation And Medium Access Organization Algorithms For Vehicular Networking, Zaydoun Yahya Rawashdeh Jan 2011

Efficient Channel Allocation And Medium Access Organization Algorithms For Vehicular Networking, Zaydoun Yahya Rawashdeh

Wayne State University Dissertations

Due to the limited bandwidth available for Vehicular Ad-hoc Networks (VANETs), organizing the wireless channel access to efficiently use the bandwidth is one of the main challenges in VANET. In this dissertation, we focus on channel allocation and media access organization for Vehicle-to-Roadside Units (V2R) and Vehicle-to-Vehicle (V2V) communications. An efficient channel allocation algorithm for Roadside Unit (RSU) access is proposed. The goal of the algorithm is to increase system throughput by admitting more tasks (vehicles) and at the same time reduce the risk of the admitted tasks. The algorithm admits the new requests only when their requirements can be …


Unified Role Assignment Framework For Wireless Sensor Networks, Manish Mahendra Kumar Kochhal Jan 2010

Unified Role Assignment Framework For Wireless Sensor Networks, Manish Mahendra Kumar Kochhal

Wayne State University Dissertations

Wireless sensor networks are made possible by the continuing improvements in embedded sensor, VLSI, and wireless radio technologies. Currently, one of the important challenges in sensor networks is the design of a systematic network management framework that allows localized and collaborative resource control uniformly across all application services such as sensing, monitoring, tracking, data aggregation, and routing.

The research in wireless sensor networks is currently oriented toward a cross-layer network abstraction that supports appropriate fine or course grained resource controls for energy efficiency. In that regard, we have designed a unified role-based service paradigm for wireless sensor networks. We pursue …


Augmented Reality Navigation Interfaces Improve Human Performance In End-Effector Controlled Telerobotics, Keshav Chintamani Jan 2010

Augmented Reality Navigation Interfaces Improve Human Performance In End-Effector Controlled Telerobotics, Keshav Chintamani

Wayne State University Dissertations

On the International Space Station (ISS) and space shuttles, the National Aeronautics and Space Administration (NASA) has used robotic manipulators extensively to perform payload handling and maintenance tasks. Teleoperating robots require expert skills and optimal performance is crucial to mission completion and crew safety. Degradation in performance is observed when manual control is mediated through remote camera views, resulting in poor end-effector navigation quality and extended task completion times. This thesis explores the application of three-dimensional augmented reality (AR) interfaces specifically designed to improve human performance during end-effector controlled teleoperations. A modular telerobotic test bed was developed for this purpose …


Task Analysis, Modeling, And Automatic Identification Of Elemental Tasks In Robot-Assisted Laparoscopic Surgery, Lavie Pinchas Golenberg Jan 2010

Task Analysis, Modeling, And Automatic Identification Of Elemental Tasks In Robot-Assisted Laparoscopic Surgery, Lavie Pinchas Golenberg

Wayne State University Dissertations

Robotic microsurgery provides many advantages for surgical operations, including tremor filtration, an increase in dexterity, and smaller incisions. There is a growing need for a task analyses on robotic laparoscopic operations to understand better the tasks involved in robotic microsurgery cases. A few research groups have conducted task observations to help systems automatically identify surgeon skill based on task execution. Their gesture analyses, however, lacked depth and their class libraries were composed of ambiguous groupings of gestures that did not share contextual similarities.

A Hierarchical Task Analysis was performed on a four-throw suturing task using a robotic microsurgical platform. Three …


Filter Scheduling Function Model In Internet Server: Resource Configuration, Performance Evaluation And Optimal Scheduling, Minghua Xu Jan 2010

Filter Scheduling Function Model In Internet Server: Resource Configuration, Performance Evaluation And Optimal Scheduling, Minghua Xu

Wayne State University Dissertations

ABSTRACT

FILTER SCHEDULING FUNCTION MODEL IN INTERNET SERVER:

RESOURCE CONFIGURATION, PERFORMANCE EVALUATION AND

OPTIMAL SCHEDULING

by

MINGHUA XU

August 2010

Advisor: Dr. Cheng-Zhong Xu

Major: Computer Engineering

Degree: Doctor of Philosophy

Internet traffic often exhibits a structure with rich high-order statistical properties like selfsimilarity

and long-range dependency (LRD). This greatly complicates the problem of

server performance modeling and optimization. On the other hand, popularity of Internet

has created numerous client-server or peer-to-peer applications, with most of them,

such as online payment, purchasing, trading, searching, publishing and media streaming,

being timing sensitive and/or financially critical. The scheduling policy in Internet servers …