Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Modeling And Analysis Of Subcellular Protein Localization In Hyper-Dimensional Fluorescent Microscopy Images Using Deep Learning Methods, Yang Jiao May 2022

Modeling And Analysis Of Subcellular Protein Localization In Hyper-Dimensional Fluorescent Microscopy Images Using Deep Learning Methods, Yang Jiao

UNLV Theses, Dissertations, Professional Papers, and Capstones

Hyper-dimensional images are informative and become increasingly common in biomedical research. However, the machine learning methods of studying and processing the hyper-dimensional images are underdeveloped. Most of the methods only model the mapping functions between input and output by focusing on the spatial relationship, whereas neglect the temporal and causal relationships. In many cases, the spatial, temporal, and causal relationships are correlated and become a relationship complex. Therefore, only modeling the spatial relationship may result in inaccurate mapping function modeling and lead to undesired output. Despite the importance, there are multiple challenges on modeling the relationship complex, including the model …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


An End To End V.M.T Framework With Controlled V.M.T Tax Rate Using Optimal Feedback Control Technique, Pratik Verma Aug 2013

An End To End V.M.T Framework With Controlled V.M.T Tax Rate Using Optimal Feedback Control Technique, Pratik Verma

UNLV Theses, Dissertations, Professional Papers, and Capstones

Vehicle Mile Travel (VMT) is a study related to available alternatives for the road

revenue collection system. As per the demand, the existing Gas/Fuel tax based revenue

collection system is not found an appropriate option in the longer run. Due

to existing system constraints like: no eective tax process for vehicles based on alternative

fuel (e.g. electric vehicles), no eective changes in tax due to economical

ination, and more highway expenditure than generated revenue, an alternative revenue

collection mechanism is required. Hence, the objective is to study an alternative

option in detail, which can address the gaps between required revenue …


Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova May 2013

Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova

UNLV Theses, Dissertations, Professional Papers, and Capstones

This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …


Study Of Stemming Algorithms, Savitha Kodimala Dec 2010

Study Of Stemming Algorithms, Savitha Kodimala

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.


In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.


On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava Jan 2009

On-Board Three-Dimensional Object Tracking: Software And Hardware Solutions, Ajay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

We describe a real time system for recognition and tracking 3D objects such as UAVs, airplanes, fighters with the optical sensor. Given a 2D image, the system has to perform background subtraction, recognize relative rotation, scale and translation of the object to sustain a prescribed topology of the fleet. In the thesis a comparative study of different algorithms and performance evaluation is carried out based on time and accuracy constraints. For background subtraction task we evaluate frame differencing, approximate median filter, mixture of Gaussians and propose classification based on neural network methods. For object detection we analyze the performance of …