Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan Jan 2023

Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan

Theses and Dissertations--Mechanical Engineering

This thesis presents a new parallelized real-time path planning process. This process is an extension of the Real-Time Rapidly Exploring Random Trees* (RT-RRT*) algorithm developed by Naderi et al in 2015 [1]. The RT-RRT* algorithm was demonstrated on a simulated two-dimensional dynamic environment while finding paths to a varying target state. We demonstrate that the original algorithm is incapable of running at a sufficient rate for control of a 7-degree-of-freedom (7-DoF) robotic arm while maintaining a path planning tree in 7 dimensions. This limitation is due to the complexity of maintaining a tree in a high-dimensional space and the network …


Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi Jan 2022

Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi

Theses and Dissertations--Computer Science

Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …


Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco Jan 2019

Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco

Theses and Dissertations--Computer Science

Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …


Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner Jan 2018

Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner

Theses and Dissertations--Electrical and Computer Engineering

Structured Light Imaging (SLI) is a means of digital reconstruction, or Three-Dimensional (3D) scanning, and has uses that span many disciplines. A projector, camera and Personal Computer (PC) are required to perform such 3D scans. Slight variances in synchronization between these three devices can cause malfunctions in the process due to the limitations of PC graphics processors as real-time systems. Previous work used a Field Programmable Gate Array (FPGA) to both drive the projector and trigger the camera, eliminating these timing issues, but still needing an external camera. This thesis proposes the incorporation of the camera with the FPGA SLI …


Contributions To Edge Computing, Vernon K. Bumgardner Jan 2017

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of …


Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang Jan 2015

Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang

Theses and Dissertations--Electrical and Computer Engineering

Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high …


Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao Jan 2013

Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao

Theses and Dissertations--Electrical and Computer Engineering

In immersive audio environments with distributed microphones, Independent Component Analysis (ICA) can be applied to uncover signals from a mixture of other signals and noise, such as in a cocktail party recording. ICA algorithms have been developed for instantaneous source mixtures and convolutional source mixtures. While ICA for instantaneous mixtures works when no delays exist between the signals in each mixture, distributed microphone recordings typically result various delays of the signals over the recorded channels. The convolutive ICA algorithm should account for delays; however, it requires many parameters to be set and often has stability issues. This thesis introduces the …