Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Audio Signal Processing (1)
- Blind Source Separation (1)
- Cloud (1)
- Computer Vision (1)
- Convolutional Source Separation (1)
-
- Distributed systems (1)
- Dynamic Environments (1)
- Edge computing (1)
- Filter Technique (1)
- Image Processing (1)
- Image Sensor (1)
- Independent Component Analysis (1)
- Information Theory (1)
- Machine Vision (1)
- Natural Language Processing (1)
- Network Policy (1)
- Network Security (1)
- PCB Design (1)
- Path-Planning (1)
- Policy Enforcement (1)
- Policy Quality (1)
- Policy Violation (1)
- Robotics (1)
- Security Exceptions (1)
- Signal Processing (1)
- Smart city (1)
- Software-Defined Network (1)
- Software-Defined Networking (1)
- Spatial Augmented Reality (1)
- Structured Light Illumination (1)
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan
Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan
Theses and Dissertations--Mechanical Engineering
This thesis presents a new parallelized real-time path planning process. This process is an extension of the Real-Time Rapidly Exploring Random Trees* (RT-RRT*) algorithm developed by Naderi et al in 2015 [1]. The RT-RRT* algorithm was demonstrated on a simulated two-dimensional dynamic environment while finding paths to a varying target state. We demonstrate that the original algorithm is incapable of running at a sufficient rate for control of a 7-degree-of-freedom (7-DoF) robotic arm while maintaining a path planning tree in 7 dimensions. This limitation is due to the complexity of maintaining a tree in a high-dimensional space and the network …
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Theses and Dissertations--Computer Science
Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Theses and Dissertations--Computer Science
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …
Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner
Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner
Theses and Dissertations--Electrical and Computer Engineering
Structured Light Imaging (SLI) is a means of digital reconstruction, or Three-Dimensional (3D) scanning, and has uses that span many disciplines. A projector, camera and Personal Computer (PC) are required to perform such 3D scans. Slight variances in synchronization between these three devices can cause malfunctions in the process due to the limitations of PC graphics processors as real-time systems. Previous work used a Field Programmable Gate Array (FPGA) to both drive the projector and trigger the camera, eliminating these timing issues, but still needing an external camera. This thesis proposes the incorporation of the camera with the FPGA SLI …
Contributions To Edge Computing, Vernon K. Bumgardner
Contributions To Edge Computing, Vernon K. Bumgardner
Theses and Dissertations--Computer Science
Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.
Edge Computing is the migration of computational functionality to sources of data generation. The importance of …
Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang
Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang
Theses and Dissertations--Electrical and Computer Engineering
Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high …
Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao
Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao
Theses and Dissertations--Electrical and Computer Engineering
In immersive audio environments with distributed microphones, Independent Component Analysis (ICA) can be applied to uncover signals from a mixture of other signals and noise, such as in a cocktail party recording. ICA algorithms have been developed for instantaneous source mixtures and convolutional source mixtures. While ICA for instantaneous mixtures works when no delays exist between the signals in each mixture, distributed microphone recordings typically result various delays of the signals over the recorded channels. The convolutive ICA algorithm should account for delays; however, it requires many parameters to be set and often has stability issues. This thesis introduces the …