Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dissertations

Theses/Dissertations

Discipline
Institution
Keyword
Publication Year

Articles 61 - 90 of 95

Full-Text Articles in Computer Engineering

Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston May 2014

Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston

Dissertations

During the elicitation process the requirements for a software application are obtained from the customer. Customers often do not know how to clearly express the requirements of the application to be built, causing requirements to be ambiguous. Many studies have been found to cover different characteristics of the requirements elicitation process including methods for reducing ambiguities in requirements. The methods and findings of these studies were found to be too general when it comes to the specific domain of the requirements and knowledge about the requirements. In addition, some studies did not take into consideration the level of expertise of …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe Dec 2013

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen Dec 2013

New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen

Dissertations

Distributed-memory systems are a key to achieve high performance computing and the most favorable architectures used in advanced research problems. Mesh connected multicomputer are one of the most popular architectures that have been implemented in many distributed-memory systems. These systems must support communication operations efficiently to achieve good performance. The wormhole switching technique has been widely used in design of distributed-memory systems in which the packet is divided into small flits. Also, the multicast communication has been widely used in distributed-memory systems which is one source node sends the same message to several destination nodes. Fault tolerance refers to the …


Novel Algorithms For Fair Bandwidth Sharing On Counter Rotating Rings, Mete Yilmaz Jan 2013

Novel Algorithms For Fair Bandwidth Sharing On Counter Rotating Rings, Mete Yilmaz

Dissertations

Rings are often preferred technology for networks as ring networks can virtually create fully connected mesh networks efficiently and they are also easy to manage. However, providing fair service to all the stations on the ring is not always easy to achieve.

In order to capitalize on the advantages of ring networks, new buffer insertion techniques, such as Spatial Reuse Protocol (SRP), were introduced in early 2000s. As a result, a new standard known as IEEE 802.17 Resilient Packet Ring was defined in 2004 by the IEEE Resilient Packet Ring (RPR) Working Group. Since then two addenda have been introduced; …


Architecture--Performance Interrelationship Analysis In Single/Multiple Cpu/Gpu Computing Systems: Application To Composite Process Flow Modeling, Richard Harrison Haney Jan 2013

Architecture--Performance Interrelationship Analysis In Single/Multiple Cpu/Gpu Computing Systems: Application To Composite Process Flow Modeling, Richard Harrison Haney

Dissertations

Current developments in computing have shown the advantage of using one or more Graphic Processing Units (GPU) to boost the performance of many computationally intensive applications but there are still limits to these GPU-enhanced systems. The major factors that contribute to the limitations of GPU(s) for High Performance Computing (HPC) can be categorized as hardware and software oriented in nature. Understanding how these factors affect performance is essential to develop efficient and robust applications codes that employ one or more GPU devices as powerful co-processors for HPC computational modeling. The present work analyzes and understands the intrinsic interrelationship of both …


A Discriminative Imaging-Based Framework For Road Sign Condition Assessment Using Local Features And Svm Classifiers, Jafar Jameel Abukhait Jun 2012

A Discriminative Imaging-Based Framework For Road Sign Condition Assessment Using Local Features And Svm Classifiers, Jafar Jameel Abukhait

Dissertations

Transportation departments are required to monitor the condition of road signs through appropriate condition assessment mechanisms to improve road safety and keep drivers properly informed. Typically, these mechanisms include visual inspection or specialized equipment such as retroreflectometers. These methods are costly, tedious, and risky since they need direct contact with road signs. Efforts to use emerging computer vision techniques for the assessment of road signs condition combined with the availability of road data inventories are allowing the automation of these processes, thus easing the inspection process, reducing costs of equipment, and decreasing the risks associated with the need for maintenance …


Vector Coprocessor Sharing Techniques For Multicores: Performance And Energy Gains, Spiridon Florin Beldianu May 2012

Vector Coprocessor Sharing Techniques For Multicores: Performance And Energy Gains, Spiridon Florin Beldianu

Dissertations

Vector Processors (VPs) created the breakthroughs needed for the emergence of computational science many years ago. All commercial computing architectures on the market today contain some form of vector or SIMD processing.

Many high-performance and embedded applications, often dealing with streams of data, cannot efficiently utilize dedicated vector processors for various reasons: limited percentage of sustained vector code due to substantial flow control; inherent small parallelism or the frequent involvement of operating system tasks; varying vector length across applications or within a single application; data dependencies within short sequences of instructions, a problem further exacerbated without loop unrolling or other …


Energy-Efficient Multi-Criteria Packet Forwarding In Multi-Hop Wireless Networks, Komlan Egoh May 2012

Energy-Efficient Multi-Criteria Packet Forwarding In Multi-Hop Wireless Networks, Komlan Egoh

Dissertations

Reliable multi-hop packet forwarding is an important requirement for the implementation of realistic large-scale wireless ad-hoc networks. However, packet forwarding methods based on a single criterion, such as the traditional greedy geographic forwarding, are not sufficient in most realistic wireless settings because perfect-reception-within-rangecannot be assumed. Furthermore, methods where the selection of intermediate relaying nodes is performed at the transmitter-side do not adapt well to rapidly changing network environments. Although a few link-aware geographic forwarding schemes have been reported in the literature, the tradeoffs between multiple decision criteria and their impact on network metrics such as throughput, delay and energy …


Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond May 2012

Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond

Dissertations

In this paper, I propose to demonstrate a means of error estimation preprocessing in the assembly of overlapping aerial image mosaics. The mosaic program automatically assembles several hundred aerial images from a data set by aligning them, via image registration using a pattern search method, onto a GIS grid.

The method presented first locates the images from a data set that it predicts will not align well via the mosaic process, then it uses a correlation function, optimized by a modified Hooke and Jeeves algorithm, to provide a more optimal transformation function input to the mosaic program. Using this improved …


Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr Jan 2011

Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr

Dissertations

Operational lifetime of a wireless sensor network (WSN) depends on its energy resources. Significant improvement of WSN lifetime can be achieved by adding spare sensor nodes to WSN. Spares are ready to be switched on when any primary (a node that is not a spare) exhausts its energy. A spare replacing a primary becomes a primary itself.

The LEACH-SM protocol (Low-Energy Adaptive Clustering Hierarchy with Spare Management) proposed by us is a modification of the prominent LEACH protocol. LEACH extends WSN lifetime via rotation of cluster heads but allows for inefficiencies due to redundant sensing target coverage. There are two …


Cross-Layer Design For Mobile Ad-Hoc Unmanned Aerial Vehicle Communication Networks, Abdel Ilah Nour Alshbatat Jan 2011

Cross-Layer Design For Mobile Ad-Hoc Unmanned Aerial Vehicle Communication Networks, Abdel Ilah Nour Alshbatat

Dissertations

Mobile Ad-Hoc network (MANET) is a popular type of wireless network that is formed by a collection of mobile nodes. Each node in such a network has the capability to communicate with its neighbors and non-neighbors through a wireless medium without using any existing network infrastructure. Due to the lack of infrastructure, all nodes in Ad-Hoc network are designed to act as an end system and a router for other nodes.

Traditionally, the dominant design methodology for network protocols was based on the open systems interconnection (OSI) reference model. This methodology divided the stack into seven layers in which each …


Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang Dec 2010

Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang

Dissertations

The intriguing study of feature extraction, and edge detection in particular, has, as a result of the increased use of imagery, drawn even more attention not just from the field of computer science but also from a variety of scientific fields. However, various challenges surrounding the formulation of feature extraction operator, particularly of edges, which is capable of satisfying the necessary properties of low probability of error (i.e., failure of marking true edges), accuracy, and consistent response to a single edge, continue to persist. Moreover, it should be pointed out that most of the work in the area of feature …


Pattern Recognition For Fault Detection, Classification, And Localization In Electrical Power Systems, Qais Hashim Alsafasfeh Aug 2010

Pattern Recognition For Fault Detection, Classification, And Localization In Electrical Power Systems, Qais Hashim Alsafasfeh

Dissertations

The longer it takes to identify and repair a fault, the more damage may result in the electrical power system, especially in periods of peak loads, which could lead to the collapse of the system, causing the power outage to extend for a longer period and larger parts of the electrical network. Reducing the outage time and immediate restoration of service can be achieved if the fault type and location are determined in a timely and precise manner.

An integrated algorithm that is based on generating unique signatures from the electric current signal to detect, classify, and localize a fault …


Hardware Support For Real-Time Network Security And Packet Classification Using Field Programmable Gate Arrays, Nitesh Bhicu Guinde May 2010

Hardware Support For Real-Time Network Security And Packet Classification Using Field Programmable Gate Arrays, Nitesh Bhicu Guinde

Dissertations

Deep packet inspection and packet classification are the most computationally expensive operations in a Network Intrusion Detection (NID) system. Deep packet inspection involves content matching where the payload of the incoming packets is matched against a set of signatures in the database. Packet classification involves inspection of the packet header fields and is basically a multi-dimensional matching problem. Any matching in software is very slow in comparison to current network speeds. Also, both of these problems need a solution which is scalable and can work at high speeds. Due to the high complexity of these matching problems, only Field-Programmable Gate …


Design Of Adaptive Collective Foraging In Swarm Robotic Systems, Hanyi Dai May 2010

Design Of Adaptive Collective Foraging In Swarm Robotic Systems, Hanyi Dai

Dissertations

Inspired by the collective behavior observed in biological colonies, swarm robotics is a new approach to design a distributed control algorithm in order to coordinate a group of simple robots performing a complex group task. With only limited computation and communication ability of individual robots, one of the challenges in designing such multi-robotic systems is to understand the effect of individual robots behavior on the group performance. This thesis dedicates the research to designing a set of local interaction and adaptation rule for individual robots so that optimized collective foraging performance can be achieved at group level.

The research starts …


Soft-Error Resilient On-Chip Memory Structures, Shuai Wang Jan 2010

Soft-Error Resilient On-Chip Memory Structures, Shuai Wang

Dissertations

Soft errors induced by energetic particle strikes in on-chip memory structures, such as L1 data/instruction caches and register files, have become an increasing challenge in designing new generation reliable microprocessors. Due to their transient/random nature, soft errors cannot be captured by traditional verification and testing process due to the irrelevancy to the correctness of the logic. This dissertation is thus focusing on the reliability characterization and cost-effective reliable design of on-chip memories against soft errors.

Due to various performance, area/size, and energy constraints in various target systems, many existing unoptimized protection schemes on cache memories may eventually prove significantly inadequate …


Entropy And Certainty In Lossless Data Compression, James Jay Jacobs Dec 2009

Entropy And Certainty In Lossless Data Compression, James Jay Jacobs

Dissertations

Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in information that was proposed by Claude Shannon. Lossless data compression is uniquely tied to entropy theory as the data and the system have a static definition. The static nature of the two requires a mechanism to reduce the entropy without the ability to alter either …


Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li Aug 2009

Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li

Dissertations

The innovations and improvements in high-throughput genomic technologies, such as DNA microarray, make it possible for biologists to simultaneously measure dependencies and regulations among genes on a genome-wide scale and provide us genetic information. An important objective of the functional genomics is to understand the controlling mechanism of the expression of these genes and encode the knowledge into gene regulatory network (GRN). To achieve this, computational and statistical algorithms are especially needed.

Inference of GRN is a very challenging task for computational biologists because the degree of freedom of the parameters is redundant. Various computational approaches have been proposed for …


Communications And Positioning In Wireless Networks, Yao Zhao Jun 2009

Communications And Positioning In Wireless Networks, Yao Zhao

Dissertations

My doctoral research for the past three years is presented in this report. My research mainly focuses on the communications and positioning for wireless networks and is composed of three parts. First, I explored a new Turbo frequency equalization technique for multiple-input multiple-output (MIMO) wireless communications systems to improve the performance of wireless communications. In the second part of my research, I studied the multiple antenna cooperative communications from the perspective of information theories. The third part of my work is dedicated to extensive research on positioning technology for wireless networks using knowledge of the estimation theory in signal processing.


On Modeling And Mitigating New Breed Of Dos Attacks, Amey Bhaskar Shevtekar May 2009

On Modeling And Mitigating New Breed Of Dos Attacks, Amey Bhaskar Shevtekar

Dissertations

Denial of Service (DoS) attacks pose serious threats to the Internet, exerting in tremendous impact on our daily lives that are heavily dependent on the good health of the Internet. This dissertation aims to achieve two objectives:1) to model new possibilities of the low rate DoS attacks; 2) to develop effective mitigation mechanisms to counter the threat from low rate DoS attacks.

A new stealthy DDoS attack model referred to as the "quiet" attack is proposed in this dissertation. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control …


Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang Jan 2007

Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang

Dissertations

The Doppler spread, or equivalently, the mobile speed, is a measure of the spectral dispersion of a mobile fading channel. Accurate estimation of the mobile speed is important in wireless mobile applications which require such as knowledge of the rate of channel variations. In this dissertation, first the performance of classical crossing- and covariance-based speed estimators is studied. Next, the problem of mobile speed estimation using diversity combining is investigated. Then, a nonparametric estimation technique is proposed that is robust to different channel variations. Finally, cyclostationarity-based speed estimators which can be applied either blindly or with the aid of pilot …


On Mitigating Distributed Denial Of Service Attacks, Zhiqiang Gao Aug 2006

On Mitigating Distributed Denial Of Service Attacks, Zhiqiang Gao

Dissertations

Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the wellbeing of the Internet. How to mitigate these attacks effectively and efficiently has become an active research area. The critical issues here include 1) IP spoofing, i.e., forged source lIP addresses are routinely employed to conceal the identities of the attack sources and deter the efforts of detection, defense, and tracing; 2) the distributed nature, that is, hundreds or thousands of compromised …


Design And Stability Analysis Of High Performance Packet Switches, Zhen Guo Jan 2006

Design And Stability Analysis Of High Performance Packet Switches, Zhen Guo

Dissertations

With the rapid development of optical interconnection technology, high-performance packet switches are required to resolve contentions in a fast manner to satisfy the demand for high throughput and high speed rates. Combined input-crosspoint buffered (CICB) switches are an alternative to input-buffered (IB) packet switches to provide high-performance switching and to relax arbitration timing for packet switches with high-speed ports.

A maximum weight matching (MWM) scheme can provide 100% throughput under admissible traffic for lB switches. However, the high complexity of MWM prohibits its implementation in high-speed switches. In this dissertation, a feedback-based arbitration scheme for CICB switches is studied, where …


Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo Jan 2006

Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo

Dissertations

The emerging wireless technologies has made ubiquitous wireless access a reality and enabled wireless systems to support a large variety of applications. Since the wireless self-configuring networks do not require infrastructure and promise greater flexibility and better coverage, wireless ad hoc and sensor networks have been under intensive research. It is believed that wireless ad hoc and sensor networks can become as important as the Internet. Just as the Internet allows access to digital information anywhere, ad hoc and sensor networks will provide remote interaction with the physical world.

Dynamics of the object distribution is one of the most important …


Multilevel Adaptive Security System, Hongwei Li Jan 2006

Multilevel Adaptive Security System, Hongwei Li

Dissertations

Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ad hoc secure routing protocols and multilevel security are first reviewed. Then a new system, called the Multilevel Adaptive Security System, which incorporates the multilevel security concept at both the application layer and the network layer, is proposed to provide adaptive security services for data and routing processes.

MLASS …


Design And Resource Management Of Reconfigurable Multiprocessors For Data-Parallel Applications, Xiaofang Wang Jan 2006

Design And Resource Management Of Reconfigurable Multiprocessors For Data-Parallel Applications, Xiaofang Wang

Dissertations

FPGA (Field-Programmable Gate Array)-based custom reconfigurable computing machines have established themselves as low-cost and low-risk alternatives to ASIC (Application-Specific Integrated Circuit) implementations and general-purpose microprocessors in accelerating a wide range of computation-intensive applications. Most often they are Application Specific Programmable Circuiits (ASPCs), which are developer programmable instead of user programmable. The major disadvantages of ASPCs are minimal programmability, and significant time and energy overheads caused by required hardware reconfiguration when the problem size outnumbers the available reconfigurable resources; these problems are expected to become more serious with increases in the FPGA chip size. On the other hand, dominant high-performance computing …


Hfo2 As Gate Dielectric On Si And Ge Substrate, Reenu Garg Jan 2006

Hfo2 As Gate Dielectric On Si And Ge Substrate, Reenu Garg

Dissertations

Hafnium oxide HfO2 has been considered as an alternative to silicon dioxide SiO2 in future nano-scale complementary metal-oxide-semiconductor (CMOS) devices since it provides the required capacitance at the reduced device size because of its high dielectric constant. HfO2 films are currently deposited by various techniques. Many of them require high temperature annealing that can impact device performance and reliability.

In this research, electrical characteristics of capacitors with HfO2 as gate dielectric deposited by standard thermal evaporation and e-beam evaporation on Si and Ge substrates were investigated. The dielectric constant of HfO2 deposited by thermal evaporation …


Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan May 2005

Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan

Dissertations

Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering new insights and hidden attack scenarios. Security Information Management (SIM) is a new growing area of interest for intrusion detection. The research work in this dissertation explores the semantics of attack behaviors and designs Frame-based Attack Representation and First-order logic Automatic Reasoning (FAR-FAR) using linguistics and First-order Logic (FOL) based approaches. Techniques based on …


Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu May 2005

Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu

Dissertations

The transmission control protocol (TCP) exhibits poor performance when used in error-prone wireless networks. Remedy to this problem has been an active research area. However, a widely accepted and adopted solution is yet to emerge. Difficulties of an acceptable solution lie in the areas of compatibility, scalability, computational complexity and the involvement of intermediate routers and switches.

This dissertation rexriews the current start-of-the-art solutions to TCP performance enhancement, and pursues an end-to-end solution framework to the problem. The most noticeable cause of the performance degradation of TCP in wireless networks is the higher packet loss rate as compared to that …


A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin May 2005

A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin

Dissertations

This dissertation studies the development of application programs for parallel and distributed computer systems, especially PC clusters. A methodology is proposed to increase the efficiency of code development, the productivity of programmers and enhance performance of executing the developed programs on PC clusters while facilitating improvement of scalability and code portability of these programs. A new programming model, named the Super-Programming Model (SPM), is created. Programs are developed assuming an instruction set architecture comprised of SuperInstructions (SIs). SPM models the target system as a large Virtual Machine (VM); VM contains functional units which are underlain with sub-computer systems and SIs …