Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Engineering

Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang Dec 2010

Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang

Dissertations

The intriguing study of feature extraction, and edge detection in particular, has, as a result of the increased use of imagery, drawn even more attention not just from the field of computer science but also from a variety of scientific fields. However, various challenges surrounding the formulation of feature extraction operator, particularly of edges, which is capable of satisfying the necessary properties of low probability of error (i.e., failure of marking true edges), accuracy, and consistent response to a single edge, continue to persist. Moreover, it should be pointed out that most of the work in the area of feature …


A Similarity Matrix For Irish Traditional Dance Music, Padraic Lavin Nov 2010

A Similarity Matrix For Irish Traditional Dance Music, Padraic Lavin

Dissertations

It is estimated that there are between seven and ten thousand Irish traditional dance tunes in existence. As Irish musicians travelled the world they carried their repertoire in their memories and rarely recorded these pieces in writing. When the music was passed down from generation to generation by ear the names of these pieces of music and the melodies themselves were forgotten or changed over time. This has led to problems for musicians and archivists when identifying the names of traditional Irish tunes.

Almost all of this music is now available in ABC notation from online collections. An ABC file …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


Pattern Recognition For Fault Detection, Classification, And Localization In Electrical Power Systems, Qais Hashim Alsafasfeh Aug 2010

Pattern Recognition For Fault Detection, Classification, And Localization In Electrical Power Systems, Qais Hashim Alsafasfeh

Dissertations

The longer it takes to identify and repair a fault, the more damage may result in the electrical power system, especially in periods of peak loads, which could lead to the collapse of the system, causing the power outage to extend for a longer period and larger parts of the electrical network. Reducing the outage time and immediate restoration of service can be achieved if the fault type and location are determined in a timely and precise manner.

An integrated algorithm that is based on generating unique signatures from the electric current signal to detect, classify, and localize a fault …


Cloud Computing For Schools, Shane O'Doherty Jul 2010

Cloud Computing For Schools, Shane O'Doherty

Dissertations

This project evaluates previous Information and Communication Technology policy and practice relating to primary schools in Ireland with a view to suggesting a better way forward in light of advances in ICT, such as the availability of fast broadband services, including fibre broadband, browser-based applications and the advent of cloud computing. Cloud computing refers to the Internet as a source of both software programs and also data retention, in effect the Internet provides the software and data services via browsers to users who may remain entirely unaware of the technology at work, uncluttered by hardware or software licensing issues or …


Suitable Knowledge Management In Project Environment, Taya Polyaninova Jun 2010

Suitable Knowledge Management In Project Environment, Taya Polyaninova

Dissertations

Knowledge is becoming one of the main assets for organizations that want to improve their competitiveness in currently changing market. Knowledge comes from different sources within organizations, such as internal processes, projects, customers and stakeholder information. As markets and the way of doing things changes, many companies implement different projects to deal with those changes, which leads to accumulation of knowledge and information. Companies use Knowledge Management to create, identify and distribute knowledge and experiences arising from projects within organisation. However, as projects are done to create unique deliverables and they are never the same, there is a difficulty in …


Hardware Support For Real-Time Network Security And Packet Classification Using Field Programmable Gate Arrays, Nitesh Bhicu Guinde May 2010

Hardware Support For Real-Time Network Security And Packet Classification Using Field Programmable Gate Arrays, Nitesh Bhicu Guinde

Dissertations

Deep packet inspection and packet classification are the most computationally expensive operations in a Network Intrusion Detection (NID) system. Deep packet inspection involves content matching where the payload of the incoming packets is matched against a set of signatures in the database. Packet classification involves inspection of the packet header fields and is basically a multi-dimensional matching problem. Any matching in software is very slow in comparison to current network speeds. Also, both of these problems need a solution which is scalable and can work at high speeds. Due to the high complexity of these matching problems, only Field-Programmable Gate …


Design Of Adaptive Collective Foraging In Swarm Robotic Systems, Hanyi Dai May 2010

Design Of Adaptive Collective Foraging In Swarm Robotic Systems, Hanyi Dai

Dissertations

Inspired by the collective behavior observed in biological colonies, swarm robotics is a new approach to design a distributed control algorithm in order to coordinate a group of simple robots performing a complex group task. With only limited computation and communication ability of individual robots, one of the challenges in designing such multi-robotic systems is to understand the effect of individual robots behavior on the group performance. This thesis dedicates the research to designing a set of local interaction and adaptation rule for individual robots so that optimized collective foraging performance can be achieved at group level.

The research starts …


Soft-Error Resilient On-Chip Memory Structures, Shuai Wang Jan 2010

Soft-Error Resilient On-Chip Memory Structures, Shuai Wang

Dissertations

Soft errors induced by energetic particle strikes in on-chip memory structures, such as L1 data/instruction caches and register files, have become an increasing challenge in designing new generation reliable microprocessors. Due to their transient/random nature, soft errors cannot be captured by traditional verification and testing process due to the irrelevancy to the correctness of the logic. This dissertation is thus focusing on the reliability characterization and cost-effective reliable design of on-chip memories against soft errors.

Due to various performance, area/size, and energy constraints in various target systems, many existing unoptimized protection schemes on cache memories may eventually prove significantly inadequate …


Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond Jan 2010

Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond

Dissertations

Researchers must collect and analyse new data that will enhance the body of knowledge. It is for this reason that data is of major importance to researchers. All aspects of a research project involve data, from navigating existing data, to understanding how data is used in the world and why it is important to learn to collect data and make predictions. Researchers need to consider the types of data that are possible and examine and weight each option so they can determine what sources of data will answer the research questions or hypotheses.

Researchers, who require a large amount of …