Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2011

Discipline
Institution
Keyword
Publication
Publication Type

Articles 871 - 888 of 888

Full-Text Articles in Computer Engineering

A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding Jan 2011

A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding

USF Tampa Graduate Theses and Dissertations

A dynamic hierarchical web-based portal was created to house a suite of web-based supply chain management applications. The portal was designed in a hierarchical manner to match the structure of large companies. Administrators of the the portal have the ability to form the portal in such a way to mimic the existing structure of their company. Access rights to the applications in the portal may be granted or denied per division and the users of the portal are placed in these divisions based on their duty in the company. In addition, users are granted roles which dictate their ability to …


Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal Jan 2011

Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal

USF Tampa Graduate Theses and Dissertations

Reversible circuits are similar to conventional logic circuits except that they are built from reversible gates. In reversible gates, there is a unique, one-to-one mapping between the inputs and outputs, not the case with conventional logic. Also, reversible gates require constant ancilla inputs for reconfiguration of gate functions and garbage outputs that help in keeping reversibility. Reversible circuits hold promise in futuristic computing technologies like quantum computing, quantum dot cellular automata, DNA computing, optical computing, etc. Thus, it is important to minimize parameters such as ancilla and garbage bits, quantum cost and delay in the design of reversible circuits.

The …


Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko Jan 2011

Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko

USF Tampa Graduate Theses and Dissertations

Testing gait rehabilitation devices on humans can be a difficult task, due to the effects of the neurological controls of the human body. This thesis advances the use of a passive dynamic walker (PDW) tuned to have asymmetric gait patterns similar to those with physical impairments to test rehabilitation devices. A passive dynamic walker is a multipendulum system that has a stable gait pattern when walking down a slope without any energy inputs except the forces due to gravity. A PDW model is better suited for testing rehabilitation devices because it has been shown to resemble human gait and separates …


Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger Jan 2011

Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger

USF Tampa Graduate Theses and Dissertations

With the rise autonomous and robotic systems in field applications, the need for dexterous, highly adaptable end effectors has become a major research topic. Control mechanisms of robotics hands with a high number independent actuators is recognized as a complex, high dimensional problem, with exponentially complex algorithms. However, recent studies have shown that human hand motion possesses very high joint correlation which translates into a set of predefined postures, or synergies. The hand produces a motion using a complementing contribution of multiple joints, called synergies. The similarities place variables onto a common dimensional space, effectively reducing the number of independent …


Design Of Multi Agent Based Crowd Injury Model, Emin Kugu Jan 2011

Design Of Multi Agent Based Crowd Injury Model, Emin Kugu

Electrical & Computer Engineering Theses & Dissertations

A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary.

In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules …


Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi Jan 2011

Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi

Electrical & Computer Engineering Theses & Dissertations

The explosion of high-data-rate-demanding wireless applications such as smart-phones and wireless Internet access devices, together with growth of existing wireless services, are creating a shortage of the scarce Radio Frequency (RF) spectrum. However, several spectrum measurement campaigns revealed that current spectrum usage across time and frequency is inefficient, creating the artificial shortage of the spectrum because of the traditional exclusive "command-and-control" model of using the spectrum. Therefore, a new concept of Cognitive Radio (CR) has been emerging recently in which unlicensed users temporarily borrow spectrum from the licensed Primary Users (PU) based on the Dynamic Spectrum Access (DSA) technique that …


Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner Jan 2011

Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner

Browse all Theses and Dissertations

This dissertation develops and demonstrates a method to measure the uncertainty of secondary structure of protein sequences using Shannon's information theory. This method is applied to a newly developed large dataset of chameleon sequences and to several protein hinges culled from the Hinge Atlas. The uncertainty of the central residue in each tripeptide is computed for each amino acid in a sequence using Cuff and Barton's CB513 as the reference set. It is shown that while secondary structure uncertainty is relatively high in chameleon regions [avg = 1.27 bits] it is relatively low in the regions 1-7 residues nearest a …


A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer Jan 2011

A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer

Browse all Theses and Dissertations

While mobile reading devices have been on the market and investigated by researchers in recent years, there is still work required to make these devices highly accessible to the visually impaired. A usability test with one such device revealed gaps in the current state of the art devices. These gaps focus mostly on the user interaction and his or her ability to quickly consume written reading material. In this dissertation a voice user interface (VUI) is presented that improves the ability of a blind user of a mobile reading device to interact with written material. The image processing techniques required …


Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire Jan 2011

Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire

Browse all Theses and Dissertations

This thesis investigates the use of an artificial neural network (ANN), in particular a Multi-Layer Perceptron (MLP), to perform function approximation on truth data representing a weapon engagement zone's (WEZ) maximum launch range. The WEZ of an air-to-air missile represents the boundaries and zones of effectiveness for a one-vs-one air-to-air combat engagement [13]. The intent is for the network to fuse table lookup and interpolation functionality into a physically compact and computationally efficient package, while improving approximation accuracy over conventional methods. Data was collected from simulated firings of a notional air-to-air missile model and used to train a two layer …


Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi Jan 2011

Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi

Browse all Theses and Dissertations

Fall related injuries are the leading cause of death and hospitalization among the elderly. Falls among older people become a major problem facing hospitals and nursing homes. In this study we put an effort to design a wireless device capable of detecting falls with the hope that this study will provide a path towards better healthcare monitoring and better independent living for the elderly.

In this project I showed how the fall detection device can be interfaced with different systems to achieve functionality without adding extra cost. For seniors who prefer to stay at their homes and live independently, the …


3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp Jan 2011

3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp

Browse all Theses and Dissertations

A method to automatically characterize and identify 3-D range scans based on intrinsic landmarks is presented. Intrinsic landmarks represent locally unique, intrinsic properties of a scanned surface, regardless of scale or rotation. The number, location, and characteristics of landmarks are used to characterize the scanned models. This method contains a selection process to identify stable, intrinsic landmarks for range scans as well as the identification of those scans. The selection process requires no user interaction or surface assumptions. It uses the principal curvatures at the range points to select the landmarks. First, a large number of landmarks are generated by …


A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha Jan 2011

A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha

Browse all Theses and Dissertations

Computing has changed. Lately, a slew of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources has become available at the disposal of the common man. The latter commonly called Cloud Computing (or just Cloud) is democratizing computing by making large computing power accessible to people and corporations around the world easily and economically.

However, taking full advantage of this computing landscape, especially for the data intensive domains, has been hampered by many factors, the primary one being the complexity in developing applications for the variety of available platforms.

This thesis …


Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano Dec 2010

Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano

Todd Sedano

Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss Dec 2010

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss

Ray Bareiss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu Dec 2010

Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu

Hong-Ning Dai

This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …


Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong Dec 2010

Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …


Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni Dec 2010

Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni

Faith Joel Shimba

Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …


Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary Dec 2010

Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary

Faith Joel Shimba

A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …