Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Computer Engineering

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi Dec 2016

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi

Electronic Theses and Dissertations

Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by ongoing problems in social interaction and communication, and engagement in repetitive behaviors. According to Centers for Disease Control and Prevention, an estimated 1 in 68 children in the United States has ASD. Mounting evidence shows that many of these individuals display an interest in social interaction with computers and robots and, in general, feel comfortable spending time in such environments. It is known that the subtlety and unpredictability of people’s social behavior are intimidating and confusing for many individuals with ASD. Computerized learning environments and robots, however, prepare a predictable, …


A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki Dec 2016

A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki

Electronic Theses and Dissertations

Stream processing frameworks are designed to process the streaming data that arrives in time. An example of such data is stream of emails that a user receives every day. Most of the real world data streams are also imbalanced as is in the stream of emails, which contains few spam emails compared to a lot of legitimate emails. The classification of the imbalanced data stream is challenging due to the several reasons: First of all, data streams are huge and they can not be stored in the memory for one time processing. Second, if the data is imbalanced, the accuracy …


Towards Energy-Efficient And Reliable Computing: From Highly-Scaled Cmos Devices To Resistive Memories, Soheil Salehi Mobarakeh Jan 2016

Towards Energy-Efficient And Reliable Computing: From Highly-Scaled Cmos Devices To Resistive Memories, Soheil Salehi Mobarakeh

Electronic Theses and Dissertations

The continuous increase in transistor density based on Moore's Law has led us to highly scaled Complementary Metal-Oxide Semiconductor (CMOS) technologies. These transistor-based process technologies offer improved density as well as a reduction in nominal supply voltage. An analysis regarding different aspects of 45nm and 15nm technologies, such as power consumption and cell area to compare these two technologies is proposed on an IEEE 754 Single Precision Floating-Point Unit implementation. Based on the results, using the 15nm technology offers 4-times less energy and 3-fold smaller footprint. New challenges also arise, such as relative proportion of leakage power in standby mode …


Improving Efficiency In Deep Learning For Large Scale Visual Recognition, Baoyuan Liu Jan 2016

Improving Efficiency In Deep Learning For Large Scale Visual Recognition, Baoyuan Liu

Electronic Theses and Dissertations

The emerging recent large scale visual recognition methods, and in particular the deep Convolutional Neural Networks (CNN), are promising to revolutionize many computer vision based artificial intelligent applications, such as autonomous driving and online image retrieval systems. One of the main challenges in large scale visual recognition is the complexity of the corresponding algorithms. This is further exacerbated by the fact that in most real-world scenarios they need to run in real time and on platforms that have limited computational resources. This dissertation focuses on improving the efficiency of such large scale visual recognition algorithms from several perspectives. First, to …


A Contextual Approach To Real Time, Interactive Narrative Generation, James Hollister Jan 2016

A Contextual Approach To Real Time, Interactive Narrative Generation, James Hollister

Electronic Theses and Dissertations

Oral story telling has become a lost art of family histories because social media and technology have taken over the personal interactions that once passed on the important stories and facts from generation to generation. This dissertation presents and evaluates a method of generating a narrative with input from the listener without actually forcing him or her to become an actual character in the narrative. This system is called CAMPFIRE Story Telling System (STS) and employs a contextual approach to story generation. This system uses the Cooperating Context Method (CCM) to generate and tell dynamic stories in real time and …


Developing New Power Management And High-Reliability Schemes In Data-Intensive Environment, Ruijun Wang Jan 2016

Developing New Power Management And High-Reliability Schemes In Data-Intensive Environment, Ruijun Wang

Electronic Theses and Dissertations

With the increasing popularity of data-intensive applications as well as the large-scale computing and storage systems, current data centers and supercomputers are often dealing with extremely large data-sets. To store and process this huge amount of data reliably and energy-efficiently, three major challenges should be taken into consideration for the system designers. Firstly, power conservation–Multicore processors or CMPs have become a mainstream in the current processor market because of the tremendous improvement in transistor density and the advancement in semiconductor technology. However, the increasing number of transistors on a single die or chip reveals a super-linear growth in power consumption …


Reactive Rejuvenation Of Cmos Logic Paths Using Self-Activating Voltage Domains, Navid Khoshavi Najafabadi Jan 2016

Reactive Rejuvenation Of Cmos Logic Paths Using Self-Activating Voltage Domains, Navid Khoshavi Najafabadi

Electronic Theses and Dissertations

Aggressive CMOS technology scaling trends exacerbate the aging-related degradation of propagation delay and energy efficiency in nanoscale designs. Recently, power-gating has been utilized as an effective low-power design technique which has also been shown to alleviate some aging impacts. However, the use of MOSFETs to realize power-gated designs will also encounter aging-induced degradations in the sleep transistors themselves which necessitates the exploration of design strategies to utilize power-gating effectively to mitigate aging. In particular, Bias Temperature Instability (BTI) which occurs during activation of power-gated voltage islands is investigated with respect to the placement of the sleep transistor in the header …


Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi Jan 2016

Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi

Electronic Theses and Dissertations

Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is …


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …


Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan Jan 2016

Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan

Electronic Theses and Dissertations

The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …


Computational Methods For Comparative Non-Coding Rna Analysis: From Secondary Structures To Tertiary Structures, Ping Ge Jan 2016

Computational Methods For Comparative Non-Coding Rna Analysis: From Secondary Structures To Tertiary Structures, Ping Ge

Electronic Theses and Dissertations

Unlike message RNAs (mRNAs) whose information is encoded in the primary sequences, the cellular roles of non-coding RNAs (ncRNAs) originate from the structures. Therefore studying the structural conservation in ncRNAs is important to yield an in-depth understanding of their functionalities. In the past years, many computational methods have been proposed to analyze the common structural patterns in ncRNAs using comparative methods. However, the RNA structural comparison is not a trivial task, and the existing approaches still have numerous issues in efficiency and accuracy. In this dissertation, we will introduce a suite of novel computational tools that extend the classic models …


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved …


Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao Jan 2016

Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao

Electronic Theses and Dissertations

With the improvement of hardware, more and more multimedia applications are allowed to run in the mobile device. However, due to the limited radio bandwidth, wireless network performance becomes a critical issue. Common mobile solutions are based on the centralized structure, which require an access point to handle all the communication requirement in the work area. The transmission performance of centralized framework relies on the density of access points. But increasing the number of access points will cost lot of money and the interference between access point will reduce the transmission quality. Thanks to the wireless sensor network implementations, the …


Design And Development Of The Ebear: A Socially Assistive Robot For Elderly People With Depression, Amirhossein Kargarbideh Jan 2016

Design And Development Of The Ebear: A Socially Assistive Robot For Elderly People With Depression, Amirhossein Kargarbideh

Electronic Theses and Dissertations

There has been tremendous progress in the field of robotics in the past decade and especially developing humanoid robots with social abilities that can assist human at a socio-emotional level. The objective of this thesis is to develop and study a perceptive and expressive animal-like robot equipped with artificial intelligence in assisting the elderly people with depression. We investigated how social robots can become companions of elderly individuals with depression and improve their mood and increase their happiness and well-being. The robotic platform built in this thesis is a bear-like robot called the eBear. The eBear can show facial expression …


Probabilistic-Based Computing Transformation With Reconfigurable Logic Fabrics, Mohammed Alawad Jan 2016

Probabilistic-Based Computing Transformation With Reconfigurable Logic Fabrics, Mohammed Alawad

Electronic Theses and Dissertations

Effectively tackling the upcoming "zettabytes" data explosion requires a huge quantum leap in our computing power and energy efficiency. However, with the Moore's law dwindling quickly, the physical limits of CMOS technology make it almost intractable to achieve high energy efficiency if the traditional "deterministic and precise" computing model still dominates. Worse, the upcoming data explosion mostly comprises statistics gleaned from uncertain, imperfect real-world environment. As such, the traditional computing means of first-principle modeling or explicit statistical modeling will very likely be ineffective to achieve flexibility, autonomy, and human interaction. The bottom line is clear: given where we are headed, …


Energy-Aware Reconfigurable Logic Device Using Spin-Based Storage And Carbon Nanotube Switching, Mohan Krishna Gopi Krishna Jan 2016

Energy-Aware Reconfigurable Logic Device Using Spin-Based Storage And Carbon Nanotube Switching, Mohan Krishna Gopi Krishna

Electronic Theses and Dissertations

Scaling of semiconductors to the 14-nanometer range and below nanometer range introduces serious design challenges that include high static power in memories and high leakage power, hindering further integration of CMOS devices. Thus, emerging devices are under intense analysis to overcome these drawbacks caused by transistor size scaling. Spintronics technology provides excellent features such as Non-Volatility, low read power, low read delay, higher scalability as well as easy integration with CMOS in comparison with SRAM memories. In addition, Carbon-Nanotube Field-Effect Transistors (CNFETs) provide superior electrical conductivity, low delay and low power consumption in comparison with conventional CMOS technology. Thus in …


Localization And Mapping Of Unknown Locations And Tunnels With Unmanned Ground Vehicles, Doris Turnage Jan 2016

Localization And Mapping Of Unknown Locations And Tunnels With Unmanned Ground Vehicles, Doris Turnage

Electronic Theses and Dissertations

The main goals of this research were to enhance a commercial off the shelf (COTS) software platform to support unmanned ground vehicles (UGVs) exploring the complex environment of tunnels, to test the platform within a simulation environment, and to validate the architecture through field testing. Developing this platform will enhance the U. S. Army Engineering Research and Development Center’s (ERDC’s) current capabilities and create a safe and efficient autonomous vehicle to perform the following functions within tunnels: (1) localization (e.g., position tracking) and mapping of its environment, (2) traversing varied terrains, (3) sensing the environment for objects of interest, and …


Dynamic Thermal Management Of Vertically Stacked Heterogeneous Processors, Ajay Sharma Jan 2016

Dynamic Thermal Management Of Vertically Stacked Heterogeneous Processors, Ajay Sharma

Electronic Theses and Dissertations

No abstract provided.


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.