Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi Dec 2016

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi

Electronic Theses and Dissertations

Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by ongoing problems in social interaction and communication, and engagement in repetitive behaviors. According to Centers for Disease Control and Prevention, an estimated 1 in 68 children in the United States has ASD. Mounting evidence shows that many of these individuals display an interest in social interaction with computers and robots and, in general, feel comfortable spending time in such environments. It is known that the subtlety and unpredictability of people’s social behavior are intimidating and confusing for many individuals with ASD. Computerized learning environments and robots, however, prepare a predictable, …


Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi Jan 2016

Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi

Electronic Theses and Dissertations

Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is …


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …


Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan Jan 2016

Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan

Electronic Theses and Dissertations

The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved …


Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao Jan 2016

Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao

Electronic Theses and Dissertations

With the improvement of hardware, more and more multimedia applications are allowed to run in the mobile device. However, due to the limited radio bandwidth, wireless network performance becomes a critical issue. Common mobile solutions are based on the centralized structure, which require an access point to handle all the communication requirement in the work area. The transmission performance of centralized framework relies on the density of access points. But increasing the number of access points will cost lot of money and the interference between access point will reduce the transmission quality. Thanks to the wireless sensor network implementations, the …