Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses

Discipline
Institution
Keyword
Publication Year
Publication Type

Articles 1 - 30 of 80

Full-Text Articles in Computer Engineering

Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro May 2019

Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro

Theses

The latest 5G technology in wireless communication has led to an increasing demand for higher data rates and low latencies. The overall latency of the system in a cloud radio access network is greatly affected by the decoding latency in the uplink channel. Various proposed solutions suggest using network function virtualization (NFV). NFV is the process of decoupling the network functions from hardware appliances. This provides the exibility to implement distributed computing and network coding to effectively reduce the decoding latency and improve the reliability of the system. To ensure the system is cost effective, commercial off the shelf (COTS ...


Multi-Population-Based Differential Evolution Algorithm For Optimization Problems, Ishani Chatterjee May 2017

Multi-Population-Based Differential Evolution Algorithm For Optimization Problems, Ishani Chatterjee

Theses

A differential evolution (DE) algorithm is an evolutionary algorithm for optimization problems over a continuous domain. To solve high dimensional global optimization problems, this work investigates the performance of differential evolution algorithms


Decision Tree Rule-Based Feature Selection For Imbalanced Data, Haoyue Liu May 2017

Decision Tree Rule-Based Feature Selection For Imbalanced Data, Haoyue Liu

Theses

A class imbalance problem appears in many real world applications, e.g., fault diagnosis, text categorization and fraud detection. When dealing with an imbalanced dataset, feature selection becomes an important issue. To address it, this work proposes


An Immersive Learning Model, Shamsa Abdulla Salem Al Mazrouei Apr 2017

An Immersive Learning Model, Shamsa Abdulla Salem Al Mazrouei

Theses

Our overarching goal is to provide children with immersive game-based learning environments to support Arabic linguistic skills acquisition. We postulate that immersion in- creases learning. To investigate this hypothesis, we developed a model and built an implementation of an educational virtual environment (EVE) that supports immersion and thus, induces effective learning. Experimental results confirm our hypothesis.

Our model integrates learning content, learning activities, immersion and gameplay. Based on our analysis of various curricula, specifically the United Arab Emirates grade one curriculum, we identified the nature of the learning content in order to satisfy the curriculum requirements. This content is conceptually ...


Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead Dec 2016

Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead

Theses

Recently, the concept of coordinating actions between distributed agents has emerged in the information theory literature. It was first introduced by Cuff in 2008 for the point-to-point case of coordination. However, Cuff’s work and the vast majo


Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein De Almeida May 2016

Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein De Almeida

Theses

It is the purpose of this document to describe the design and development processes of Scare Tactics. The game will be discussed in further detail as it relates to several areas, such as market analysis, development process, game design, technical design, and each team members’ individual area of background research. The research areas include asymmetrical game design, level design, game engine architecture, real-time graphics, user interface design, networking and artificial intelligence.

As part of the team’s market analysis, other games featuring asymmetric gameplay are discussed. The games described in this section serve as inspirations for asymmetric game design. Some ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki May 2016

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is match with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki May 2016

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as Snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is matched with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


A Game-Based Learning Model, Fatmah Mohamed Ali Ramsi Dec 2015

A Game-Based Learning Model, Fatmah Mohamed Ali Ramsi

Theses

The purpose of this research is to design a conceptual model and develop an implementation as a proof of concept of game-based learning (GBL)to support linguistic skills acquisition. Our model lays the foundations of game-based learning by defining methods, processes, and procedures to support the development of game-based learning systems. Integration of learning and gameplay raises various issues, among them the learning process, learning content, and game characteristics. Language competency is fundamental to academic and social success. Vocabulary acquisition is a primary basis for language competency. Word lists and dictionaries have been used as a resource to enrich vocabulary ...


Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi Nov 2015

Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi

Theses

The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving ...


Formal Specification And Refinement Of The Navigation Tasks Of Autonomous Robots, Eman Rabiah Rabiah May 2015

Formal Specification And Refinement Of The Navigation Tasks Of Autonomous Robots, Eman Rabiah Rabiah

Theses

Autonomous robots are hybrid systems whose role in our daily life is becoming increasingly critical. They are tasked with various activities requiring reliability, safety, and correctness of their software-controlled behavior. Formal methods have been proved effective in addressing development issues associated with these software qualities. However, even though autonomous robot navigation is a primordial function, there is no research dealing with enhancing reliability of the navigation algorithms. Thus, our focus is to investigate this type of algorithms, and specifically path planning, a fundamental and critical functionality supporting autonomy. We formally address the issue of enhancing reliability of the widely-used A ...


The Construction And Characterization Of A Magneto-Optical Trap For Rubidium-87 And Electromagnetically-Induced Transparency In Rubidium-87 In A Vapor Cell, Yu Liu May 2014

The Construction And Characterization Of A Magneto-Optical Trap For Rubidium-87 And Electromagnetically-Induced Transparency In Rubidium-87 In A Vapor Cell, Yu Liu

Theses

Recent years have observed fast developments in neutral atomic vapor based quantum information storage technology. The technique utilizes light fields in the optical wavelength region as signal carrier and retriever and neutral atomic systems (e.g. single atoms, ensembles of atoms, atom-like defects in solids) as storage media. Photons are robust carriers of information due to their high velocity (c = 2.998 x 108 m/s) and ease of transportation (they propagate rectilinearly with low loss). Their high mobility, however, makes it a challenging task to spatially localize and therefore store them. Atoms (or atom-like systems), on the other ...


Reliability-Performance Trade-Offs In Photonic Noc Architectures, Pradheep Khanna Kaliraj Sep 2013

Reliability-Performance Trade-Offs In Photonic Noc Architectures, Pradheep Khanna Kaliraj

Theses

Advancements in the field of chip fabrication has facilitated in integrating more number of transistors in a given area which lead to the era of multi-core processors. Interconnect became the bottleneck for the multi-core processors as the number of cores in a chip increased. The traditional bus based architectures, which are currently used in the processors, cannot scale up to support the increasing number of cores in a multi-core chip. Hence, Network-on-Chip (NoC) is the preferred communication backbone for modern multicore chips. However, the multi-hop data transmission using wireline interconnects result in high energy dissipation and latency. Hence, many alternative ...


Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp Aug 2013

Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp

Theses

Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide ...


Brand Communities Of Facebook: How Do They Create Value?, Mahmud Hassan Jan 2013

Brand Communities Of Facebook: How Do They Create Value?, Mahmud Hassan

Theses

Businesses are witnessing an explosion of internet-based messages and information transmitted through various social networking sites (SNSs). Although there is a great deal of interest on consumption behaviors within SNSs but the shared consumption practices which reveals the collective value creation has not been properly explored within this context before. A netnographic approach (Kozinets 2002) guided the data collection. Facebook is chosen because of its vast popularity and multicultural aspect. This study identified twenty one distinct value creating behaviors (VCBs) within Facebook and explored six new VCBs that were not identified within the context of consumer behavior and SNSs.


High-Performance Matrix Multiplication On Intel And Fgpa Platforms, Gang Li May 2012

High-Performance Matrix Multiplication On Intel And Fgpa Platforms, Gang Li

Theses

Matrix multiplication is at the core of high-performance numerical computation. Software methods of accelerating matrix multiplication fall into two categories. One is based on calculation simplification. The other one is based on increasing the memory access efficiency. Also matrix multiplication can be accelerated using vector processors. In this investigation, various matrix multiplication algorithms and the vector-based hardware acceleration method are analyzed and compared in terms of performance and memory requirements. Results are shown for Intel and Xilinx FPGA platforms. They show that when the CPU is fast, Goto's algorithm runs faster than Strassen's algorithm because the data access ...


Energy Scavenging System For Indoor Wireless Sensor Network, David Andrew Crea Dec 2010

Energy Scavenging System For Indoor Wireless Sensor Network, David Andrew Crea

Theses

As wireless communication evolves wireless sensors have begun to be integrated into society more and more. As these sensors are used to a greater extent newer and better ways to keep them working optimally have begun to surface. One such method aims to further the sensors energy independence on humans. This technique is known as energy scavenging. The logic behind energy scavenging is to allow the device to have its own reliable source of energy that does not require upkeep, has a long life expectancy, and does not completely rely on an internal power source. The aim of this thesis ...


Modeling Next Generation Air Traffic Control System With Petri Net, Hang Wu Dec 2010

Modeling Next Generation Air Traffic Control System With Petri Net, Hang Wu

Theses

The Federal Aviation Administration (FAA) is one of the largest Air Navigation Service Providers, managing air traffic for more than 15% of the world's airspace. Today's Air Traffic Control (ATC) system cannot meet the growth of the air traffic activities, which brings with more unprecedented delays. At the same time, Air Traffic Controllers are facing higher workload than ever before. The FAA has declared that the existing ATC system will transition to a new system known as “Free Flight”. “Free Flight” will change today's ATC system by giving pilots increased flexibility to choose and modify their routes ...


Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee Dec 2007

Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee

Theses

The problem of designing retransmission protocols based on Hybrid Automatic Repeat reQuest (HARQ) for moving networks over Ricean fading channels has been considered. The scenario of interest consists of one receiver traveling at a given speed while connected to a wireless network based on OFDM (e.g., WiMax) through several base stations located along the path. Five different retransmission protocols that combine HARQ with handover between adjacent base stations are considered. Their performance in terms of number of retransmissions per packet via numerical simulations, considering both frequency selective and nonselective channels are presented. The results obtained show the relevant advantage ...


Kerberos Phone Secure Messenger, Nabeel Al-Saber Dec 2007

Kerberos Phone Secure Messenger, Nabeel Al-Saber

Theses

Security is becoming vital in today's open insecure Internet. While popular Internet enabled mobile devices are spreading widely, the security of such platforms is not maturely addressed. This research extends the popular Kerberos authentication protocol to run on mobile phones and builds a novel Kerberos Secure Phone Messenger (KSPM) on top of the protocol. Moreover, the Kerberos network authentication protocol provides user authentication and message privacy with the convenience of secret key cryptography. Such an advantage in mobile phones helps reduce the computational burden and power consumption if compared with public key cryptography. KSPM achieves high standards in terms ...


Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin Dec 2007

Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin

Theses

With the continuous expansion of network infrastructure and deployment of applications sensitive to Quality-of-Service, network measurement plays a major role in both network planning and management. Accurate measurement of various network parameters, e.g., available bandwidth, link capacity, delay, packet loss and jitter, provides a positive impact for effective traffic engineering, Quality-of-Service (QoS) routing, optimization of end-to-end transport performance, and link capacity planning. For network measurement, there exists several proactive estimation tools based on either probe-gap model or probe-rate model that estimate path related attributes. Most of these tools that have been implemented can measure tight-link capacity (smallest available bandwidth ...


Two Factor Authentication And Authorization In Ubiquitous Mobile Computing, Qing Zhu Dec 2007

Two Factor Authentication And Authorization In Ubiquitous Mobile Computing, Qing Zhu

Theses

Handheld devices, such as mobile phones, PDAs and others, have become an integrated part of our lives. They are perfectly suitable to become the first real-life platforms for mobile computing applications. A lightweight holistic authentication and authorization scheme is presented for this typical wireless scenario. It is shown that either SIM or Kerberos authentication has its limitations. A two-factor authentication method SIM-based Kerberos authentication is developed to implement the Secure Single Sign-on function with LDAP protocol realization for authorization and mobile directory services. Performance analysis and power consumption analyses for this protocol are presented as well. Our results show that ...


Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa Dec 2007

Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa

Theses

Several challenging applications and construction works demand real-time measurements for positioning at the centimeter-level accuracy. This positioning accuracy can be obtained by using a Global Positioning System (GPS) roving unit and employing a single reference station (base-station) or through utilizing the service of multiple reference stations forming a Real-Time Kinematics (RTK) Reference Network.

The limitation of the single reference approach is that measurement errors are distance dependent and good accuracy can be only obtained when distances are less than 10 kms. In addition, this method requires a nearby Geodetic Control Point (GCP). Recently, RTK reference networks are widely established in ...


Route Recovery Schemes For Link And Node Failure And Link Congestion, Ibrahim Takouna Aug 2007

Route Recovery Schemes For Link And Node Failure And Link Congestion, Ibrahim Takouna

Theses

Link/Node failure occurs frequently causing service disruption in computer networks. Hardware techniques have been developed to protect the network from Link/Node failure. These techniques work in physical layer, therefore their convergence time is very small. On the other hand, many schemes have been proposed to mitigate the failure influence on the network. These schemes work in upper layers such as the network layer. However, hardware solutions faster than other schemes, but they are expensive. Link/Node failure causes all flows which were using the failed link/node are temporarily interrupted till a new path reestablished.

Three recovery algorithms ...


Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez May 2007

Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez

Theses

Modem processors are designed to achieve greater amounts of instruction level parallelism (ILP) and thread level parallelism (TLP). Simultaneous multithreading (SMT) is an architecture that exploits both LLP and TLP. It improves the utilization of the processor resources by allowing multiple independent threads to reside in the pipeline and dynamically scheduling the available resources among the threads.

The first part of this thesis presents the development of a simultaneous multithreading processor simulator. The SMT simulator is derived from SimpleScalar, a superscalar processor simulator widely used in the computer architecture research field. The basic pipeline is expanded to allow multiple threads ...


Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen Dec 2006

Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen

Theses

Non Repudiation Secure File Transfer Protocol (NRSFTP) is designed to resolve three main concerns for today's electronic file transfer methodology. The three main concerns are Non-Repudiation, Secure, and Non-Real Time file transfer. Non-repudiation is to assure the receiver that the sender of the document is not an imposter. Secure document transfer is to assure the sender that only the intended receiver will be able to read the document. Non-real-time file transfer is to provide convenient and low cost transportability of the encrypted data from one party to another. With the above three concerns addressed, the NRSFTP protocol can be ...


Fpga-Based Implementation Of Parallel Graph Partitioning, Mohammad Kharashgeh Aug 2006

Fpga-Based Implementation Of Parallel Graph Partitioning, Mohammad Kharashgeh

Theses

Graph partitioning is a very important application that can be found in numerous areas, from finite element methods to data processing and VLSI circuit design. Many algorithms have been developed to solve this problem. Of special interest is multilevel graph partitioning that provides a very efficient solution. This method can also be parallelized and implemented on various multiprocessor architectures. Unfortunately, the target of such implementations is often unavailable high-end multiprocessor systems. Here a parallel version of this method for an in-house developed multiprocessor system is implemented on an FPGA. The system designed provides a cost-effective solution.

The design is based ...


A Wireless Method For Monitoring Medication Compliance, Jeffrey Scott Jonas Aug 2006

A Wireless Method For Monitoring Medication Compliance, Jeffrey Scott Jonas

Theses

There are many devices on the market to help remind patients to take their pills, but most require observation by a caregiver to assure medication compliance. This project demonstrates three modes to detect pill removal from a pillbox: a switch under the pills, a reflective type photointerrupter and a transmissive "electric eye" photosensor. Each mode exhibited blind spots or other failures to detect pill presence, but by combining modes with complementary characteristics, the accuracy of pill detection is greatly increased.

Two methods of caregiver notification are demonstrated: text messages transmitted via an attached cellular phone, or the status is collected ...


Classification, Testing And Optimization Of Intrusion Detection Systems, Javier Leon May 2006

Classification, Testing And Optimization Of Intrusion Detection Systems, Javier Leon

Theses

Modem network security products vary greatly in their underlying technology and architecture. Since the introduction of intrusion detection decades ago, intrusion detection technologies have continued to evolve rapidly. This rapid change has led to the introduction of a wealth of security devices, technologies and algorithms that perform functions originally associated with intrusion detection systems.

This thesis offers an analysis of intrusion detection technologies, proposing a new classification system for intrusion detection systems. Working closely with the development of a new intrusion detection product, this thesis introduces a method of testing related technologies in a production environment by outlining and executing ...


Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain May 2006

Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain

Theses

RFID tag location estimation in a 3D environment is investigated. The location of the tag with unknown coordinates can be estimated with certain accuracy. However, accuracy can be improved using the knowledge based on measurement of additional reference tags with known location. This thesis studies the mathematical formulation and practical realization of location sensing using RFID tags.

Deviating from the standard use of RFID technology which employs one tag reader to identify the presence of tag, here multiple tag readers with known location are used to estimate the physical location of an individual tag, with/without the help of few ...