Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2015

Discipline
Institution
Keyword
Publication
File Type

Articles 241 - 270 of 291

Full-Text Articles in Computer Engineering

A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki Jan 2015

A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki

Faculty Publications

This paper proposes an unconventional carpool-matching system concept that is different from existing systems with four innovative operational features: (F1) The proposed matching system will be used by members of an association and sponsored by the association, e.g., the employees of a company, members of a homeowner association, employees of a shopping center. This expands the scope beyond commute trips. Such associations can also voluntarily form alliances to increase the number of possible carpool partners and geographical reach. (F2) Service provided by a driver or received by a rider incurs credit or debt to a bank centrally and fairly managed …


A Collaborative Adaptive Wiener Filter For Multi-Frame Super-Resolution, Khaled M. Mohamed, Russell C. Hardie Jan 2015

A Collaborative Adaptive Wiener Filter For Multi-Frame Super-Resolution, Khaled M. Mohamed, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

Factors that can limit the effective resolution of an imaging system may include aliasing from under-sampling, blur from the optics and external factors, and sensor noise. Image restoration and super-resolution (SR) techniques can be used to improve image resolution. One SR method, developed recently, is the adaptive Wiener filter (AWF) SR algorithm. This is a multi-frame SR method that combines registered temporal frames through a joint nonuniform interpolation and restoration process to provide a high-resolution image estimate. Variations of this method have been demonstrated to be effective for multi-frame SR, as well demosaicing RGB and polarimetric imagery. While the AWF …


Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner Jan 2015

Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner

Electrical and Computer Engineering Faculty Publications

In many undersampled imaging systems, spatial integration from the individual detector elements is the dominant component of the system point spread function (PSF). Conventional focal plane arrays (FPAs) utilize square detector elements with a nearly 100% fill factor, where fill factor is defined as the fraction of the detector element area that is active in light detection. A large fill factor is generally considered to be desirable because more photons are collected for a given pitch, and this leads to a higher signal-to-noise-ratio (SNR). However, the large active area works against super-resolution (SR) image restoration by acting as an additional …


Enhanced Presentation Of Tomographic Data, Carmen Watts Clayton, Bernice E. Mills, George Buffleben, Thien Vu-Nguyen Jan 2015

Enhanced Presentation Of Tomographic Data, Carmen Watts Clayton, Bernice E. Mills, George Buffleben, Thien Vu-Nguyen

STAR Program Research Presentations

Solid materials can now be viewed non-destructively with x-rays by tomography; a technique for taking many 2D images of an object at many angles and reconstructing the images into a 3D data cube. The data is next rendered into 2D or 3D still images or movies. By nature, x-ray tomography yields a very large amount of data in three dimensions. Effectively displaying this data to an audience is a challenge.

In this work techniques are explored to improve the presentation methods of movies of both 2D and 3D tomographic data for visual appeal and correct perspective. Finding the optimal ways …


A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg Jan 2015

A Heuristic Text Analytic Approach For Classifying Research Articles, Steven Walczak, Deborah L. Kellogg

School of Information Faculty Publications

Classification of research articles is fundamental to analyze and understand research literature. Underlying concepts from both text analytics and concept mining form a foundation for the development of a quantitative heuristic methodology, the Scale of Theoretical and Applied Research (STAR), for classifying research. STAR demonstrates how concept mining may be used to classify research with respect to its theoretical and applied emphases. This research reports on evaluating the STAR heuristic classifier using the Business Analytics domain, by classifying 774 Business Analytics articles from 23 journals. The results indicate that STAR effectively evaluates overall article content of journals to be consistent …


Design And Implementation Of Network Transfer Protocol For Big Genomic Data, Mohammed Aledhari, Fahad Saeed Jan 2015

Design And Implementation Of Network Transfer Protocol For Big Genomic Data, Mohammed Aledhari, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Genomic data is growing exponentially due to next generation sequencing technologies (NGS) and their ability to produce massive amounts of data in a short time. NGS technologies generate big genomic data that needs to be exchanged between different locations efficiently and reliably. The current network transfer protocols rely on Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) protocols, ignoring data size and type. Universal application layer protocols such as HTTP are designed for wide variety of data types and are not particularly efficient for genomic data. Therefore, we present a new data-aware transfer protocol for genomic-data that increases network …


Probabilistic Verification Of Multi-Robot Missions In Uncertain Environments, Damian M. Lyons, Ronald Arkin, Shu Jiang, Dagan Harrington, Feng Tang, Peng Tang Jan 2015

Probabilistic Verification Of Multi-Robot Missions In Uncertain Environments, Damian M. Lyons, Ronald Arkin, Shu Jiang, Dagan Harrington, Feng Tang, Peng Tang

Faculty Publications

The effective use of autonomous robot teams in highly-critical missions depends on being able to establish performance guarantees. However, establishing a guarantee for the behavior of an autonomous robot operating in an uncertain environment with obstacles is a challenging problem. This paper addresses the challenges involved in building a software tool for verifying the behavior of a multi-robot waypoint mission that includes uncertain environment geometry as well as uncertainty in robot motion. One contribution of this paper is an approach to the problem of a-priori specification of uncertain environments for robot program verification. A second contribution is a novel method …


Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen Jan 2015

Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen

Computational Modeling & Simulation Engineering Faculty Publications

Obtaining exascale performance is a challenge. Although the technology of today features hardware with very high levels of concurrency, exascale performance is primarily limited by energy consumption. This limitation has lead to the use of GPUs and specialized hardware such as many integrated core (MIC) co-processors and FPGAs for computation acceleration. The Intel Xeon Phi co-processor, built upon the MIC architecture, features many low frequency, energy efficient cores. Applications, even those which do not saturate the large vector processing unit in each core, may benefit from the energy-efficient hardware and software of the Xeon Phi. This work explores the energy …


A Knowledge-Driven Distributed Architecture For Context-Aware Systems, Dennis Lupiana Jan 2015

A Knowledge-Driven Distributed Architecture For Context-Aware Systems, Dennis Lupiana

Doctoral

As the number of devices increases, it becomes a challenge for the users to use them effectively. This is more challenging when the majority of these devices are mobile. The users and their devices enter and leave different environments where different settings and computing needs may be required. To effectively use these devices in such environments means to constantly be aware of their whereabouts, functionalities and desirable working conditions. This is impractical and hence it is imperative to increase seamless interactions between the users and devices,and to make these devices less intrusive. To address these problems, various responsive computing systems, …


Visqol: An Objective Speech Quality Model, Andrew Hines, J. Skoglund, A. C. Kokaram, N. Harte Jan 2015

Visqol: An Objective Speech Quality Model, Andrew Hines, J. Skoglund, A. C. Kokaram, N. Harte

Articles

This paper presents an objective speech quality model, ViSQOL, the Virtual Speech Quality Objective Listener. It is a signal-based, full-reference, intrusive metric that models human speech quality perception using a spectro-temporal measure of similarity between a reference and a test speech signal. The metric has been particularly designed to be robust for quality issues associated with Voice over IP (VoIP) transmission. This paper describes the algorithm and compares the quality predictions with the ITU-T standard metrics PESQ and POLQA for common problems in VoIP: clock drift, associated time warping, and playout delays. The results indicate that ViSQOL and POLQA significantly …


Visqolaudio: An Objective Audio Quality Metric For Low Bitrate Codecs, Andrew Hines, Eoin Gillen, Damien Kelly, Jan Skoglund, Anil Kokaram, Naomi Harte Jan 2015

Visqolaudio: An Objective Audio Quality Metric For Low Bitrate Codecs, Andrew Hines, Eoin Gillen, Damien Kelly, Jan Skoglund, Anil Kokaram, Naomi Harte

Articles

Streaming services seek to optimise their use of bandwidth across audio and visual channels to maximise the quality of experience for users. This letter evaluates whether objective quality metrics can predict the audio quality for music encoded at low bitrates by comparing objective predictions with results from listener tests. Three objective metrics were benchmarked: PEAQ, POLQA, and VISQOLAudio. The results demonstrate objective metrics designed for speech quality assessment have a strong potential for quality assessment of low bitrate audio codecs.


An Analysis Of The Impact Of Playout Delay Adjustments Introduced By Voip Jitter Buffers On Listening Speech Quality, Peter Počta, Hugh Melvin, Andrew Hines Jan 2015

An Analysis Of The Impact Of Playout Delay Adjustments Introduced By Voip Jitter Buffers On Listening Speech Quality, Peter Počta, Hugh Melvin, Andrew Hines

Articles

This paper investigates the impact of frequent and small playout delay adjustments (time-shifting) of 30 ms or less introduced to silence periods by Voice over IP (VoIP) jitter buffer strategies on listening quality perceived by the end user. In particular, the quality impact is assessed using both a subjective method (quality scores obtained from subjective listening test) and an objective method based on perceptual modelling. Two different objective methods are used, PESQ (Perceptual Evaluation of Speech Quality, ITU-T Recommendation P.862) and POLQA (Perceptual Objective Listening Quality Assessment, ITU-T Recommendation P.863). Moreover, the relative accuracy of both objective models is assessed …


Sheep Updates 2015 - Merredin, Bruce Mullan, Kate Pritchett, Kimbal Curtis, Chris Wilcox, Lynne Bradshaw, Geoff Lindon, Katherine Davies, Joe Young, Stephen Lee, Dawson Bradford, Khama Kelman, Lucy Anderton, Jaq Pearson, Jackie Jarvis, Ben Patrick Jan 2015

Sheep Updates 2015 - Merredin, Bruce Mullan, Kate Pritchett, Kimbal Curtis, Chris Wilcox, Lynne Bradshaw, Geoff Lindon, Katherine Davies, Joe Young, Stephen Lee, Dawson Bradford, Khama Kelman, Lucy Anderton, Jaq Pearson, Jackie Jarvis, Ben Patrick

Sheep Updates

This session covers fourteen papers from different authors:

1. The Sheep Industry Business Innovation project, Bruce Mullan, Sheep Industry Development Director, Department of Agriculture and Food, Western Australia

2. Western Australian sheep stocktake, Kate Pritchett and Kimbal Curtis, Research Officers, Department of Agriculture and Food, Western Australia

3. Wool demand and supply - short term volatility, long term opportunities, Chris Wilcox, Principal of Poimena Analysis

4. Myths, Facts and the role of animal welfare in farming, Lynne Bradshaw, president, RSPCA WA

5. Latest research and development on breech strike prevention, Geoff Lindon, Manager Productivity and Animal Welfare, AWI

6. …


Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman Jan 2015

Connecting People And Ideas From Around The World: Global Innovation Platforms For Next-Generation Ecology And Beyond, P. Søgaard Jørgensen, F. Barraquand, V. Bonhomme, T. J. Curran, E. Cieraad, T. G. Ezard, L. Gherardi, R. A. Hayes, T. Poisot, R. Salguero-Gómez, Lucía Desoto, B. Swartz, J. M. Talbot, B. Wee, Naupaka B. Zimmerman

Biology Faculty Publications

We present a case for using Global Community Innovation Platforms (GCIPs), an approach to improve innovation and knowledge exchange in international scientific communities through a common and open online infrastructure. We highlight the value of GCIPs by focusing on recent efforts targeting the ecological sciences, where GCIPs are of high relevance given the urgent need for interdisciplinary, geographical, and cross-sector collaboration to cope with growing challenges to the environment as well as the scientific community itself. Amidst the emergence of new international institutions, organizations, and meetings, GCIPs provide a stable international infrastructure for rapid and long-term coordination that can be …


Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee Jan 2015

Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee

Australian Digital Forensics Conference

In recent years, the hottest topics in the security field are related to the advanced and persistent attacks. As an approach to solve this problem, we propose a cyber blackbox which collects and preserves network traffic on a virtual volume based WORM device, called EvidenceLock to ensure data integrity for security and forensic analysis. As a strategy to retain traffic for long enough periods, we introduce a deduplication method. Also this paper includes a study on the network evidence which is collected and preserved for analyzing the cause of cyber incident. Then, a method is proposed to suggest a starting …


Multiferroic Tunnel Junctions And Ferroelectric Control Of Magnetic State At Interface, Y. W. Yin, M. Raju, W. J. Hu, John D. Burton, Y.-M. Kim, A. Y. Borisevich, S. J. Pennycook, S. M. Yang, T. W. Noh, Alexei Gruverman, X. G. Li, Z. D. Zhang, Evgeny Y. Tsymbal, Qi Li Jan 2015

Multiferroic Tunnel Junctions And Ferroelectric Control Of Magnetic State At Interface, Y. W. Yin, M. Raju, W. J. Hu, John D. Burton, Y.-M. Kim, A. Y. Borisevich, S. J. Pennycook, S. M. Yang, T. W. Noh, Alexei Gruverman, X. G. Li, Z. D. Zhang, Evgeny Y. Tsymbal, Qi Li

Alexei Gruverman Publications

As semiconductor devices reach ever smaller dimensions, the challenge of power dissipation and quantum effect place a serious limit on the future device scaling. Recently, a multiferroic tunnel junction (MFTJ) with a ferroelectric barrier sandwiched between two ferromagnetic electrodes has drawn enormous interest due to its potential applications not only in multi-level data storage but also in electric field controlled spintronics and nanoferronics. Here, we present our investigations on four-level resistance states, giant tunneling electroresistance (TER) due to interfacial magnetoelectric coupling, and ferroelectric control of spin polarized tunneling in MFTJs. Coexistence of large tunneling magnetoresistance and TER has been observed …


Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor Jan 2015

Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor

Electrical and Computer Engineering: Graduate Student Scholarship

Background: Recognizing and mimicking facial expressions are important cues for building great rapport and relationship in human-human communication. Individuals with Autism Spectrum Disorder (ASD) have often deficits in recognizing and mimicking social cues, such as facial expressions. In the last decade several studies have shown that individuals with ASD have superior engagement toward objects and particularly robots (i.e. humanoid and non-humanoid). However, majority of the studies have focused on investigating robot’s appearances and the engineering design concepts and very few research have been done on the effectiveness of robots in therapeutic and treatment applications. In fact, the critical question that …


Needed Computations Shortcutting Needed Steps, Sergio Antoy, Jacob Johannsen, Steven Libby Jan 2015

Needed Computations Shortcutting Needed Steps, Sergio Antoy, Jacob Johannsen, Steven Libby

Computer Science Faculty Publications and Presentations

We define a compilation scheme for a constructor-based, strongly-sequential, graph rewriting system which shortcuts some needed steps. The object code is another constructor-based graph rewriting system. This system is normalizing for the original system when using an innermost strategy. Consequently, the object code can be easily implemented by eager functions in a variety of programming languages. We modify this object code in a way that avoids total or partial construction of the contracta of some needed steps of a computation. When computing normal forms in this way, both memory consumption and execution time are reduced compared to ordinary rewriting computations …


S-Store: Streaming Meets Transaction Processing, John Meehan, Nesime Tatbul, Cansu Aslantas, Ugur Cetintemel, Jiang Du, Tim Kraska, Samuel Madden, David Maier, Andrew Pavlo, Michael Stonebraker, Kristin A. Tufte, Hao Wang Jan 2015

S-Store: Streaming Meets Transaction Processing, John Meehan, Nesime Tatbul, Cansu Aslantas, Ugur Cetintemel, Jiang Du, Tim Kraska, Samuel Madden, David Maier, Andrew Pavlo, Michael Stonebraker, Kristin A. Tufte, Hao Wang

Computer Science Faculty Publications and Presentations

Stream processing addresses the needs of real-time applications. Transaction processing addresses the coordination and safety of short atomic computations. Heretofore, these two modes of operation existed in separate, stove-piped systems. In this work, we attempt to fuse the two computational paradigms in a single system called S-Store. In this way, S-Store can simultaneously accommodate OLTP and streaming applications. We present a simple transaction model for streams that integrates seamlessly with a traditional OLTP system. We chose to build S-Store as an extension of H-Store, an open-source, in-memory, distributed OLTP database system. By implementing S-Store in this way, we can make …


Usage Based Topology For Dcns, Qing Yi, Suresh Singh Jan 2015

Usage Based Topology For Dcns, Qing Yi, Suresh Singh

Computer Science Faculty Publications and Presentations

Many data center network topologies are designed to provide full bisection bandwidth for tens of thousands of servers in order to achieve high network throughput and server agility. However, the utilization rate of DCNs on average is below 10%, which results in a significant waste of network resources and energy. Many researchers propose consolidating network traffic flows to maximize the set of idle network equipment and switching them to low power mode to save energy. In this paper, we propose using skinnier network topologies to meet performance requirements of realistic loads thus saving not only energy but capital cost as …


Positive Fragments Of Coalgebraic Logics, Adriana Balan, Alexander Kurz, Jirí Velebil Jan 2015

Positive Fragments Of Coalgebraic Logics, Adriana Balan, Alexander Kurz, Jirí Velebil

Engineering Faculty Articles and Research

Positive modal logic was introduced in an influential 1995 paper of Dunn as the positive fragment of standard modal logic. His completeness result consists of an axiomatization that derives all modal formulas that are valid on all Kripke frames and are built only from atomic propositions, conjunction, disjunction, box and diamond. In this paper, we provide a coalgebraic analysis of this theorem, which not only gives a conceptual proof based on duality theory, but also generalizes Dunn's result from Kripke frames to coalgebras for weak-pullback preserving functors. To facilitate this analysis we prove a number of category theoretic results on …


Coalgebraic Semantics Of Reflexive Economics (Dagstuhl Seminar 15042), Samson Abramsky, Alexander Kurz, Pierre Lescanne, Viktor Winschel Jan 2015

Coalgebraic Semantics Of Reflexive Economics (Dagstuhl Seminar 15042), Samson Abramsky, Alexander Kurz, Pierre Lescanne, Viktor Winschel

Engineering Faculty Articles and Research

This report documents the program and the outcomes of Dagstuhl Seminar 15042 “Coalgebraic Semantics of Reflexive Economics”.


Qcm-D Monitoring Of Binding-Induced Conformational Change Of Calmodulin, Hyun J. Kwon, Brian Dodge Jan 2015

Qcm-D Monitoring Of Binding-Induced Conformational Change Of Calmodulin, Hyun J. Kwon, Brian Dodge

Faculty Publications

Understanding conformational changes are important when studying a protein such as calmodulin (CaM), which activates various target enzymes and regulates numerous physiological functions. CaM is a highly flexible protein that can transitorily adopt various conformations. A quartz crystal microbalance with dissipation (QCM-D) sensor was used to study binding-induced conformational changes of surface-immobilized CaM. Structural changes of CaM were evaluated using the Voigt’s viscoelastic model with frequency (ΔF) and dissipation change (ΔD). When Apo-CaM layer was incubated in 0.1 mM Ca2+ solution, the layer decreased by approximately 0.56 nm, due to the release of coupled water molecules and conformational change. The …


Desiderata For A Big Data Language, David Maier Jan 2015

Desiderata For A Big Data Language, David Maier

Computer Science Faculty Publications and Presentations

Data management and analytics systems for big data have proliferated, including column stores, array databases, graphanalysis environments and linear-algebra packages. This burgeoning of systems has lead to a surfeit of language and APIs. It is time to consider a new framework that can span these systems and simplify the programming and maintenance of Big Data applications. There are two key goals for such a framework:

Portability: It should be relatively easy to move an application or tool developed on one platform to operate against another. As a corollary, back-end data and analytics services should be swappable in a particular …


A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth Jan 2015

A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth

Computer Science Faculty Publications and Presentations

We describe a language-independent theory for name binding and resolution, suitable for programming languages with complex scoping rules including both lexical scoping and modules. We formulate name resolution as a two-stage problem. First a language-independent scope graph is constructed using language-specific rules from an abstract syntax tree. Then references in the scope graph are resolved to corresponding declarations using a language-independent resolution process. We introduce a resolution calculus as a concise, declarative, and language- independent specification of name resolution. We develop a resolution algorithm that is sound and complete with respect to the calculus. Based on the resolution calculus we …


A Demonstration Of The Bigdawg Polystore System, Aaron J. Elmore, Jennie Duggan, Michael Stonebraker, Magdalena Balazinska, Ugur Cetintemel, Vijay Gadepally, J. Heer, Bill Howe, Jeremy Kepner, Tim Kraska, Samuel Madden, David Maier, Timothy G. Mattson, S. Papadopoulos, J. Parkhurst, Nesime Tatbul, Manasi Vartak, Stan Zdonik Jan 2015

A Demonstration Of The Bigdawg Polystore System, Aaron J. Elmore, Jennie Duggan, Michael Stonebraker, Magdalena Balazinska, Ugur Cetintemel, Vijay Gadepally, J. Heer, Bill Howe, Jeremy Kepner, Tim Kraska, Samuel Madden, David Maier, Timothy G. Mattson, S. Papadopoulos, J. Parkhurst, Nesime Tatbul, Manasi Vartak, Stan Zdonik

Computer Science Faculty Publications and Presentations

This paper presents BigDAWG, a reference implementation of a new architecture for “Big Data” applications. Such applications not only call for large-scale analytics, but also for real-time streaming support, smaller analytics at interactive speeds, data visualization, and cross-storage-system queries. Guided by the principle that “one size does not fit all”, we build on top of a variety of storage engines, each designed for a specialized use case. To illustrate the promise of this approach, we demonstrate its effectiveness on a hospital application using data from an intensive care unit (ICU). This complex application serves the needs of doctors and researchers …


Robust Super-Resolution By Fusion Of Interpolated Frames For Color And Grayscale Images, Barry K. Karch, Russell C. Hardie Jan 2015

Robust Super-Resolution By Fusion Of Interpolated Frames For Color And Grayscale Images, Barry K. Karch, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

Multi-frame super-resolution (SR) processing seeks to overcome undersampling issues that can lead to undesirable aliasing artifacts in imaging systems. A key factor in effective multi-frame SR is accurate subpixel inter-frame registration. Accurate registration is more difficult when frame-to-frame motion does not contain simple global translation and includes locally moving scene objects. SR processing is further complicated when the camera captures full color by using a Bayer color filter array (CFA). Various aspects of these SR challenges have been previously investigated. Fast SR algorithms tend to have difficulty accommodating complex motion and CFA sensors. Furthermore, methods that can tolerate these complexities …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer Jan 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger Jan 2015

Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …


Creating A National Nonmotorized Traffic Count Archive: Process And Progress, Krista Nordback, Kristin A. Tufte, Morgan Harvey, Nathan Mcneil, Elizabeth Stolz, Jolene Liu Jan 2015

Creating A National Nonmotorized Traffic Count Archive: Process And Progress, Krista Nordback, Kristin A. Tufte, Morgan Harvey, Nathan Mcneil, Elizabeth Stolz, Jolene Liu

Civil and Environmental Engineering Faculty Publications and Presentations

Robust bicycle and pedestrian data on a national scale would help promote effective planning and engineering of walking and bicycling facilities, build the evidence-based case for funding such projects, and dispel notions that walking and cycling are not occurring. To organize and promote the collection of nonmotorized traffic data, a team of transportation professionals and computer scientists is creating a national bicycle and pedestrian count archive. This archive will enable data sharing by centralizing continuous and short-duration traffic counts in a publicly available online archive. Although other archives exist, this will be the first archive that will be national in …