Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2002

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 35

Full-Text Articles in Computer Engineering

A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns Dec 2002

A Performance Study Of Lam And Mpich On An Smp Cluster, Brian Patrick Kearns

Dissertations and Theses

Many universities and research laboratories have developed low cost clusters, built from Commodity-Off-The-Shelf (COTS) components and running mostly free software. Research has shown that these types of systems are well-equipped to handle many problems requiring parallel processing. The primary components of clusters are hardware, networking, and system software. An important system software consideration for clusters is the choice of the message passing library.

MPI (Message Passing Interface) has arguably become the most widely used message passing library on clusters and other parallel architectures, due in part to its existence as a standard. As a standard, MPI is open for anyone …


Congruent Weak Conformance, Ronald W. Brower Sep 2002

Congruent Weak Conformance, Ronald W. Brower

Theses and Dissertations

This research addresses the problem of verifying implementations against specifications through an innovative logic approach. Congruent weak conformance, a formal relationship between agents and specifications, has been developed and proven to be a congruent partial order. This property arises from a set of relations called weak conformations. The largest, called weak conformance, is analogous to Milner's observational equivalence. Weak conformance is not an equivalence, however, but rather an ordering relation among processes. Weak conformance allows behaviors in the implementation that are unreachable in the specification. Furthermore, it exploits output concurrencies and allows interleaving of extraneous output actions in the implementation. …


Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr Aug 2002

Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr

Theses

Currently, Wavelength Division Multiplexing (WDM) optical networks play a major role in supporting the outbreak in demand for high bandwidth networks driven by the Internet. It can be a catastrophe to millions of users if a single optical fiber is somehow cut off from the network, and there is no protection in the design of the logical topology for a restorative mechanism. Many protection and restoration algorithms are needed to prevent, reroute, and/or reconfigure the network from damages in such a situation. In the past few years, many works dealing with these issues have been reported. Those algorithms can be …


Multicast Routing Algorithms And Failure Analyses For Low Earth Orbit Satellite Communication Networks, Jae Soong Lee Aug 2002

Multicast Routing Algorithms And Failure Analyses For Low Earth Orbit Satellite Communication Networks, Jae Soong Lee

Theses and Dissertations

In the rapidly changing environment of mobile communications, the importance of the mobile satellite (e,g,, low earth orbit satellites (LEOsats)) networks will increase due to their global visibility and connection. Multicasting is an effective communication method in terms of frequency spectrum usage for a LEO network. It is devised to provide lower network traffic (i,e,, one-to-many transmissions). This research examines the system performance of two dissimilar terrestrially-based multicasting protocols: the Distance Vector Multicast Routing Protocol (DVMRP) and the On Demand Multicast Routing Protocol (ODMRP). These two protocols are simulated in large group membership density and in the presence of satellite …


Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones Jul 2002

Content Aware Request Distribution For High Performance Web Service: A Performance Study, Robert M. Jones

Dissertations and Theses

The World Wide Web is becoming a basic infrastructure for a variety of services, and the increases in audience size and client network bandwidth create service demands that are outpacing server capacity. Web clusters are one solution to this need for high performance, highly available web server systems. We are interested in load distribution techniques, specifically Layer-7 algorithms that are content-aware. Layer-7 algorithms allow distribution control based on the specific content requested, which is advantageous for a system that offers highly heterogenous services. We examine the performance of the Client Aware Policy (CAP) on a Linux/Apache web cluster consisting of …


Three Dimensional Deformable Modeling Of The Spine, Rania Atef Jun 2002

Three Dimensional Deformable Modeling Of The Spine, Rania Atef

Archived Theses and Dissertations

The purpose of this work is the development of a 3D deformable model of the spinal lumbar region. The data for the spine comes from the National Library of Medicine website (NLM). The 3D model uses several NURBS patches as modeling primitives. This work is part of a larger system aimed at building a 3D surgical simulator coupled with a force - feedback.PHANToM robot in a virtual reality CA VE system.

The input to this system is a set of two-dimensional CT images. They are processed and edge detected to produce a set of contoured images containing the vertebral data. …


Three-Dimensional Modeling Of The Lumbar Spine For Simulation Purposes, Ayman Hamdy Mohamed Kassem Jun 2002

Three-Dimensional Modeling Of The Lumbar Spine For Simulation Purposes, Ayman Hamdy Mohamed Kassem

Archived Theses and Dissertations

Human spine modeling started gaining its popularity in world war II for military purposes as a result of studying the phenomenon of pilot spine cracking during ejection. It started with simple beam modeling and continued to get more complicated and realistic. Modeling the spine is a challenging problem because of its detailed anatomical structure, the motion of soft and bone tissues and the deformations that occur during different loads. Realistic spine modeling is expected to have a significant impact in a world where spinal injuries and deformities account for a large percentage of all injuries. In this research, a spinal …


Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You Apr 2002

Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Yuqiu You in Spring of 2002.


Robust Face Representation And Recognition Under Low Resolution And Difficult Lighting Conditions, Mohammad Moinul Islam Apr 2002

Robust Face Representation And Recognition Under Low Resolution And Difficult Lighting Conditions, Mohammad Moinul Islam

Electrical & Computer Engineering Theses & Dissertations

This dissertation focuses on different aspects of face image analysis for accurate face recognition under low resolution and poor lighting conditions. A novel resolution enhancement technique is proposed for enhancing a low resolution face image into a high resolution image for better visualization and improved feature extraction, especially in a video surveillance environment. This method performs kernel regression and component feature learning in local neighborhood of the face images. It uses directional Fourier phase feature component to adaptively lean the regression kernel based on local covariance to estimate the high resolution image. For each patch in the neighborhood, four directional …


A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi Apr 2002

A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi

Electrical & Computer Engineering Theses & Dissertations

This work presents an abstract formal model of the interconnection structure of the Open Systems Interconnection Reference Model (OSI-RM) developed using Object-Oriented modeling principles permitting it to serve as a re-usable platform in supporting the development of simulations and formal methods applied to layered network protocols. A simulation of the object model using MODSIM III was developed and Prototype Verification System (PVS) was used to show the applicability of the object model to formal methods by formally specifying and verifying a Global Systems for Mobile communications (GSM) protocol. This application has proved to be successful in two aspects. The first …


Analysis Of Ultra Wide Band (Uwb) Technology For An Indoor Geolocation And Physiological Monitoring System, Cengiz Alabacak Mar 2002

Analysis Of Ultra Wide Band (Uwb) Technology For An Indoor Geolocation And Physiological Monitoring System, Cengiz Alabacak

Theses and Dissertations

The goal of this research is to analyze the utility of UWB for indoor geolocation and to evaluate a prototype system, which will send information detailing a person’s position and physiological status to a command center. In a real world environment, geolocation and physiological status information needs to be sent to a command and control center that may be located several miles away from the operational environment. This research analyzes and characterizes the UWB signal in the various operational environments associated with indoor geolocation. Additionally, "typical usage scenarios" for the interaction between UWB and other devices are also tested and …


Wavelet Domain Communication System (Wdcs): Packet-Based Wavelet Spectral Estimation And M-Ary Signaling, Marion Jay F. Lee Mar 2002

Wavelet Domain Communication System (Wdcs): Packet-Based Wavelet Spectral Estimation And M-Ary Signaling, Marion Jay F. Lee

Theses and Dissertations

A recently proposed Wavelet Domain Communication System (WDCS) using transform domain processing demonstrated excellent interference avoidance capability under adverse environmental conditions. This work extends previous results by: 1) incorporating a wavelet packet decomposition technique, 2) demonstrating M-Ary signaling capability, and 3) providing increased adaptivity over a larger class of interference signals. The newly proposed packet-based WDCS is modeled and its performance characterized using MATLAB®. In addition, the WDCS response to two scenarios simulating Doppler effects and physical separation of transceivers are obtained. The fundamental metric for analysis and performance evaluation is bit error rate (Pb). Relative to …


A Direct Sequence Code-Division Multiple-Access Local Area Network Model, James R. Rapallo Jr. Mar 2002

A Direct Sequence Code-Division Multiple-Access Local Area Network Model, James R. Rapallo Jr.

Theses and Dissertations

The United States Air Force relies heavily on computer networks for every-day operations. The medium access control (MAC) protocol currently used by most local area (LAN) permits a single station to access the network at a time (e.g. CSMA/CD or Ethernet). This limits network throughput to, at most, the maximum transmission rate of a single node with overhead neglected. Significant delays are observed when a LAN is overloaded by multiple users attempting to access the common medium. In CSMA/CD, collisions are detected and the data sent by the nodes involved are delayed and transmitted at a later time. The retransmission …


Performance Evaluation Of Hyperbolic Position Location Technique In Cellular Wireless Networks, Hakan Senturk Mar 2002

Performance Evaluation Of Hyperbolic Position Location Technique In Cellular Wireless Networks, Hakan Senturk

Theses and Dissertations

This study addresses the wireless geolocation problem that has been an attractive subject for the last few years after Federal Communications Commission (FCC) mandate for wireless service providers to locate emergency 911 users with a high degree of accuracy -within a radius of 125 meters, 67 percent of the time by October 2001. There are a number of different geolocation technologies that have been proposed. These include, Assisted GPS (A-GPS), network-based technologies such as Enhanced Observed Time Difference (E-OTD), Time Difference of Arrival (TDOA), Angle of Arrival (AOA), and Cell of Origin (COO). This research focuses on network based techniques, …


Integrated Manet Mutual Authentication System, Jason T. Ballah Mar 2002

Integrated Manet Mutual Authentication System, Jason T. Ballah

Theses and Dissertations

The Integrated MANET Mutual Authentication System (IMMAS) provides implied mutual authentication of all routing and data traffic within a Mobile Ad Hoc Network (MANET) by combining Elliptic Curve Cryptography, a public-key cryptosystem, with the Dynamic Source Routing (DSR) Protocol. IMMAS provides security by effectively hiding network topology from adversaries while reducing the potential for, among other things, traffic analysis and data tampering, all while providing a graceful degradation for each of the authentication components. Current research in MANETs tends to focus primarily on routing issues leaving topics such as security and authentication for future research. IMMAS focuses on achieving a …


Performance Analysis Of A Dynamic Bandwidth Allocation Algorithm In A Circuit-Switched Communications Network, Timothy M. Schwamb Mar 2002

Performance Analysis Of A Dynamic Bandwidth Allocation Algorithm In A Circuit-Switched Communications Network, Timothy M. Schwamb

Theses and Dissertations

Military communications networks typically employ a gateway multiplexer to aggregate all communications traffic onto a single link. These multiplexers typically use a static bandwidth allocation method via time-division multiplexing (TDM). Inefficiencies occur when a high-bandwidth circuit, e.g., a video teleconferencing circuit, is relatively inactive rendering a considerable portion of the aggregate bandwidth wasted while inactive. Dynamic bandwidth allocation (DBA) reclaims unused bandwidth from circuits with low utilization and reallocates it to circuits with higher utilization without adversely affecting queuing delay. The proposed DBA algorithm developed here measures instantaneous utilization by counting frames arriving during the transmission time of a single …


Fabrication Techniques For Micro-Optical Device Arrays, Ryan D. Conk Mar 2002

Fabrication Techniques For Micro-Optical Device Arrays, Ryan D. Conk

Theses and Dissertations

Micro-optical devices are vital components of conventional military data storage, sensor, and communication systems. Two types of micro-optical device arrays exist: individually addressable and matrix addressable. The matrix addressable array has a drastically reduced number of metal lines and can potentially be fabricated into large, dense (over 1k elements) arrays. Such arrays are expected to enable the development of extremely high bandwidth optical interconnect systems for future military applications including optical computing and short-haul fiber optical communication systems. I investigate new fabrication techniques for the assembly of dense matrix-addressed arrays of micro-optical devices such as vertical-cavity surface-emitting lasers. Using a …


The Modified Hash Chain Sealed Bid Auction Protocol, Riham Hassan Abdel-Moneim Feb 2002

The Modified Hash Chain Sealed Bid Auction Protocol, Riham Hassan Abdel-Moneim

Archived Theses and Dissertations

No abstract provided.


Attack Visualization For Intrusion Detection System, Mohammad A. Rabie Jan 2002

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie

Theses

Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results …


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2002

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as anomalies …


A Power Scheduling Software Package For Planetary Habitats, Gary W. Huband Jan 2002

A Power Scheduling Software Package For Planetary Habitats, Gary W. Huband

Legacy ETDs

Mankind has established a permanent presence in space with the International Space Station. The next step is building habitats on the Moon or Mars. However, these habitats will have to be nearly self-sustaining because replenishment from Earth will be costly. Power for life support and other electrical devices will be limited and must be monitored and allocated. This thesis develops the framework for power scheduling software to perform these tasks.

The software includes a graphical user interface (GUI) to allow the user to interact with the power schedule, a database and server, and a simulation for the effects of device …


Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang Jan 2002

Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang

Theses Digitization Project

The project, Spider III, presents architecture and protocol of a multi-agent-based internet distributed computing system, which provides a convenient development and execution environment for transparent task distribution, load balancing, and fault tolerance. Spider is an on going distribution computing project in the Department of Computer Science, California State University San Bernardino. It was first proposed as an object-oriented distributed system by Han-Sheng Yuh in his master's thesis in 1997. It has been further developed by Koping Wang in his master's project, of where he made large contribution and implemented the Spider II System.


An On-Line Acid-Base Titration Applet In The Generic Tutorial System For The Sciences Project, Thomas Lee Gummo Jan 2002

An On-Line Acid-Base Titration Applet In The Generic Tutorial System For The Sciences Project, Thomas Lee Gummo

Theses Digitization Project

The purpose of this Master's Project was to develop an Acid-Base Titration Simulator. It was also to be a part of the California State University - San Bernardino's GTSS, Generic Tutorial System for the Sciences, project. The main benefit is that students will be able to conduct titration experiments over the Internet without being in the laboratory and without costly equipment or dangerous chemicals. Instructors at the high school and college level can demonstrate the key principles of titration.


Java Prototype Of Hypercard Bibliography Past Implementation And Present Choices, Neeta Reddy Jan 2002

Java Prototype Of Hypercard Bibliography Past Implementation And Present Choices, Neeta Reddy

Theses Digitization Project

This project was started with JDK Version 1.0 and was later upgraded to version JDK Version 1.2.2, to create a graphical user interface using the Abstract Window Toolkit (AWT) to a HyperCard bibliography of software engineering. The bibliographic index tool is designed to facilitate searching for text and is run as a Java applet. It presents an alphabetically ordered list of author names and subjects. With the bibliography index tool one can manipulate a bibliographic list directly over the World Wide Web on a computer that lists electronic bibliographies.


Javaserver Page, Java Servlet And Javabean Technology: Online Real Estate Company, Kevin Tzu-Jung Chen Jan 2002

Javaserver Page, Java Servlet And Javabean Technology: Online Real Estate Company, Kevin Tzu-Jung Chen

Theses Digitization Project

This project will simulate an online real estate company using JSP, Java Servlet and JavaBean technology.


Wireless Messaging And Project Management System, Bhrigu Celly Jan 2002

Wireless Messaging And Project Management System, Bhrigu Celly

Theses Digitization Project

Wireless is an important part of the future and utilizing the wireless technology in project management is a great tool. This project is a messaging system designed using WAP and Java Server pages, as both of them are the technologies of the future. The project puts together a tool to help in project management made with the use of Java Server Pages and MySQL as the backend database. It uses Wireless Markup Language as the basic language for the cellular phones and the hand held wireless devices. The prototype has been modeled on project planning for power plants done by …


A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen Jan 2002

A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen

Dissertations and Theses @ UNI

Since computers came into existence, simulations have been associated with it as the two inseparable media, simulations and computers, have had a mutually beneficial effect. With the advent of the flexible microcomputer, simulation has been widely used. In recent years, computer technology has infiltrated every sector in society, especially the educational system and industrial operations where simulations are essential for satisfying both instructional and industrial needs. Simulation effectiveness research has been mixed in both the educational system and industries. Therefore, it is still necessary to evaluate how effective computer simulation is as an instructional method or strategy.

This study was …


Mobile Order Entry System Based On The Wireless Technology, Sumit Imsuksri Jan 2002

Mobile Order Entry System Based On The Wireless Technology, Sumit Imsuksri

Theses Digitization Project

The sales representatives primary duties are to attract wholesale and retail buyers and purchasing agents to their merchandise, and to address any of their client's questions or concerns. Aided by a laptop computer connected to the Internet, they can access the customer information and sell products to their customer immediately. This project, a Mobile Order Entry System using cellphones, will give sales representatives as state-of-the-art alternative in accessing anf selling products to their customers through cell phones instead of using laptop computers.


Web-Based Interactive Self-Evaluation System For Computer Science In Generic Tutorial System For The Sciences Project, Supachai Praritsantik Jan 2002

Web-Based Interactive Self-Evaluation System For Computer Science In Generic Tutorial System For The Sciences Project, Supachai Praritsantik

Theses Digitization Project

The goal of this master project is to promote and facilitate the use of new web-based and Java-based technologies in the development of self-evaluation systems for computer science; in particular, analysis of sorting algorithms.


A Doctor-Patient Communication Tool (Dpct) Ryodoroku Application On The Web, Hongwei Bi Jan 2002

A Doctor-Patient Communication Tool (Dpct) Ryodoroku Application On The Web, Hongwei Bi

Theses Digitization Project

No abstract provided.