Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 472

Full-Text Articles in Computer Engineering

Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang Dec 2006

Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang

Dissertations

The Doppler spread, or equivalently, the mobile speed, is a measure of the spectral dispersion of a mobile fading channel. Accurate estimation of the mobile speed is important in wireless mobile applications which require such as knowledge of the rate of channel variations. In this dissertation, first the performance of classical crossing- and covariance-based speed estimators is studied. Next, the problem of mobile speed estimation using diversity combining is investigated. Then, a nonparametric estimation technique is proposed that is robust to different channel variations. Finally, cyclostationarity-based speed estimators which can be applied either blindly or with the aid of pilot ...


Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen Dec 2006

Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen

Theses

Non Repudiation Secure File Transfer Protocol (NRSFTP) is designed to resolve three main concerns for today's electronic file transfer methodology. The three main concerns are Non-Repudiation, Secure, and Non-Real Time file transfer. Non-repudiation is to assure the receiver that the sender of the document is not an imposter. Secure document transfer is to assure the sender that only the intended receiver will be able to read the document. Non-real-time file transfer is to provide convenient and low cost transportability of the encrypted data from one party to another. With the above three concerns addressed, the NRSFTP protocol can be ...


High-Resolution Mapping In Manus Basin, C. Roman, V. Ferrini Dec 2006

High-Resolution Mapping In Manus Basin, C. Roman, V. Ferrini

Christopher N. Roman

Near-bottom seafloor mapping with precisely navigated deep submergence vehicles has become increasingly common in a range of oceanographic settings. Recent mapping efforts at deep-water hydrothermal vent sites have resulted in high-resolution (sub-meter) bathymetry datasets that can be used to identify morphological features associated with volcanic, tectonic, and hydrothermal processes. The resolution of these maps, and our ability to accurately quantify the complex morphologic details of hydrothermal structures has been limited by a number of variables including navigational accuracy, sonar settings (e.g. acoustic wavelength, sonar orientation, ping rate), survey parameters (e.g. altitude, speed), data density, and data processing techniques ...


Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith Dec 2006

Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith

Steven R Ray

Recent years have seen rapid progress in the development of ontologies as semantic models intended to capture and represent aspects of the real world. There is, however, great variation in the quality of ontologies. If ontologies are to become progressively better in the future, more rigorously developed, and more appropriately compared, then a systematic discipline of ontology evaluation must be created to ensure quality of content and methodology. Systematic methods for ontology evaluation will take into account representation of individual ontologies, performance and accuracy on tasks for which the ontology is designed and used, degree of alignment with other ontologies ...


Estimating Variance Under Interval And Fuzzy Uncertainty: Case Of Hierarchical Estimation, Gang Xiang, Vladik Kreinovich Dec 2006

Estimating Variance Under Interval And Fuzzy Uncertainty: Case Of Hierarchical Estimation, Gang Xiang, Vladik Kreinovich

Departmental Technical Reports (CS)

No abstract provided.


Fast Algorithms For Computing Statistics Under Interval And Fuzzy Uncertainty, And Their Applications, Gang Xiang, Vladik Kreinovich Dec 2006

Fast Algorithms For Computing Statistics Under Interval And Fuzzy Uncertainty, And Their Applications, Gang Xiang, Vladik Kreinovich

Departmental Technical Reports (CS)

In many engineering applications, we have to combine probabilistic, interval, and fuzzy uncertainty. For example, in environmental analysis, we observe a pollution level x(t) in a lake at different moments of time t, and we would like to estimate standard statistical characteristics such as mean, variance, autocorrelation, correlation with other measurements. In environmental measurements, we often only measure the values with interval uncertainty. We must therefore modify the existing statistical algorithms to process such interval data.

In this paper, we provide a brief survey of algorithms for computing various statistics under interval (and fuzzy) uncertainty and of their applications ...


For Piecewise Smooth Signals, L1 Method Is The Best Among Lp: An Interval-Based Justification Of An Empirical Fact, Vladik Kreinovich, Arnold Neumaier Dec 2006

For Piecewise Smooth Signals, L1 Method Is The Best Among Lp: An Interval-Based Justification Of An Empirical Fact, Vladik Kreinovich, Arnold Neumaier

Departmental Technical Reports (CS)

Traditional engineering techniques use the Least Squares method (i.e., in mathematical terms, the l2-norm) to process data. It is known that in many practical situations, lp-methods with p=/=2 lead to better results. In different practical situations, different values of p are optimal. It is known that in several situations when we need to reconstruct a piecewise smooth signal, the empirically optimal value of p is close to 1. In this paper, we provide a new interval-based theoretical explanation for this empirical fact.


Efficient Image Processing In Resource-Constrained Visual Sensor Networks, Hongtao Du Dec 2006

Efficient Image Processing In Resource-Constrained Visual Sensor Networks, Hongtao Du

Doctoral Dissertations

Visual sensor networks (VSNs) that employ content-rich 2-D images or image sequences as the basic media have been evolving rapidly in recent years. Besides the critical resource constraints that are already inherent in any micro-sensor networks, the development of VSNs also faces challenges from device design, image transmission, and onboard image processing, among which efficient onboard processing is the most difficult to tackle. The focus of this dis- sertation is to develop efficient image processing solutions from three aspects: to improve the time-consuming image processing algorithms using pipelined and parallel computing; to dis- tribute the computation more effectively through novel ...


Scheduling Algorithms For Scalable High-Performance Packet Switching Architectures, Xike Li Dec 2006

Scheduling Algorithms For Scalable High-Performance Packet Switching Architectures, Xike Li

Doctoral Dissertations

Packet switching fabrics constitute a fundamental building block of all Internet routers. As a core technology, the switching engine is responsible for enabling multiple input (ingress) ports to be dynamically linked to output (egress) ports, thereby allowing packets to effectively traverse the router. Scheduling algorithms, which play a key role in switching fabrics, determine the dynamic configurations of the input-output matchings. The ever growing need for additional bandwidth and more sophisticated service provisioning in next- generation networks necessitates the introduction of scalable packet scheduling solutions that go beyond legacy schemes.

Switch architectures can be coarsely classified into two categories, in ...


Direct Sequence Modified Time Hopping Ppm Over Ultra Wideband S-V Channel, Peter Vial, Beata J. Wysocki, Tadeusz A. Wysocki Dec 2006

Direct Sequence Modified Time Hopping Ppm Over Ultra Wideband S-V Channel, Peter Vial, Beata J. Wysocki, Tadeusz A. Wysocki

Faculty Publications in Computer & Electronics Engineering (to 2015)

A three position Pulse Position Modulation (PPM) scheme is proposed for a Direct Sequence Time Hopping Ultra Wideband wireless communication system. The channel is based on the Saleh-Valenzuela model. We show that by adapting the Space Time Spreading technique to use three pulse positions in a single input single output system representing -2,0,2 an improvement in Bit Error Rate is achieved compared to sending the same bits using two pulse positions only. In addition, the bit access rate is doubled as two bits can be successfully sent in the same time using our proposed system.


An Energy Efficient Mac-Phy Approach To Support Distributed Source Coding In Wireless Sensor Network, Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Beata J. Wysocki, Tadeusz A. Wysocki Dec 2006

An Energy Efficient Mac-Phy Approach To Support Distributed Source Coding In Wireless Sensor Network, Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Beata J. Wysocki, Tadeusz A. Wysocki

Faculty Publications in Computer & Electronics Engineering (to 2015)

Distributed Source Coding (DSC) based signal processing applications are ideal candidates for multirate transmissions in Wireless Sensor Network (WSN). In this paper, we propose a novel MAC-PHY approach in WSN to achieve energy efficiency using multirate desirable for the DSC based signal processing applications. Our approach is different from the common multirate research in link adaptation, the focus of which is to increase throughput based on rate adaptation derived from variable channel conditions. In the proposed approach, the redundant and inefficient communications are eliminated, yielding significant improvement of energy efficiency in WSN. Here, the minimum desirable transmission power can be ...


Capacity Of Single-Radio Ad Hoc Networks For Handling High Bit-Rate Real-Time Internet Applications, Mehran Abolhasan, Tadeusz A. Wysocki, Daniel Franklin, Justin Lipman Dec 2006

Capacity Of Single-Radio Ad Hoc Networks For Handling High Bit-Rate Real-Time Internet Applications, Mehran Abolhasan, Tadeusz A. Wysocki, Daniel Franklin, Justin Lipman

Faculty Publications in Computer & Electronics Engineering (to 2015)

Until now, the main focus in ad hoc networking has been improving Routing and Medium Access Control (MAC) Strategies. As a result, a diverse range of routing and MAC protocols have been proposed. To evaluate these protocols, much of the existing research has been based on simulation scenarios which assume ideal channel conditions and low node and traffic densities. Therefore, despite a few studies which have shown the performance limitations of ad hoc networks theoretically, there has not been many simulation studies performed which investigate the performance of ad hoc networks under a high node and traffic density. This paper ...


A Reconfigurable Supercomputing Library For Accelerated Parallel Lagged-Fibonacci Pseudorandom Number Generation, Yu Bi Dec 2006

A Reconfigurable Supercomputing Library For Accelerated Parallel Lagged-Fibonacci Pseudorandom Number Generation, Yu Bi

Masters Theses

To help promote more widespread adoption of hardware acceleration in parallel scientific computing, we present portable, flexible design components for pseudorandom number generation. Due to the success of the Scalable Parallel Random Number Generators (SPRNG) software library in stochastic computations (e.g., Monte Carlo simulations), we developed an efficient and portable hardware architecture fully compatible with SPRNG’s Parallel Additive Lagged Fibonacci Generator (PALFG). Our general design produces identical results for all the parameter sets that SPRNG supports and yields high performance parallel random number generators which can each generate 162 million 31-bit uniform random integers per second on Xilinx ...


A Fuzzy Logic Controller For Autonomous Wheeled Vehicles, Mohamed Trabia, Linda Z. Shi, Neil Eugene Hodge Dec 2006

A Fuzzy Logic Controller For Autonomous Wheeled Vehicles, Mohamed Trabia, Linda Z. Shi, Neil Eugene Hodge

Mechanical Engineering Faculty Publications

Autonomous vehicles have potential applications in many fields, such as replacing humans in hazardous environments, conducting military missions, and performing routine tasks for industry. Driving ground vehicles is an area where human performance has proven to be reliable. Drivers typically respond quickly to sudden changes in their environment. While other control techniques may be used to control a vehicle, fuzzy logic has certain advantages in this area; one of them is its ability to incorporate human knowledge and experience, via language, into relationships among the given quantities. Fuzzy logic controllers for autonomous vehicles have been successfully applied to address various ...


Multivariate Discretization Of Continuous Valued Attributes., Ehab Ahmed El Sayed Ahmed 1978- Dec 2006

Multivariate Discretization Of Continuous Valued Attributes., Ehab Ahmed El Sayed Ahmed 1978-

Electronic Theses and Dissertations

The area of Knowledge discovery and data mining is growing rapidly. Feature Discretization is a crucial issue in Knowledge Discovery in Databases (KDD), or Data Mining because most data sets used in real world applications have features with continuously values. Discretization is performed as a preprocessing step of the data mining to make data mining techniques useful for these data sets. This thesis addresses discretization issue by proposing a multivariate discretization (MVD) algorithm. It begins withal number of common discretization algorithms like Equal width discretization, Equal frequency discretization, Naïve; Entropy based discretization, Chi square discretization, and orthogonal hyper planes. After ...


Gridfields: Model-Driven Data Transformation In The Physical Sciences, Bill Howe Dec 2006

Gridfields: Model-Driven Data Transformation In The Physical Sciences, Bill Howe

Dissertations and Theses

Scientists' ability to generate and store simulation results is outpacing their ability to analyze them via ad hoc programs. We observe that these programs exhibit an algebraic structure that can be used to facilitate reasoning and improve performance. In this dissertation, we present a formal data model that exposes this algebraic structure, then implement the model, evaluate it, and use it to express, optimize, and reason about data transformations in a variety of scientific domains.

Simulation results are defined over a logical grid structure that allows a continuous domain to be represented discretely in the computer. Existing approaches for manipulating ...


Robust Control Techniques Enabling Duty Cycle Experiments Utilizing A 6-Dof Crewstation Motion Base, A Full Scale Combat Hybrid Electric Power System, And Long Distance Internet Communications, Marc Compere, Jarrett Goodell, Miguel Simon, Wilford Smith, Mark Brudnak Nov 2006

Robust Control Techniques Enabling Duty Cycle Experiments Utilizing A 6-Dof Crewstation Motion Base, A Full Scale Combat Hybrid Electric Power System, And Long Distance Internet Communications, Marc Compere, Jarrett Goodell, Miguel Simon, Wilford Smith, Mark Brudnak

Publications

The RemoteLink effort supports the U.S. Army's objective for developing and fielding next generation hybrid-electric combat vehicles. It is a distributed soldierin- the-Ioop and hardware-in-the-Ioop environment with a 6-DOF motion base for operator realism, a full-scale combat hybrid electric power system, and an operational context provided by OneSAF. The driver/gunner crewstations rest on one of two 6-DOF motion bases at the U.S. Army TARDEC Simulation Laboratory (TSL). The hybrid power system is located 2,450 miles away at the TARDEC Power and Energy System Integration Laboratory (P&E SIL). The primary technical challenge in the RemoteLink ...


Context-Aware Data Caching For Mobile Computing Environments, Stylianos Drakatos Nov 2006

Context-Aware Data Caching For Mobile Computing Environments, Stylianos Drakatos

FIU Electronic Theses and Dissertations

The deployment of wireless communications coupled with the popularity of portable devices has led to significant research in the area of mobile data caching. Prior research has focused on the development of solutions that allow applications to run in wireless environments using proxy based techniques. Most of these approaches are semantic based and do not provide adequate support for representing the context of a user (i.e., the interpreted human intention.). Although the context may be treated implicitly it is still crucial to data management. In order to address this challenge this dissertation focuses on two characteristics: how to predict ...


How To Take Into Account Dependence Between The Inputs: From Interval Computations To Constraint-Related Set Computations, With Potential Applications To Nuclear Safety, Bio- And Geosciences, Martine Ceberio, Scott Ferson, Vladik Kreinovich, Sanjeev Chopra, Gang Xiang, Adrian Murguia, Jorge Santillan Nov 2006

How To Take Into Account Dependence Between The Inputs: From Interval Computations To Constraint-Related Set Computations, With Potential Applications To Nuclear Safety, Bio- And Geosciences, Martine Ceberio, Scott Ferson, Vladik Kreinovich, Sanjeev Chopra, Gang Xiang, Adrian Murguia, Jorge Santillan

Departmental Technical Reports (CS)

In many real-life situations, in addition to knowing the intervals Xi of possible values of each variable xi, we also know additional restrictions on the possible combinations of xi; in this case, the set X of possible values of x=(x1,..,xn) is a proper subset of the original box X1 x ... x Xn. In this paper, we show how to take into account this dependence between the inputs when computing the range of a function f(x1,...,xn).


Multi-User Uwb-Ir Systems With Interleaved Coding-Modulation On Multipath Fading Channels, Michal M. Pietrzyk, Keni Popovski, Tadeusz Wysocki, Beata J. Wysocki, Jos H. Weber Nov 2006

Multi-User Uwb-Ir Systems With Interleaved Coding-Modulation On Multipath Fading Channels, Michal M. Pietrzyk, Keni Popovski, Tadeusz Wysocki, Beata J. Wysocki, Jos H. Weber

Faculty Publications in Computer & Electronics Engineering (to 2015)

Interleaved coding-modulation (ICM) is a recently proposed method for ultra-wideband impulse radio (UWBIR) systems. ICM exploits the concept of chip interleaving, allowing to alleviate the problem of inter-symbol and inter-pulse interference commonly present in high data rate UWB-IR systems. In this paper, we extend previous work on ICM to scarcely populated multi-user scenarios. We propose a design of a deterministic chip interleaver based on time-hopping hyperbolic congruence sequences. We also review the main parameters of the random and hyperbolic interleavers. Our results indicate that the proposed type of interleaver yields similar performance to random interleavers but with the advantage of ...


What Users Say They Want In Documentation, David G. Novick, Karen Ward Oct 2006

What Users Say They Want In Documentation, David G. Novick, Karen Ward

Departmental Papers (CS)

While earlier work provided a partial view of users’ preferences about manuals, for most users in most work contexts the important question remains open: What do users want in documentation? This paper presents the results of a study in which a diverse cross-section of 25 users was interviewed in depth about their needs and preferences with respect to software help systems, whether printed or on-line, that they use at work. The study’s participants indicated that they preferred documentation, whether online or printed, that is easy to navigate, provides explanations at an appropriate level of technical detail, enables finding as ...


Why Don't People Read The Manual?, David G. Novick, Karen Ward Oct 2006

Why Don't People Read The Manual?, David G. Novick, Karen Ward

Departmental Papers (CS)

Few users of computer applications seek help from the documentation. This paper reports the results of an empirical study of why this is so and examines how, in real work, users solve their usability problems. Based on in-depth interviews with 25 subjects representing a varied cross-section of users, we find that users do avoid using both paper and online help systems. Few users have paper manuals for the most heavily used applications, but none complained about their lack. Online help is more likely to be consulted than paper manuals, but users are equally likely to report that they solve their ...


How To Efficiently Process Uncertainty Within A Cyberinfrastructure Without Sacrificing Privacy And Confidentiality, Luc Longpre, Vladik Kreinovich Oct 2006

How To Efficiently Process Uncertainty Within A Cyberinfrastructure Without Sacrificing Privacy And Confidentiality, Luc Longpre, Vladik Kreinovich

Departmental Technical Reports (CS)

In this paper, we propose a simple solution to the problem of estimating uncertainty of the results of applying a black-box algorithm -- without sacrificing privacy and confidentiality of the algorithm.


Entropy Conserving Probability Transforms And The Entailment Principle, Ronald R. Yager, Vladik Kreinovich Oct 2006

Entropy Conserving Probability Transforms And The Entailment Principle, Ronald R. Yager, Vladik Kreinovich

Departmental Technical Reports (CS)

Our main result here is the development of a general procedure for transforming some initial probability distribution into a new probability distribution in a way that the resulting distribution has entropy at least as great as the original distribution. A significant aspect of our approach is that it makes use of the Zadeh's entailment principle which is itself a general procedure for going from an initial possibility distribution to a new possibility distribution so that the resulting possibility has an uncertainty at least as great of the original.


Two Etudes On Combining Probabilistic And Interval Uncertainty: Processing Correlations And Measuring Loss Of Privacy, Martine Ceberio, Gang Xiang, Luc Longpre, Vladik Kreinovich, Hung T. Nguyen, Daniel Berleant Oct 2006

Two Etudes On Combining Probabilistic And Interval Uncertainty: Processing Correlations And Measuring Loss Of Privacy, Martine Ceberio, Gang Xiang, Luc Longpre, Vladik Kreinovich, Hung T. Nguyen, Daniel Berleant

Departmental Technical Reports (CS)

In many practical situations, there is a need to combine interval and probabilistic uncertainty. The need for such a combination leads to two types of problems: (1) how to process the given combined uncertainty, and (2) how to gauge the amount of uncertainty and -- a related question -- how to best decrease this uncertainty. In our research, we concentrate on these two types of problems. In this paper, we present two examples that illustrate how the corresponding problems can be solved.


Ceg 453/653: Design Of Computing Systems, Jack Jean Oct 2006

Ceg 453/653: Design Of Computing Systems, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Cs 340: Programming Language Workshop In C#, Krishnaprasad Thirunarayan Oct 2006

Cs 340: Programming Language Workshop In C#, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course is designed as a self-study in C#. You are expected to learn the language and solve a set of programming problems assigned to you using MS Visual Studio .NET. There are no exams. We officially meet only once in the quarter. However, I will be available in the posted office hours for clarifications and discussions about the programming problems.


Ceg 220: Introduction To C Programming For Engineers I, Ronald F. Taylor Oct 2006

Ceg 220: Introduction To C Programming For Engineers I, Ronald F. Taylor

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. Some programming assignments may involve complex arithmetic and trigonometric and exponential functions. 4 credit hours.


Ceg 210: Pc Networking I, Karen Meyer Oct 2006

Ceg 210: Pc Networking I, Karen Meyer

Computer Science & Engineering Syllabi

Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration. Course Goals

At the end of the quarter the student will be able to:

  • design and configure a client server network
  • create and manage network objects
  • plan and implement directory services and network file systems
  • plan and implement network security
  • design and write network login scripts
  • manage and solve problems related to a client server network


Ceg 433/633: Operating Systems, Prabhaker Mateti Oct 2006

Ceg 433/633: Operating Systems, Prabhaker Mateti

Computer Science & Engineering Syllabi

The management of resources in multi-user computer systems. Emphasis is on problems of file-system design, process scheduling, memory allocation, protection, and tools needed for solutions. Course projects use the CIC++ language and include the design of portions of an operating system. 4 credit hours.