Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Engineering

Hardware-Efficient Scalable Reinforcement Learning Systems, Zhenzhen Liu Dec 2007

Hardware-Efficient Scalable Reinforcement Learning Systems, Zhenzhen Liu

Doctoral Dissertations

Reinforcement Learning (RL) is a machine learning discipline in which an agent learns by interacting with its environment. In this paradigm, the agent is required to perceive its state and take actions accordingly. Upon taking each action, a numerical reward is provided by the environment. The goal of the agent is thus to maximize the aggregate rewards it receives over time. Over the past two decades, a large variety of algorithms have been proposed to select actions in order to explore the environment and gradually construct an e¤ective strategy that maximizes the rewards. These RL techniques have been successfully applied …


Radar System Characterization Extended To Hardware In The Loop Simulation For The Lab-Volt™ Training System, Oscar C. Mayhew Sep 2007

Radar System Characterization Extended To Hardware In The Loop Simulation For The Lab-Volt™ Training System, Oscar C. Mayhew

Theses and Dissertations

Modeling RADAR signals in software allows the testing of potential electronic counter measures and electronic counter counter measures without the associated RADAR hardware and test facilities. Performing a characterization process on a real world RADAR system reveals all imperfections within the system. The Lab-Volt™ RADAR system served as the characterized real world RADAR system. The characterization process consisted of measurements at selected front panel locations on the Lab-Volt™ transmitter module, antenna pedestal, receiver module, and dual channel sampler module. Due to the overwhelming influence of antenna parameters on a received signal, the characterization process also attempted to derive an antenna …


Real-Time Gps-Alternative Navigation Using Commodity Hardware, Jordon L. Fletcher Jun 2007

Real-Time Gps-Alternative Navigation Using Commodity Hardware, Jordon L. Fletcher

Theses and Dissertations

Modern navigation systems can use the Global Positioning System (GPS) to accurately determine position with precision in some cases bordering on millimeters. Unfortunately, GPS technology is susceptible to jamming, interception, and unavailability indoors or underground. There are several navigation techniques that can be used to navigate during times of GPS unavailability, but there are very few that result in GPS-level precision. One method of achieving high precision navigation without GPS is to fuse data obtained from multiple sensors. This thesis explores the fusion of imaging and inertial sensors and implements them in a real-time system that mimics human navigation. In …


Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra Apr 2007

Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra

Tony Wasserman

We describe a current study for obtaining information about management of commercial and community open source projects. We have interviewed and surveyed leaders of more than 75 open source projects. Questions focused on the styles of leadership and communication, with a technical focus on testing and quality assurance processes. This paper describes the methods used to identify and contact subjects, as well as the questions posed and some results.


Aphid: Anomaly Processor In Hardware For Intrusion Detection, Samuel A. Hart Mar 2007

Aphid: Anomaly Processor In Hardware For Intrusion Detection, Samuel A. Hart

Theses and Dissertations

The Anomaly Processor in Hardware for Intrusion Detection (APHID) is a step forward in the field of co-processing intrusion detection mechanism. By using small, fast hardware primitives APHID relieves the production CPU from the burden of security processing. These primitives are tightly coupled to the CPU giving them access to critical state information such as the current instruction(s) in execution, the next instruction, registers, and processor state information. By monitoring these hardware elements, APHID is able to determine when an anomalous action occurs within one clock cycle. Upon detection, APHID can force the processor into a corrective state, or a …


Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley Mar 2007

Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley

Theses and Dissertations

This research effort examines the idea of applying virtualization hardware to enhance operating system security against rootkits. Rootkits are sets of tools used to hide code and/or functionality from the user and operating system. Rootkits can accomplish this feat through using access to one part of an operating system to change another part that resides at the same privilege level. Hardware assisted virtualization (HAV) provides an opportunity to defeat this tactic through the introduction of a new operating mode. Created to aid operating system virtualization, HAV provides hardware support for managing and saving multiple states of the processor. This hardware …


Hardware Realization Of A Transform Domain Communication System, Marshall E. Haker Mar 2007

Hardware Realization Of A Transform Domain Communication System, Marshall E. Haker

Theses and Dissertations

The purpose of this research was to implement a Transform Domain Communication System (TDCS) in hardware and compare experimental bit error performance with results published in literature. The intent is to demonstrate the effectiveness or ineffectiveness of a TDCS in communicating binary data across a real channel. In this case, an acoustic channel that is laden with narrowband interference was considered. A TDCS user pair was constructed to validate the proposed design using Matlab™ to control a PC sound card. The proposed TDCS design used the Bartlett method of spectrum estimation, the spectral notching algorithm found in TDCS literature, quadrature …


Soldier/Hardware-In-The-Loop Simulation-Based Combat Vehicle Duty Cycle Measurement: Duty Cycle Experiment 2, Mark Brudnak, Mike Pozolo, Victor Paul, Syed Mohammad, Marc Compere, Et Al. Jan 2007

Soldier/Hardware-In-The-Loop Simulation-Based Combat Vehicle Duty Cycle Measurement: Duty Cycle Experiment 2, Mark Brudnak, Mike Pozolo, Victor Paul, Syed Mohammad, Marc Compere, Et Al.

Publications

This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1]. This paper is written in the context of [1] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Electric System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …


Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das Dec 2006

Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das

Tony Wasserman

This paper is a preliminary report on using FLOSSmole data retrieved from open source repositories (forges) to calculate Business Readiness Rating scores.


Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman Dec 2006

Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman

Tony Wasserman

This paper describes the evolution of hardware and software technology over the past three decades, focusing on approaches for building interactive information systems and web applications. Successive generations of technology have used advances in hardware and software technology, along with increasingly sophisticated development methods and tools, to reduce development times and to produce a better user experience. After describing the key technology characteristics of each generation, this paper also describes the evolution of a specific methodology, User Software Engineering, from its origins in the 1970’s to its applicability to the development of modern applications.