Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Masters Theses

Discipline
Institution
Keyword

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

An Fpga Based Implementation Of The Exact Stochastic Simulation Algorithm, Phani Bharadwaj Vanguri Dec 2010

An Fpga Based Implementation Of The Exact Stochastic Simulation Algorithm, Phani Bharadwaj Vanguri

Masters Theses

Mathematical and statistical modeling of biological systems is a desired goal for many years. Many biochemical models are often evaluated using a deterministic approach, which uses differential equations to describe the chemical interactions. However, such an approach is inaccurate for small species populations as it neglects the discrete representation of population values, presents the possibility of negative populations, and does not represent the stochastic nature of biochemical systems. The Stochastic Simulation Algorithm (SSA) developed by Gillespie is able to properly account for these inherent noise fluctuations. Due to the stochastic nature of the Monte Carlo simulations, large numbers of simulations …


Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop Aug 2010

Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop

Masters Theses

Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based …


Performance Evaluation Of Memory And Computationally Bound Chemistry Applications On Streaming Gpgpus And Multi-Core X86 Cpus, Frederick E. Weber Iii May 2010

Performance Evaluation Of Memory And Computationally Bound Chemistry Applications On Streaming Gpgpus And Multi-Core X86 Cpus, Frederick E. Weber Iii

Masters Theses

In recent years, multi-core processors have come to dominate the field in desktop and high performance computing. Graphics processors traditionally used in CAD, video games, and other 3-d applications, have become more programmable and are now suitable for general purpose computing. This thesis explores multi-core processors and GPU performance and limitations in two computational chemistry applications: a memory bound component of ab-initio modeling and a computationally bound Monte Carlo simulation. For the applications presented in this thesis, exploiting multiple processors is done using a variety of tools and languages including OpenMP and MKL. Brook+ and the Compute Abstraction Layer streaming …


Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb May 2010

Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb

Masters Theses

The battle for cyber supremacy is a cat and mouse game: evolving threats from internal and external sources make it difficult to protect critical systems. With the diverse and high risk nature of these threats, there is a need for robust techniques that can quickly adapt and address this evolution. Existing tools such as Splunk, Snort, and Bro help IT administrators defend their networks by actively parsing through network traffic or system log data. These tools have been thoroughly developed and have proven to be a formidable defense against many cyberattacks. However, they are vulnerable to zero-day attacks, slow attacks, …


Gpu Implementation Of A Novel Approach To Cramer’S Algorithm For Solving Large Scale Linear Systems, Rosanne Lane West May 2010

Gpu Implementation Of A Novel Approach To Cramer’S Algorithm For Solving Large Scale Linear Systems, Rosanne Lane West

Masters Theses

Scientific computing often requires solving systems of linear equations. Most software pack- ages for solving large-scale linear systems use Gaussian elimination methods such as LU- decomposition. An alternative method, recently introduced by K. Habgood and I. Arel, involves an application of Cramer’s Rule and Chio’s condensation to achieve a better per- forming system for solving linear systems on parallel computing platforms. This thesis describes an implementation of this algorithm on an nVidia graphics processor card us- ing the CUDA language. Increased performance, relative to the serial implementation, is demonstrated, paving the way for future parallel realizations of the scheme.


Fpga Implementation Of Pso Algorithm And Neural Networks, Parviz Palangpour Jan 2010

Fpga Implementation Of Pso Algorithm And Neural Networks, Parviz Palangpour

Masters Theses

"This thesis describes the Field Programmable Gate Array (FPGA) implementations of two powerful techniques of Computational Intelligence (CI), the Particle Swarm Optimization algorithm (PSO) and the Neural Network (NN). Particle Swarm Optimization (PSO) is a popular population-based optimization algorithm. While PSO has been shown to perform well in a large variety of problems, PSO is typically implemented in software. Population-based optimization algorithms such as PSO are well suited for execution in parallel stages. This allows PSO to be implemented directly in hardware and achieve much faster execution times than possible in software. In this thesis, a pipelined architecture for hardware …


Adaptive User Interface For Vehicle Swarm Control, Paul Robinette Jan 2010

Adaptive User Interface For Vehicle Swarm Control, Paul Robinette

Masters Theses

"An algorithm to automatically generate behaviors for robotic vehicles has been created and tested in a laboratory setting. This system is designed to be applied in situations where a large number of robotic vehicles must be controlled by a single operator. The system learns what behaviors the operator typically issues and offers these behaviors to the operator in future missions. This algorithm uses the symbolic clustering method Gram-ART to generate these behaviors. Gram-ART has been shown to be successful at clustering such standard symbolic problems as the mushroom dataset and the Unix commands dataset. The algorithm was tested by having …


Target Detection And Feature Evaluation Of Airborne Mine Target Images, Deepika Kamakshi Timmavajjula Jan 2010

Target Detection And Feature Evaluation Of Airborne Mine Target Images, Deepika Kamakshi Timmavajjula

Masters Theses

"Target segmentation and detection problem is one of the preliminary approaches in analyzing an image. Many edge, region and texture based techniques have been proposed in literature. These techniques often have limitations based on types of image data, kind of segmentation of interest and the problem domain. Mine detection problem dealt with for this thesis has mine target images which have a center target consisting of false alarm or mine patch which has to be detected and features evaluated to evaluate various parameter performances. Thus, segmenting the mine patch becomes the first step of analyzing these images. This thesis is …


Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming, Vikram Reddy Surendra Jan 2010

Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming, Vikram Reddy Surendra

Masters Theses

"The goal of this thesis it to develop a wireless networking framework for battery-free devices based on passive, backscatter communication. In contrast to traditional, active communication systems, where the radio signal has to be generated using large amount of energy from batteries, the passive systems reflect the RF signal. The information is encoded by modulating the reflected signal, which consumes significantly less energy than active transmission. The existing passive, backscatter systems have limited communication capabilities. For example, the Radio Frequency Identification (RFID) systems support short-distance, direct communication between active reader and passive tags. The communication range is limited due to …


Efficient Modular Arithmetic Units For Low Power Cryptographic Applications, Rajashekhar Reddy Modugu Jan 2010

Efficient Modular Arithmetic Units For Low Power Cryptographic Applications, Rajashekhar Reddy Modugu

Masters Theses

"The demand for high security in energy constrained devices such as mobiles and PDAs is growing rapidly. This leads to the need for efficient design of cryptographic algorithms which offer data integrity, authentication, non-repudiation and confidentiality of the encrypted data and communication channels. The public key cryptography is an ideal choice for data integrity, authentication and non-repudiation whereas the private key cryptography ensures the confidentiality of the data transmitted. The latter has an extremely high encryption speed but it has certain limitations which make it unsuitable for use in certain applications. Numerous public key cryptographic algorithms are available in the …


Automatic Detection Of Malignant Melanoma Using Boundary Gradient Information In Dermoscopy Images, Yogesh Ajit Dandekar Jan 2010

Automatic Detection Of Malignant Melanoma Using Boundary Gradient Information In Dermoscopy Images, Yogesh Ajit Dandekar

Masters Theses

"This thesis demonstrates an algorithm which uses local border features, primarily derived from the border gradient, to help determine whether the lesion is a malignant melanoma or a benign lesion. Although this algorithm uses manually-marked lesion borders, it could be included in a fully automatic routine. A Prewitt algorithm with a window size proportional to the area of the lesion is used to calculate the gradient over the entire lesion boundary. This gradient value is used to calculate various boundary features, such as mean, standard deviation, and direction of maximum gradient. The dark and white areas inside the lesion combined …


Gpu Based Processing For Airborne Detection, Dheeraj Singiresu Jan 2010

Gpu Based Processing For Airborne Detection, Dheeraj Singiresu

Masters Theses

"Onboard real-time processing is highly desirable in airborne detection applications. As the data processing involved here is computationally expensive, typically high power multi-rack system is required to achieve real-time detection. Use of such hardware is often not feasible in an airborne application due to space, power and weight constraints. In this thesis, different computing architectures suitable for real-time onboard processing are compared in terms of computation speed, watts/GFLOPS, and weight/GFLOPS. A brief description of the modem GPU architecture and the current GPGPU technology is provided. GPU implementations of some computationally expensive image processing applications such as band-to-band registration for Multi …


Embedded Optimal Control Of Mobile Robot Formations Using Neural Networks, Bryan M. Brenner Jan 2010

Embedded Optimal Control Of Mobile Robot Formations Using Neural Networks, Bryan M. Brenner

Masters Theses

"This work first presents the development of a nearly-optimal control scheme and then evaluates the effectiveness of this nearly-optimal control scheme by comparing it to a non optimal controller in Paper I. It is shown that the proposed nearly-optimal scheme is a significant improvement over the non optimal one in both simulation and hardware tests. The test was carried out on a differentially driven robotic vehicle in both obstacle free and obstacle ridden environments. On the other hand, the controller introduced for the obstacle avoidance in Paper II will also function in the absence of obstacles so that no switching …