Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 760

Full-Text Articles in Computer Engineering

Cyber-Physical Modeling Of Implantable Cardiac Medical Devices, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam Dec 2011

Cyber-Physical Modeling Of Implantable Cardiac Medical Devices, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

The design of bug-free and safe medical device software is challenging, especially in complex implantable devices that control and actuate organs in unanticipated contexts. Safety recalls of pacemakers and implantable cardioverter defibrillators between 1990 and 2000 affected over 600,000 devices. Of these, 200,000 or 41%, were due to firmware issues and their effect continues to increase in frequency. There is currently no formal methodology or open experimental platform to test and verify the correct operation of medical device software within the closed-loop context of the patient. To this effect, a real-time Virtual Heart Model (VHM) has been developed ...


Mind Economy: Dynamic Graph Analysis Of Communications, Alexy Khrabrov Dec 2011

Mind Economy: Dynamic Graph Analysis Of Communications, Alexy Khrabrov

Publicly Accessible Penn Dissertations

Social networks are growing in reach and impact but little is known about their structure, dynamics, or users’ behaviors. New techniques and approaches are needed to study and understand why these networks attract users’ persistent attention, and how the networks evolve. This thesis investigates questions that arise when modeling human behavior in social networks, and its main contributions are:

• an infrastructure and methodology for understanding communication on graphs;

• identification and exploration of sub-communities;

• metrics for identifying effective communicators in dynamic graphs;

• a new definition of dynamic, reciprocal social capital and its iterative computation

• a methodology to study influence in social ...


Computational Modeling For Transportation Network Security, Sherif A. Tolba Dec 2011

Computational Modeling For Transportation Network Security, Sherif A. Tolba

Master's Theses

No abstract provided.


Data Exploration Interface For Digital Forensics, Varun Dontula Dec 2011

Data Exploration Interface For Digital Forensics, Varun Dontula

University of New Orleans Theses and Dissertations

The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst.

We present an alternative approach, which leverages data visualization techniques to provide ...


Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong Dec 2011

Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong

Technical Reports

Choosing and implementing the right security software tools can protect a company’s assets. In particular, data breaches might not happen if a company is aware of its information flow and has the proper tool to protect it. This thesis paper will explain why and how acquiring data loss prevention (DLP) software will help a company to reduce data loss, mitigate the loss impact and save money. Facts and examples are provided to support and illustrate the statement above.


New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky Dec 2011

New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky

Christopher N. Roman

In the summer of 2011, the Exploration Vessel NAUTILUS is undertaking a four-month expedition to the Black, Aegean and Mediterranean Seas, and North Atlantic Ocean. The primary goal of the NAUTILUS is to create a focus of international leadership for the development and integration of leading-edge technologies, educational programs, field operations, and public outreach programs for ocean exploration, in partnership with NOAA, National Geographic Society, Office of Naval Research, and other sponsors. To do so, the program uses a complement of deep submergence vehicle systems and “telepresence” technologies to engage scientists, educators and the public, both at sea and ashore ...


Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey Dec 2011

Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and ...


Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey Dec 2011

Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo ...


High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey Dec 2011

High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey

Christopher N. Roman

Detailed bathymetric maps of the sea floor with centimeter level resolution can be produced by underwater vehicles using multibeam sonars and structured light laser imaging. Over spatial scales up to tens of thousands of square meters it is possible to produce maps gridded to sub centimeter levels. This level of accuracy demands detailed treatments of the sensor relative data, the vehicle navigation data and the vehicle to sensor position and rotational offsets. The presented results will show comparisons between these two sensor modalities. Data have a been collected during recent field programs to the Kolumbo volcanic crater and the Southern ...


Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey Dec 2011

Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey

Christopher N. Roman

Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo ...


Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey Dec 2011

Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey

Christopher N. Roman

Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and ...


A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo Dec 2011

A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found ...


State-Based Techniques For Designing, Verifying And Debugging Message Passing Systems, Rajaa Khaled Alqudah Dec 2011

State-Based Techniques For Designing, Verifying And Debugging Message Passing Systems, Rajaa Khaled Alqudah

Electrical Engineering and Computer Science - Dissertations

Message passing systems support the applications of concurrent events, where independent or semi-independent events occur simultaneously in a nondeterministic fashion. The nature of independence, random interactions and concurrency made the code development of such applications complicated and error-prone. Conventional code development environments or IDEs, such as Microsoft Visual Studio, provide little programming support in this regard. Furthermore, ensuring the correctness of a message passing system is a challenge. Typically, it is important to guarantee that a system meets its desired specifications along its construction process. Model checking is one of the techniques used in software verification which has proven to ...


Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich Dec 2011

Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich

Departmental Technical Reports (CS)

Many neurological disorders result in disordered motion. The effects of a disorder can be decrease by an appropriate rehabilitation. To make rehabilitation efficient, we need to monitor the patient and check how well he or she improves. In our previous papers, we proposed a fuzzy-based semi-heuristic method of gauging how well a patient improved. Surprisingly, this semi-heuristic method turned out to be more efficient that we expected. In this paper, we provide a justification for this efficiency.

In the future, it is desirable to combine this fuzzy-assessment approach with results by Alavarez-Alvarez, Trivino, and Cordon who use fuzzy techniques ...


Solving Virus Problems By System Administrators- A Triz Perspective, Umakant Mishra Dec 2011

Solving Virus Problems By System Administrators- A Triz Perspective, Umakant Mishra

Umakant Mishra

The computer virus is not only a problem to the end user but also a problem to everybody whoever is associated with computers, including systems administrators, corporate managers and even anti-virus manufacturers. In the previous article we discussed on how to use TRIZ for analyzing and solving virus problems of an end user. In this article we will focus on the problems faced by the systems administrators.

An analysis of virus scenario finds that the same situation of virus infection creates different problems to people at different levels, such as, a computer user, a system administrator, a corporate manager and ...


Solving Virus Problems By Computer Users- A Triz Perspective, Umakant Mishra Dec 2011

Solving Virus Problems By Computer Users- A Triz Perspective, Umakant Mishra

Umakant Mishra

The knowledge on TRIZ helps us analyzing a problem. Analysis is an important step in problem solving because the same event may be causing different problems (or benefits) to different people under different conditions. Some solutions may be addressing a problem in a short term or narrow perspective while giving rise to other problems or disadvantages. A good solution should be ideal and holistic in approach and should lead to no other problems or negative consequences.

When we analyze the problem of computer virus we find that different types of computer users face different types of problems and seek to ...


Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang Dec 2011

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang

School of Information Sciences -- Faculty Publications and Other Works

The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.


Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich Dec 2011

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

It is well known that an arbitrary continuous function on a bounded set -- e.g., on an interval [a,b] -- can be, with any given accuracy, approximated by a polynomial. Usually, polynomials are described as linear combinations of monomials. It turns out that in many computational problems, it is more efficient to represent a polynomial as Bernstein polynomials -- e.g., for functions of one variable, a linear combination of terms (x-a)k * (b-x)n-k. In this paper, we provide a simple fuzzy-based explanation of why Bernstein polynomials are often more efficient, and we show how this informal explanation can be ...


In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich Dec 2011

In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich

Departmental Technical Reports (CS)

No abstract provided.


Semi-Heuristic Poverty Measures Used By Economists: Justification Motivated By Fuzzy Techniques, Karen Villaverde, Nagwa Albehery, Tonghui Wang, Vladik Kreinovich Dec 2011

Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich Dec 2011

Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practically useful cases, we know how to efficiently compute the exact range of a function over given intervals (and, possibly, under additional constraints). In other words, we know how to efficiently compute the minimum and maximum of a given function f(x1, ..., xn) on any box. From the practical viewpoint, it is important not only to find the value of the corresponding maximum or minimum, but also to know for what values of the parameters xi this optimum is attained. We prove a general result: that if we can efficiently compute the optimum, then we ...


A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp Dec 2011

A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the ...


Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava Dec 2011

Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava

Theses and Dissertations

The growing number of mobile phone users is a primary cause of congestion in cellular networks. Therefore, cellular network providers have turned to expensive and differentiated data plans. Unfortunately, as the number of smartphone users keeps increasing, changing data plans only provides a temporary solution. A more permanent solution is offloading 3G traffic to networks in orthogonal frequency bands. One such plausible network is open Wi-Fi, which is free by definition. As Wi-Fi networks become ubiquitous, there are several areas where there is simultaneous Wi-Fi and 3G coverage. In this thesis, we study the feasibility of offloading 3G traffic to ...


A General Attack Method For Steganography Removal Using Pseudo-Cfa Re-Interpolation, Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif Dec 2011

A General Attack Method For Steganography Removal Using Pseudo-Cfa Re-Interpolation, Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif

Faculty Publications in Computer & Electronics Engineering (to 2015)

Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar ...


Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez Dec 2011

Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez

Electrical and Computer Engineering Faculty Publications

Fast nonuniform interpolation based super-resolution (SR) has traditionally been limited to applications with translational interframe motion. This is in part because such methods are based on an underlying assumption that the warping and blurring components in the observation model commute. For translational motion this is the case, but it is not true in general. This presents a problem for applications such as airborne imaging where translation may be insufficient. Here we present a new Fourier domain analysis to show that, for many image systems, an affine warping model with limited zoom and shear approximately commutes with the point spread function ...


The Design Of A Haptic Device For Training And Evaluating Surgeon And Novice Laparoscopic Movement Skills, Ryan Bontreger Dec 2011

The Design Of A Haptic Device For Training And Evaluating Surgeon And Novice Laparoscopic Movement Skills, Ryan Bontreger

All Theses

As proper levels of force application are necessary to ensure patient safety, and training hours with an expert on live subjects are difficult, enhanced computer-based training is needed to teach the next generation of surgeons. Considering the role of touch in surgery, there is a need for a device capable of discerning the haptic ability of surgical trainees. This need is amplified by minimally invasive surgical techniques where a surgeon's sense of tissue properties comes not directly through their own hands but indirectly through the tools. A haptic device capable of producing a realistic range of forces and motions ...


Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian Dec 2011

Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian

Computer Science and Software Engineering

There seems to exist an invisible barrier between people that should be connected but for whatever reasons (don't hang out in the same circles, don't go to the same meetings, or are geographically separated) haven't met each other yet.

Normally these people will only meet when others bring them together or they are thrown together on a project. DSIC aims to preempt the person discovery process by allowing a way for people to post ideas, events, and other collaborations in a single place that can then be searched by other users.

The system utilizes postings, user profiles ...


Context-Driven Agents In Computer Supported Cooperative Works, Brian D. Lichtman Dec 2011

Context-Driven Agents In Computer Supported Cooperative Works, Brian D. Lichtman

HIM 1990-2015

This thesis describes a research project that investigates the level of contextualization needed to successfully build context-driven agents that can manage a cooperative project. Many times in industry, collaborators in a large project may be located vast distances from each other. It is for this reason that management of such projects can often be difficult. The purpose of this research is to design an agent that can take on the role of a project manager (PM) to assist the human project manager. Specifically, this thesis looks to give such project management agents full situational awareness. It is hypothesized that only ...


Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams Dec 2011

Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams

Mechanical Engineering

The Deutsches Museum of Munich, Germany requested add-on components to their mechanical calculator exhibit. The end-goal is to produce an interactive 3D model in software to demonstrate the functions of the Braun-Vayringe Machine (BVM). There will be four students working on this project at California Polytechnic State University, San Luis Obispo: two mechanical engineers (Dan Marioni and Will Harris) and two computer engineers (Chad Williams and Kevin Webb).This project involves the coordination of three facilities; the Deutsches Museum, and the Mechanical and Computer Science Departments of Cal Poly. The name of the project is known as the Historic Calculator ...


Application Of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo Dec 2011

Application Of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo

Theses and Dissertations

Characterization and forecasting are two important processes in capacity planning. While they are closely related, their approaches have been different. In this research, a decomposition method called Empirical Mode Decomposition (EMD) has been applied as a preprocessing tool in order to bridge the input of both characterization and forecasting processes of the job arrivals of an enterprise cluster. Based on the facts that an enterprise cluster follows a standard preset working schedule and that EMD has the capability to extract hidden patterns within a data stream, we have developed a set of procedures that can preprocess the data for characterization ...