Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Phoneme Weighting And Energy-Based Weighting For Speaker Recognition, Eric Fang Dec 2012

Phoneme Weighting And Energy-Based Weighting For Speaker Recognition, Eric Fang

All Dissertations

This dissertation focuses on determining specific vowel phonemes which work best for speaker identification and speaker verification, and also developing new algorithms to improve speaker identification accuracy. Results from the first part of our research indicate that the vowels /i/, /E/ and /u/ were the ones having the highest recognition scores for both the Gaussian mixture model (GMM) and vector quantization (VQ) methods (at most one classification error). For VQ, /i/, /I/, /e/, /E/ and /@/ had no classification errors. Persons speaking /E/, /o/ and /u/ have been verified well by both GMM and VQ methods in our experiments. For …


Connecting Architecture, Fitness, Optimizations And Performance Using An Anisotropic Diffusion Filter, Sumedh Naik Dec 2012

Connecting Architecture, Fitness, Optimizations And Performance Using An Anisotropic Diffusion Filter, Sumedh Naik

All Theses

Over the past decade, computing architectures have continued to exploit multiple levels of parallelism in applications. This increased interest in parallel computing has not only fueled the growth of multi-core processors but has also lead to an emergence of several non-traditional computing architectures like General Purpose Graphical Processing Units (GP-GPUs), Cell Processors, and Field Programmable Gate Arrays (FPGAs). Of these non-traditional computing architectures, GP-GPUs have gained widespread popularity due to their massively parallel computational abilities and relative ease of programmability.
Several software development ecosystems have emerged to harness the power of these parallel architectures. Although several threading libraries like POSIX …


Towards Trustworthy, Efficient And Scalable Distributed Wireless Systems, Ze Li Dec 2012

Towards Trustworthy, Efficient And Scalable Distributed Wireless Systems, Ze Li

All Dissertations

Advances in wireless technologies have enabled distributed mobile devices to connect with each other to form distributed wireless systems. Due to the absence of infrastructure, distributed wireless systems require node cooperation in multi-hop routing. However, the openness and decentralized nature of distributed wireless systems where each node labors under a resource constraint introduces three challenges: (1) cooperation incentives that effectively encourage nodes to offer services and thwart the intentions of selfish and malicious nodes, (2) cooperation incentives that are efficient to deploy, use and maintain, and (3) routing to efficiently deliver messages with less overhead and lower delay. While most …


Socialq&A: A Novel Approach To Notifiying The Correct Users In Question And Answering Systems, Nikhil Vithlani Aug 2012

Socialq&A: A Novel Approach To Notifiying The Correct Users In Question And Answering Systems, Nikhil Vithlani

All Theses

Question and Answering (Q&A) systems are currently in use by a large
number of Internet users. Q&A systems play a vital role in our daily life as
an important platform for information and knowledge sharing. Hence, much
research has been devoted to improving the performance of Q&A systems,
with a focus on improving the quality of answers provided by users, reducing
the wait time for users who ask questions, using a knowledge base to provide
answers via text mining, and directing questions to appropriate users. Due
to the growing popularity of Q&A systems, the number of questions in the
system …


Network Service Delivery And Throughput Optimization Via Software Defined Networking, Aaron Rosen May 2012

Network Service Delivery And Throughput Optimization Via Software Defined Networking, Aaron Rosen

All Theses

In today's world, transmitting data across large bandwidth-delay product (BDP) networks requires special configuration on end users' machines in order to be done efficiently. This added level of complexity creates extra cost and is usually overlooked by users unknowledgeable to the issues. This is one example problem which can be ameliorated with the emerging software defined networking (SDN) paradigm. In an SDN, packet forwarding is controlled via software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has …


Security And Performance Verification Of Distributed Authentication And Authorization Tools, Seok Bae Yun May 2012

Security And Performance Verification Of Distributed Authentication And Authorization Tools, Seok Bae Yun

All Theses

Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. In this paper, we introduce existing distributed authentication and authorization tools. We evaluate the quality of the security tools by verifying their security and performance.
For security tool verification, we use process calculus and mathematical modeling languages. Casper, Communicating Sequential Process (CSP) and Failure Divergence Refinement (FDR) to test for security vulnerabilities, Petri nets and Karp Miller trees are used to find performance …