Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 800

Full-Text Articles in Computer Engineering

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith Dec 2013

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith

Faculty Publications from the Department of Electrical and Computer Engineering

Colloidally synthesized nanocubes strongly coupled to conducting films hold great promise for enhancing different nonlinear optical processes. They exhibit a robust and sensitive scattering response that can be easily controlled by their geometrical and material parameters. Strong local field enhancement is generated at the gap regions between the nanocubes and the metallic film. We show that strong optical bistability and all-optical switching behavior can be obtained by loading these nanogaps with Kerr nonlinear materials. Relatively low input intensities are required to obtain these nonlinear effects. The proposed design can lead to efficient, low-power, and ultrafast all-optical memories and scattering nanoswitches.


Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons Dec 2013

Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons

University of Maine Office of Research Administration: Grant Reports

The goals of the project were to increase the level and volume of information technologies in the classroom and to promote inquiry-based learning. The project was tightly integrated with the Maine Learning Technology Initiative that puts a laptop computer into the hands of every 7th and 8th grade student and teacher. It was also tightly integrated with the University of Maine Supercomputer. Through the use of technology, students were able to ask “what if questions and find and visualize the answers to their questions. The focus of the inquiry was dynamic Earth modelling. This included geological evolution of the earth ...


Mobile Sensor Data Mining, Jeff Lockhart Fcrh '13 Dec 2013

Mobile Sensor Data Mining, Jeff Lockhart Fcrh '13

The Fordham Undergraduate Research Journal

At an ever increasing rate, the smartphones and other devices people carry with them in their everyday lives are packed with sensors and processing power. This provides an unprecedented opportunity to apply data mining techniques to people’s activities as they go about their daily lives, without changing their routine. The goal of the Wireless Sensor Data Mining (WISDM) Project is to explore the possibilities of data mining on these powerful mobile platforms.1 Data mining involves extracting knowledge from data using computer algorithms. A major sensor in these devices is the tri-axial accelerometer originally included for screen rotation and ...


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz Dec 2013

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Electrical and Computer Engineering Publications

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the large ...


On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar Dec 2013

On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar

Electronic Thesis and Dissertation Repository

This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms ...


Disaster Data Management In Cloud Environments, Katarina Grolinger Dec 2013

Disaster Data Management In Cloud Environments, Katarina Grolinger

Electronic Thesis and Dissertation Repository

Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.

In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering ...


Robotic Testing Of Proximal Tibio-Fibular Joint Kinematics For Measuring Instability Following Total Knee Arthroplasty, Wael K. Barsoum, Ho H. Lee, Trevor G. Murray, Robb Colbrunn, Alison K. Klika, S. Butler, Antonie J. Van Den Bogert Dec 2013

Robotic Testing Of Proximal Tibio-Fibular Joint Kinematics For Measuring Instability Following Total Knee Arthroplasty, Wael K. Barsoum, Ho H. Lee, Trevor G. Murray, Robb Colbrunn, Alison K. Klika, S. Butler, Antonie J. Van Den Bogert

Antonie J. van den Bogert

Pain secondary to instability in total knee arthroplasty (TKA) has been shown to be major cause of early failure. In this study, we focused on the effect of instability in TKA on the proximal tibio-fibular joint (PTFJ). We used a robotics model to compare the biomechanics of the PTFJ in the native knee, an appropriately balanced TKA, and an unbalanced TKA. The tibia (n = 5) was mounted to a six-degree-of-freedom force/torque sensor and the femur was moved by a robotic manipulator. Motion at the PTFJ was recorded with a high-resolution digital camera system. After establishing a neutral position, loading ...


On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad Dec 2013

On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad

Electronic Thesis and Dissertation Repository

The field of human-robot interaction has garnered significant interest in the last decade. Every form of human-robot coexistence must guarantee the safety of the user. Safety in human-robot interaction is being vigorously studied, in areas such as collision avoidance, soft actuators, light-weight robots, computer vision techniques, soft tissue modeling, collision detection, etc. Despite the safety provisions, unwanted collisions can occur in case of system faults. In such cases, before post-collision strategies are triggered, it is imperative to effectively detect the collisions. Implementation of tactile sensors, vision systems, sonar and Lidar sensors, etc., allows for detection of collisions. However, due to ...


Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha Dec 2013

Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha

Joseph Shrestha

The term “big data” is associated with one or more of the four characteristics: volume, variety, and velocity. The technologies associated with the big data has already been proven in other sectors. Internet giants like Google, Facebook, Netflix, etc. uses big data collected from their users to present advertisements, friend recommendations, and TV shows and movies relevant to the specific user. Big data is also used for insurance fraud detection, improving bus system by reducing congestion, predictive flight arrival time, weather forecast, and genomic analysis.
For the construction industry, volume and variety becomes particularly relevant. From project planning to the ...


Cloud Computing In Kaust Library: Beyond Remote Hosting, Yi Yu Dec 2013

Cloud Computing In Kaust Library: Beyond Remote Hosting, Yi Yu

Yi Yu

Enterprise computing is the key strategic approach for KAUST to build its modern IT landscape. In such a strategic direction and technical environment, the library tries to establish library technology by catching new trends which help to make the library more efficient and sufficient. This paper focuses on the cloud computing development in the KAUST library, by using real world scenarios and first-hand experiences to describe what cloud computing means for KASUT library. It addresses the difficulties that were met by the library during the implementation process, how cloud computing affects the functional performance and work procedure of the library ...


Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh Dec 2013

Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh

Jeremy Straub

Small satellites, such as CubeSats, serve as excellent platforms for the collection of data that can be supplied to a geographic information system. To serve this need, they require a robust and lightweight task scheduler due to their limited onboard power production capabilities as well as internal space restrictions. Because of these constraints, schedules must be optimized; however, the scheduling optimization process must be performed using limited processing (CPU) power.

Several considerations must be taken into account in order to make a scheduler for these systems. This poster highlights requirements such as inter-dependency of onboard systems, and limited windows of ...


Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh Dec 2013

Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

Scheduling for a Small Satellite for Remote Sensed Data Collection


Cache-Aware Compositional Analysis Of Real-Time Multicore Virtualization Platforms, Meng Xu, Linh T.X. Phan, Insup Lee, Oleg Sokolsky, Sisu Xi, Chenyang Lu, Christopher Gill Dec 2013

Cache-Aware Compositional Analysis Of Real-Time Multicore Virtualization Platforms, Meng Xu, Linh T.X. Phan, Insup Lee, Oleg Sokolsky, Sisu Xi, Chenyang Lu, Christopher Gill

Departmental Papers (CIS)

Multicore processors are becoming ubiquitous, and it is becoming increasingly common to run multiple real-time systems on a shared multicore platform. While this trend helps to reduce cost and to increase performance, it also makes it more challenging to achieve timing guarantees and functional isolation.

One approach to achieving functional isolation is to use virtualization. However, virtualization also introduces many challenges to the multicore timing analysis; for instance, the overhead due to cache misses becomes harder to predict, since it depends not only on the direct interference between tasks but also on the indirect interference between virtual processors and the ...


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis ...


An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith Dec 2013

An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith

Theses and Dissertations

Remote Direct Memory Access (RDMA) is the transfer of data into buffers between two compute nodes that does not require the involvement of a CPU or Operating System (OS). The idea is borrowed from Direct Memory Access (DMA) which allows memory within a compute node to be transferred without transiting through the CPU. RDMA is termed a zero-copy protocol as it eliminates the need to copy data between buffers within the protocol stack. Because of this and other features, RDMA promotes reliable, high throughput and low latency transfer for packet-switched networking. While the benefits of RMDA are well known and ...


Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah Dec 2013

Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah

Theses and Dissertations

Finding rising stars in academia early in their careers has many implications when hiring new faculty, applying for promotion, and/or requesting grants. Typically, the impact and productivity of a researcher are assessed by a popular measurement called the h-index that grows linearly with the academic age of a researcher. Therefore, h-indices of researchers in the early stages of their careers are almost uniformly low, making it difficult to identify those who will, in future, emerge as influential leaders in their field. To overcome this problem, we make use of Social network analysis to identify young researchers most likely to ...


Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford Dec 2013

Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford

Theses and Dissertations

As three-dimensional virtual environments become both more prevalent and more fragmented, studying how users are connected via their avatars and how they benefit from the virtual world community has become a significant area of research. An in-depth analysis of virtual world Social networks is needed to evaluate how users interact in virtual worlds, to better understand the impact of avatar Social networks on the virtual worlds, and to improve future online Social networks.

Our current efforts are focused on building and exploring the Social network aspects of virtual worlds. In this thesis, we build a Social network of avatars based ...


Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei Dec 2013

Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei

Computer Science Faculty Publications

Broadcasting in vehicular networks has attracted great interest in research community and industry. Broadcasting on disseminating information to individual vehicle beyond the transmission range is based on inter-vehicle communication systems. It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of ...


New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen Dec 2013

New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen

Dissertations

Distributed-memory systems are a key to achieve high performance computing and the most favorable architectures used in advanced research problems. Mesh connected multicomputer are one of the most popular architectures that have been implemented in many distributed-memory systems. These systems must support communication operations efficiently to achieve good performance. The wormhole switching technique has been widely used in design of distributed-memory systems in which the packet is divided into small flits. Also, the multicast communication has been widely used in distributed-memory systems which is one source node sends the same message to several destination nodes. Fault tolerance refers to the ...


Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, Venkittaraman Vivek Pallipuram Krishnamani Dec 2013

Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, Venkittaraman Vivek Pallipuram Krishnamani

All Dissertations

The current trend in High-Performance Computing (HPC) is to extract concurrency from clusters that include heterogeneous resources such as General Purpose Graphical Processing Units (GPGPUs) and Field Programmable Gate Array (FPGAs). Although these heterogeneous systems can provide substantial performance for massively parallel applications, much of the available computing resources are often under-utilized due to inefficient application mapping, load balancing, and tuning. While several performance prediction models exist to efficiently tune applications, they often require significant computing architecture knowledge for reliable prediction. In addition, they do not address multiple levels of design space abstraction and it is often difficult to choose ...


Firmware And Software For An Integrated Electrophysiology Data Acquisition And Stimulation System, Kyle D. Batzer Dec 2013

Firmware And Software For An Integrated Electrophysiology Data Acquisition And Stimulation System, Kyle D. Batzer

Master's Theses

This thesis describes the firmware and software design for a prototype electrophysiology experimentation system. The overall system, built on the work of previous students and developed with fellow graduate student Mr. Donovan Squires, provides eight channels of acquisition and four channel of arbitrary waveform generation for stimulation of biological systems. In order to show the performance of the system, a common electrophysiology experiment was performed on the giant axon of an earthworm and the results were compared to previously validated systems. The developed system is intended to support future work at the Neurobiology Engineering Laboratory at Western Michigan University.

The ...


Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, Fang Qi Dec 2013

Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, Fang Qi

All Theses

In peer-to-peer (P2P) file sharing systems, many autonomous peers without preexisting trust relationships share files with each other. Due to their open environment and distributed structure, these systems are vulnerable to the significant impact from selfish and misbehaving nodes. Free-riding, whitewash, collusion and Sybil attacks are common and serious threats, which severely harm non-malicious users and degrade the system performance. Many trust systems were proposed for P2P file sharing systems to encourage cooperative behaviors and punish non-cooperative behaviors. However, querying reputation values usually generates latency and overhead for every user. To address this problem, a social network based trust system ...


Automated Foosball Table Year 1: Final Project Report, Juan David Gutierrez-Franco, John Inlow, Jesse Graham, Larry Huang Dec 2013

Automated Foosball Table Year 1: Final Project Report, Juan David Gutierrez-Franco, John Inlow, Jesse Graham, Larry Huang

Mechanical Engineering

This project is a first iteration of an automated foosball table designed and created using servomotors provided by Yaskawa to create an interactive tradeshow display where guests can play against the algorithms developed in the PLC (programmable logic controller) controlling the servomotors. There will be a second iteration of the project done by a different team directly following this one. The motion components were selected with the intent to be able to surpass the reaction times and speeds of expert human players. There are a total of eight servomotors, four controlling linear actuators for translation of rods, and four controlling ...


Exploring Human-Computer Interaction Through Bluetooth Low Energy Enabled Human Interface Devices, Tyler Durkin Dec 2013

Exploring Human-Computer Interaction Through Bluetooth Low Energy Enabled Human Interface Devices, Tyler Durkin

Liberal Arts and Engineering Studies

No abstract provided.


Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi Dec 2013

Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi

Electrical Engineering

This senior project involves the complete system design and construction of a "Nerf" sentry gun to replace an armed guard. We aimed to develop a compact and highly mobile defense system that allows operational flexibility. The sentry gun can autonomously track and shoot at moving targets, while also allowing a user to remotely access and control the gun via computer. The mobility, hardiness, and functionality of this system allows a reliable replacement for human beings in harsh and hostile environments; ultimately sparing a life.


Tascked: The Sanity Promoting Task Manager, Jake Tobin Dec 2013

Tascked: The Sanity Promoting Task Manager, Jake Tobin

Computer Science and Software Engineering

Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system ...


Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij Dec 2013

Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij

Computer Science and Software Engineering

No abstract provided.


Face Recognition Using Statistical Adapted Local Binary Patterns., Abdallah Abd-Elghafar Mohamed Dec 2013

Face Recognition Using Statistical Adapted Local Binary Patterns., Abdallah Abd-Elghafar Mohamed

Electronic Theses and Dissertations

Biometrics is the study of methods of recognizing humans based on their behavioral and physical characteristics or traits. Face recognition is one of the biometric modalities that received a great amount of attention from many researchers during the past few decades because of its potential applications in a variety of security domains. Face recognition however is not only concerned with recognizing human faces, but also with recognizing faces of non-biological entities or avatars. Fortunately, the need for secure and affordable virtual worlds is attracting the attention of many researchers who seek to find fast, automatic and reliable ways to identify ...


A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb Dec 2013

A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb

Masters Theses & Specialist Projects

Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish ...


An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., Artur Abdullin Dec 2013

An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., Artur Abdullin

Electronic Theses and Dissertations

We propose an Inter-Domain Supervision (IDS) clustering framework to discover clusters within diverse data formats, mixed-type attributes and different sources of data. This approach can be used for combined clustering of diverse representations of the data, in particular where data comes from different sources, some of which may be unreliable or uncertain, or for exploiting optional external concept set labels to guide the clustering of the main data set in its original domain. We additionally take into account possible incompatibilities in the data via an automated inter-domain compatibility analysis. Our results in clustering real data sets with mixed numerical, categorical ...