Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 849

Full-Text Articles in Computer Engineering

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith Dec 2013

Enhanced Optical Bistability With Film-Coupled Plasmonic Nanocubes, Christos Argyropoulos, Cristian Ciraci, David R. Smith

Faculty Publications from the Department of Electrical and Computer Engineering

Colloidally synthesized nanocubes strongly coupled to conducting films hold great promise for enhancing different nonlinear optical processes. They exhibit a robust and sensitive scattering response that can be easily controlled by their geometrical and material parameters. Strong local field enhancement is generated at the gap regions between the nanocubes and the metallic film. We show that strong optical bistability and all-optical switching behavior can be obtained by loading these nanogaps with Kerr nonlinear materials. Relatively low input intensities are required to obtain these nonlinear effects. The proposed design can lead to efficient, low-power, and ultrafast all-optical memories and scattering nanoswitches.


Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons Dec 2013

Ideas: Inquiry-Based Dynamic Earth Applications Of Supercomputing, Seeing The Big Picture With Information Technology, Bruce E. Segee, Yifeng Zhu, Peter O. Koons

University of Maine Office of Research Administration: Grant Reports

The goals of the project were to increase the level and volume of information technologies in the classroom and to promote inquiry-based learning. The project was tightly integrated with the Maine Learning Technology Initiative that puts a laptop computer into the hands of every 7th and 8th grade student and teacher. It was also tightly integrated with the University of Maine Supercomputer. Through the use of technology, students were able to ask “what if questions and find and visualize the answers to their questions. The focus of the inquiry was dynamic Earth modelling. This included geological evolution of the earth ...


Mobile Sensor Data Mining, Jeff Lockhart Fcrh '13 Dec 2013

Mobile Sensor Data Mining, Jeff Lockhart Fcrh '13

The Fordham Undergraduate Research Journal

At an ever increasing rate, the smartphones and other devices people carry with them in their everyday lives are packed with sensors and processing power. This provides an unprecedented opportunity to apply data mining techniques to people’s activities as they go about their daily lives, without changing their routine. The goal of the Wireless Sensor Data Mining (WISDM) Project is to explore the possibilities of data mining on these powerful mobile platforms.1 Data mining involves extracting knowledge from data using computer algorithms. A major sensor in these devices is the tri-axial accelerometer originally included for screen rotation and ...


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz Dec 2013

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Electrical and Computer Engineering Publications

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the large ...


Multiplexed Fiber-Ring Laser Sensors For Ultrasonic Detection, Tongqing Liu, Lingling Hu, Ming Han Dec 2013

Multiplexed Fiber-Ring Laser Sensors For Ultrasonic Detection, Tongqing Liu, Lingling Hu, Ming Han

Faculty Publications from the Department of Electrical and Computer Engineering

We propose and demonstrate a multiplexing method for ultrasonic sensors based on fiber Bragg gratings (FBGs) that are included inside the laser cavity of a fiber-ring laser. The multiplexing is achieved using add-drop filters to route the light signals, according to their wavelengths, into different optical paths, each of which contains a separate span of erbium-doped fiber (EDF) as the gain medium. Because a specific span of EDF only addresses a single wavelength channel, mode completion is avoided and the FBG ultrasonic sensors can be simultaneously demodulated. The proposed method is experimentally demonstrated using a two-channel system with two sensing ...


Disaster Data Management In Cloud Environments, Katarina Grolinger Dec 2013

Disaster Data Management In Cloud Environments, Katarina Grolinger

Electronic Thesis and Dissertation Repository

Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.

In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering ...


On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar Dec 2013

On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar

Electronic Thesis and Dissertation Repository

This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms ...


Robotic Testing Of Proximal Tibio-Fibular Joint Kinematics For Measuring Instability Following Total Knee Arthroplasty, Wael K. Barsoum, Ho H. Lee, Trevor G. Murray, Robb Colbrunn, Alison K. Klika, S. Butler, Antonie J. Van Den Bogert Dec 2013

Robotic Testing Of Proximal Tibio-Fibular Joint Kinematics For Measuring Instability Following Total Knee Arthroplasty, Wael K. Barsoum, Ho H. Lee, Trevor G. Murray, Robb Colbrunn, Alison K. Klika, S. Butler, Antonie J. Van Den Bogert

Antonie J. van den Bogert

Pain secondary to instability in total knee arthroplasty (TKA) has been shown to be major cause of early failure. In this study, we focused on the effect of instability in TKA on the proximal tibio-fibular joint (PTFJ). We used a robotics model to compare the biomechanics of the PTFJ in the native knee, an appropriately balanced TKA, and an unbalanced TKA. The tibia (n = 5) was mounted to a six-degree-of-freedom force/torque sensor and the femur was moved by a robotic manipulator. Motion at the PTFJ was recorded with a high-resolution digital camera system. After establishing a neutral position, loading ...


On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad Dec 2013

On Sensorless Collision Detection And Measurement Of External Forces In Presence Of Modeling Inaccuracies, Vahid Sotoudehnejad

Electronic Thesis and Dissertation Repository

The field of human-robot interaction has garnered significant interest in the last decade. Every form of human-robot coexistence must guarantee the safety of the user. Safety in human-robot interaction is being vigorously studied, in areas such as collision avoidance, soft actuators, light-weight robots, computer vision techniques, soft tissue modeling, collision detection, etc. Despite the safety provisions, unwanted collisions can occur in case of system faults. In such cases, before post-collision strategies are triggered, it is imperative to effectively detect the collisions. Implementation of tactile sensors, vision systems, sonar and Lidar sensors, etc., allows for detection of collisions. However, due to ...


Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha Dec 2013

Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha

Joseph Shrestha

The term “big data” is associated with one or more of the four characteristics: volume, variety, and velocity. The technologies associated with the big data has already been proven in other sectors. Internet giants like Google, Facebook, Netflix, etc. uses big data collected from their users to present advertisements, friend recommendations, and TV shows and movies relevant to the specific user. Big data is also used for insurance fraud detection, improving bus system by reducing congestion, predictive flight arrival time, weather forecast, and genomic analysis.
For the construction industry, volume and variety becomes particularly relevant. From project planning to the ...


Synthesis Of Tungsten Oxide Nanowires Onto Ito Glass Using T-Cvd, Tomy Abuzairi, Bohr-Ran Huang, Tzu-Ching Lin Dec 2013

Synthesis Of Tungsten Oxide Nanowires Onto Ito Glass Using T-Cvd, Tomy Abuzairi, Bohr-Ran Huang, Tzu-Ching Lin

Makara Journal of Technology

Tungsten oxide is an n-type semiconductor with interesting physical and chemical properties that make it suitable for various technological applications. Tungsten oxide nanowires were synthesized not only at low temperature but also without the use of any catalysts. The tungsten oxide nanowires were synthesized at 550 °C with tungsten layers onto the ITO glass using thermal chemical vapor deposition (T-CVD). The SEM image shows that the tungsten oxide nanowires are effectively grown with the 200 nm tungsten film. The Raman spectra shoulder at ~690 cm-1 proves the synthesized of tungsten oxide nanowires.


Recycling Roof Tile Waste Material For Wall Cover Tiles, Ambar Mulyono, Silfia Mona Aryani, Joko Lulut Dec 2013

Recycling Roof Tile Waste Material For Wall Cover Tiles, Ambar Mulyono, Silfia Mona Aryani, Joko Lulut

Makara Journal of Technology

Prior research on roof tile waste treatment has attempted to find the appropriate technology to reuse old roof tile waste by create wall cladding materials from it. Through exploration and experimentation, a treatment method has been discovered to transform the tile fragments into artificial stone that resembles the shape of coral. This baked clay artificial stone material is then processed as a decorative element for vertical surfaces that are not load-bearing, such as on the interior and exterior walls of a building. Before applying the fragments as wall tiles, several steps must be taken: 1) Blunting, which changes the look ...


Microgrid Development Using A Grid Tie Inverter, Hartono Budi Santoso, Budiyanto Budiyanto Dec 2013

Microgrid Development Using A Grid Tie Inverter, Hartono Budi Santoso, Budiyanto Budiyanto

Makara Journal of Technology

The use of renewable energy sources (RES), especially photovoltaic (PV), to meet the demand of electrical energy has been getting a great deal of attention as an alternative solution to electrical energy deficit problems. RES are being applied in power systems in a variety of configurations including microgrid systems. One of the characteristics of a microgrid is capability to supplying power to grid when there is an excess power to supply local load. This research examines the chances of saving power consumption from grid using power converters grid tie inverter (GTI) in a microgrid configuration. The test is done by ...


Surface Treatment Of Fly Ash For Improving The Tensile Strength Of Fly Ash/Unsaturated Polyester Composites, Sugiman Sugiman, Paryanto Dwi Setyawan Dec 2013

Surface Treatment Of Fly Ash For Improving The Tensile Strength Of Fly Ash/Unsaturated Polyester Composites, Sugiman Sugiman, Paryanto Dwi Setyawan

Makara Journal of Technology

The paper presents the surface treatment of fly ashes using acid and alkali solution on the tensile strength of the fly ash/unsaturated polyester (UP) composites. Sulfuric acid (H2SO4), hydrofluoric acid (HF) and sodium hydroxide (NaOH) solution with concentration of 0%, 5%, 10%, 15%, and 20% (by weight) were used for surface treatment of fly ashes. Generally, the tensile strength of the treated fly-ash/UP composites shows a significant increase compared to the untreated fly ash. Of all surface treatments studied, the optimum tensile strength was obtained at a concentration of 10%. At this concentration, at a fly ash content ...


Semiconductor Thermal Neutron Detector, Toru Aoki, Aki Miyake, Takayuki Nakano, Akifumi Koike, Hisashi Morii, Hidenori Mimura Dec 2013

Semiconductor Thermal Neutron Detector, Toru Aoki, Aki Miyake, Takayuki Nakano, Akifumi Koike, Hisashi Morii, Hidenori Mimura

Makara Journal of Technology

The CdTe and GaN detector with a Gd converter have been developed and investigated as a neutron detector for neutron imaging. The fabricated Gd/CdTe detector with the 25 mm thick Gd was designed on the basis of simulation results of thermal neutron detection efficiency and spatial resolution. The Gd/CdTe detector shows the detection of neutron capture gamma ray emission in the 155Gd(n, g)156Gd, 157Gd(n, g)158Gd and 113Cd(n, g)114Cd reactions and characteristic X-ray emissions due to conversion-electrons generated inside the Gd film. The observed efficient thermal neutron detection with the Gd/CdTe detector ...


Radiation Characteristics Of A Planar Strip Dipole Antenna And A Slot Dipole Antenna For Thz Applications, Catur Apriono, Eko Tjipto Rahardjo Dec 2013

Radiation Characteristics Of A Planar Strip Dipole Antenna And A Slot Dipole Antenna For Thz Applications, Catur Apriono, Eko Tjipto Rahardjo

Makara Journal of Technology

The development of a THz system often requires a device that is used to radiate or detect THz waves. One way to fulfill this requirement is to use an antenna. Therefore, we need to consider the radiation characteristics of an antenna working in the THz region. In this paper, we present simulation study of two dipole antennas, i.e. a planar strip dipole antenna and a slot dipole antenna. The simulation results show that a planar strip dipole antenna has a better radiation efficiency (more than 95%) compared to the slot dipole. It also shows that an efficiency of more ...


The Effect Of Pressing Temperature And Time On The Quality Of Particle Board Made From Jatropha Fruit Hulls Treated In Acidic Condition, Apri Heri Iswanto, Fauzi Febrianto, Yusuf Sudo Hadi, Surdiding Ruhendi, Dede Hermawan Dec 2013

The Effect Of Pressing Temperature And Time On The Quality Of Particle Board Made From Jatropha Fruit Hulls Treated In Acidic Condition, Apri Heri Iswanto, Fauzi Febrianto, Yusuf Sudo Hadi, Surdiding Ruhendi, Dede Hermawan

Makara Journal of Technology

The high of pH of jatropha fruit hulls causes the negative properties of particleboard made from this material. Adjusting the particle acidity and pressing conditions (temperature and time) is among the technical modifications available to improve this particleboard’s properties. Particle acidity has been adjusted in a previous research project, and immersing the particles in acetic acid was found to be the best treatment in this preliminary research. In order to improve the particleboard’s properties, an experiment was conducted to determine the best pressing temperature and time. The objective of the research was to evaluate the influence of pressing ...


Intensity-Demodulated Fiber-Ring Laser Sensor System For Acoustic Emission Detection, Ming Han, Tongqing Liu, Lingling Hu, Qi Zhang Dec 2013

Intensity-Demodulated Fiber-Ring Laser Sensor System For Acoustic Emission Detection, Ming Han, Tongqing Liu, Lingling Hu, Qi Zhang

Faculty Publications from the Department of Electrical and Computer Engineering

We theoretically and experimentally demonstrate a fiber-optic ultrasonic sensor system based on a fiber-ring laser whose cavity consisting of a regular fiber Bragg grating (FBG) and a tunable optical band-pass filter (TOBPF). The FBG is the sensing element and the TOBPF is used to set the lasing wavelength at a point on the spectral slope of the FBG. The ultrasonic signal is detected by the variations of the laser output intensity in response to the cold-cavity loss modulations from the ultrasonicallyinduced FBG spectral shift. The system demonstrated here has a simple structure and low cost, making it attractive for acoustic ...


Cloud Computing In Kaust Library: Beyond Remote Hosting, Yi Yu Dec 2013

Cloud Computing In Kaust Library: Beyond Remote Hosting, Yi Yu

Yi Yu

Enterprise computing is the key strategic approach for KAUST to build its modern IT landscape. In such a strategic direction and technical environment, the library tries to establish library technology by catching new trends which help to make the library more efficient and sufficient. This paper focuses on the cloud computing development in the KAUST library, by using real world scenarios and first-hand experiences to describe what cloud computing means for KASUT library. It addresses the difficulties that were met by the library during the implementation process, how cloud computing affects the functional performance and work procedure of the library ...


Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh Dec 2013

Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh

Jeremy Straub

Small satellites, such as CubeSats, serve as excellent platforms for the collection of data that can be supplied to a geographic information system. To serve this need, they require a robust and lightweight task scheduler due to their limited onboard power production capabilities as well as internal space restrictions. Because of these constraints, schedules must be optimized; however, the scheduling optimization process must be performed using limited processing (CPU) power.

Several considerations must be taken into account in order to make a scheduler for these systems. This poster highlights requirements such as inter-dependency of onboard systems, and limited windows of ...


Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh Dec 2013

Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

Scheduling for a Small Satellite for Remote Sensed Data Collection


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis ...


Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford Dec 2013

Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford

Theses and Dissertations

As three-dimensional virtual environments become both more prevalent and more fragmented, studying how users are connected via their avatars and how they benefit from the virtual world community has become a significant area of research. An in-depth analysis of virtual world Social networks is needed to evaluate how users interact in virtual worlds, to better understand the impact of avatar Social networks on the virtual worlds, and to improve future online Social networks.

Our current efforts are focused on building and exploring the Social network aspects of virtual worlds. In this thesis, we build a Social network of avatars based ...


Tascked: The Sanity Promoting Task Manager, Jake Tobin Dec 2013

Tascked: The Sanity Promoting Task Manager, Jake Tobin

Computer Science and Software Engineering

Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system ...


An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith Dec 2013

An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith

Theses and Dissertations

Remote Direct Memory Access (RDMA) is the transfer of data into buffers between two compute nodes that does not require the involvement of a CPU or Operating System (OS). The idea is borrowed from Direct Memory Access (DMA) which allows memory within a compute node to be transferred without transiting through the CPU. RDMA is termed a zero-copy protocol as it eliminates the need to copy data between buffers within the protocol stack. Because of this and other features, RDMA promotes reliable, high throughput and low latency transfer for packet-switched networking. While the benefits of RMDA are well known and ...


Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah Dec 2013

Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah

Theses and Dissertations

Finding rising stars in academia early in their careers has many implications when hiring new faculty, applying for promotion, and/or requesting grants. Typically, the impact and productivity of a researcher are assessed by a popular measurement called the h-index that grows linearly with the academic age of a researcher. Therefore, h-indices of researchers in the early stages of their careers are almost uniformly low, making it difficult to identify those who will, in future, emerge as influential leaders in their field. To overcome this problem, we make use of Social network analysis to identify young researchers most likely to ...


Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi Dec 2013

Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi

Electrical Engineering

This senior project involves the complete system design and construction of a "Nerf" sentry gun to replace an armed guard. We aimed to develop a compact and highly mobile defense system that allows operational flexibility. The sentry gun can autonomously track and shoot at moving targets, while also allowing a user to remotely access and control the gun via computer. The mobility, hardiness, and functionality of this system allows a reliable replacement for human beings in harsh and hostile environments; ultimately sparing a life.


Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei Dec 2013

Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei

Computer Science Faculty Publications

Broadcasting in vehicular networks has attracted great interest in research community and industry. Broadcasting on disseminating information to individual vehicle beyond the transmission range is based on inter-vehicle communication systems. It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of ...


Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel Dec 2013

Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel

UNLV Theses, Dissertations, Professional Papers, and Capstones

Topic of this master's thesis is connected with task allocation algorithms and mesh networks. Author of this work has already graduated from Wroclaw, University of Technology (Poland) where during his studies he created software simulation environment for two different task allocation algorithms for mesh networks:Adaptive ScanandFrame Sliding. Those algorithms were compared by two, main parame- ters: simulation time and average mesh fulfillment (utilization level). All simulations were done in software environment which was developed specially for that research. This application was based on few, different types of objects: task (width, height, processing time), task queue (different number of ...


Computer-Based Stereoscopic Parts Recognition For Robotic Applications, Ahmad A. Fayed Dec 2013

Computer-Based Stereoscopic Parts Recognition For Robotic Applications, Ahmad A. Fayed

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most of robotic handling and assembly operations are based on sensors such as range and touch sensors. In certain circumstances, such as in the presence of ionizing radiation where most customary sensors will degrade over time due to radiation exposure, these sensors won't function properly. Utilizing two or more cameras (stereo vision) located outside the target zone and analyzing their images to identify location and dimensions of parts within the robot workspace is an alternative for using sensors. Object Recognition is affected by the light condition which oftentimes causes the gray-scale or red, green, and blue values to have ...