Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1042

Full-Text Articles in Computer Engineering

A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham Dec 2014

A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham

Faculty Publications

Contact switches and touch screens are the state of the art for recording pigeons’ pecking behavior. Recording other behavior, however, requires a different sensor for each behavior, and some behaviors cannot easily be recorded. We present a flexible and inexpensive image-based approach to detecting and counting pigeon behaviors that is based on the Kinect sensor from Microsoft. Although the system is as easy to set up and use as the standard approaches, it is more flexible because it can record behaviors in addition to key pecking. In this article, we show how both the fast, fine motion of key pecking ...


New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann Dec 2014

New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann

CLCWeb: Comparative Literature and Culture

In his article "New Challenges for the Archiving of Digital Writing" Heiko Zimmermann discusses the challenges of the preservation of digital texts. In addition to the problems already at the focus of attention of digital archivists, there are elements in digital literature which need to be taken into consideration when trying to archive them. Zimmermann analyses two works of digital literature, the collaborative writing project A Million Penguins (2006-2007) and Renée Tuner's She… (2008) and shows how the ontology of these texts is bound to elements of performance, to direct social interaction of writers and readers to the uniquely ...


An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler Dec 2014

An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler

University of New Orleans Theses and Dissertations

This thesis performs an empirical analysis of Word2Vec by comparing its output to WordNet, a well-known, human-curated lexical database. It finds that Word2Vec tends to uncover more of certain types of semantic relations than others -- with Word2Vec returning more hypernyms, synonomyns and hyponyms than hyponyms or holonyms. It also shows the probability that neighbors separated by a given cosine distance in Word2Vec are semantically related in WordNet. This result both adds to our understanding of the still-unknown Word2Vec and helps to benchmark new semantic tools built from word vectors.


Automated Scratchpad Mapping And Allocation For Embedded Processors, Yang Gao Dec 2014

Automated Scratchpad Mapping And Allocation For Embedded Processors, Yang Gao

Theses and Dissertations

Embedded system-on-chip processors such as the Texas Instruments C66 DSP and the IBM Cell provide the programmer with a software controlled on-chip memory to supplement a traditional but simple two-level cache. By decomposing data sets and their corresponding workload into small subsets that fit within this on-chip memory, the processor can potentially achieve equivalent or better performance, power efficiency, and area efficiency than with its sophisticated cache. However, program controlled on chip memory requires a shift in the responsibility for management and allocation from the hardware to the programmer. Specifically, this requires the explicit mapping of program arrays to specific ...


High-Performance Meta-Genomic Gene Identification, Ibrahim Savran Dec 2014

High-Performance Meta-Genomic Gene Identification, Ibrahim Savran

Theses and Dissertations

Computational Genomics, or Computational Genetics, refers to the use of computational and statistical analysis for understanding the structure and the function of genetic material in organisms. The primary focus of research in computational genomics in the past three decades has been the understanding of genomes and their functional elements by analyzing biological sequence data. The high demand for low-cost sequencing has driven the development of highthroughput sequencing technologies, next-generation sequencing (NGS), that parallelize the sequencing process, producing thousands or millions of sequences concurrently. Moore’s Law is the observation that the number of transistors on integrated circuits doubles approximately every ...


Automatic Loop Tuning And Memory Management For Stencil Computations, Fan Zhang Dec 2014

Automatic Loop Tuning And Memory Management For Stencil Computations, Fan Zhang

Theses and Dissertations

The Texas Instruments C66x Digital Signal Processor (DSP) is an embedded processor technology that is targeted at real time signal processing. It is also developed with a high potential to become the new generation of coprocessor technology for high performance embedded computing. Of particular interest is its performance for stencil computations, such as those found in signal processing and computer vision tasks. A stencil is a loop in which the output value is updated at each position of an array by taking a weighted function of its neighbors. Efficiently mapping stencil-based kernels to the C66x device presents two challenges. The ...


Benefits Of Video Games In Multidisciplinary Scientific Research, Jeremiah Jeffrey Shepherd Dec 2014

Benefits Of Video Games In Multidisciplinary Scientific Research, Jeremiah Jeffrey Shepherd

Theses and Dissertations

In recent years, computer-based games have been shown to be effective both as a tool for conducting research in a variety of domains and for research on games itself. In this work, we show that implementing games that have a basis in theory and that are combined with the most recent gaming practices result in effective research tools. We demonstrate this via game implementations for three domains. The first implementation is based on new theories in speech pedagogy, and demonstrates the effectiveness of our approach. The second implementation shows that using a game that simulates therapeutic speech practices can aid ...


Practical Concurrency Support For Web Service Transactions, Emad Alsuwat Dec 2014

Practical Concurrency Support For Web Service Transactions, Emad Alsuwat

Theses and Dissertations

Traditional database concurrency control methods use locking, timestampordering, and optimistic-ordering to achieve DB consistency. However, these approaches are not suitable for long-running Web Service Compositions (WSCs) due to associated performance degradation. Our hypothesis asserts that, using transactional semantic and ordering information, the execution time of a WSC can be reduced, thus allowing the use of traditional database concurrency control methods while avoiding unacceptable performance degradation. Our solution is based on the following approaches: § We model a WSC as WS-BPEL specification, i.e., a partial order of WS transactions. § We allow some of the WS transactions in the WSC to execute ...


Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr. Dec 2014

Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr.

Electrical and Computer Engineering Publications

Recent developments in the use of technologies in education have provided unique opportunities for teaching and learning. This paper describes the results of a survey conducted at Western University (Canada) in 2013, regarding the use of media by students and instructors. The results of this study support the assumption that the media usage of students and instructors include a mixture of traditional and new media. The main traditional media continue to be important, and some new media have emerged as seemingly on equal footing or even more important than the traditional forms of media. Some new media that have recently ...


A Study Of Mobile Learning For Higher Education Students In Guangzhou, Chun Hung, Hugo Wong Dec 2014

A Study Of Mobile Learning For Higher Education Students In Guangzhou, Chun Hung, Hugo Wong

Practical Social and Industrial Research Symposium

No abstract provided.


Assisted Technology For Daily Living, Raymond K.Y. Tong Dec 2014

Assisted Technology For Daily Living, Raymond K.Y. Tong

Practical Social and Industrial Research Symposium

Prof Tong will introduce two major assisted technologies he recently developed to assist elderly people’s daily living and promote healthy ageing : i) the telecare system for monitoring the safety of single elderly at home; and ii) Kinect system for elderly to carry out home-based exercise.


Design Of A Haptic Interface For Medical Applications Using Magneto-Rheological Fluid Based Actuators, Nima Najmaei Dec 2014

Design Of A Haptic Interface For Medical Applications Using Magneto-Rheological Fluid Based Actuators, Nima Najmaei

Electronic Thesis and Dissertation Repository

This thesis reports on the design, construction, and evaluation of a prototype two degrees-of-freedom (DOF) haptic interface, which takes advantage of Magneto-Rheological Fluid (MRF) based clutches for actuation. Haptic information provides important cues in teleoperated systems and enables the user to feel the interaction with a remote or virtual environment during teleoperation. The two main objectives in designing a haptic interface are stability and transparency. Indeed, deficiencies in these factors in haptics-enabled telerobotic systems has the introduction of haptics in medical environments where safety and reliability are prime considerations. An actuator with poor dynamics, high inertia, large size, and heavy ...


Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr. Dec 2014

Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr.

Electrical and Computer Engineering Publications

The Web 2.0 has permeated academic life. The use of online information services in post-secondary education has led to dramatic changes in faculty teaching methods as well as in the learning and study behavior of students. At the same time, traditional information media, such as textbooks and printed handouts, still form the basic pillars of teaching and learning. This paper reports the results of a survey about media usage in teaching and learning conducted with Western University students and instructors, highlighting trends in the usage of new and traditional media in higher education by instructors and students. In addition ...


Requirement-Guided Model Refinement, Zhihao Jiang, Pieter Mosterman, Rahul Mangharam Dec 2014

Requirement-Guided Model Refinement, Zhihao Jiang, Pieter Mosterman, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Medical device is a typical Cyber-Physical System and ensuring the safety and efficacy of the device requires closed-loop verification. Currently closed-loop verifications of medical devices are performed in the form of clinical trials in which the devices are tested on the patients.


Dynamically Reconfigurable Miniature Golf Course, James Lind Dec 2014

Dynamically Reconfigurable Miniature Golf Course, James Lind

Honors Theses

The purpose of this report is to inform the reader of the Senior Design Project lead by 3 students in the Electrical and Computer Engineering department at Western Michigan University. The project is in needed for use within the ECE department as a tool for showcasing to prospective students the attributes of electrical and computer engineering.

At the heart of the project lies an Arduino microcontroller acting as the commanding brain of the system. Its task is to manipulate various types of obstacles throughout the playing field with a goal of delivering a dynamic experience to the player(s). Additionally ...


Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta Dec 2014

Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta

Departmental Technical Reports (CS)

Fuzzy techniques have been originally designed to describe imprecise ("fuzzy") expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in situations without expert knowledge, when all we have is data. In this paper, we explain this surprising phenomenon by showing that the need for optimal processing of data (including crisp data) naturally leads to fuzzy and neural data processing techniques.

This result shows the potential of fuzzy data processing. To maximally utilize this potential, we need to provide an operational meaning of the corresponding fuzzy degrees. We show that such a meaning can be extracted from the above ...


Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich Dec 2014

Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

We prove that the function computed by each single-use expression is a ratio of two multi-linear functions.


When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich Dec 2014

When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich

Departmental Technical Reports (CS)

Sometimes, a function f of n variables can be represented as a composition of two functions of fewer variables. In this case, the problem of computing the range of f on given intervals can be reduced to two range-computation problems with fewer variables. In this paper, we describe a feasible algorithm that checks whether such a reduction is possible -- and, if it is possible, produces the desired reduction.


Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich Dec 2014

Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, we only know the upper bound Δ on the measurement error: |Δx| ≤ Δ. In other words, we only know that the measurement error is located on the interval [−Δ, Δ]. The traditional approach is to assume that Δx is uniformly distributed on [−Δ, Δ]. In some situations, however, this approach underestimates the error of indirect measurements. It is therefore desirable to directly process this interval uncertainty. Such "interval computations" methods have been developed since the 1950s. In this paper, we provide a brief overview of related algorithms and results.


Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich Dec 2014

Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich

Departmental Technical Reports (CS)

Starting from well-known studies by Kahmenan and Tarsky, researchers have found many examples when our decision making -- and our decision making -- seem to be irrational. In this chapter, we show that this seemingly irrational decision making can be explained if we take into account that human abilities to process information are limited; as a result, instead of the exact values of different quantities, we operate with granules that contain these values. On several examples, we show that optimization under such granularity restriction indeed leads to observed human decision making. Thus, granularity helps explain seemingly irrational human decision making.


Robust Model Predictive Control With Anytime Estimation, Truong X Nghiem, Yash Vardhan Pant, Rahul Mangharam Dec 2014

Robust Model Predictive Control With Anytime Estimation, Truong X Nghiem, Yash Vardhan Pant, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

With an increasing autonomy in modern control systems comes an increasing amount of sensor data to be processed, leading to overloaded computation and communication in the systems. For example, a vision-based robot controller processes large image data from cameras at high frequency to observe the robot’s state in the surrounding environment, which is used to compute control commands. In real-time control systems where large volume of data is processed for feedback control, the data-dependent state estimation can become a computation and communication bottleneck, resulting in potentially degraded control performance. Anytime algorithms, which offer a trade-off between execution time and ...


Reliability Measurement Of An Object Oriented Design: A Systematic Review, Innovative Research Publications Irp India, Nidhi Gupta, Dr. Rahul Kumar Dec 2014

Reliability Measurement Of An Object Oriented Design: A Systematic Review, Innovative Research Publications Irp India, Nidhi Gupta, Dr. Rahul Kumar

Innovative Research Publications IRP India

Reliability is one of the highly significant quality indicators of object oriented software. Its proper measurement or evaluation, constantly facilitate and improve the software development process. On the other hand, reliability has always been a mysterious theory and its truthful measurement or evaluation is a complex exercise. Researchers and practitioners have always argued that reliability should be considered as a key feature in order to promise the quality software. A perfect measure of software quality fully depends on reliability measurement, and as an outcome estimating reliability is a complex problem attracting significant research consideration. This review paper presents the results ...


Research On The Clustering Algorithm Of Component Based On The Grade Strategy, Innovative Research Publications Irp India, G.Vamshi Krishna, Dr.P. Niranjan, Dr. P. Shireesha Dec 2014

Research On The Clustering Algorithm Of Component Based On The Grade Strategy, Innovative Research Publications Irp India, G.Vamshi Krishna, Dr.P. Niranjan, Dr. P. Shireesha

Innovative Research Publications IRP India

The rapid development in the software component technology increases the number of components, reasonable component classification is the foundation to achieve effective retrieval. The former methods like faceted classification and full text retrieval methods and some traditional methods have always some subjective factors to achieve it. The user is not able to satisfy with these methods. So from the point of user requirements, grade strategy is introduced, which gives each facet different weight, and the similarity between the components. A component clustering algorithm based on the grade strategy is proposed. They prove that component clustering algorithm based on the grade ...


Image Registration In Medical Image Processing -An Overview, Innovative Research Publications Irp India, Dr. P. Latha,, Baby D. Dayana, N. Meffiya Dec 2014

Image Registration In Medical Image Processing -An Overview, Innovative Research Publications Irp India, Dr. P. Latha,, Baby D. Dayana, N. Meffiya

Innovative Research Publications IRP India

Image registration the process is very difficult problem facing in medical field . The process of image registration is an automatic or manual procedure. It tries to find similar points between two images and align themto minimize the “error”, i.e. distance measure between twoimages.The dataset can be multiple photographs like MRI,spect,CT scan images from different times ,depths or viewpoints.The purpose of this paper is to provide a overall information about the existing registration techniques and a detailed approach about non rigid registration which is in advanced mode .


Text Dependent Speaker Identification Using A Bayesian Network And Mel Frequency Cepstrum Coefficient, Innovative Research Publications Irp India, Mohd. Manjur Alam, Md. Salah Uddin Chowdury, Niaz Uddin Mahmud, Shamsun Nahar Shoma, Md. Abdul Wahab Dec 2014

Text Dependent Speaker Identification Using A Bayesian Network And Mel Frequency Cepstrum Coefficient, Innovative Research Publications Irp India, Mohd. Manjur Alam, Md. Salah Uddin Chowdury, Niaz Uddin Mahmud, Shamsun Nahar Shoma, Md. Abdul Wahab

Innovative Research Publications IRP India

Speaker identification is a biometric technique. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. Speaker Recognition technology has recently been used in large number of commercial areas successfully such as in voice based biometrics; voice controlled appliances, security control for confidential information, remote access to computers and many more interesting areas. A speaker identification system has two phases which are the training phase and the testing phase. Feature extraction is the first step for each phase in speaker recognition. Many algorithms are suggested by the researchers for feature extraction. In this ...


Mc-Fluid: Fluid Model-Based Mixed-Criticality Scheduling On Multiprocessors, Jaewoo Lee, Kieu-My Phan, Xiaozhe Gu, Jiyeon Lee, Arvind Easwaran, Insik Shin, Insup Lee Dec 2014

Mc-Fluid: Fluid Model-Based Mixed-Criticality Scheduling On Multiprocessors, Jaewoo Lee, Kieu-My Phan, Xiaozhe Gu, Jiyeon Lee, Arvind Easwaran, Insik Shin, Insup Lee

Departmental Papers (CIS)

A mixed-criticality system consists of multiple components with different criticalities. While mixed-criticality scheduling has been extensively studied for the uniprocessor case, the problem of efficient scheduling for the multiprocessor case has largely remained open. We design a fluid model-based multiprocessor mixed-criticality scheduling algorithm, called MC-Fluid in which each task is executed in proportion to its criticality-dependent rate. We propose an exact schedulability condition for MC-Fluid and an optimal assignment algorithm for criticality-dependent execution rates with polynomial-time complexity. Since MC-Fluid cannot be implemented directly on real hardware platforms, we propose another scheduling algorithm, called MC-DP-Fair, which can be implemented while preserving ...


50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen Dec 2014

50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen

Departmental Technical Reports (CS)

While many objects and processes in the real world are discrete, from the computational viewpoint, discrete objects and processes are much more difficult to handle than continuous ones. As a result, a continuous approximation is often a useful way to describe discrete objects and processes. We show that the need for such an approximation explains many features of fuzzy techniques, and we speculate on to which promising future directions of fuzzy research this need can lead us.


How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich Dec 2014

How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich

Departmental Technical Reports (CS)

A natural idea of decision making under uncertainty is to assign a fair price to different alternatives, and then to use these fair prices to select the best alternative. In this paper, we show how to assign a fair price under different types of uncertainty.


Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr. Dec 2014

Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.

Electrical and Computer Engineering Publications

Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.


A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn Dec 2014

A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

Cognitive Radio (CR) is a technology that has gained much interest recently due to the increasing scarcity of the radio frequency spectrum. Large portions of the radio frequency spectrum are licensed to users who then have exclusive access to the bandwidth, and unlicensed bands can be a challenge to use due to interference from unlicensed users. Despite the seeming scarcity, tests of bands allocated by the Federal Communications Committee (FCC) to licensed and unlicensed user have shown that many are underutilized and often unoccupied by the user to whom they are licensed. CR aims to exploit this unused spectrum and ...