Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Scientific Application Acceleration Utilizing Heterogeneous Architectures, Edwin Weill Dec 2014

Scientific Application Acceleration Utilizing Heterogeneous Architectures, Edwin Weill

All Theses

Within the past decade, there have been substantial leaps in computer architectures to exploit the parallelism that is inherently present in many applications. The scientific community has benefited from the emergence of not only multi-core processors, but also other, less traditional architectures including general purpose graphical processing units (GPGPUs), field programmable gate arrays (FPGAs), and Intel's many integrated cores (MICs) architecture (i.e. Xeon Phi). The popularity of the GPGPU has increased rapidly because of their ability to perform massive amounts of parallel computation quickly and at low cost with an ease of programmability. Also, with the addition of high-level programming …


A Device To Record Naturally Daily Wrist Motion, Surya Sharma Dec 2014

A Device To Record Naturally Daily Wrist Motion, Surya Sharma

All Theses

We introduce a new device to record and store wrist motion activity data. The motivation to create this device was the fact that this data can be used to detect periods of eating or the number of bites consumed. There is no similar device available in the market. This device uses new components that have been recently introduced to the market, and newer techniques that can be used for low quantity production. The production cost for this device was $52, similar to other fitness trackers on the market. The device was capable of recording wrist motion activity for 24 hours …


Towards Efficient File Sharing And Packet Routing In Mobile Opportunistic Networks, Kang Chen Aug 2014

Towards Efficient File Sharing And Packet Routing In Mobile Opportunistic Networks, Kang Chen

All Dissertations

With the increasing popularity of portable digital devices (e.g., smartphones, laptops, and tablets), mobile opportunistic networks (MONs) [40, 90] consisting of portable devices have attracted much attention recently. MONs are also known as pocket switched networks (PSNs) [52]. MONs can be regarded as a special form of mobile ad hoc networks (MANETs) [7] or delay tolerant networks (DTNs) [35, 56]. In such networks, mobile nodes (devices) move continuously and meet opportunistically. Two mobile nodes can communicate with each other only when they are within the communication range of each other in a peer-to-peer (P2P) manner (i.e., without the need of …


A Load-Based Approach To Forming A Connected Dominating Set For An Ad Hoc Network, Raihan Hazarika Aug 2014

A Load-Based Approach To Forming A Connected Dominating Set For An Ad Hoc Network, Raihan Hazarika

All Theses

Efficient routing in mobile ad hoc networks (MANETs) is highly desired and connected dominating sets (CDS) have been gaining significant popularity in this regard. The CDS based approach reduces the search for a minimum cost path between a pair of source and destination terminals to the set of terminals forming the backbone network. Researchers over the years have developed numerous distributed and localized algorithms for constructing CDSs which minimize the number of terminals forming the backbone or which provide multiple node-disjoint paths between each pair of terminals. However none of this research focuses on minimizing the load at the bottleneck …


Verifying A Systematic Application To Accelerator Roadmap Using Shallow Water Wave Equations, Ranajeet Anand Aug 2014

Verifying A Systematic Application To Accelerator Roadmap Using Shallow Water Wave Equations, Ranajeet Anand

All Theses

With the advent of parallel computing, a number of hardware architectures have become available for data parallel applications. Every architecture is unique with respect to characteristics such as floating point operations per second, memory bandwidth and synchronization costs. Data parallel applications possess inherent parallelism that needs to be studied and the hardware that can best exploit this parallelism can be identified and selected for large-scale implementation. The application that I have considered for my thesis is - numerical solution of shallow water wave equations using finite difference method. These equations are a set of partial differential equations that model the …


A Study Of Time-Based Features And Regularity Of Manipulation To Improve The Detection Of Eating Activity Periods During Free Living, Jose Reyes May 2014

A Study Of Time-Based Features And Regularity Of Manipulation To Improve The Detection Of Eating Activity Periods During Free Living, Jose Reyes

All Theses

This thesis considers the problem of detecting when people eat by tracking their wrist motion. The goal of this work is to automatically detect the start and stop times of these eating activities. It builds upon previous work done by our research group, which developed an algorithm for automatically detecting peaks in activities associated with food preparation and clean-up. This peak detector is then used for segmenting data. These segments are then classified as eating or non-eating activities using a naive Bayes classifier based on probabilities obtained from computing different features in each segment. The original work introduced 4 features, …


Ear Contour Detection And Modeling Using Statistical Shape Models, Satish Ravindran May 2014

Ear Contour Detection And Modeling Using Statistical Shape Models, Satish Ravindran

All Theses

Ear detection is an actively growing area of research because of its applications in human head tracking and biometric recognition. In head tracking, it is used to augment face detectors and to perform pose estimation. In biometric systems, it is used both as an independent modality and in multi-modal biometric recognition. The ear shape is the preferred feature used to perform detection because of its unique structure in both 2D color images and 3D range images. Ear shape models have also been used in literature to perform ear detection, but at a cost of a loss in information about the …


Privacy Preserving Statistics, Oluwakemi Hambolu May 2014

Privacy Preserving Statistics, Oluwakemi Hambolu

All Theses

Over the past few years, there have been an increase in the development and improvement of circumvention tools like Tor and Psiphon. These tools provide an environment for citizens of oppressive regimes to access websites freely without fear of identification, these tools aid democracy activists and journalists in West Africa in using the Internet securely. A similar circumvention tool was developed by us. This tool circumvents DNS and IP address blocking/filtering, by leveraging technologies developed by criminal botnet enterprises. To improve and maintain the circumvention tool we developed, it is important to quantify the number and country of origin of …


Electric Power Synchrophasor Network Cyber Security Vulnerabilities, Christopher Beasley May 2014

Electric Power Synchrophasor Network Cyber Security Vulnerabilities, Christopher Beasley

All Theses

Smart grid technologies such as synchrophasor devices (Phasor Measurement Units (PMUs)), make real-time monitoring, control, and analysis of the electric power grid possible. PMUs measure voltage and current phasors across the electrical power grid, add a GPS time stamps to measurements, and sends reports to the Phasor Data Concentrators (PDCs) in the control centers. Reports are used to make decisions about the condition and state of the power grid. Since this approach relies on Internet Protocol (IP) network infrastructure, possible cybersecurity vulnerabilities have to be addressed to ensure that it is stable, secure, and reliable. In literature, attacks that are …