Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Theses/Dissertations

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 60 of 294

Full-Text Articles in Computer Engineering

A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef Dec 2014

A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef

Electronic Theses and Dissertations

Prostate cancer is the second most fatal cancer experienced by American males. The average American male has a 16.15% chance of developing prostate cancer, which is 8.38% higher than lung cancer, the second most likely cancer. The current in-vitro techniques that are based on analyzing a patients blood and urine have several limitations concerning their accuracy. In addition, the prostate Specific Antigen (PSA) blood-based test, has a high chance of false positive diagnosis, ranging from 28%-58%. Yet, biopsy remains the gold standard for the assessment of prostate cancer, but only as the last resort because of its invasive nature, high …


Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza Dec 2014

Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza

Electronic Theses and Dissertations

Bots are malicious, automated computer programs that execute malicious scripts and predefined functions on an affected computer. They pose cybersecurity threats and are one of the most sophisticated and common types of cybercrime tools today. They spread viruses, generate spam, steal personal sensitive information, rig online polls and commit other types of online crime and fraud. They sneak into unprotected systems through the Internet by seeking vulnerable entry points. They access the system’s resources like a human user does. Now the question arises how do we counter this? How do we prevent bots and on the other hand allow human …


Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti Dec 2014

Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti

Electronic Theses and Dissertations

The current trends in technology suggest that the next generation of services and devices allows smarter customization and automatic context recognition. Computers learn the behavior of the users and can offer them customized services depending on the context, location, and preferences. One of the most important challenges in human-machine interaction is the proper understanding of human emotions by machines and automated systems. In the recent years, the progress made in machine learning and pattern recognition led to the development of algorithms that are able to learn the detection and identification of human emotions from experience. These algorithms use different modalities …


Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina Dec 2014

Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina

Electronic Theses and Dissertations

As of 2014, about 2.5 quintillion bytes of data are created each day, and 90% of the data in the world was created in the last two years alone. The storage of this data can be on external hard drives, on unused space in peer-to-peer (P2P) networks or using the more currently popular approach of storing in the Cloud. When the users store their data in the Cloud, the entire data is exposed to the administrators of the services who can view and possibly misuse the data. With the growing popularity and usage of Cloud storage services like Google Drive, …


Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace Dec 2014

Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace

Dissertations

In today’s global economy, new workforce competencies are needed for success at both individual and societal levels. The new workforce skills extend beyond basic reading, writing, and arithmetic to include higher order processes such as critical thinking and problem solving. Technical job opportunities have grown by approximately 17%, yet the United States continues to decline in science, technology, engineering and mathematics (STEM) disciplines. Further, U.S. students earn average or below average test scores when compared to other developed countries. Researchers cite the need to incorporate the learning of workplace skills into secondary education curriculum, and advocates call for new teaching …


Interactive Student Planner Application, Nii Tetteh Tackie Yarboi Dec 2014

Interactive Student Planner Application, Nii Tetteh Tackie Yarboi

Electronic Theses, Projects, and Dissertations

Interactive Student Planner is a web based application that will be used by students of California State University San Bernardino. The proposed system replaces the manual planner given to students by the school. This would allow a student to select courses for a quarter, keep track of homework due dates, create and manage project, create notes, create reports, prompts student for upcoming events, save and keep records of other students. A student can send project report as email to the professor, upload and download files easily. The manual way of storing information is not effective, since the student is limited …


A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef Nov 2014

A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef

Electronic Thesis and Dissertation Repository

The recent emergence of online social networks (OSNs) has changed the communication behaviors of thousand of millions of users. OSNs have become significant platforms for connecting users, sharing information, and a valuable source of private and sensitive data about individuals. While OSNs insert constantly new social features to increase the interaction between users, they, unfortunately, offer primitive access control mechanisms that place the burden of privacy policy configuration solely on the holder who has shared data in her/his profile regardless of other associated users, who may have different privacy preferences. Therefore, current OSN privacy mechanisms violate the privacy of all …


Detection Of Variable Retention Time In Dram, Neraj Kumar Nov 2014

Detection Of Variable Retention Time In Dram, Neraj Kumar

Dissertations and Theses

This thesis investigates a test method to detect the presence of Variable Retention Time (VRT) bits in manufactured DRAM. The VRT bits retention time is modeled as a 2-state random telegraph process that includes miscorrelation between test and use. The VRT defect is particularly sensitive to test and use conditions. A new test method is proposed to screen the VRT bits by simulating the use conditions during manufacturing test. Evaluation of the proposed test method required a bit-level VRT model to be parameterized as a function of temperature and voltage conditions. The complete 2-state VRT bit model combines models for …


Task-Based Robotic Grasp Planning, Yun Lin Nov 2014

Task-Based Robotic Grasp Planning, Yun Lin

USF Tampa Graduate Theses and Dissertations

Grasp should be selected intelligently to fulfill different stability properties and manipulative requirements. Currently, most grasping approaches consider only pick-and-place tasks without any physical interaction with other objects or the environment, which are common in an industry setting with limited uncertainty. When robots move to our daily-living environment and perform a broad range of tasks in an unstructured environment, all sorts of physical interactions will occur, which will result in random physical interactive wrenches: forces and torques on the tool.

In addition, for a tool to perform a required task, certain motions need to occur. We call it "functional tool …


Generalized Conditional Matching Algorithm For Ordered And Unordered Sets, Ravikiran Krishnan Nov 2014

Generalized Conditional Matching Algorithm For Ordered And Unordered Sets, Ravikiran Krishnan

USF Tampa Graduate Theses and Dissertations

Designing generalized data-driven distance measures for both ordered and unordered set data is the core focus of the proposed work. An ordered set is a set where time-linear property is maintained when distance between pair of temporal segments. One application in the ordered set is the human gesture analysis from RGBD data. Human gestures are fast becoming the natural form of human computer interaction. This serves as a motivation to modeling, analyzing, and recognition of gestures. The large number of gesture categories such as sign language, traffic signals, everyday actions and also subtle cultural variations in gesture classes makes gesture …


Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar Nov 2014

Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar

Doctoral Dissertations

This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network. Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc network …


Ubot-7: The Design Of A Compliant Dexterous Mobile Manipulator, Jonathan Cummings Nov 2014

Ubot-7: The Design Of A Compliant Dexterous Mobile Manipulator, Jonathan Cummings

Masters Theses

This thesis presents the design of uBot-7, the latest version of a dexterous mobile manipulator. This platform has been iteratively developed to realize a high performance-to-cost dexterous whole body manipulator with respect to mobile manipulation. The semi-anthropomorphic design of the uBot is a demonstrated and functional research platform for developing advanced autonomous perception, manipulation, and mobility tasks. The goal of this work is to improve the uBot’s ability to sense and interact with its environment in order to increase the platforms capability to operate dexterously, through the incorporation of joint torque feedback, and safely, through the implementation of passive and …


Network-On-Chip Synchronization, Mark Buckler Nov 2014

Network-On-Chip Synchronization, Mark Buckler

Masters Theses

Technology scaling has enabled the number of cores within a System on Chip (SoC) to increase significantly. Globally Asynchronous Locally Synchronous (GALS) systems using Dynamic Voltage and Frequency Scaling (DVFS) operate each of these cores on distinct and dynamic clock domains. The main communication method between these cores is increasingly more likely to be a Network-on-Chip (NoC). Typically, the interfaces between these clock domains experience multi-cycle synchronization latencies due to their use of “brute-force” synchronizers. This dissertation aims to improve the performance of NoCs and thereby SoCs as a whole by reducing this synchronization latency.

First, a survey of NoC …


Gammatone And Mfcc Features In Speaker Recognition, Wison Burgos Nov 2014

Gammatone And Mfcc Features In Speaker Recognition, Wison Burgos

Theses and Dissertations

The feature analysis component of an Automated Speaker Recognition (ASR) system plays a crucial role in the overall performance of the system. There are many feature extraction techniques available, but ultimately we want to maximize the performance of these systems. From this point of view, the algorithms developed to compute feature components are analyzed. Current state-of-the-art ASR systems perform quite well in a controlled environment where the speech signal is noise free. The objective of this thesis investigates the results that can be obtained when you combine Mel-Frequency Cepstral Coefficients (MFCC) and Gammatone Frequency Cepstral Coefficients (GFCC) as feature components …


Using Embedded Systems To Determine The Configuration Of A Static Wheelchair Mounted Robotic Arm, Daniel Ashley Oct 2014

Using Embedded Systems To Determine The Configuration Of A Static Wheelchair Mounted Robotic Arm, Daniel Ashley

USF Tampa Graduate Theses and Dissertations

The calibration of a 9 degree of freedom (DOF) robotic manipulator using multiple three axis accelerometers and an embedded system will be accomplished in this work. The 9-DOF robotic system used in this study is a 7-DOF robotic arm attached to a 2-DOF power wheelchair. Combined they create a Wheelchair Mounted Robotic Arm (WMRA). The problem that will be solved by this thesis is the calibration of the robotic system during start up. The 7 DOF robotic arm is comprised of rotational joints only. These joints have dual channel encoders to determine the joint position, among other useful data. The …


Human Mirna Sequence Based Variations Database, Nadim Georges Bou Zeidan Oct 2014

Human Mirna Sequence Based Variations Database, Nadim Georges Bou Zeidan

USF Tampa Graduate Theses and Dissertations

MicroRNAs (miRNAs) are studied as key genetic elements that regulate the gene expression involved in different human diseases. Clinical sequence based variations like copy number variations (CNVs) affect miRNA biogenesis, dosage and target recognition that may represent potentially functional variants and relevant target bindings.

To systematically analyze miRNA-related CNVs and their effects on related genes, a user-friendly free online database was developed to provide further analysis of co-localization of miRNA loci with human genome CNV regions. Further analysis pipelines such as miRNA-target to estimate the levels or locations of variations for genetic duplications, insertions or deletions were also offered. Such …


Analysis And Prevention Of Code-Injection Attacks On Android Os, Grant Joseph Smith Oct 2014

Analysis And Prevention Of Code-Injection Attacks On Android Os, Grant Joseph Smith

USF Tampa Graduate Theses and Dissertations

Injection attacks are the top two causes of software errors and vulnerabilities, according to the MITRE Common Vulnerabilities list [1]. This thesis presents a threat analysis of injection attacks on applications built for Android, a popular but not rigorously studied operating system designed for mobile devices. The following thesis is argued: Injection attacks are possible on off-the-shelf Android systems, and such attacks have the capacity to compromise the device through resource denial and leaking private data. Specifically, we demonstrate that injection attacks are possible through the OS shell and through the SQLite API. To mitigate these attacks, we augment the …


Digital Provenance - Models, Systems, And Applications, Salmin Sultana Oct 2014

Digital Provenance - Models, Systems, And Applications, Salmin Sultana

Open Access Dissertations

Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this …


Shape From Inconsistent Silhouette: Reconstruction Of Objects In The Presence Of Segmentation And Camera Calibration Error, Amy Tabb Oct 2014

Shape From Inconsistent Silhouette: Reconstruction Of Objects In The Presence Of Segmentation And Camera Calibration Error, Amy Tabb

Open Access Dissertations

Silhouettes are useful features to reconstruct the object shape when the object is textureless or the shape classes of objects are unknown. In this dissertation, we explore the problem of reconstructing the shape of challenging objects from silhouettes under real-world conditions such as the presence of silhouette and camera calibration error. This problem is called the Shape from Inconsistent Silhouettes problem. A psuedo-Boolean cost function is formalized for this problem, which penalizes differences between the reconstruction images and the silhouette images, and the Shape from Inconsistent Silhouette problem is cast as a psuedo-Boolean minimization problem. We propose a memory and …


Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao Oct 2014

Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao

Open Access Dissertations

Visual saliency is the perceptual process that makes attractive objects "stand out" from their surroundings in the low-level human visual system. Visual saliency has been modeled as a preprocessing step of the human visual system for selecting the important visual information from a scene. We investigate bottom-up visual saliency using spectral analysis approaches. We present separate and composite model families that generalize existing frequency domain visual saliency models. We propose several frequency domain visual saliency models to generate saliency maps using new spectrum processing methods and an entropy-based saliency map selection approach. A group of saliency map candidates are then …


Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran Oct 2014

Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran

Open Access Dissertations

In recent years, there has been a wide-spread adoption of both multicore and cloud computing. Traditionally, concurrent programmers have relied on the underlying system providing strong memory consistency, where there is a semblance of concurrent tasks operating over a shared global address space. However, providing scalable strong consistency guarantees as the scale of the system grows is an increasingly difficult endeavor. In a multicore setting, the increasing complexity and the lack of scalability of hardware mechanisms such as cache coherence deters scalable strong consistency. In geo-distributed compute clouds, the availability concerns in the presence of partial failures prohibit strong consistency. …


Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li Oct 2014

Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li

Open Access Dissertations

Paraphrasing the theory of embodied cognition, all aspects of our cognition are determined primarily by the contextual information and the means of physical interaction with data and information. In hybrid human-machine systems involving complex decision making, continuously maintaining a high level of attention while employing a deep understanding concerning the task performed as well as its context are essential. Utilizing embodied interaction to interact with machines has the potential to promote thinking and learning according to the theory of embodied cognition proposed by Lakoff. Additionally, the hybrid human-machine system utilizing natural and intuitive communication channels (e.g., gestures, speech, and body …


Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King Oct 2014

Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King

Open Access Theses

As sport-related concussions become more prevalent, the ability to quickly and reliably assess brain injury risk is increasingly essential. Commercially-available systems exist with the goal of assessing the risk of traumatic brain injury in athletes in real-time. These systems utilize a pre-determined acceleration threshold, discarding all captured information below this arbitrary threshold. The use of an event-based model to assess the risk of traumatic brain injury has been shown to be inadequate. Therefore, these systems falsely promote "accurate" real-time communication of risk. Research conducted by the Purdue Neurotrauma Group (PNG) seeks to advance the field by developing a biomechanical sports …


Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson Oct 2014

Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson

Open Access Theses

The lionfish is an invasive species that out-competes and overcrowds native sh species along the eastern seaboard of the United States and down into the Caribbean. Lionfish populations are growing rapidly. Current methods of monitoring lionfish populations are costly and time intensive. A bio-inspired robotic fish was built to use as an autonomous lionfish tracking platform. Lionfish are tracked visually using an onboard processor. Five different computer vision methods for identification and tracking are proposed and discussed. These include: background subtraction, color tracking, mixture of Gaussian background subtraction, speeded up robust feature (SURF), and CamShift based tracking. Each of these …


Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony Oct 2014

Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony

Open Access Theses

Trajectory optimization is a field which can benefit greatly from the advantages offered by parallel computing. The current state-of-the-art in trajectory optimization focuses on the use of direct optimization methods, such as the pseudo-spectral method. These methods are favored due to their ease of implementation and large convergence regions while indirect methods have largely been ignored in the literature in the past decade except for specific applications in astrodynamics. It has been shown that the shortcomings conventionally associated with indirect methods can be overcome by the use of a continuation method in which complex trajectory solutions are obtained by solving …


Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton Oct 2014

Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton

Open Access Theses

Open source software plays an important part in the modern world, powering businesses large and small. However, little work has been done to evaluate the quality of open source software. Two different license paradigms exist within the open source world, and this study examines the difference in software quality between them. In this thesis, the author uses technical debt as a measure of software quality. Eighty open source projects (40 from each paradigm) were downloaded from the popular open source hosting website SourceForge. Using complexity, code duplication, comments, and unit test coverage as inputs to the SonarQube technical debt model, …


Wi-Fi Real Time Location Systems, Benjamin A. Doll Oct 2014

Wi-Fi Real Time Location Systems, Benjamin A. Doll

Open Access Theses

This thesis objective was to determine the viability of utilizing an untrained Wi-Fi real time location system as a GPS alternative for indoor environments. Background research showed that GPS is rarely able to penetrate buildings to provide reliable location data. The benefit of having location information in a facility and how they might be used for disaster or emergency relief personnel and their resources motivated this research. A building was selected with a well-deployed Wi-Fi infrastructure and its untrained location feature was used to determine the distance between the specified test points and the system identified location. It was found …


Principle Of Bio-Inspired Insect Wing Rotational Hinge Design, Fan Fei Oct 2014

Principle Of Bio-Inspired Insect Wing Rotational Hinge Design, Fan Fei

Open Access Theses

A principle for designing and fabricating bio-inspired miniature artificial insect flapping wing using flexure rotational hinge design is presented. A systematic approach of selecting rotational hinge stiffness value is proposed. Based on the understanding of flapping wing aerodynamics, a dynamic simulation is constructed using the established quasi-steady model and the wing design. Simulations were performed to gain insight on how different parameters affect the wing rotational response. Based on system resonance a model to predict the optimal rotational hinge stiffness based on given wing parameter and flapping wing kinematic is proposed. By varying different wing parameters, the proposed method is …


Effects Of Hip And Ankle Moments On Running Stability: Simulation Of A Simplified Model, Rubin C. Cholera Oct 2014

Effects Of Hip And Ankle Moments On Running Stability: Simulation Of A Simplified Model, Rubin C. Cholera

Open Access Theses

In human running, the ankle, knee, and hip moments are known to play different roles to influence the dynamics of locomotion. A recent study of hip moments and several hip-based legged robots have revealed that hip actuation can significantly improve the stability of locomotion, whether controlled or uncontrolled. Ankle moments are expected to also significantly affect running stability, but in a different way than hip moments. Here we seek to advance the current theory of dynamic running and associated legged robots by determining how simple open-loop ankle moments could affect running stability. We simulate a dynamical model, and compare it …


Automatic Translation Of Non-Repetitive Openmp To Mpi, Fahed Jubair Oct 2014

Automatic Translation Of Non-Repetitive Openmp To Mpi, Fahed Jubair

Open Access Dissertations

Cluster platforms with distributed-memory architectures are becoming increasingly available low-cost solutions for high performance computing. Delivering a productive programming environment that hides the complexity of clusters and allows writing efficient programs is urgently needed. Despite multiple efforts to provide shared memory abstraction, message-passing (MPI) is still the state-of-the-art programming model for distributed-memory architectures. ^ Writing efficient MPI programs is challenging. In contrast, OpenMP is a shared-memory programming model that is known for its programming productivity. Researchers introduced automatic source-to-source translation schemes from OpenMP to MPI so that programmers can use OpenMP while targeting clusters. Those schemes limited their focus on …