Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 945

Full-Text Articles in Computer Engineering

How Can We Build A Moral Robot?, Kristen E. Clark Dec 2015

How Can We Build A Moral Robot?, Kristen E. Clark

Capstones

Artificial intelligence is already starting to drive our cars and make choices that affect the world economy. One day soon, we’ll have robots that can take care of our sick and elderly, and even rescue us in rescue us in emergencies. But as robots start to make decisions that matter—it’s raising questions that go far beyond engineering. We’re stating to think about ethics.

Bertram Malle and Matthias Scheutz are part of a team funded by the department of defense. It's their job to answer a question that seems straight out of a sci-fi novel: How ...


Demonstration Of Inexact Computing Implemented In The Jpeg Compression Algorithm Using Probabilistic Boolean Logic Applied To Cmos Components, Christopher I. Allen Dec 2015

Demonstration Of Inexact Computing Implemented In The Jpeg Compression Algorithm Using Probabilistic Boolean Logic Applied To Cmos Components, Christopher I. Allen

Theses and Dissertations

Probabilistic computing offers potential improvements in energy, performance, and area compared with traditional digital design. This dissertation quantifies energy and energy-delay tradeoffs in digital adders, multipliers, and the JPEG image compression algorithm. This research shows that energy demand can be cut in half with noisesusceptible16-bit Kogge-Stone adders that deviate from the correct value by an average of 3 in 14 nanometer CMOS FinFET technology, while the energy-delay product (EDP) is reduced by 38 . This is achieved by reducing the power supply voltage which drives the noisy transistors. If a 19 average error is allowed, the adders are 13 times more ...


Formal Modeling And Verification Of Delay-Insensitive Circuits, Hoon Park Dec 2015

Formal Modeling And Verification Of Delay-Insensitive Circuits, Hoon Park

Dissertations and Theses

Einstein's relativity theory tells us that the notion of simultaneity can only be approximated for events distributed over space. As a result, the use of asynchronous techniques is unavoidable in systems larger than a certain physical size. Traditional design techniques that use global clocks face this barrier of scale already within the space of a modern microprocessor chip. The most common response by the chip industry for overcoming this barrier is to use Globally Asynchronous Locally Synchronous (GALS) design techniques. The circuits investigated in this thesis can be viewed as examples of GALS design. To make such designs trustworthy ...


Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar Dec 2015

Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar

School of Computing and Information Sciences

Pipeline networks are one of the key infrastructures of our modern life. Proactive monitoring and frequent inspection of pipeline networks are very important for sustaining their safe and efficient functionalities. Existing monitoring and maintenance approaches are costly and inefficient because pipelines can be installed in large scale and in an inaccessible and hazardous environment. To overcome these challenges, we propose a novel Radio Frequency IDentification (RFID)-based Autonomous Maintenance system for Pipelines, called RAMP, which combines robotic, sensing, and RFID technologies for efficient and accurate inspection, corrective reparation, and precise geo-location information. RAMP can provide not only economical and scalable ...


From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus Dec 2015

From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus

Computer Science Faculty Publications and Presentations

Although functional as well as logic languages use equality to discriminate between logically different cases, the operational meaning of equality is different in such languages. Functional languages reduce equational expressions to their Boolean values, True or False, logic languages use unification to check the validity only and fail otherwise. Consequently, the language Curry, which amalgamates functional and logic programming features, offers two kinds of equational expressions so that the programmer has to distinguish between these uses. We show that this distinction can be avoided by providing an analysis and transformation method that automatically selects the appropriate operation. Without this distinction ...


Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim Dec 2015

Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim

Theses and Dissertations

Proteins are often referred as working molecule of a cell, performing many structural, functional and regulatory processes. Revealing the function of proteins still remains a challenging problem. Advancement in genomics sequence projects produces large protein sequence repository, but due to technical difficulty and cost related to structure determination, the number of identified protein structure is far behind. Novel structures identification are particularly important for a number of reasons: they generate models of similar proteins for comparison; identify evolutionary relationships; further contribute to our understanding of protein function and mechanism; and allow for the fold of other family members to be ...


Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish Dec 2015

Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish

Electronic Thesis and Dissertation Repository

Cloud systems, also known as cloud services, are among the primary solutions of the information technology domain. Cloud services are accessed through an identity authentication process. These authentication processes have become increasingly vulnerable to adversaries who may perform denial-of-service (DoS) attacks to make cloud services inaccessible. Several strong authentication protocols have been employed to protect conventional network systems. Nevertheless, they can cause a DoS threat when implemented in the cloud-computing system. This is because the comprehensive verification process may exhaust the cloud resources and shut down cloud’s services. This thesis proposes a novel cloud-based secure authentication (CSA) protocol suite ...


Dynamic Modeling, Parameter Estimation And Control Of A Leg Prosthesis Test Robot, Hanz Richter, Daniel Simon, William Smith, Sergey Samorezov Dec 2015

Dynamic Modeling, Parameter Estimation And Control Of A Leg Prosthesis Test Robot, Hanz Richter, Daniel Simon, William Smith, Sergey Samorezov

Hanz Richter

Robotic testing can facilitate the development of new concepts, designs and control systems for prosthetic limbs. Human subject test clearances, safety and the lack of repeatability associated with human trials can be reduced or eliminated with automated testing, and test modalities are possible which are dangerous or inconvenient to attempt with patients. This paper describes the development, modeling, parameter estimation and control of a robot capable of reproducing two degree-of-freedom hip motion in the sagittal plane. Hip vertical displacement and thigh angle motion profiles are applied to a transfemoral prosthesis attached to the robot. A treadmill is used as walking ...


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY ...


Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen Dec 2015

Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen

Dissertations

For every face recognition method, the primary goal is to achieve higher recognition accuracy and spend less computational costs. However, as the gallery size increases, especially when one probe image corresponds to only one training image, face recognition becomes more and more challenging. First, a larger gallery size requires more computational costs and memory usage. Meanwhile, that the large gallery sizes degrade the recognition accuracy becomes an even more significant problem to be solved.

A coarse parallel algorithm that equally divides training images and probe images into multiple processors is proposed to deal with the large computational costs and huge ...


A Platform For Fast Detection Of Let-7 Micro Rna Using Polyaniline Fluorescence And Image Analysis Techniques, Partha P. Sengupta Dec 2015

A Platform For Fast Detection Of Let-7 Micro Rna Using Polyaniline Fluorescence And Image Analysis Techniques, Partha P. Sengupta

Master's Theses

The project describes a new strategy for transducing hybridization events through modulating intrinsic properties of the electroconductive polymer polyaniline (PANI). When DNA based probes electrostatically interact with PANI, its fluorescence properties are increased, a phenomenon that can be enhanced by UV irradiation. Hybridization of target nucleic acids results in dissociation of probes causing PANI fluorescence to return to basal levels. By monitoring restoration of base PANI fluorescence as little as 10-11 M (10 pM) of target oligonucleotides could be detected within 15 minutes of hybridization. Detection of complementary oligos was specific, with introduction of a single mismatch failing to ...


Vanadium Oxide Thin-Film Variable Resistor-Based Rf Switches, Kuanchang Pan, Weisong Wang, Eunsung Shin, Kelvin Freeman, Guru Subramanyam Dec 2015

Vanadium Oxide Thin-Film Variable Resistor-Based Rf Switches, Kuanchang Pan, Weisong Wang, Eunsung Shin, Kelvin Freeman, Guru Subramanyam

Guru Subramanyam

Vanadium dioxide (VO2) is a unique phase change material (PCM) that possesses a metal-to-insulator transition property. Pristine VO2 has a negative temperature coefficient of resistance, and it undergoes an insulator-to-metal phase change at a transition temperature of 68°C. Such a property makes the VO2 thin-film-based variable resistor (varistor) a good candidate in reconfigurable electronics to be integrated with different RF devices such as inductors, varactors, and antennas. Series single-pole single-throw (SPST) switches with integrated VO2 thin films were designed, fabricated, and tested. The overall size of the device is 380 μm × 600 μm. The SPST switches were fabricated on ...


A High Performance Ceramic-Polymer Separator For Lithium Batteries, Jitendra Kumar, Padmakar Kichambare, Amarendra K. Rai, Rabi Bhattacharya, Stanley J. Rodrigues, Guru Subramanyam Dec 2015

A High Performance Ceramic-Polymer Separator For Lithium Batteries, Jitendra Kumar, Padmakar Kichambare, Amarendra K. Rai, Rabi Bhattacharya, Stanley J. Rodrigues, Guru Subramanyam

Guru Subramanyam

A three-layered (ceramic-polymer-ceramic) hybrid separator was prepared by coating ceramic electrolyte [lithium aluminum germanium phosphate (LAGP)] over both sides of polyethylene (PE) polymer membrane using electron beam physical vapor deposition (EB-PVD) technique. Ionic conductivities of membranes were evaluated after soaking PE and LAGP/PE/LAGP membranes in a 1 Molar (1M) lithium hexafluroarsenate (LiAsF6) electrolyte in ethylene carbonate (EC), dimethyl carbonate (DMC) and ethylmethyl carbonate (EMC) in volume ratio (1:1:1). Scanning electron microscopy (SEM) and X-ray diffraction (XRD) techniques were employed to evaluate morphology and structure of the separators before and after cycling performance tests to better understand ...


Industry-University Collaboration: A University Of Dayton Model, Guru Subramanyam Dec 2015

Industry-University Collaboration: A University Of Dayton Model, Guru Subramanyam

Guru Subramanyam

This paper introduces industry-university collaboration activities currently in place at the University of Dayton's School of Engineering. These collaborations are important to prepare industry-ready graduates who excel in technical, entrepreneurial, and leadership skills. One of the key curricular components is the industry-sponsored multidisciplinary projects. Industry involvement in advisory committee, strategic research partnerships, and other forms are discussed.


Can Declared Strategy Voting Be An Effective Instrument For Group Decision-Making?, Lorrie Cranor Dec 2015

Can Declared Strategy Voting Be An Effective Instrument For Group Decision-Making?, Lorrie Cranor

Lorrie F Cranor

The goal of this research is to determine whether declared strategy voting can be an effective tool for group decision-making. Declared strategy voting is a novel group decision-making procedure in which preference is specified using voting strategies - first-order mathematical functions that specify a choice in terms of zero or more parameters. This research will focus on refining the declared strategy voting concept, developing an accessible implementation of declared strategy voting that can be used for mock elections, assessing the potential impacts of declared strategy voting, and evaluating the effectiveness of declared strategy voting for group decision-making. This proposal describes the ...


Design And Implementation Of A Practical Security-Conscious Electronic Polling System, Lorrie Cranor, Ron Cytron Dec 2015

Design And Implementation Of A Practical Security-Conscious Electronic Polling System, Lorrie Cranor, Ron Cytron

Lorrie F Cranor

We present the design and implementation of Sensus, a practical, secure and private system for conducting surveys and elections over computer networks. Expanding on the work of Fujioka, Okamoto, and Ohta, Sensus uses blind signatures to ensure that only registered voters can vote and that each registered voter only votes once, while at the same time maintaining voters' privacy. Sensus allows voters to verify independently that their votes were counted correctly, and anonymously challenge the results should their votes be miscounted. We outline seven desirable properties of voting systems and show that Sensus satisfied these properties well, in some cases ...


On Problematic Robotic Thresholds, Adam K. Taylor Dec 2015

On Problematic Robotic Thresholds, Adam K. Taylor

Computer Science and Engineering: Theses, Dissertations, and Student Research

Large configuration spaces present difficulties for developers validating large soft- ware systems and for users selecting the proper configuration to achieve the desired runtime behavior. Robot systems face the same challenges as they may have hundreds of configurable parameters. Our work focuses on co-robotic systems, those in which robots and humans work closely together to augment each other’s capabilities. We aim to leverage the user’s knowledge about a system to help determine configuration errors. To accomplish this, users mark runtime failures while observing the system in operation. A marked error indicates the robot “did something when it should ...


Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez Dec 2015

Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez

Honors Theses

Business contracts represent a main source of income for Architects. Acquiring these contracts requires the latest and most immersive technology that improves their sales against competitors. Virtual reality provides an in-depth experience that allows clients to have a reasonable assurance that the building meets their physical expectations. Videos and photos are detached and mundane; while they provide some visual representation they will not allow the user to compare his physical characteristics (height, length, width) with a 3D model. In this paper, I describe a procedure for automatically importing 3D models from Revit into Unreal4. I also describe the workflow required ...


Campus-Wide Integrated Building Energy Simulation, Willy Bernal, Madhur Behl, Truong X. Nghiem, Rahul Mangharam Dec 2015

Campus-Wide Integrated Building Energy Simulation, Willy Bernal, Madhur Behl, Truong X. Nghiem, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Effective energy management for large campus facilities is becoming increasingly complex as modern heating and cooling systems comprise of several hundred subsystems interconnected to each other. Building energy simulators like EnergyPlus are exceedingly good at modeling a single building equipped with a standalone HVAC equipment. However, the ability to simulate a large campus and to control the dynamics and interactions of the subsystems is limited or missing altogether. In this paper, we use the Matlab-EnergyPlus MLE+ tool we developed, to extend the capability of EnergyPlus to co-simulate a campus with multiple buildings connected to a chilled water distribution to a ...


Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan Dec 2015

Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan

Innovative Research Publications IRP India

Most of the approaches to solve the unmixing problem are based on the Linear Mixing Model (LMM) which is questionable. Therefore, nonlinear spectral model is generally used to study the effects of multiple scattering in the complex surfaces. In this paper, we have demonstrated the application of Radiative Transform Equation (RTE) based Hapke multi scattering model. The Hapke model based non-linear spectral unmixing is carried out on a Moon Mineralogy Mapper (M3 ) data. The values of six non-linear Hapke's model parameters are estimated using a MATLAB based algorithm after optimizing the Hapke corrected M3-Endmembers and modeled spectra through minimum ...


Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav Dec 2015

Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav

Innovative Research Publications IRP India

Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the ...


Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


Energy Aware Forwarding In Content Centric Based Multihop Wireless Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim Dec 2015

Energy Aware Forwarding In Content Centric Based Multihop Wireless Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Content centric networking (CCN) is a newly proposed futuristic Internet paradigm in which communication depends on the decoupling of content names from their locations. In CCN-based multihop wireless ad hoc networks, the participating nodes show dynamic topology, intermittent connectivity, channels fluctuation, and severe constraints such as limited battery power. In the case of traffic congestion, the affected nodes die early owing to the shortage of battery power. Consequently, all pending request entries are also destroyed, which further degrades the network performance as well as the node working lifetime. In this study, we have proposed a novel energy aware transmission scheme ...


Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee Dec 2015

Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee

Departmental Papers (CIS)

Many safety-critical real-time embedded systems need to meet stringent timing constraints such as preserving delay bounds between input and output events. In model-based development, a system is often implemented by using a code generator to automatically generate source code from system models, and integrating the generated source code with a platform. It is challenging to guarantee that the implemented systems preserve required timing constraints, because the timed behavior of the source code and the platform is closely intertwined. In this paper, we address this challenge by proposing a model transformation approach for the code generation. Our approach compensates the platform-processing ...


Attack-Resilient State Estimation In The Presence Of Noise, Miroslav Pajic, Paulo Tabuada, Insup Lee, George Pappas Dec 2015

Attack-Resilient State Estimation In The Presence Of Noise, Miroslav Pajic, Paulo Tabuada, Insup Lee, George Pappas

Departmental Papers (CIS)

We consider the problem of attack-resilient state estimation in the presence of noise. We focus on the most general model for sensor attacks where any signal can be injected via the compromised sensors. An l0-based state estimator that can be formulated as a mixed-integer linear program and its convex relaxation based on the l1 norm are presented. For both l0 and l1-based state estimators, we derive rigorous analytic bounds on the state-estimation errors. We show that the worst-case error is linear with the size of the noise, meaning that the attacker cannot exploit noise ...


Optimizing The Resource Requirements Of Hierarchical Scheduling Systems, Jin Hyun Kim, Axel Legay, Louis-Marie Traonouez, Abdeldjalil Boudjadar, Ulrik Nyman, Kim G. Larsen, Insup Lee, Jin-Young Choi Dec 2015

Optimizing The Resource Requirements Of Hierarchical Scheduling Systems, Jin Hyun Kim, Axel Legay, Louis-Marie Traonouez, Abdeldjalil Boudjadar, Ulrik Nyman, Kim G. Larsen, Insup Lee, Jin-Young Choi

Departmental Papers (CIS)

Compositional reasoning on hierarchical scheduling systems is a well-founded formal method that can construct schedulable and optimal system configurations in a compositional way. However, a compositional framework formulates the resource requirement of a component, called an interface, by assuming that a resource is always supplied by the parent components in the most pessimistic way. For this reason, the component interface demands more resources than the amount of resources that are really sufficient to satisfy sub-components. We provide two new supply bound functions which provides tighter bounds on the resource requirements of individual components. The tighter bounds are calculated by using ...


Cache-Aware Interfaces For Compositional Real-Time Systems, Linh T.X. Phan, Meng Xu, Insup Lee Dec 2015

Cache-Aware Interfaces For Compositional Real-Time Systems, Linh T.X. Phan, Meng Xu, Insup Lee

Departmental Papers (CIS)

Interface-based compositional analysis is by now a fairly established area of research in real-time systems. However, current research has not yet fully considered practical aspects, such as the effects of cache interferences on multicore platforms. This position paper discusses the analysis challenges and motivates the need for cache scheduling in this setting, and it highlights several research questions towards cache-aware interfaces for compositional systems on multicore platforms.


Towards Compositional Mixed-Criticality Real-Time Scheduling In Open Systems, Jaewoo Lee, Hoon Sung Chwa, Arvind Easwaran, Insik Shin, Insup Lee Dec 2015

Towards Compositional Mixed-Criticality Real-Time Scheduling In Open Systems, Jaewoo Lee, Hoon Sung Chwa, Arvind Easwaran, Insik Shin, Insup Lee

Departmental Papers (CIS)

Although many cyber-physical systems are both mixed-criticality system and compositional system, there are little work on intersection of mixed-criticality system and compositional system. We propose novel concepts for task-level criticality mode and reconsider temporal isolation in terms of compositional mixed-criticality scheduling.


Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris Dec 2015

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris

Open Access Dissertations

This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model ...