Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

University of Kentucky

Discipline
Keyword
Publication
Publication Type

Articles 1 - 10 of 10

Full-Text Articles in Computer Engineering

Electronic Signatures: Review And Analysis, Bryan Gibson Sep 2015

Electronic Signatures: Review And Analysis, Bryan Gibson

Kentucky Transportation Center Technical Assistance Report

Electronic signatures, or e-signatures, are an increasingly ubiquitous component of a rapidly digitizing world. Compared to traditional paper signature, e-signatures have emerged as a viable, potentially more efficient method of entering into a contract. An e-signature can be thought of as an electronic symbol or marking associated with the signer. It acts as a signature and functions in lieu of a manual paper signature. This technical assistance report briefly reviews relevant Kentucky statutes and guidelines regarding e-signatures and public recordkeeping as well as applicable federal law. Following this, the report presents conclusions and points for continued discussion. Relevant statues and …


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong Mar 2015

Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong

Physics and Astronomy Faculty Publications

The static and dynamic magnetic responses of patterned ferromagnetic thin films are uniquely altered in the case of aperiodic patterns that retain long-range order (e.g., quasicrystals). We have fabricated permalloy wire networks based on periodic square antidot lattices (ADLs) distorted according to an aperiodic Fibonacci sequence applied to two lattice translations, d1  = 1618 nm and d2  = 1000 nm. The wire segment thickness is fixed at t = 25 nm, and the width W varies from 80 to 510 nm. We measured the DC magnetization between room temperature and 5 K. Room-temperature, narrow-band (9.7 GHz) ferromagnetic resonance …


Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil Jan 2015

Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil

Theses and Dissertations--Computer Science

Despite the world-changing success of the Internet, shortcomings in its routing and forwarding system have become increasingly apparent. One symptom is an escalating tension between users and providers over the control of routing and forwarding of packets: providers understandably want to control use of their infrastructure, and users understandably want paths with sufficient quality-of-service (QoS) to improve the performance of their applications. As a result, users resort to various “hacks” such as sending traffic through intermediate end-systems, and the providers fight back with mechanisms to inspect and block such traffic.

To enable users and providers to jointly control routing and …


Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin Jan 2015

Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin

Theses and Dissertations--Computer Science

In this dissertation, we focus on solving forest transportation planning related problems, including constraints that consider negative environmental impacts and multi-objective optimizations that provide forest managers and road planers alternatives for making informed decisions. Along this line of study, several multilevel techniques and mataheuristic algorithms have been developed and investigated. The forest transportation planning problem is a fixed-charge problem and known to be NP-hard. The general idea of utilizing multilevel approach is to solve the original problem of which the computational cost maybe prohibitive by using a set of increasingly smaller problems of which the computational cost is cheaper.

The …


A Network Path Advising Service, Xiongqi Wu Jan 2015

A Network Path Advising Service, Xiongqi Wu

Theses and Dissertations--Computer Science

A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between a source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will present applications with a set of paths and allow them to select the most appropriate path. Although this enables applications to be actively involved in the selection of the paths their packets travel, the huge number of potential paths and the need to know the current network conditions of each …


Misfit: Mining Software Fault Information And Types, Billy R. Kidwell Jan 2015

Misfit: Mining Software Fault Information And Types, Billy R. Kidwell

Theses and Dissertations--Computer Science

As software becomes more important to society, the number, age, and complexity of systems grow. Software organizations require continuous process improvement to maintain the reliability, security, and quality of these software systems. Software organizations can utilize data from manual fault classification to meet their process improvement needs, but organizations lack the expertise or resources to implement them correctly.

This dissertation addresses the need for the automation of software fault classification. Validation results show that automated fault classification, as implemented in the MiSFIT tool, can group faults of similar nature. The resulting classifications result in good agreement for common software faults …


Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu Jan 2015

Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu

Theses and Dissertations--Computer Science

Many manual biomedical annotation tasks can be categorized as instances of the typical multi-label classification problem where several categories or labels from a fixed set need to assigned to an input instance. MeSH term assignment to biomedical articles and diagnosis code extraction from medical records are two such tasks. To address this problem automatically, in this thesis, we present a way to utilize latent associations between labels based on output label sets. We used random indexing as a method to determine latent associations and use the associations as a novel feature in a learning-to-rank algorithm that reranks candidate labels selected …


Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang Jan 2015

Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang

Theses and Dissertations--Electrical and Computer Engineering

Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high …


Stargrazer One: A New Architecture For Distributed Maximum Power Point Tracking Of Solar Photovoltaic Sources, Edgard Munoz-Coreas Jan 2015

Stargrazer One: A New Architecture For Distributed Maximum Power Point Tracking Of Solar Photovoltaic Sources, Edgard Munoz-Coreas

Theses and Dissertations--Electrical and Computer Engineering

The yield from a solar photovoltaic (PV) source is dependent on factors such as light and temperature. A control system called a maximum power point tracker (MPPT) ensures that the yield from a solar PV source is maximized in spite of these factors. This thesis presents a novel implementation of a perturb and observe (PO) MPPT.

The implementation uses a switched capacitor step down converter and a custom digital circuit implementation of the PO algorithm. Working in tandem, the switched capacitor step down converter and the custom digital circuit implementation were able to successfully track the maximum power point of …