Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Engineering

Control Of Cation Ordering In Zinc Tin Nitride And In-Situ Monitoring Of Growth, Brian Christopher Durant Dec 2015

Control Of Cation Ordering In Zinc Tin Nitride And In-Situ Monitoring Of Growth, Brian Christopher Durant

Masters Theses

Semiconducting materials with a band gap around 1.5 eV are very much sought after due to their close match to the solar spectrum. However, some compounds that have shown promise for highly efficient solar cells contain rare, expensive, and sometimes toxic elements, such as indium and gallium. As such, a search for earth abundant materials has become more prominent recently. One such earth abundant semiconducting material that has garnered interest is ZnSnN2. It has been shown through previous studies that there is the possibility of continuously tuning the band gap between 1.0 and 2.0 eV by controlling the …


Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan Dec 2015

Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan

Dissertations

Wireless has become one of the most pervasive core technologies in the modern world. Demand for faster data rates, improved spectrum efficiency, higher system access capacity, seamless protocol integration, improved security and robustness under varying channel environments has led to the resurgence of programmable software defined radio (SDR) as an alternative to traditional ASIC based radios. Future SDR implementations will need support for multiple standards on platforms with multi-Gb/s connectivity, parallel processing and spectrum sensing capabilities. This dissertation implemented key technologies of importance in addressing these issues namely development of cost effective multi-mode reconfigurable SDR and providing a framework to …


Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen Dec 2015

Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen

Dissertations

For every face recognition method, the primary goal is to achieve higher recognition accuracy and spend less computational costs. However, as the gallery size increases, especially when one probe image corresponds to only one training image, face recognition becomes more and more challenging. First, a larger gallery size requires more computational costs and memory usage. Meanwhile, that the large gallery sizes degrade the recognition accuracy becomes an even more significant problem to be solved.

A coarse parallel algorithm that equally divides training images and probe images into multiple processors is proposed to deal with the large computational costs and huge …


Using Eye And Head Movements As A Control Mechanism For Tele-Operating A Ground-Based Robot And Its Payload, Kathryn C. Hicks Oct 2015

Using Eye And Head Movements As A Control Mechanism For Tele-Operating A Ground-Based Robot And Its Payload, Kathryn C. Hicks

Computational Modeling & Simulation Engineering Theses & Dissertations

To date, eye and head tracking has been used to indicate users' attention patterns while performing a task or as an aid for disabled persons, to allow hands-free interaction with a computer. The increasing accuracy and the reduced cost of eye- and head-tracking equipment make utilizing this technology feasible for explicit control tasks, especially in cases where there is confluence between the visual task and control.

The goal of this research was to investigate the use of eye-tracking as a more natural interface for the control of a camera-equipped, remotely operated robot in tasks that require the operator to simultaneously …


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia May 2015

Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia

Boise State University Theses and Dissertations

VPEvolve is a free and open source application that utilizes a Visual Programming Environment (VPE) for the setup of the Genetic Algorithm (GA), for optimization of computational models. Specifically, the User Interface uses connected glyphs to represent the genetic operators of mutation, reproduction, fitness and selection. These glyphs give the user an intuitive way to set the parameters for the GA, and better visualization of the population's flow through these operators.

VPEvolve is currently being developed alongside research being done in Biocomputing to create models of cellular regeneration based on the regenerative properties of Planaria or flatworms. Since these models …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Algoritmo De Interpretación De Información Del Analizador De Red Nexus 1252, Luis Fernando Morales Giraldo, Jonathan Jair Díaz Pérez Jan 2015

Algoritmo De Interpretación De Información Del Analizador De Red Nexus 1252, Luis Fernando Morales Giraldo, Jonathan Jair Díaz Pérez

Ingeniería en Automatización

No abstract provided.


Misfit: Mining Software Fault Information And Types, Billy R. Kidwell Jan 2015

Misfit: Mining Software Fault Information And Types, Billy R. Kidwell

Theses and Dissertations--Computer Science

As software becomes more important to society, the number, age, and complexity of systems grow. Software organizations require continuous process improvement to maintain the reliability, security, and quality of these software systems. Software organizations can utilize data from manual fault classification to meet their process improvement needs, but organizations lack the expertise or resources to implement them correctly.

This dissertation addresses the need for the automation of software fault classification. Validation results show that automated fault classification, as implemented in the MiSFIT tool, can group faults of similar nature. The resulting classifications result in good agreement for common software faults …


Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin Jan 2015

Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin

Theses and Dissertations--Computer Science

In this dissertation, we focus on solving forest transportation planning related problems, including constraints that consider negative environmental impacts and multi-objective optimizations that provide forest managers and road planers alternatives for making informed decisions. Along this line of study, several multilevel techniques and mataheuristic algorithms have been developed and investigated. The forest transportation planning problem is a fixed-charge problem and known to be NP-hard. The general idea of utilizing multilevel approach is to solve the original problem of which the computational cost maybe prohibitive by using a set of increasingly smaller problems of which the computational cost is cheaper.

The …