Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Theses/Dissertations

Computer and Systems Architecture

Institution
Keyword
Publication

Articles 1 - 30 of 41

Full-Text Articles in Computer Engineering

Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez Dec 2015

Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez

Honors Theses

Business contracts represent a main source of income for Architects. Acquiring these contracts requires the latest and most immersive technology that improves their sales against competitors. Virtual reality provides an in-depth experience that allows clients to have a reasonable assurance that the building meets their physical expectations. Videos and photos are detached and mundane; while they provide some visual representation they will not allow the user to compare his physical characteristics (height, length, width) with a 3D model. In this paper, I describe a procedure for automatically importing 3D models from Revit into Unreal4. I also describe the workflow required …


Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang Dec 2015

Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang

Doctoral Dissertations

Modern central processing units (CPUs) employ arithmetic logic units (ALUs) that support statically defined precisions, often adhering to industry standards. Although CPU manufacturers highly optimize their ALUs, industry standard precisions embody accuracy and performance compromises for general purpose deployment. Hence, optimizing ALU precision holds great potential for improving speed and energy efficiency. Previous research on multiple precision ALUs focused on predefined, static precisions. Little previous work addressed ALU architectures with customized, dynamically defined precision. This dissertation presents approaches for developing dynamic precision ALU architectures for both fixed-point and floating-point to enable better performance, energy efficiency, and numeric accuracy. These new …


Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer Dec 2015

Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer

Computer Engineering

No abstract provided.


Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins Dec 2015

Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins

Masters Theses

The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …


Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan Dec 2015

Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan

Masters Theses

Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.


Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …


Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang Nov 2015

Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang

Masters Theses

Traditional fault tolerant techniques such as hardware or time redundancy incur high overhead and are inefficient for checking arithmetic operations. Our objective is to study an alternative approach of adding new instructions to check arithmetic operations. These checking instructions either rely on error detecting code or calculate approximate results and consequently, consume much less execution time. To evaluate the effectiveness of such an approach we wish to modify several benchmarks to use checking instructions and run simulation experiments to find out their execution time and memory usage. However, the checking instructions are not included in the instruction set and as …


Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang Nov 2015

Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Huang (Benjamin) Huang on November 20, 2015.


Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman Nov 2015

Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman

Doctoral Dissertations

Continuous scaling of CMOS has been the major catalyst in miniaturization of integrated circuits (ICs) and crucial for global socio-economic progress. However, continuing the traditional way of scaling to sub-20nm technologies is proving to be very difficult as MOSFETs are reaching their fundamental performance limits [1] and interconnection bottleneck is dominating IC operational power and performance [2]. Migrating to 3-D, as a way to advance scaling, has been elusive due to inherent customization and manufacturing requirements in CMOS architecture that are incompatible with 3-D organization. Partial attempts with die-die [3] and layer-layer [4] stacking have their own limitations [5]. We …


On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu Nov 2015

On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu

Doctoral Dissertations

The high power density of a many-core processor results in increased temperature which negatively impacts system reliability and performance. Dynamic thermal management applies thermal-aware techniques at run time to avoid overheating using temperature information collected from on-chip thermal sensors. Temperature sensing and thermal control schemes are two critical technologies for successfully maintaining thermal safety. In this dissertation, on-line thermal sensor calibration schemes are developed to provide accurate temperature information. Software-based dynamic thermal management techniques are proposed using calibrated thermal sensors. Due to process variation and silicon aging, on-chip thermal sensors require periodic calibration before use in DTM. However, the calibration …


Design And Implementation Of An Economy Plane For The Internet, Xinming Chen Nov 2015

Design And Implementation Of An Economy Plane For The Internet, Xinming Chen

Doctoral Dissertations

The Internet has been very successful in supporting many network applications. As the diversity of uses for the Internet has increased, many protocols and services have been developed by the industry and the research community. However, many of them failed to get deployed in the Internet. One challenge of deploying these novel ideas in operational network is that the network providers need to be involved in the process. Many novel network protocols and services, like multicast and end-to-end QoS, need the support from network providers. However, since network providers are typically driven by business reasons, if they can not get …


Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis Nov 2015

Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis

Doctoral Dissertations

Machines today lack the inherent ability to reason and make decisions, or operate in the presence of uncertainty. Machine-learning methods such as Bayesian Networks (BNs) are widely acknowledged for their ability to uncover relationships and generate causal models for complex interactions. However, their massive computational requirement, when implemented on conventional computers, hinders their usefulness in many critical problem areas e.g., genetic basis of diseases, macro finance, text classification, environment monitoring, etc. We propose a new non-von Neumann technology framework purposefully architected across all layers for solving these problems efficiently through physical equivalence, enabled by emerging nanotechnology. The architecture builds …


Gsu Alumni Portal, Vemuri Vinusha Chowdary, Sairam Dasu, Siva Machineni Oct 2015

Gsu Alumni Portal, Vemuri Vinusha Chowdary, Sairam Dasu, Siva Machineni

All Capstone Projects

The main objective of GSU alumni portal web application is to allow old and new students of a university to communicate with each other. The application allows students to register and then search the data based on different criteria. Also it has the benefit of having a centralized database and up to date information. A user can easily obtain information about other registered users. This application is deployed using Cloud computing (Microsoft Azure) and nothing is managed locally. The administrator is responsible for maintaining information of students. When a student submits the registration form, administrator will complete the verification process …


An Investigation Into Partitioning Algorithms For Automatic Heterogeneous Compilers, Antonio M. Leija Sep 2015

An Investigation Into Partitioning Algorithms For Automatic Heterogeneous Compilers, Antonio M. Leija

Master's Theses

Automatic Heterogeneous Compilers allows blended hardware-software solutions to be explored without the cost of a full-fledged design team, but limited research exists on current partitioning algorithms responsible for separating hardware and software. The purpose of this thesis is to implement various partitioning algorithms onto the same automatic heterogeneous compiler platform to create an apples to apples comparison for AHC partitioning algorithms. Both estimated outcomes and actual outcomes for the solutions generated are studied and scored. The platform used to implement the algorithms is Cal Poly’s own Twill compiler, created by Doug Gallatin last year. Twill’s original partitioning algorithm is chosen …


Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis Aug 2015

Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis

Electronic Theses and Dissertations

Power and energy are increasingly important metrics in modern computing systems. Large supercomputers utilize millions of cores and can consume as much power as a small town; monitoring and reducing power consumption is an important task. At the other extreme, power usage of embedded and mobile devices is also critically important. Battery life is a key concern in such devices; having detailed power measurement allows optimizing these devices for power as well. Current systems are not set up to allow easy power measurement. There has been much work in this area, but obtaining power readings is often expensive, intrusive, and …


Middleware And Services For Dynamic Adaptive Neural Network Arrays, Joshua Caleb Willis Aug 2015

Middleware And Services For Dynamic Adaptive Neural Network Arrays, Joshua Caleb Willis

Masters Theses

Dynamic Adaptive Neural Network Arrays (DANNAs) are neuromorphic systems that exhibit spiking behaviors and can be designed using evolutionary optimization. Array elements are rapidly reconfigurable and can function as either neurons or synapses with programmable interconnections and parameters. Visualization applications can examine DANNA element connections, parameters, and functionality, and evolutionary optimization applications can utilize DANNA to speedup neural network simulations. To facilitate interactions with DANNAs from these applications, we have developed a language-agnostic application programming interface (API) that abstracts away low-level communication details with a DANNA and provides a high-level interface for reprogramming and controlling a DANNA. The library has …


Pre-R: Making Healthcare Healthier, Timothy Acorda, Ryan Foletta, Winifred Lee, Thomas Nguyen, Isabella Sarmiento, Brian Truong, Marek Zhang Jun 2015

Pre-R: Making Healthcare Healthier, Timothy Acorda, Ryan Foletta, Winifred Lee, Thomas Nguyen, Isabella Sarmiento, Brian Truong, Marek Zhang

Computer Engineering

No abstract provided.


Printed Circuit Board For Introductory Animatronics Course, Preston Brown Jun 2015

Printed Circuit Board For Introductory Animatronics Course, Preston Brown

Computer Engineering

For many years, freshmen Computer Engineering students at California Polytechnic State University have taken a course that introduces them to the “processes of electronics manufacturing. They are lectured on concepts such as CAD/CAM design, Design for Manufacture (DFM), documentation requirements, prototyping and production planning”. The laboratory portion of the course allows students to “use hands-on techniques to solidify knowledge of project planning, soldering, automation, hand tool usage and production methods” by manufacturing their own power supply, starting with aluminum sheets, a bag of components, and and an unassembled printed circuit board (PCB).

While the project is popular among students, department …


Oversubscribing Inotify On Embedded Platforms, Donald Percivalle, Scott Vanderlind Jun 2015

Oversubscribing Inotify On Embedded Platforms, Donald Percivalle, Scott Vanderlind

Computer Engineering

For most computers running the popular Linux operating system, the inte- grated kernel component inotify provides adequate functionality for monitor- ing changes to files present on the filesystem. However, for certain embedded platforms where resources are very limited and filesystems are very populated (like network attached storage (NAS) devices), inotify may not have enough resources to provide watchers for every file. This results in applications missing change notifications for files they have watched. This paper explores methods for using inotify most effectively on embedded systems by leveraging more la- tent storage. Benefits of this include a reduction in dropped notifications …


Creating A 3d Racing Game In Opengl, Noah Harper Jun 2015

Creating A 3d Racing Game In Opengl, Noah Harper

Computer Science and Software Engineering

No abstract provided.


Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip Jun 2015

Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip

Mechanical Engineering

Executive Summary:

The Inyo National Forest is arguably one of the most beautiful locations in California, containing natural masterpieces such as Mount Whitney and the Ancient Bristlecone Pine Forest. Despite its magnificence, the Inyo National Forest can be a treacherous region. The Friends of the Inyo take pride in being able to facilitate the viewing experience for all outdoorsmen by maintaining the mountain trails, which includes providing adequate trail signage.

Unfortunately, there is a fundamental issue with the recent state of trail signage in the Inyo National Forest: the rate at which signs are being vandalized or naturally destroyed is …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …


Rest Api To Access And Manage Geospatial Pipeline Integrity Data, Alexandra Michelle Francis Jun 2015

Rest Api To Access And Manage Geospatial Pipeline Integrity Data, Alexandra Michelle Francis

Master's Theses

Today’s economy and infrastructure is dependent on raw natural resources, like crude oil and natural gases, that are optimally transported through a net- work of hundreds of thousands of miles of pipelines throughout America[28]. A damaged pipe can negatively a↵ect thousands of homes and businesses so it is vital that they are monitored and quickly repaired[1]. Ideally, pipeline operators are able to detect damages before they occur, but ensuring the in- tegrity of the vast amount of pipes is unrealistic and would take an impractical amount of time and manpower[1].

Natural disasters, like earthquakes, as well as construction are just …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr. May 2015

Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.

Electronic Theses and Dissertations

The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …


Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia May 2015

Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia

Boise State University Theses and Dissertations

VPEvolve is a free and open source application that utilizes a Visual Programming Environment (VPE) for the setup of the Genetic Algorithm (GA), for optimization of computational models. Specifically, the User Interface uses connected glyphs to represent the genetic operators of mutation, reproduction, fitness and selection. These glyphs give the user an intuitive way to set the parameters for the GA, and better visualization of the population's flow through these operators.

VPEvolve is currently being developed alongside research being done in Biocomputing to create models of cellular regeneration based on the regenerative properties of Planaria or flatworms. Since these models …


Data Integrity Verification In Cloud Computing, Katanosh Morovat May 2015

Data Integrity Verification In Cloud Computing, Katanosh Morovat

Graduate Theses and Dissertations

Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services for users and owners of data as well. Cloud computing services are a completely internet-based technology where data are stored and maintained in the data center of a cloud provider. Lack of appropriate control over the data might incur several security issues. As a result, some data stored in the cloud must be protected at all times. These types of data are called sensitive data. Sensitive data is defined as data that must be protected against …


Application Of Ergonomic Principles In Computer Workstations To Alleviate Health Risks From Extended Computer Use, John M. Awbrey Apr 2015

Application Of Ergonomic Principles In Computer Workstations To Alleviate Health Risks From Extended Computer Use, John M. Awbrey

Morehead State Theses and Dissertations

A Thesis Presented to the Faculty of the College of Science and Technology Morehead State University in Partial Fulfillment of the Requirements for the Degree Master of Science by John M. Awbrey on April 27, 2015


An Exploration Of Quality Systems In Healthcare Facilities, Tange D. Awbrey Apr 2015

An Exploration Of Quality Systems In Healthcare Facilities, Tange D. Awbrey

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Tange D. Awbrey on April 27, 2015.