Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Department of Computer Science and Engineering

2012

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Human Action Recognition By Principal Component Analysis Of Motion Curves, Daniel Stephen Chivers Jan 2012

Human Action Recognition By Principal Component Analysis Of Motion Curves, Daniel Stephen Chivers

Browse all Theses and Dissertations

Human action recognition is used to automatically detect and recognize actions per- formed by humans in a video. Applications include visual surveillance, human-computer interaction, and robot intelligence, to name a few. An example of a surveillance application is a system that monitors a large public area, such as an airport, for suspicious activity. In human-machine interaction, computers may be controlled by simple human actions. For example, the motion of an arm may instruct the computer to rotate a 3-D model that is being displayed. Human action recognition is also an important capability of intelligent robots that interact with humans.

General ...


Abstraction Driven Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu Jan 2012

Abstraction Driven Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu

Browse all Theses and Dissertations

Cloud computing has changed the way organizations create, manage, and evolve their applications. While many organizations are eager to use the cloud, tempted by substantial cost savings and convenience, the implications of using clouds are still not well understood. One of the major concerns in cloud adoption is the vendor lock-in of applications, caused by the heterogeneity of the numerous cloud service offerings. Vendor locked applications are difficult, if not impossible to port from one cloud system to another, forcing cloud service consumers to use undesired or suboptimal solutions. This dissertation investigates a complete and comprehensive solution to address the ...


Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda Jan 2012

Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda

Browse all Theses and Dissertations

The scope of this research is concentrated on analytical winding size optimization (thickness or diameter) of high-frequency power inductors wound with foil, solid-round wire, multi-strand wire, and litz-wire conductors.

The first part of this research concerns analytical optimization of the winding size (thickness or diameter) for the inductors conducting a sinusoidal current. Estimation of winding resistance in individual inductor layers made of foil, taking into account the skin and proximity effects is performed. Approximated equations for the winding power loss in each layer are given and the optimal values of foil thickness for each layer are derived.

A low- and ...


Linked Open Data Alignment & Querying, Prateek Jain Jan 2012

Linked Open Data Alignment & Querying, Prateek Jain

Browse all Theses and Dissertations

The recent emergence of the "Linked Data" approach for publishing data represents a major step forward in realizing the original vision of a web that can "understand and satisfy the requests of people and machines to use the web content" i.e. the Semantic Web. This new approach has resulted in the Linked Open Data (LOD) Cloud, which includes more than 295 large datasets contributed by experts belonging to diverse communities such as geography, entertainment, and life sciences. However, the current interlinks between datasets in the LOD Cloud, as we will illustrate,are too shallow to realize much of the ...


Cloudvista: A Framework For Interactive Visual Cluster Exploration Of Big Data In The Cloud, Zhen Li Jan 2012

Cloudvista: A Framework For Interactive Visual Cluster Exploration Of Big Data In The Cloud, Zhen Li

Browse all Theses and Dissertations

With the development and deployment of ubiquitous information sensing, mobile devices,wireless sensor networks, RFID readers, simulation, and computer generated software logs, big data have become precious resources for scientific study, business intelligence, and national security. As one of the most intuitive and effective analysis methods,visual cluster analysis remains as a significant challenge for big datasets. First, existing visualization models need to be updated to process big data in parallel. Second, processing big data inevitably bring large latency, which conflicts the requirement of interactivity. In this thesis, we develop the CloudVista framework to address the common problems with data ...


Behavioral Signature-Based Framework For Identifying Unsatisfiable Variable Mappings Between Digital Designs, Vaibhav Uday Tendulkar Jan 2012

Behavioral Signature-Based Framework For Identifying Unsatisfiable Variable Mappings Between Digital Designs, Vaibhav Uday Tendulkar

Browse all Theses and Dissertations

Throughout its design process (from specification to implementation) a digital circuit goes through a variety of structural changes. These changes are introduced primarily due to the use of automated tools in the design process. Checking whether the Boolean functions representing the two designs are equivalent is thus necessary to verify if a design implementation adheres to its specification. Combinational Equivalence Checking (CEC) - a process of determining whether two combinational design functions are equiv-alent, has been one of the most researched Boolean matching problems. The well-known CEC techniques that have been proposed adopt some kind of a formal approach such as ...


Knowledge Acquisition In A System, Christopher J. Thomas Jan 2012

Knowledge Acquisition In A System, Christopher J. Thomas

Browse all Theses and Dissertations

I present a method for growing the amount of knowledge available on the Web using a hermeneutic method that involves background knowledge, Information Extraction techniques and validation through discourse and use of the extracted information.

I present the metaphor of the "Circle of Knowledge on the Web". In this context, knowledge acquisition on the web is seen as analogous to the way scientific disciplines gradually increase the knowledge available in their field.

Here, formal models of interest domains are created automatically or manually and then validated by implicit and explicit validation methods before the statements in the created models can ...


Optimization Of Spectrum Allocation In Cognitive Radio And Dynamic Spectrum Access Networks, Tao Zhang Jan 2012

Optimization Of Spectrum Allocation In Cognitive Radio And Dynamic Spectrum Access Networks, Tao Zhang

Browse all Theses and Dissertations

Spectrum has become a treasured commodity. However, many licensed frequency bands exclusively assigned to the primary license holders (also called primary users) remain relatively unused or under-utilized for most of the time. Allowing other users (also called secondary users) without a license to operate in these bands with no interference becomes a promising way to satisfy the fast growing needs for frequency spectrum resources. A cognitive radio adapts to the environment it operates in by sensing the spectrum and quickly decides on appropriate frequency bands and transmission parameters to use in order to achieve certain performance goals. One of the ...