Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Computer Sciences

Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland Oct 2007

Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland

Computational Modeling & Simulation Engineering Theses & Dissertations

In the last 10 years, video games have become complex simulation environments with high resolution 3D graphics enabled by powerhouse rendering engines, multi-player client server networks, user friendly displays and graphical user interface , while remaining relatively inexpensive. There is a critical need for systems engineering analysis and rapid trade studies due to changes in operations caused by current events such as terrorist attacks, asymmetric threats, natural disasters, etc. Modem games provide a unique way to visualize and interact with these complex environments, scenarios, missions, and operations. A discrete event simulator (DES) provides an environment to model system architecture behavior, …


An Adaptive And Non-Linear Technique For Enhancement Of High Contrast Images, Saibabu Arigela Oct 2007

An Adaptive And Non-Linear Technique For Enhancement Of High Contrast Images, Saibabu Arigela

Electrical & Computer Engineering Theses & Dissertations

In night time surveillance, there is a possibility of having extremely bright and dark regions in some image frames of a video sequence. Neither the object details in the low intensity areas nor in the high intensity areas can be clearly interpreted. Several image processing techniques have been developed to retrieve meaningful information under low lighting conditions. The algorithm based on integrated neighborhood dependency of pixel characteristics, and that based on the illuminance reflectance model perform well for improving the visual quality of digital images captured under extremely low and nonuniform lighting conditions. But these techniques cannot perform well in …


A Modular Kernel Linear Discriminant Analysis Of Gabor Features For Improved Face Recognition, Neeharika Gudur Oct 2007

A Modular Kernel Linear Discriminant Analysis Of Gabor Features For Improved Face Recognition, Neeharika Gudur

Electrical & Computer Engineering Theses & Dissertations

Automatic face recognition is one of the major challenges in computer vision and pattern analysis. This thesis presents an efficient face recognition system that is robust with regards to changes in illumination, facial expressions and partial occlusions. Modular Kernel Linear Discriminant Analysis performed on Gabor Features obtained from the face images is employed for improving face recognition accuracy. A face image is pre-processed using the 2D Gabor wavelet transform to achieve invariance to illumination in images. Modular approaches that divide the pre-processed images into smaller sub-images provide improved accuracy, as the facial variations in an image are confined to local …


Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali Oct 2007

Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks find several potential applications in a variety of fields, such as environmental monitoring and control, battlefields, surveillance, smart buildings, human health monitoring, etc. These sensor networks consist of a large number of very tiny, inexpensive, and low power sensor nodes, which are deployed in a variety of harsh environments that may result in the sensor data getting corrupted. It is thus critical to detect and report these abnormal values in the sensor data, in order to have a better understanding of the monitored environment. Detection of the abnormal values is of special interest for the sensor network …


Neighborhood Defined Adaboost Based Mixture Of Color Components For Efficient Skin Segmentation, Ramya Reddy Maaram Oct 2007

Neighborhood Defined Adaboost Based Mixture Of Color Components For Efficient Skin Segmentation, Ramya Reddy Maaram

Electrical & Computer Engineering Theses & Dissertations

A skin segmentation algorithm robust to illumination changes and skin-like backgrounds is developed in this thesis. So far skin pixel classification has been limited to only individual color spaces and there has not been a comprehensive evaluation of which color components or combination of color components would provide the best classification accuracy, Color components in a given color space form the feature set for the classification of skin pixels. The combination of the color components or the features present within a single color space may not be the best when it comes to skin pixel classification as the discriminatory power …


A Robust Method For Multiple Face Tracking Using Kalman Filter, Zaheer Shaik Oct 2007

A Robust Method For Multiple Face Tracking Using Kalman Filter, Zaheer Shaik

Electrical & Computer Engineering Theses & Dissertations

A robust method for tracking faces of multiple people moving in a scene using a Kalman filter is proposed. This method overcomes the problem of partial and total occlusion for a short period. The method uses a combination of face detection and cloth matching to track and differentiate between people. A Template matching technique for face and a non-parametric distribution for cloth are used. Face templates are obtained from the first frame of a video sequence by applying the Viola-Jones face detection method. Cloth color distribution is obtained from people's clothes, assuming that the bodies move along with the faces. …


Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown Oct 2007

Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown

Computer Science Theses & Dissertations

Backup or preservation of websites is often not considered until after a catastrophic event has occurred. In the face of complete website loss, webmasters or concerned third parties have attempted to recover some of their websites from the Internet Archive. Still others have sought to retrieve missing resources from the caches of commercial search engines. Inspired by these post hoc reconstruction attempts, this dissertation introduces the concept of lazy preservation{ digital preservation performed as a result of the normal operations of the Web Infrastructure (web archives, search engines and caches). First, the Web Infrastructure (WI) is characterized by its preservation …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …


Distributed Knowledge Discovery In Large Scale Peer-To-Peer Networks, Sachin Shetty Jul 2007

Distributed Knowledge Discovery In Large Scale Peer-To-Peer Networks, Sachin Shetty

Computational Modeling & Simulation Engineering Theses & Dissertations

Explosive growth in the availability of various kinds of data in distributed locations has resulted in unprecedented opportunity to develop distributed knowledge discovery (DKD) techniques. DKD embraces the growing trend of merging computation with communication by performing distributed data analysis and modeling with minimal communication of data. Most of the current state-of-the-art DKD systems suffer from the lack of scalability, robustness and adaptability due to their dependence on a centralized model for building the knowledge discovery model. Peer-to-Peer networks offer a better scalable and fault-tolerant computing platform for building distributed knowledge discovery models than client-server based platforms. Algorithms and communication …


A Wavelet Based Complementary Approach For Image Enhancement, Ismail Kosum Apr 2007

A Wavelet Based Complementary Approach For Image Enhancement, Ismail Kosum

Electrical & Computer Engineering Theses & Dissertations

Detail in an image means more meaningful information that is very important in many computer vision and pattern recognition applications. The object region visibility in an image plays an important role in obtaining accurate and desired information from the original image. In particular, image processing techniques developed for region segmentation and object classification have better results depending on the visibility in images. There are several enhancement techniques available which are capable of obtaining clear images with balanced lighting and contrast. In this thesis, a completely image dependent approach to enhance the luminance of images under extreme lighting conditions and a …


A Resolution Enhancement Technique In Digital Images, Mehmet R. Ormanoglu Apr 2007

A Resolution Enhancement Technique In Digital Images, Mehmet R. Ormanoglu

Electrical & Computer Engineering Theses & Dissertations

Image enhancement is the processing of images to increase their usefulness. The image enhancement methods and objectives vary with the application. When images are enhanced for human viewers, as in television, the objective is mostly to improve perceptual aspects: image quality, intelligibility, or visual appearance. The aim of this research work is to make the processed image better in the visual sense than the unprocessed image. An image can often be enhanced by modifying its contrast or dynamic range, increasing the sharpness of edges, reducing the noise, or reducing the blurring. The most commonly used contrast enhancement technique is histogram …


A Structured Systemic Framework For Software Development, Kevin Macgregor Adams Apr 2007

A Structured Systemic Framework For Software Development, Kevin Macgregor Adams

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research was to develop and apply a systems-based framework for the analysis of software development project performance. Software development project performance is measured at the project level; that is, cost, schedule, and product quality that affect the overall project. To date, most performance improvement efforts have been focused on individual processes within the overall software development system. Making improvements to sub-elements, processes, or sub-systems without regard for the overall project is a classic misbehavior entered into by practitioners who fail to use a holistic, systemic approach. Attempts to improve sub-system behavior are at odds with The …


An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp Apr 2007

An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this paper is to provide an exploratory study on the implementation and issues regarding Quality Management Systems as defined by ISO 9001 :2000 using the architecture of ISO/IEC 15504. The recently published ISO/IEC 15504 series of standards provides a framework to assess processes and determine levels of capability. With the use of this framework, the study will focus on the assessment and identification of problem areas requiring focus for continual improvement within an ISO 9001 :2000 quality management system.

The structure of this paper is as follows: Section 1 provides a background discussion of ISO 9001 :2000. …


Long-Range Target Classification In A Cluttered Environment Using Multi-Sensor Image Sequences, Cenk Yaman Apr 2007

Long-Range Target Classification In A Cluttered Environment Using Multi-Sensor Image Sequences, Cenk Yaman

Electrical & Computer Engineering Theses & Dissertations

Accurate identification of unknown contacts is crucial in military intelligence. Automated systems which quickly and accurately determine the identity of a contact could be a benefit in backing up electronic signal identification methods such as Identification Friend and Foe (IFF) systems. Radio Detection and Ranging (RADAR) images are often undesirable in military applications since they reveal the location of the imaging system. So we explore the use of visible and infrared images of which are generally more consistent than RADAR images and for which it is easy to compensate for environmental effects. Recent advances in visible and IR imaging technology …


Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet Apr 2007

Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet

Electrical & Computer Engineering Theses & Dissertations

Wireless Local Area networks (WLAN) and Wireless Personal Area Networks (WPAN) provide complimentary services using the same unlicensed radio frequency band of operation. The 802.11b WLAN operates in the 2.4 GHz band and uses a Direct Sequence Spread Spectrum technique. It is designed to cover large areas ranging up to 100 meters in diameter, which may connect hundreds of computers. Bluetooth (BT) WPAN also operates in the same frequency band as the IEEE 802.lib and it uses a Frequency Hopping Spread Spectrum technique. BT is primarily used for communications between notebooks, palm units and other personal computing devices within relatively …


Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk Jan 2007

Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The Coalition Battle Management Language is a language for representing and exchanging plans, orders, and reports across live, constructive and robotic forces in multi-service, multi-national and multi-organizational operations. Standardization efforts in the Simulation Interoperability Standards Organization seek to define this language through three parallel activities: (1) specify a sufficient data model to unambiguously define a set of orders using the Joint Command, Control, and Consultation Information Exchange Data Model (JC3IEDM) as a starting point; (2) develop a formal grammar (lexicon and production rules) to formalize the definition of orders, requests, and reports; (3) develop a formal battle management ontology to …


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Using Pareto Fronts To Evaluate Polyp Detection Algorithms For Ct Colonography, Adam Huang, Jiang Li, Ronald M. Summers, Nicholas Petrick, Amy K. Hara Jan 2007

Using Pareto Fronts To Evaluate Polyp Detection Algorithms For Ct Colonography, Adam Huang, Jiang Li, Ronald M. Summers, Nicholas Petrick, Amy K. Hara

Electrical & Computer Engineering Faculty Publications

We evaluate and improve an existing curvature-based region growing algorithm for colonic polyp detection for our CT colonography (CTC) computer-aided detection (CAD) system by using Pareto fronts. The performance of a polyp detection algorithm involves two conflicting objectives, minimizing both false negative (FN) and false positive (FP) detection rates. This problem does not produce a single optimal solution but a set of solutions known as a Pareto front. Any solution in a Pareto front can only outperform other solutions in one of the two competing objectives. Using evolutionary algorithms to find the Pareto fronts for multi-objective optimization problems has been …


Validating Pareto Optimal Operation Parameters Of Polyp Detection Algorithms For Ct Colonography, Jiang Li, Adam Huang, Nicholas Petrick, Jianhua Yao, Ronald M. Summers, Maryellen L. Giger (Ed.), Nico Karssemeijer (Ed.) Jan 2007

Validating Pareto Optimal Operation Parameters Of Polyp Detection Algorithms For Ct Colonography, Jiang Li, Adam Huang, Nicholas Petrick, Jianhua Yao, Ronald M. Summers, Maryellen L. Giger (Ed.), Nico Karssemeijer (Ed.)

Electrical & Computer Engineering Faculty Publications

We evaluated a Pareto front-based multi-objective evolutionary algorithm for optimizing our CT colonography (CTC) computer-aided detection (CAD) system. The system identifies colonic polyps based on curvature and volumetric based features, where a set of thresholds for these features was optimized by the evolutionary algorithm. We utilized a two-fold cross-validation (CV) method to test if the optimized thresholds can be generalized to new data sets. We performed the CV method on 133 patients; each patient had a prone and a supine scan. There were 103 colonoscopically confirmed polyps resulting in 188 positive detections in CTC reading from either the prone or …


Neighborhood Defined Feature Selection Strategy For Improved Face Recognition In Different Sensor Modalitie, Satyanadh Gundimada Jan 2007

Neighborhood Defined Feature Selection Strategy For Improved Face Recognition In Different Sensor Modalitie, Satyanadh Gundimada

Electrical & Computer Engineering Theses & Dissertations

A novel feature selection strategy for improved face recognition in images with variations due to illumination conditions, facial expressions, and partial occlusions is presented in this dissertation. A hybrid face recognition system that uses feature maps of phase congruency and modular kernel spaces is developed. Phase congruency provides a measure that is independent of the overall magnitude of a signal, making it invariant to variations in image illumination and contrast. A novel modular kernel spaces approach is developed and implemented on the phase congruency feature maps. Smaller sub-regions from a predefined neighborhood within the phase congruency images of the training …


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …