Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,564 Full-Text Articles 38,363 Authors 8,336,044 Downloads 263 Institutions

All Articles in Computer Engineering

Faceted Search

23,564 full-text articles. Page 751 of 929.

Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava 2013 University of Nevada, Las Vegas

Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava

UNLV Theses, Dissertations, Professional Papers, and Capstones

Most of digital image applications demand on high image quality. Unfortunately, images often are degraded by noise during the formation, transmission, and recording processes. Hence, image denoising is an essential processing step preceding visual and automated analyses. Image denoising methods can reduce image contrast, create block or ring artifacts in the process of denoising. In this dissertation, we develop high performance non-linear diffusion based image denoising methods, capable to preserve edges and maintain high visual quality. This is attained by different approaches: First, a nonlinear diffusion is presented with robust M-estimators as diffusivity functions. Secondly, the knowledge of textons derived …


On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu 2013 University of Nevada, Las Vegas

On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu

UNLV Theses, Dissertations, Professional Papers, and Capstones

High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.

Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …


A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb 2013 Western Kentucky University

A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb

Masters Theses & Specialist Projects

Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi 2013 University of Nebraska-Lincoln

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Clustering And Classification Of Multi-Domain Proteins, Neethu Shah 2013 University of Nebraska-Lincoln

Clustering And Classification Of Multi-Domain Proteins, Neethu Shah

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Rapid development of next-generation sequencing technology has led to an unprecedented growth in protein sequence data repositories over the last decade. Majority of these proteins lack structural and functional characterization. This necessitates design and development of fast, efficient, and sensitive computational tools and algorithms that can classify these proteins into functionally coherent groups.

Domains are fundamental units of protein structure and function. Multi-domain proteins are extremely complex as opposed to proteins that have single or no domains. They exhibit network-like complex evolutionary events such as domain shuffling, domain loss, and domain gain. These events therefore, cannot be represented in the …


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin 2013 California Polytechnic State University, San Luis Obispo

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices …


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella 2013 California Polytechnic State University, San Luis Obispo

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …


A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong PANG, Shengyi JIANG, Dongyi CHEN 2013 Singapore Management University

A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen

Research Collection School Of Computing and Information Systems

Identifying potential customers among a huge number of users in microblogging is a fundamental problem for microblog marketing. One challenge in potential customer detection in microblogging is how to generate an accurate characteristic description for users, i.e., user profile generation. Intuitively, the preference of a user’s friends (i.e., the person followed by the user in microblogging) is of great importance to capture the characteristic of the user. Also, a user’s self-defined tags are often concise and accurate carriers for the user’s interests. In this paper, for identifying potential customers in microblogging, we propose a method to generate user profiles via …


Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou TENG, Ah-hwee TAN, Loo-Nin TEOW 2013 Singapore Management University

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison 2013 University of South Florida

Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison

USF Tampa Graduate Theses and Dissertations

Programmable reversible logic is emerging as a prospective logic design style for implementation in modern nanotechnology and quantum computing with minimal impact on circuit heat generation. Adiabatic logic is a design methodology for reversible logic in CMOS where the current flow through the circuit is controlled such that the energy dissipation due to switching and capacitor dissipation is minimized. Recent advances in reversible logic using and quantum computer algorithms allow for improved computer architectures. Production of cost-effective Secure Integrated Chips, such as Smart Cards, requires hardware designers to consider tradeoffs in size, security, and power consumption. In order to design …


Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman 2013 The University of Western Ontario

Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman

Electronic Thesis and Dissertation Repository

The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …


A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques 2013 The University of Western Ontario

A Hybrid Visual Control Scheme To Assist The Visually Impaired With Guided Reaching Tasks, Duane Jacques

Electronic Thesis and Dissertation Repository

In recent years, numerous researchers have been working towards adapting technology developed for robotic control to use in the creation of high-technology assistive devices for the visually impaired. These types of devices have been proven to help visually impaired people live with a greater degree of confidence and independence. However, most prior work has focused primarily on a single problem from mobile robotics, namely navigation in an unknown environment. In this work we address the issue of the design and performance of an assistive device application to aid the visually-impaired with a guided reaching task. The device follows an eye-in-hand, …


Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson 2013 Liberty University

Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson

Senior Honors Theses

Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.

Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …


Diseño E Implementación De Un Sistema De Información Para La Federación Colombiana De Tiro, Cesar Augusto Prieto Henríquez, Alix Leonela Salazar Manrique 2013 Universidad de La Salle, Bogotá

Diseño E Implementación De Un Sistema De Información Para La Federación Colombiana De Tiro, Cesar Augusto Prieto Henríquez, Alix Leonela Salazar Manrique

Ingeniería en Automatización

La Federación Colombiana de Tiro ha contado a través de la historia con bases de datos ambiguas, administradas a través de software no especializado que restringe el manejo y accesibilidad de la información de cada uno de los miembros. Actualmente la Federación Colombiana de Tiro no cuenta con una base de datos actualizada que le permita tener acceso a los datos completos de cada uno de sus miembros; se presenta dificultad para adquirir información precisa acerca del histórico de cada uno de los deportistas, de acuerdo con los diferentes eventos que se realizan y en los cuales ellos son participantes …


Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver 2013 DePaul University

Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver

College of Computing and Digital Media Dissertations

Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.

To respond to this problem, …


Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet 2013 Florida International University

Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet

FIU Electronic Theses and Dissertations

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or “dirty” sensor data. The dirty …


Techniques And Directions For Building Very Large Agent Teams, Paul Scerri, Joseph A. Giampapa, Katia Sycara 2013 Carnegie Mellon University

Techniques And Directions For Building Very Large Agent Teams, Paul Scerri, Joseph A. Giampapa, Katia Sycara

Joseph Andrew Giampapa

We have developed probabilistic algorithms that leverage the associates network for distributed plan instantiation, role allocation, information sharing and adjustable autonomy with a team. By developing such new algorithms, we have been able to build teams of hundreds of cooperating agents, and test specific behaviors among tens of thousands of agents. In this paper, we describe the algorithms that we have developed, the tests that we subjected them to, and sketch some of the key challenges that remain to be addressed.


Evaluation Criteria For The Morse Simulation Environment, Joseph A. Giampapa 2013 Carnegie Mellon University

Evaluation Criteria For The Morse Simulation Environment, Joseph A. Giampapa

Joseph Andrew Giampapa

Abstract: "This document is intended for researchers who will be using the MORSE simulator for their team-oriented experiments. It specifies some initial criteria that can be used to evaluate the performance of the test subjects. This document also specifies the log events that are generated by MORSE and that can be used for such evaluations."


A Review Of Research Literature On Bilateral Negotiations, Cuihong Li, Joseph Giampapa, Katia Sycara-Cyranski 2013 Carnegie Mellon University

A Review Of Research Literature On Bilateral Negotiations, Cuihong Li, Joseph Giampapa, Katia Sycara-Cyranski

Joseph Andrew Giampapa

Abstract: "Automated bilateral negotiations are an important mechanism to realize efficient distributed matching in the Navy detailing system, and the presence of outside options is an outstanding feature of the negotiations. In this report we provide an extensive literature review on the research of bilateral negotiations in the fields of Economics and Artificial Intelligence. Three important dimensions are described to identify the negotiation environment and to build a research model. Preliminary considerations and suggestions are given in these dimensions on modelling the system. The review suggests that negotiations with outside options is a new and important research problem, yet it …


Probabilistic Verification Of Coordinated Multi-Robot Missions, Sagar J. Chaki, Joseph A. Giampapa 2013 Carnegie Mellon University

Probabilistic Verification Of Coordinated Multi-Robot Missions, Sagar J. Chaki, Joseph A. Giampapa

Joseph Andrew Giampapa

Robots are increasingly used to perform a wide variety of tasks, especially those involving dangerous or inaccessible locations. As the complexity of such tasks grow, robots are being deployed in teams, with complex coordination schemes aimed at maximizing the chance of mission success. Such teams operate under inherently uncertain conditions -- the robots themselves fail, and have to continuously adapt to changing environmental conditions. A key challenge facing robotic mission designers is therefore to construct a mission -- i.e., specify number and type of robots, number and size of teams, coordination and planning mechanisms etc. -- so as to maximize …


Digital Commons powered by bepress