Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (29)
- California Polytechnic State University, San Luis Obispo (14)
- Wright State University (10)
- Missouri University of Science and Technology (7)
- University of Nevada, Las Vegas (6)
-
- University of Tennessee, Knoxville (6)
- Utah State University (6)
- University of Central Florida (5)
- Clemson University (4)
- Grand Valley State University (4)
- Old Dominion University (4)
- Portland State University (4)
- American University in Cairo (3)
- California State University, San Bernardino (3)
- Morehead State University (2)
- The University of Southern Mississippi (2)
- University of Denver (2)
- University of Texas at El Paso (2)
- Boise State University (1)
- Eastern Michigan University (1)
- Edith Cowan University (1)
- Munster Technological University (1)
- New Jersey Institute of Technology (1)
- Syracuse University (1)
- Universidad de La Salle (1)
- University of Kentucky (1)
- University of South Florida (1)
- Washington University in St. Louis (1)
- Western Michigan University (1)
- World Maritime University (1)
- Keyword
-
- Department of Computer Science and Engineering (10)
- Computer networks--Security measures (8)
- #antcenter (6)
- Computer architecture (4)
- Clustering (3)
-
- Computer vision (3)
- Image processing (3)
- Ad hoc networks (Computer networks) (2)
- Adobe Flex (2)
- BGP (2)
- Biometrics (2)
- Computer network architectures (2)
- Computer networks--Management (2)
- Computer security (2)
- Computer software (2)
- Cryptography (2)
- Daniel Felix Ritchie School of Engineering and Computer Science (2)
- Data Mining (2)
- Decision making (2)
- Electronic data processing--Distributed processing (2)
- Genetic Programming (2)
- Internet telephony (2)
- Machine Learning (2)
- Networking (2)
- Ontology (2)
- Steganography (2)
- 3D (1)
- 3D model (1)
- 3d (1)
- <p>Ad hoc networks (Computer networks)<br />Adaptive control systems<br />Mathematical optimization<br />Wireless sensor networks</p> (1)
- Publication
-
- Theses and Dissertations (29)
- Master's Theses (11)
- Browse all Theses and Dissertations (10)
- Masters Theses (10)
- Electronic Theses and Dissertations (7)
-
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (6)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (6)
- Culminating Experience Projects (4)
- Dissertations (4)
- Dissertations and Theses (4)
- Electrical & Computer Engineering Theses & Dissertations (4)
- All Theses (3)
- Archived Theses and Dissertations (3)
- Computer Science and Software Engineering (3)
- Doctoral Dissertations (3)
- Theses Digitization Project (3)
- Morehead State Theses and Dissertations (2)
- Open Access Theses & Dissertations (2)
- All Dissertations (1)
- Boise State University Theses and Dissertations (1)
- Honors Capstone Projects - All (1)
- Ingeniería en Automatización (1)
- Master's Theses and Doctoral Dissertations (1)
- McKelvey School of Engineering Theses & Dissertations (1)
- Theses (1)
- Theses: Doctorates and Masters (1)
- USF Tampa Graduate Theses and Dissertations (1)
- University of Kentucky Master's Theses (1)
- World Maritime University Dissertations (1)
Articles 1 - 30 of 125
Full-Text Articles in Engineering
Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski
Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski
Theses and Dissertations
The use of systems architecture, following a set of integrated descriptions from an architecture framework, has been well codified in Department of Defense acquisition and systems engineering. However, in the Space Science and Technology (S&T) community, this guidance and practice is not commonly adopted. This paper outlines an approach to leverage the changes made in DoD Architecture Framework 2.0 (DoDAF2.0), and the renewed emphasis on data and support to acquisition decision analysis. After decomposing the Space S&T design lifecycle into phases, design milestones and activities using process models, a set of DoDAF prescribed and Fit-for-Purpose views are constructed into a …
Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson
Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson
Theses and Dissertations
This research extends the knowledge of live-virtual-constructive (LVC) and distributed virtual simulations (DVS) through a detailed analysis and characterization of their underlying computing architecture. LVCs are characterized as a set of asynchronous simulation applications each serving as both producers and consumers of shared state data. In terms of data aging characteristics, LVCs are found to be first-order linear systems. System performance is quantified via two opposing factors; the consistency of the distributed state space, and the response time or interaction quality of the autonomous simulation applications. A framework is developed that defines temporal data consistency requirements such that the objectives …
A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez
A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez
Theses and Dissertations
For this research we created a human skin reflectance model in the VIS and NIR. We then modeled sensor output for an RGB sensor based on output from the skin reflectance model. The model was also used to create a skin detection algorithm and a skin pigmentation level (skin reflectance at 685nm) estimation algorithm. The average root mean square error across the VIS and NIR between the skin reflectance model and measured data was 2%. The skin reflectance model then allowed us to generate qualitatively accurate responses for an RGB sensor for different biological and lighting conditions. To test the …
Tsukahara: A Comprehensive Web Solution Designed To Simplify The Process Of Hosting A Gymnastics Meet., Jonathan Thomassian
Tsukahara: A Comprehensive Web Solution Designed To Simplify The Process Of Hosting A Gymnastics Meet., Jonathan Thomassian
Computer Science and Software Engineering
The process of setting up a gymnastics meet is long and complicated. Most meets organized today involve large amounts of paperwork by both organizing gyms and attending gyms. Tsukahara seeks to address this issue by providing a comprehensive web based solution, to make it easy for gyms to both host and attend meets.
Session Initiation Protocol Server Implementation For Linksys Routers, Matthew Duder
Session Initiation Protocol Server Implementation For Linksys Routers, Matthew Duder
Computer Science and Software Engineering
Session Initiation Protocol (SIP) is a signaling protocol used for network-based media interaction. SIP Servers are required to process and forward requests and responses between end clients. Once connection setup is complete, the end clients utilize some other protocol (such as Real-Time Transport Protocol) to complete their task.
Such a server may be implemented and installed on routers. Unlike the SIP protocol, however, router development currently remains without standards. For this project, Linux-based residential-grade routers had their kernels replaced with an open source version. This allowed for installation of open-source development, such as a SIP server implementation.
This project led …
Redesigning Src2pkg, A Linux Package Creation Toolkit, Timothy Goya
Redesigning Src2pkg, A Linux Package Creation Toolkit, Timothy Goya
Computer Science and Software Engineering
Package managers ease installation and removal of applications. However, as the name indicates, in order for a package manager to be useful, they need packages created from upstream sources to manage. This is the purpose of src2pkg, a toolkit written in Bash shell script which automates many package creation tasks. src2pkg, however, suffers from major design flaws that cripple its ability to package some exotic upstream sources. src2pkg-ng is a prototype redesign of src2pkg that eliminates these flaws. src2pkg-ng fully supports creating packages for Slackware and Slackware-compatible variants for at least 21 upstream sources with various levels of complexity. Debian …
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
Master's Theses
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …
Methodology To Derive Resource Aware Context Adaptable Architectures For Field Programmable Gate Arrays, Harikrishna Samala
Methodology To Derive Resource Aware Context Adaptable Architectures For Field Programmable Gate Arrays, Harikrishna Samala
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The design of a common architecture that can support multiple data-flow patterns (or contexts) embedded in complex control flow structures, in applications like multimedia processing, is particularly challenging when the target platform is a Field Programmable Gate Array (FPGA) with a heterogeneous mixture of device primitives. This thesis presents scheduling and mapping algorithms that use a novel area cost metric to generate resource aware context adaptable architectures. Results of a rigorous analysis of the methodology on multiple test cases are presented. Results are compared against published techniques and show an area savings and execution time savings of 46% each.
Self-Healing Cellular Automata To Correct Soft Errors In Defective Embedded Program Memories, Varun Voddi
Self-Healing Cellular Automata To Correct Soft Errors In Defective Embedded Program Memories, Varun Voddi
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Static Random Access Memory (SRAM) cells in ultra-low power Integrated Circuits (ICs) based on nanoscale Complementary Metal Oxide Semiconductor (CMOS) devices are likely to be the most vulnerable to large-scale soft errors. Conventional error correction circuits may not be able to handle the distributed nature of such errors and are susceptible to soft errors themselves. In this thesis, a distributed error correction circuit called Self-Healing Cellular Automata (SHCA) that can repair itself is presented. A possible way to deploy a SHCA in a system of SRAM-based embedded program memories (ePM) for one type of chip multi-processors is also discussed. The …
Interactive Perception For Cluttered Environments, Robert Willimon
Interactive Perception For Cluttered Environments, Robert Willimon
All Theses
Robotics research tends to focus upon either non-contact sensing or machine manipulation, but not both. This paper explores the benefits of combining the two by addressing the problem of extracting and classifying unknown objects within a cluttered environment, such as found in recycling and service robot applications. In the proposed approach, a pile of objects lies on a flat background, and the goal of the robot is to sift through the pile and classify each object so that it can be studied further. One object should be removed at a time with minimal disturbance to the other objects. We propose …
Automated System To Debug Under-Performing Network Flows In Wide Area Networks, Harika Tandra
Automated System To Debug Under-Performing Network Flows In Wide Area Networks, Harika Tandra
Masters Theses
Locating the cause of performance losses in large high performance Wide Area Networks (WAN) is an extremely challenging problem. This is because WANs comprise several distributed sub-networks (Autonomous Networks), with their own independent network monitoring systems. Each individual monitoring system has limited or no access to network devices outside its own network. Moreover, conventional network monitoring systems are designed only to provide information about the health of individual network devices, and do not provide sufficient information to monitor endto- end performance – thus, adding severe overhead on debugging end-toend performance issues.
In this thesis, an automated tool is designed that …
Entropy And Certainty In Lossless Data Compression, James Jay Jacobs
Entropy And Certainty In Lossless Data Compression, James Jay Jacobs
Dissertations
Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in information that was proposed by Claude Shannon. Lossless data compression is uniquely tied to entropy theory as the data and the system have a static definition. The static nature of the two requires a mechanism to reduce the entropy without the ability to alter either …
Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop
Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop
Culminating Experience Projects
"The Anaglym graphics engine uses the Lua programming language as the high-level language in which to interpret Anaglym applications. Applications running inside Anaglym are Lua scripts that have a particular environment exposed to them. By default, when Lua is embedded inside a C or C++ host application, no Lua functions are available to the hosted script. Lua functions must be exported by the host environment to be callable by a Lua script."
Memory Architecture Template For Fast Block Matching Algorithms On Field Programmable Gate Arrays, Shant Chandrakar
Memory Architecture Template For Fast Block Matching Algorithms On Field Programmable Gate Arrays, Shant Chandrakar
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Fast Block Matching (FBM) algorithms for video compression are well suited for acceleration using parallel data-path architectures on Field Programmable Gate Arrays (FPGAs). However, designing an efficient on-chip memory subsystem to provide the required throughput to this parallel data-path architecture is a complex problem. This thesis presents a memory architecture template that can be parameterized for a given FBM algorithm, number of parallel Processing Elements (PEs), and block size. The template can be parameterized with well known exploration techniques to design efficient on-chip memory subsystems. The memory subsystems are derived for two existing FBM algorithms and are implemented on a …
Analysis Of Distributed Denial Of Service Attacks And Countermeasures, Sampada Karandikar
Analysis Of Distributed Denial Of Service Attacks And Countermeasures, Sampada Karandikar
All Theses
Network technology has experienced explosive growth in the past two decades. The vast connectivity of networks all over the world poses monumental risks. The generally accepted philosophy in the security world is that no system or network is completely secure [1] which makes network security a critical concern. The work done in this thesis focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Although a lot of research has been done in this field, these attacks remain one of the most common threats affecting network performance.
One defense against DDoS attacks is …
Accelerating The Stochastic Simulation Algorithm Using Emerging Architectures, David Dewayne Jenkins
Accelerating The Stochastic Simulation Algorithm Using Emerging Architectures, David Dewayne Jenkins
Masters Theses
In order for scientists to learn more about molecular biology, it is imperative that they have the ability to construct and evaluate models. Model statistics consistent with the chemical master equation can be obtained using Gillespie's stochastic simulation algorithm (SSA). Due to the stochastic nature of the Monte Carlo simulations, large numbers of simulations must be run in order to get accurate statistics for the species populations and reactions. However, the algorithm tends to be computationally heavy and leads to long simulation runtimes for large systems. In this research, the performance of Gillespie's stochastic simulation algorithm is analyzed and optimized …
Vision-Based Reinforcement Learning Using A Consolidated Actor-Critic Model, Christopher Allen Niedzwiedz
Vision-Based Reinforcement Learning Using A Consolidated Actor-Critic Model, Christopher Allen Niedzwiedz
Masters Theses
Vision-based machine learning agents are tasked with making decisions based on high-dimensional, noisy input, placing a heavy load on available resources. Moreover, observations typically provide only partial information with respect to the environment state, necessitating robust state inference by the agent. Reinforcement learning provides a framework for decision making with the goal of maximizing long-term reward. This thesis introduces a novel approach to vision-based reinforce- ment learning through the use of a consolidated actor-critic model (CACM). The approach takes advantage of artificial neural networks as non-linear function approximators and the reduced com- putational requirements of the CACM scheme to yield …
A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy
A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy
Master's Theses and Doctoral Dissertations
The Internet‟s router infrastructure, a scale-free computer network, is vulnerable to targeted denial-of-service (DoS) attacks. Protecting this infrastructure‟s stability is a vital national interest because of the dependence of economic and national security transactions on the Internet. Current defensive countermeasures that rely on monitoring specific router traffic have been shown to be costly, inefficient, impractical, and reactive rather than anticipatory.
To address these issues, this research investigation considers a new paradigm that relies on the systemic changes that occur during a cyber attack, rather than individual router traffic anomalies. It has been hypothesized in the literature that systemic knowledge of …
Sensor Integration For Low-Cost Crash Avoidance, Stephane M. Roussel
Sensor Integration For Low-Cost Crash Avoidance, Stephane M. Roussel
Master's Theses
This report is a summary of the development of sensor integration for low-cost crash avoidance for over-land commercial trucks. The goal of the project was to build and test a system composed of low-cost commercially available sensors arranged on a truck trailer to monitor the environment around the truck. The system combines the data from each sensor to increase the reliability of the sensor using a probabilistic data fusion approach. A combination of ultrasonic and magnetoresistive sensors was used in this study. In addition, Radar and digital imaging were investigated as reference signals and possible candidates for additional sensor integration. …
Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova
Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova
USF Tampa Graduate Theses and Dissertations
The flow of a liquid film over a rapidly rotating horizontal disk has numerous industrial applications including pharmaceuticals, chemical engineering, bioengineering, etc. The analysis and control of complex fluid flows over a rapidly rotating horizontal disk is an important issue in the experimental fluid mechanics. The spinning disk reactor exploits the benefits of centrifugal force, which produces thin highly sheared films due to radial acceleration. The hydrodynamics of the film results in excellent fluid mixing and high heat or mass transfer rates.
This work focuses on developing a novel approach for fluid flow tracking and analysis. Specifically, the developed algorithm …
Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith
Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith
Theses and Dissertations
When a camera is affixed on a dynamic mobile robot, image stabilization is the first step towards more complex analysis on the video feed. This thesis presents a novel electronic image stabilization (EIS) algorithm for small inexpensive highly dynamic mobile robotic platforms with onboard camera systems. The algorithm combines optical flow motion parameter estimation with angular rate data provided by a strapdown inertial measurement unit (IMU). A discrete Kalman filter in feedforward configuration is used for optimal fusion of the two data sources. Performance evaluations are conducted by a simulated video truth model (capturing the effects of image translation, rotation, …
Binary Usenet Application, Alexander J. Patterson
Binary Usenet Application, Alexander J. Patterson
Culminating Experience Projects
ANZBC software was written as a prototype to download small‐encoded files form Usenet servers. This software allows anything from a text document to a HD movie to be downloaded and decoded into a single file. Often this is a single file that is split into multiple small files and then compressed.
Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy
Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy
Theses and Dissertations
This research developed the foundation, theory, and framework for a set of analysis techniques to assist decision makers in analyzing questions regarding the synthesis, interdiction, and protection of infrastructure networks. This includes extension of traditional network interdiction to directly model nodal interdiction; new techniques to identify potential targets in social networks based on extensions of shortest path network interdiction; extension of traditional network interdiction to include layered network formulations; and develops models/techniques to design robust layered networks while considering trade-offs with cost. These approaches identify the maximum protection/disruption possible across layered networks with limited resources, find the most robust layered …
Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien
Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien
Culminating Experience Projects
Flex and Silverlight provide large Application Programming Interfaces (API’s). Applications can be designed using a variety of architectures. The purpose of this paper is not to perform a complete comparison between Flex and Silverlight. To do such a comparison would require massive amounts of time and research. The purpose of this paper is to describe the design and implementation of the Silverlight photography framework project. Along the way this paper compares the Silverlight project to the Adobe Flex project and discusses the goals of each product. During the comparison many important similarities and differences between Silverlight and Flex technologies are …
Accelerating Quantum Monte Carlo Simulations With Emerging Architectures, Akila Gothandaraman
Accelerating Quantum Monte Carlo Simulations With Emerging Architectures, Akila Gothandaraman
Doctoral Dissertations
Scientific computing applications demand ever-increasing performance while traditional microprocessor architectures face limits. Recent technological advances have led to a number of emerging computing platforms that provide one or more of the following over their predecessors: increased energy efficiency, programmability/flexibility, different granularities of parallelism, and higher numerical precision support. This dissertation explores emerging platforms such as reconfigurable computing using fieldprogrammable gate arrays (FPGAs), and graphics processing units (GPUs) for quantum Monte Carlo (QMC), a simulation method widely used in physics and physical chemistry. This dissertation makes the following significant contributions to computational science. First, we develop an open-source userfriendly hardware-accelerated simulation …
Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li
Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li
Dissertations
The innovations and improvements in high-throughput genomic technologies, such as DNA microarray, make it possible for biologists to simultaneously measure dependencies and regulations among genes on a genome-wide scale and provide us genetic information. An important objective of the functional genomics is to understand the controlling mechanism of the expression of these genes and encode the knowledge into gene regulatory network (GRN). To achieve this, computational and statistical algorithms are especially needed.
Inference of GRN is a very challenging task for computational biologists because the degree of freedom of the parameters is redundant. Various computational approaches have been proposed for …
Lyapunov-Based Coordinated Control Of An Underactuated Unmanned Aerial Vehicle And Robot Manipulator, Dongbin Lee
Lyapunov-Based Coordinated Control Of An Underactuated Unmanned Aerial Vehicle And Robot Manipulator, Dongbin Lee
All Dissertations
This Ph.D. dissertation describes nonlinear tracking control results for a quadrotor helicopter unmanned aerial vehicle (UAV) towards the ultimate goal of controlling a combined UAV plus robot manipulator system (UAVRM). The quadrotor UAV is a helicopter that has four independent rotors that provide vertical lift: these four independent forces are managed in order to directly provide lift, pitch, roll, and yaw of the vehicle. Horizontal translations result from pitch and roll actions, the system is underactuated in the sense that there are only four control inputs to move the six degree-of-freedom aircraft. There are exising dynamic models of the quadrotor …
Minimum Transmission Power Configuration In Real-Time Wireless Sensor Networks, Xiaodong Wang
Minimum Transmission Power Configuration In Real-Time Wireless Sensor Networks, Xiaodong Wang
Masters Theses
Multi-channel communications can effectively reduce channel competition and interferences in a wireless sensor network, and thus achieve increased throughput and improved end-to-end delay guarantees with reduced power consumption. However, existing work relies only on a small number of orthogonal channels, resulting in degraded performance when a large number of data flows need to be transmitted on different channels. In this thesis, empirical studies are conducted to investigate the interferences among overlapping channels. The results show that overlapping channels can also be utilized for improved real-time performance if the node transmission power is carefully configured. In order to minimize the overall …
Parallel Processing Architecture For Solving Large Scale Linear Systems, Arun Nagari
Parallel Processing Architecture For Solving Large Scale Linear Systems, Arun Nagari
Masters Theses
Solving linear systems with multiple variables is at the core of many scienti…c problems. Parallel processing techniques for solving such system problems has have received much attention in recent years. A key theme in the literature pertains to the application of Lower triangular matrix and Upper triangular matrix(LU) decomposing, which factorizes an N N square matrix into two triangular matrices. The resulting linear system can be more easily solved in O(N2) work. Inher- ently, the computational complexity of LU decomposition is O(N3). Moreover, it is a challenging process to parallelize. A highly-parallel …
Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen
Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen
World Maritime University Dissertations
No abstract provided.