Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Theses/Dissertations

2009

Institution
Keyword
Publication

Articles 1 - 30 of 125

Full-Text Articles in Engineering

Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski Dec 2009

Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski

Theses and Dissertations

The use of systems architecture, following a set of integrated descriptions from an architecture framework, has been well codified in Department of Defense acquisition and systems engineering. However, in the Space Science and Technology (S&T) community, this guidance and practice is not commonly adopted. This paper outlines an approach to leverage the changes made in DoD Architecture Framework 2.0 (DoDAF2.0), and the renewed emphasis on data and support to acquisition decision analysis. After decomposing the Space S&T design lifecycle into phases, design milestones and activities using process models, a set of DoDAF prescribed and Fit-for-Purpose views are constructed into a …


Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson Dec 2009

Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson

Theses and Dissertations

This research extends the knowledge of live-virtual-constructive (LVC) and distributed virtual simulations (DVS) through a detailed analysis and characterization of their underlying computing architecture. LVCs are characterized as a set of asynchronous simulation applications each serving as both producers and consumers of shared state data. In terms of data aging characteristics, LVCs are found to be first-order linear systems. System performance is quantified via two opposing factors; the consistency of the distributed state space, and the response time or interaction quality of the autonomous simulation applications. A framework is developed that defines temporal data consistency requirements such that the objectives …


A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez Dec 2009

A Physical Model Of Human Skin And Its Application For Search And Rescue, Abel S. Nunez

Theses and Dissertations

For this research we created a human skin reflectance model in the VIS and NIR. We then modeled sensor output for an RGB sensor based on output from the skin reflectance model. The model was also used to create a skin detection algorithm and a skin pigmentation level (skin reflectance at 685nm) estimation algorithm. The average root mean square error across the VIS and NIR between the skin reflectance model and measured data was 2%. The skin reflectance model then allowed us to generate qualitatively accurate responses for an RGB sensor for different biological and lighting conditions. To test the …


Tsukahara: A Comprehensive Web Solution Designed To Simplify The Process Of Hosting A Gymnastics Meet., Jonathan Thomassian Dec 2009

Tsukahara: A Comprehensive Web Solution Designed To Simplify The Process Of Hosting A Gymnastics Meet., Jonathan Thomassian

Computer Science and Software Engineering

The process of setting up a gymnastics meet is long and complicated. Most meets organized today involve large amounts of paperwork by both organizing gyms and attending gyms. Tsukahara seeks to address this issue by providing a comprehensive web based solution, to make it easy for gyms to both host and attend meets.


Session Initiation Protocol Server Implementation For Linksys Routers, Matthew Duder Dec 2009

Session Initiation Protocol Server Implementation For Linksys Routers, Matthew Duder

Computer Science and Software Engineering

Session Initiation Protocol (SIP) is a signaling protocol used for network-based media interaction. SIP Servers are required to process and forward requests and responses between end clients. Once connection setup is complete, the end clients utilize some other protocol (such as Real-Time Transport Protocol) to complete their task.

Such a server may be implemented and installed on routers. Unlike the SIP protocol, however, router development currently remains without standards. For this project, Linux-based residential-grade routers had their kernels replaced with an open source version. This allowed for installation of open-source development, such as a SIP server implementation.

This project led …


Redesigning Src2pkg, A Linux Package Creation Toolkit, Timothy Goya Dec 2009

Redesigning Src2pkg, A Linux Package Creation Toolkit, Timothy Goya

Computer Science and Software Engineering

Package managers ease installation and removal of applications. However, as the name indicates, in order for a package manager to be useful, they need packages created from upstream sources to manage. This is the purpose of src2pkg, a toolkit written in Bash shell script which automates many package creation tasks. src2pkg, however, suffers from major design flaws that cripple its ability to package some exotic upstream sources. src2pkg-ng is a prototype redesign of src2pkg that eliminates these flaws. src2pkg-ng fully supports creating packages for Slackware and Slackware-compatible variants for at least 21 upstream sources with various levels of complexity. Debian …


A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White Dec 2009

A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White

Master's Theses

The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …


Methodology To Derive Resource Aware Context Adaptable Architectures For Field Programmable Gate Arrays, Harikrishna Samala Dec 2009

Methodology To Derive Resource Aware Context Adaptable Architectures For Field Programmable Gate Arrays, Harikrishna Samala

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The design of a common architecture that can support multiple data-flow patterns (or contexts) embedded in complex control flow structures, in applications like multimedia processing, is particularly challenging when the target platform is a Field Programmable Gate Array (FPGA) with a heterogeneous mixture of device primitives. This thesis presents scheduling and mapping algorithms that use a novel area cost metric to generate resource aware context adaptable architectures. Results of a rigorous analysis of the methodology on multiple test cases are presented. Results are compared against published techniques and show an area savings and execution time savings of 46% each.


Self-Healing Cellular Automata To Correct Soft Errors In Defective Embedded Program Memories, Varun Voddi Dec 2009

Self-Healing Cellular Automata To Correct Soft Errors In Defective Embedded Program Memories, Varun Voddi

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Static Random Access Memory (SRAM) cells in ultra-low power Integrated Circuits (ICs) based on nanoscale Complementary Metal Oxide Semiconductor (CMOS) devices are likely to be the most vulnerable to large-scale soft errors. Conventional error correction circuits may not be able to handle the distributed nature of such errors and are susceptible to soft errors themselves. In this thesis, a distributed error correction circuit called Self-Healing Cellular Automata (SHCA) that can repair itself is presented. A possible way to deploy a SHCA in a system of SRAM-based embedded program memories (ePM) for one type of chip multi-processors is also discussed. The …


Interactive Perception For Cluttered Environments, Robert Willimon Dec 2009

Interactive Perception For Cluttered Environments, Robert Willimon

All Theses

Robotics research tends to focus upon either non-contact sensing or machine manipulation, but not both. This paper explores the benefits of combining the two by addressing the problem of extracting and classifying unknown objects within a cluttered environment, such as found in recycling and service robot applications. In the proposed approach, a pile of objects lies on a flat background, and the goal of the robot is to sift through the pile and classify each object so that it can be studied further. One object should be removed at a time with minimal disturbance to the other objects. We propose …


Automated System To Debug Under-Performing Network Flows In Wide Area Networks, Harika Tandra Dec 2009

Automated System To Debug Under-Performing Network Flows In Wide Area Networks, Harika Tandra

Masters Theses

Locating the cause of performance losses in large high performance Wide Area Networks (WAN) is an extremely challenging problem. This is because WANs comprise several distributed sub-networks (Autonomous Networks), with their own independent network monitoring systems. Each individual monitoring system has limited or no access to network devices outside its own network. Moreover, conventional network monitoring systems are designed only to provide information about the health of individual network devices, and do not provide sufficient information to monitor endto- end performance – thus, adding severe overhead on debugging end-toend performance issues.

In this thesis, an automated tool is designed that …


Entropy And Certainty In Lossless Data Compression, James Jay Jacobs Dec 2009

Entropy And Certainty In Lossless Data Compression, James Jay Jacobs

Dissertations

Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in information that was proposed by Claude Shannon. Lossless data compression is uniquely tied to entropy theory as the data and the system have a static definition. The static nature of the two requires a mechanism to reduce the entropy without the ability to alter either …


Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop Dec 2009

Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop

Culminating Experience Projects

"The Anaglym graphics engine uses the Lua programming language as the high-level language in which to interpret Anaglym applications. Applications running inside Anaglym are Lua scripts that have a particular environment exposed to them. By default, when Lua is embedded inside a C or C++ host application, no Lua functions are available to the hosted script. Lua functions must be exported by the host environment to be callable by a Lua script."


Memory Architecture Template For Fast Block Matching Algorithms On Field Programmable Gate Arrays, Shant Chandrakar Dec 2009

Memory Architecture Template For Fast Block Matching Algorithms On Field Programmable Gate Arrays, Shant Chandrakar

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Fast Block Matching (FBM) algorithms for video compression are well suited for acceleration using parallel data-path architectures on Field Programmable Gate Arrays (FPGAs). However, designing an efficient on-chip memory subsystem to provide the required throughput to this parallel data-path architecture is a complex problem. This thesis presents a memory architecture template that can be parameterized for a given FBM algorithm, number of parallel Processing Elements (PEs), and block size. The template can be parameterized with well known exploration techniques to design efficient on-chip memory subsystems. The memory subsystems are derived for two existing FBM algorithms and are implemented on a …


Analysis Of Distributed Denial Of Service Attacks And Countermeasures, Sampada Karandikar Dec 2009

Analysis Of Distributed Denial Of Service Attacks And Countermeasures, Sampada Karandikar

All Theses

Network technology has experienced explosive growth in the past two decades. The vast connectivity of networks all over the world poses monumental risks. The generally accepted philosophy in the security world is that no system or network is completely secure [1] which makes network security a critical concern. The work done in this thesis focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Although a lot of research has been done in this field, these attacks remain one of the most common threats affecting network performance.
One defense against DDoS attacks is …


Accelerating The Stochastic Simulation Algorithm Using Emerging Architectures, David Dewayne Jenkins Dec 2009

Accelerating The Stochastic Simulation Algorithm Using Emerging Architectures, David Dewayne Jenkins

Masters Theses

In order for scientists to learn more about molecular biology, it is imperative that they have the ability to construct and evaluate models. Model statistics consistent with the chemical master equation can be obtained using Gillespie's stochastic simulation algorithm (SSA). Due to the stochastic nature of the Monte Carlo simulations, large numbers of simulations must be run in order to get accurate statistics for the species populations and reactions. However, the algorithm tends to be computationally heavy and leads to long simulation runtimes for large systems. In this research, the performance of Gillespie's stochastic simulation algorithm is analyzed and optimized …


Vision-Based Reinforcement Learning Using A Consolidated Actor-Critic Model, Christopher Allen Niedzwiedz Dec 2009

Vision-Based Reinforcement Learning Using A Consolidated Actor-Critic Model, Christopher Allen Niedzwiedz

Masters Theses

Vision-based machine learning agents are tasked with making decisions based on high-dimensional, noisy input, placing a heavy load on available resources. Moreover, observations typically provide only partial information with respect to the environment state, necessitating robust state inference by the agent. Reinforcement learning provides a framework for decision making with the goal of maximizing long-term reward. This thesis introduces a novel approach to vision-based reinforce- ment learning through the use of a consolidated actor-critic model (CACM). The approach takes advantage of artificial neural networks as non-linear function approximators and the reduced com- putational requirements of the CACM scheme to yield …


A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy Nov 2009

A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy

Master's Theses and Doctoral Dissertations

The Internet‟s router infrastructure, a scale-free computer network, is vulnerable to targeted denial-of-service (DoS) attacks. Protecting this infrastructure‟s stability is a vital national interest because of the dependence of economic and national security transactions on the Internet. Current defensive countermeasures that rely on monitoring specific router traffic have been shown to be costly, inefficient, impractical, and reactive rather than anticipatory.

To address these issues, this research investigation considers a new paradigm that relies on the systemic changes that occur during a cyber attack, rather than individual router traffic anomalies. It has been hypothesized in the literature that systemic knowledge of …


Sensor Integration For Low-Cost Crash Avoidance, Stephane M. Roussel Nov 2009

Sensor Integration For Low-Cost Crash Avoidance, Stephane M. Roussel

Master's Theses

This report is a summary of the development of sensor integration for low-cost crash avoidance for over-land commercial trucks. The goal of the project was to build and test a system composed of low-cost commercially available sensors arranged on a truck trailer to monitor the environment around the truck. The system combines the data from each sensor to increase the reliability of the sensor using a probabilistic data fusion approach. A combination of ultrasonic and magnetoresistive sensors was used in this study. In addition, Radar and digital imaging were investigated as reference signals and possible candidates for additional sensor integration. …


Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova Sep 2009

Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova

USF Tampa Graduate Theses and Dissertations

The flow of a liquid film over a rapidly rotating horizontal disk has numerous industrial applications including pharmaceuticals, chemical engineering, bioengineering, etc. The analysis and control of complex fluid flows over a rapidly rotating horizontal disk is an important issue in the experimental fluid mechanics. The spinning disk reactor exploits the benefits of centrifugal force, which produces thin highly sheared films due to radial acceleration. The hydrodynamics of the film results in excellent fluid mixing and high heat or mass transfer rates.

This work focuses on developing a novel approach for fluid flow tracking and analysis. Specifically, the developed algorithm …


Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith Sep 2009

Electronic Image Stabilization For Mobile Robotic Vision Systems, Michael John Smith

Theses and Dissertations

When a camera is affixed on a dynamic mobile robot, image stabilization is the first step towards more complex analysis on the video feed. This thesis presents a novel electronic image stabilization (EIS) algorithm for small inexpensive highly dynamic mobile robotic platforms with onboard camera systems. The algorithm combines optical flow motion parameter estimation with angular rate data provided by a strapdown inertial measurement unit (IMU). A discrete Kalman filter in feedforward configuration is used for optimal fusion of the two data sources. Performance evaluations are conducted by a simulated video truth model (capturing the effects of image translation, rotation, …


Binary Usenet Application, Alexander J. Patterson Sep 2009

Binary Usenet Application, Alexander J. Patterson

Culminating Experience Projects

ANZBC software was written as a prototype to download small‐encoded files form Usenet servers. This software allows anything from a text document to a HD movie to be downloaded and decoded into a single file. Often this is a single file that is split into multiple small files and then compressed.


Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy Sep 2009

Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy

Theses and Dissertations

This research developed the foundation, theory, and framework for a set of analysis techniques to assist decision makers in analyzing questions regarding the synthesis, interdiction, and protection of infrastructure networks. This includes extension of traditional network interdiction to directly model nodal interdiction; new techniques to identify potential targets in social networks based on extensions of shortest path network interdiction; extension of traditional network interdiction to include layered network formulations; and develops models/techniques to design robust layered networks while considering trade-offs with cost. These approaches identify the maximum protection/disruption possible across layered networks with limited resources, find the most robust layered …


Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien Aug 2009

Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien

Culminating Experience Projects

Flex and Silverlight provide large Application Programming Interfaces (API’s). Applications can be designed using a variety of architectures. The purpose of this paper is not to perform a complete comparison between Flex and Silverlight. To do such a comparison would require massive amounts of time and research. The purpose of this paper is to describe the design and implementation of the Silverlight photography framework project. Along the way this paper compares the Silverlight project to the Adobe Flex project and discusses the goals of each product. During the comparison many important similarities and differences between Silverlight and Flex technologies are …


Accelerating Quantum Monte Carlo Simulations With Emerging Architectures, Akila Gothandaraman Aug 2009

Accelerating Quantum Monte Carlo Simulations With Emerging Architectures, Akila Gothandaraman

Doctoral Dissertations

Scientific computing applications demand ever-increasing performance while traditional microprocessor architectures face limits. Recent technological advances have led to a number of emerging computing platforms that provide one or more of the following over their predecessors: increased energy efficiency, programmability/flexibility, different granularities of parallelism, and higher numerical precision support. This dissertation explores emerging platforms such as reconfigurable computing using fieldprogrammable gate arrays (FPGAs), and graphics processing units (GPUs) for quantum Monte Carlo (QMC), a simulation method widely used in physics and physical chemistry. This dissertation makes the following significant contributions to computational science. First, we develop an open-source userfriendly hardware-accelerated simulation …


Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li Aug 2009

Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li

Dissertations

The innovations and improvements in high-throughput genomic technologies, such as DNA microarray, make it possible for biologists to simultaneously measure dependencies and regulations among genes on a genome-wide scale and provide us genetic information. An important objective of the functional genomics is to understand the controlling mechanism of the expression of these genes and encode the knowledge into gene regulatory network (GRN). To achieve this, computational and statistical algorithms are especially needed.

Inference of GRN is a very challenging task for computational biologists because the degree of freedom of the parameters is redundant. Various computational approaches have been proposed for …


Lyapunov-Based Coordinated Control Of An Underactuated Unmanned Aerial Vehicle And Robot Manipulator, Dongbin Lee Aug 2009

Lyapunov-Based Coordinated Control Of An Underactuated Unmanned Aerial Vehicle And Robot Manipulator, Dongbin Lee

All Dissertations

This Ph.D. dissertation describes nonlinear tracking control results for a quadrotor helicopter unmanned aerial vehicle (UAV) towards the ultimate goal of controlling a combined UAV plus robot manipulator system (UAVRM). The quadrotor UAV is a helicopter that has four independent rotors that provide vertical lift: these four independent forces are managed in order to directly provide lift, pitch, roll, and yaw of the vehicle. Horizontal translations result from pitch and roll actions, the system is underactuated in the sense that there are only four control inputs to move the six degree-of-freedom aircraft. There are exising dynamic models of the quadrotor …


Minimum Transmission Power Configuration In Real-Time Wireless Sensor Networks, Xiaodong Wang Aug 2009

Minimum Transmission Power Configuration In Real-Time Wireless Sensor Networks, Xiaodong Wang

Masters Theses

Multi-channel communications can effectively reduce channel competition and interferences in a wireless sensor network, and thus achieve increased throughput and improved end-to-end delay guarantees with reduced power consumption. However, existing work relies only on a small number of orthogonal channels, resulting in degraded performance when a large number of data flows need to be transmitted on different channels. In this thesis, empirical studies are conducted to investigate the interferences among overlapping channels. The results show that overlapping channels can also be utilized for improved real-time performance if the node transmission power is carefully configured. In order to minimize the overall …


Parallel Processing Architecture For Solving Large Scale Linear Systems, Arun Nagari Aug 2009

Parallel Processing Architecture For Solving Large Scale Linear Systems, Arun Nagari

Masters Theses

Solving linear systems with multiple variables is at the core of many scienti…c problems. Parallel processing techniques for solving such system problems has have received much attention in recent years. A key theme in the literature pertains to the application of Lower triangular matrix and Upper triangular matrix(LU) decomposing, which factorizes an N N square matrix into two triangular matrices. The resulting linear system can be more easily solved in O(N2) work. Inher- ently, the computational complexity of LU decomposition is O(N3). Moreover, it is a challenging process to parallelize. A highly-parallel …


Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen Jul 2009

Analysis And Design Of Earthquake Relief Virtual Logistic Information System, Chi Chen

World Maritime University Dissertations

No abstract provided.