Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Scientific Application Acceleration Utilizing Heterogeneous Architectures, Edwin Weill Dec 2014

Scientific Application Acceleration Utilizing Heterogeneous Architectures, Edwin Weill

All Theses

Within the past decade, there have been substantial leaps in computer architectures to exploit the parallelism that is inherently present in many applications. The scientific community has benefited from the emergence of not only multi-core processors, but also other, less traditional architectures including general purpose graphical processing units (GPGPUs), field programmable gate arrays (FPGAs), and Intel's many integrated cores (MICs) architecture (i.e. Xeon Phi). The popularity of the GPGPU has increased rapidly because of their ability to perform massive amounts of parallel computation quickly and at low cost with an ease of programmability. Also, with the addition of high-level programming …


Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang Aug 2014

Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang

All Dissertations

The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …


Ear Contour Detection And Modeling Using Statistical Shape Models, Satish Ravindran May 2014

Ear Contour Detection And Modeling Using Statistical Shape Models, Satish Ravindran

All Theses

Ear detection is an actively growing area of research because of its applications in human head tracking and biometric recognition. In head tracking, it is used to augment face detectors and to perform pose estimation. In biometric systems, it is used both as an independent modality and in multi-modal biometric recognition. The ear shape is the preferred feature used to perform detection because of its unique structure in both 2D color images and 3D range images. Ear shape models have also been used in literature to perform ear detection, but at a cost of a loss in information about the …


Design Of A Custom Software Application To Monitor And Communicate Cnc Machining Process Information To Aid In Chatter Identification, Valerie Pezzullo May 2014

Design Of A Custom Software Application To Monitor And Communicate Cnc Machining Process Information To Aid In Chatter Identification, Valerie Pezzullo

All Theses

In any manufacturing environment, it is important to be able to monitor the Computer Numerical Control (CNC) machining process so that high quality parts can be produced in the least amount of time in order to be profitable. This involves acquiring the proper parameters needed from the machine's controller, which can prove to be difficult with proprietary machine tools that tend to limit access to the internal data collected by the controller. This closed approach to controller design also means that many technological advances that have recently become prevalent in society are not being adopted in the manufacturing industry, preventing …