Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2010

Institution
Keyword
Publication

Articles 1 - 30 of 60

Full-Text Articles in Engineering

Dynamic Distributed Programming And Applications To Swap Edge Problem, Feven Z. Andemeskel Dec 2010

Dynamic Distributed Programming And Applications To Swap Edge Problem, Feven Z. Andemeskel

UNLV Theses, Dissertations, Professional Papers, and Capstones

Link failure is a common reason for disruption in communication networks. If communication between processes of a weighted distributed network is maintained by a spanning tree T, and if one edge e of T fails, communication can be restored by finding a new spanning tree, T’. If the network is 2-edge connected, T’ can always be constructed by replacing e by a single edge, e’, of the network. We refer to e’ as a swap edge of e.


The best swap edge problem is to find the best choice of e’, that is, that e which causes the new spanning …


Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti Dec 2010

Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti

UNLV Theses, Dissertations, Professional Papers, and Capstones

The leader election problem is one of the fundamental problems in distributed computing. It has applications in almost every domain. In dynamic networks, topology is expected to change frequently. An algorithm A is self-stabilizing if, starting from a completely arbitrary configuration, the network will eventually reach a legitimate configuration.

Note that any self-stabilizing algorithm for the leader election problem is also an algorithm for the dynamic leader election problem, since when the topology of the network changes, we can consider that the algorithm is starting over again from an arbitrary state. There are a number of such algorithms in the …


Self-Stabilizing Group Membership Protocol, Mahesh Subedi Dec 2010

Self-Stabilizing Group Membership Protocol, Mahesh Subedi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we consider the problem of partitioning a network into groups of bounded diameter.

Given a network of processes X and a constant D, the group partition problem is the problem of finding a D-partition of X, that is, a partition of X into disjoint connected subgraphs, which we call groups, each of diameter no greater than D. The minimal group partition problem is to find a D-partition {G1, ... Gm} of X such that no two groups can be combined; that is, for any Gi and Gj, where i ≠ j, either Gi U Gj is disconnected …


Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam Oct 2010

Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam

Electrical & Computer Engineering Theses & Dissertations

The research project related to this thesis focuses on the optimization of electrical systems for offshore wind farms for a given capacity. The optimal design and planning is a critical issue for developing cost effectively Offshore Wind Farms in energy systems. The Geometric Optimization Algorithms approach has been adopted to develop an optimization program, where the main components of the electrical system of an offshore wind farm and key technical specifications are used as parameters to be optimized for a minimum cost with necessary constraints. The effectiveness of the optimization program can be evaluated with real-time comparison between offshore wind …


Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen Oct 2010

Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen

Electrical & Computer Engineering Theses & Dissertations

A wavelet neural network (WNN) technique rs developed for electroencephalogram (EEG) artifact removal without electrooculographic (EOG) recordings. The algorithm combines the universal approximation characteristics of neural networks and the time/frequency property of wavelet, where the neural network was trained on a simulated dataset with known ground truths. The contribution of this thesis is two-fold. First, many EEG artifact removal algorithms, including regression based methods, require reference EOG signals, which are not always available. To remove EEG ai1ifacts, a WNN tries to learn the characteristics of the artifacts first and does not need reference EOG signals once trained. Second, WNNs are …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy Aug 2010

Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy

USF Tampa Graduate Theses and Dissertations

Power gating is a technique commonly used for runtime leakage reduction in digital CMOS circuits. In microprocessors, power gating can be implemented by using sleep transistors to selectively deactivate circuit modules when they are idle during program execution. In this dissertation, a framework for power gating arithmetic functional units in embedded microprocessors with architecture and compiler support is proposed. During compile time, program regions are identified where one or more functional units are idle and sleep instructions are inserted into the code so that those units can be put to sleep during program execution. Subsequently, when their need is detected …


Asynchronous Mips Processors: Educational Simulations, Robert L. Webb Aug 2010

Asynchronous Mips Processors: Educational Simulations, Robert L. Webb

Master's Theses

The system clock has been omnipresent in most mainstream chip designs. While simplifying many design problems the clock has caused the problems of clock skew, high power consumption, electromagnetic interference, and worst-case performance. In recent years, as the timing constraints of synchronous designs have been squeezed ever tighter, the efficiencies of asynchronous designs have become more attractive. By removing the clock, these issues can be mitigated. How- ever, asynchronous designs are generally more complex and difficult to debug. In this paper I discuss the advantages of asynchronous processors and the specifics of some asynchronous designs, outline the roadblocks to asynchronous …


St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri Aug 2010

St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri

Master's Theses

Medical devices used for surgical or therapeutic purposes require a high degree of safety and effectiveness. Software is critical component of many such medical devices. The software architecture of a system defines organizational structure and the runtime characteristic of the application used to control the operation of the system and provides a set of frameworks that are used to develop that. As such, the design of software architecture is a critical element in achieving the intended functionality, performance, and safety requirements of a medical device. This architecture uses object-oriented design techniques, which model the underlying system as a set of …


A Neighborhood Dependent Nonlinear Technique For Enhancement Of Color Images Captured Under Non-Uniform Lighting Conditions, Rupal Patel Jul 2010

A Neighborhood Dependent Nonlinear Technique For Enhancement Of Color Images Captured Under Non-Uniform Lighting Conditions, Rupal Patel

Electrical & Computer Engineering Theses & Dissertations

The aim of image enhancement process is to improve the interpretability of the information in images for human viewers or to provide better input for automated image processing techniques. Many image processing applications begin with a nonlinear enhancement process to improve visual quality of video sequences captured under nonuniform lighting conditions. This improves the visibility of the scene captured from physical sensing devices which have limited dynamic range. This physical limitation causes the saturated region of the image to either shadow out or wash out the rest of the scene. When extremely bright and dark regions are present in an …


Action Recognition Based On Multi-Level Representation Of 3d Shape, Binu M. Nair Jul 2010

Action Recognition Based On Multi-Level Representation Of 3d Shape, Binu M. Nair

Electrical & Computer Engineering Theses & Dissertations

A novel algorithm is proposed in this thesis for recognizing human actions using a combination of two shape descriptors, one of which is a 3D Euclidean distance transform and the other based on the Radon transform. This combination captures the necessary variations from the space time shape for recognizing actions. The space time shapes are created by the concatenation of human body silhouettes across time. The comparisons are done against some common shape descriptors such as the zernike moments and Radon transform. This is also compared with an algorithm which uses the same concept of a space time shape and …


The Executable Command In Support Of Scheduled Subroutine Calls, Andrew Scott Lewis Jul 2010

The Executable Command In Support Of Scheduled Subroutine Calls, Andrew Scott Lewis

Electrical & Computer Engineering Theses & Dissertations

A potential solution to improving the utilization of increased thread level parallelism available in modern general purpose CPU's is the inclusion of a hardware scheduler. The hardware scheduler is designed to schedule subroutine calls based on a numerical condition in a high performance memory located on the CPU die, due to which the size of available memory is extremely limited. The main stumbling block in the development of a feasible hardware scheduler is the lack of a method of invoking a scheduled call using a single pointer. The use of a single pointer allows the limited size of the memory …


A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah Jul 2010

A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah

Electrical & Computer Engineering Theses & Dissertations

The goal of the project is to develop and test a "model based" radar processing strategy that is compatible with the concept of a "cognitive radar". The basic approach will be to develop a cognitive radar algorithm (genetic algorithm) based on the capabilities of an existing commercially available Software Radio. While the focus of this effort is the development of a candidate approach for genetic algorithm, the longer term goal would be to implement the approach using this software radio technology to provide a low cost radar processor. The proposed technology would use differential absorption radar working at the 50-56 …


Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek Jun 2010

Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek

Theses and Dissertations

This research proposes two alternative methods for generating semantically equivalent circuit variants which leave the circuit's internal structure pseudo-randomly determined. Component fusion deterministically selects subcircuits using a component identification algorithm and replaces them using a deterministic algorithm that generates canonical logic forms. Component encryption seeks to alter the semantics of individual circuit components using an encoding function, but preserves the overall circuit semantics by decoding signal values later in the circuit. Experiments were conducted to examine the performance of component fusion and component encryption against representative trials of subcircuit selection-and-replacement and Boundary Blurring, two previously defined methods for circuit obfuscation. …


Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart Jun 2010

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart

Theses and Dissertations

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls …


Wii-Mote Head Tracking: A Three Dimensional Virtual Reality Display, David Fairman Jun 2010

Wii-Mote Head Tracking: A Three Dimensional Virtual Reality Display, David Fairman

Computer Engineering

The goal of this project is to create a customizable three dimensional virtual reality display on a system available to any non-technical user. This System will use the infrared camera component of a standard Nintendo Wii-mote to track a user's head motions in all six major directions. The virtual reality will be a customizable image projected onto a screen or simply shown on a computer or TV monitor. In order to appear 3-dimensional, the image will continually change according to the position of the user's head. As the user moves their head to the left and right, portions of the …


Max Flow Spill Code Placement Algorithm Implemented In Gcc 4.4.3, Stephen Robert Beard Jun 2010

Max Flow Spill Code Placement Algorithm Implemented In Gcc 4.4.3, Stephen Robert Beard

Computer Engineering

The placement of spill code plays an important role in the register allocator of an optimizing compiler. Many computer architectures possess a register linkage convention that dictates which registers are preserved across function calls and which are not. This project addresses the problem of optimizing spill code that is associated with register linkage conventions.

This algorithm was created by Dr. Chris Lupo and is described in the paper Beyond Register Allocation: a Novel Algorithm for Spill-Code Placement. The algorithm was implemented for GCC 2.5.7 for a PA-RISC architecture [4]. The work in this project will involve porting the existing code …


Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing, James Boom Jun 2010

Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing, James Boom

Computer Engineering

Given a good model and implementation of that model, computer simulation can be used to reduce the time and material costs of research. To this end I worked with other students to manufacture, test and simulate the single layer P3HT-PCBM solar cell. Using the data collected from this project, future work can then be done with the project's simulator to further optimize these types of solar cell devices.


An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr Jun 2010

An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr

Archived Theses and Dissertations

Enterprise Resource Planning (ERP) solutions provide generic off-the-shelf reference models usually known as "best practices". The configuration !individualization of the reference model to meet specific requirements of business end users however, is a difficult task. The available modeling languages do not provide a complete configurable language that could be used to model configurable reference models. More specifically, there is no algorithm that monitors the transformation of configurable UML Activity Diagram (AD) models while preserving the syntactic correctness of the model. To fill these gaps we propose an extended UML AD modeling language which we named Configurable UML Activity Diagram (C-UML …


Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly Jun 2010

Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly

Archived Theses and Dissertations

Suspended atmospheric particles (particulate matter) are a form of air pollution that visually degrades urban scenery and is hazardous to human health and the environment. Current environmental monitoring devices are limited in their capability of measuring average particulate matter (PM) over large areas. Quantifying the visual effects of haze in digital images of urban scenery and correlating these effects to PM levels is a vital step in more practically monitoring our environment. Current image haze extraction algorithms remove all the haze from the scene and hence produce unnatural scenes for the sole purpose of enhancing vision. We present two algorithms …


Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger May 2010

Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger

Master's Theses

As the Internet continues to expand, the global default-free zone (DFZ) forwarding table has begun to grow faster than hardware can economically keep pace with. Various policies are in place to mitigate this growth rate, but current projections indicate policy alone is inadequate. As such, a number of technical solutions have been proposed. This work builds on many of these proposed solutions, and furthers the debate surrounding the resolution to this problem. It discusses several design decisions necessary to any proposed solution, and based on these tradeoffs it proposes a Hierarchical Inter-Domain Routing Architecture - HIDRA, a comprehensive architecture with …


Pretty Lights, Nicholas (Nick) Delmas, Matthew (Matt) Maniaci Apr 2010

Pretty Lights, Nicholas (Nick) Delmas, Matthew (Matt) Maniaci

Computer Engineering

Digital media players often include a visualization component that allows a user to watch a visualization synchronized to their music or videos. This project uses the visualization plugin API of an existing media playback program (WinAmp) but it displays its visuals using physical LED lights. Instead of outputting visuals to the computer screen, data is sent over USB to a micro controller that runs the LED lights. This project aims to give users a more visceral visual experience than traditional visualizations on the computer screen.


A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim Apr 2010

A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim

UNLV Theses, Dissertations, Professional Papers, and Capstones

Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.

In this thesis, we present a new secure …


How To Improve Project Management For Agile Federation Development, Priyanka Kotikalpudi Apr 2010

How To Improve Project Management For Agile Federation Development, Priyanka Kotikalpudi

Engineering Management & Systems Engineering Theses & Dissertations

Developing a simulation federation out of a variety of heterogeneous simulation solutions is a complex task requiring very effective project management support in order to accomplish the common objectives and goals of this M&S federation. This thesis study conducts a detailed survey of available literature to identify the project management methods that can be extended to be applied to manage the development of simulation systems. The literature review led to the following two main results: (a) in general, there is insufficient literature dealing with M&S challenges for project management, (b) in particular, the two challenges of often changing requirements leading …


Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed Apr 2010

Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed

Electrical & Computer Engineering Theses & Dissertations

A new face recognition algorithm using a synthetic discriminant function based shifted phase-encoded fringe-adjusted joint transform correlation (SDF-SPFJTC) technique is proposed. The dark region in an input image is enhanced by using a nonlinear technique named ratio enhancement in gaussian neighborhood (REIGN). Histogram equalization and Gaussian smoothing are then performed to the enhanced face images and the synthetic discriminant function (SDF) image before they are subjected to the joint transform correlation process. The two distinct correlation peaks produced on extreme ends of the SPFJTC plane signifies the recognition of a potential target. A post processing step utilizes the peak-to-clutter ratio …


A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur Apr 2010

A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur

Electrical & Computer Engineering Theses & Dissertations

Genetic Algorithms find several applications in a variety of fields, such as engineering, management, finance, chemistry, scheduling, data mining and so on, where optimization plays a key role. This technique represents a numerical optimization technique that is modeled after the natural process of selection based on the Darwinian principle of evolution. The Genetic Algorithm (GA) is one among several optimization techniques and attempts to obtain the desired solution by generating a set of possible candidate solutions or populations. These populations are then compared and the best solutions from the set are retained. Subsequently, new candidate solutions are produced, and the …


Selective Phase-Based De-Weathering (Spdw), Christopher Morris Apr 2010

Selective Phase-Based De-Weathering (Spdw), Christopher Morris

Electrical & Computer Engineering Theses & Dissertations

No Abstract.


Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan Apr 2010

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan

Computer Science Theses & Dissertations

Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai Mar 2010

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …