Retrospective Case Study And Potential Solutions In Regard To The Object Oriented Design Of Charger Through Various Modeling And Analysis Techniques, 2014 University of Alabama in Huntsville
Retrospective Case Study And Potential Solutions In Regard To The Object Oriented Design Of Charger Through Various Modeling And Analysis Techniques, Jesse Moore
Summer Community of Scholars Posters (RCEU and HCR Combined Programs)
No abstract provided.
Virtualization-Based System Hardening Against Untrusted Kernels, 2014 Singapore Management University
Virtualization-Based System Hardening Against Untrusted Kernels, Yueqiang Cheng
Dissertations and Theses Collection (Open Access)
Applications are integral to our daily lives to help us processing sensitive I/O data, such as individual passwords and camera streams, and private application data, such as financial information and medical reports. However, applications and sensitive data all surfer from the attacks from kernel rootkits in the traditional architecture, where the commodity OS that is supposed to be the secure foothold of the system is routinely compromised due to the large code base and the broad attack surface. Fortunately, the virtualization technology has significantly reshaped the landscape of the modern computer system, and provides a variety of new opportunities for …
Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, 2014 Edith Cowan University
Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Efstratios Skafidas, Kamal Alameh
Research outputs 2014 to 2021
In this paper, we propose and experimentally demonstrate reconfigurable card-to-card optical wireless interconnects architecture with 16-Carrierless-Amplitude/Phase modulation. Results show that 3×40 Gb/s interconnection is achieved with 2 mW transmission power.
Using Acl2 To Verify Loop Pipelining In Behavioral Synthesis, 2014 Portland State University
Using Acl2 To Verify Loop Pipelining In Behavioral Synthesis, Disha Puri, Sandip Ray, Kecheng Hao, Fei Xie
Civil and Environmental Engineering Faculty Publications and Presentations
Behavioral synthesis involves compiling an Electronic System-Level (ESL) design into its RegisterTransfer Level (RTL) implementation. Loop pipelining is one of the most critical and complex transformations employed in behavioral synthesis. Certifying the loop pipelining algorithm is challenging because there is a huge semantic gap between the input sequential design and the output pipelined implementation making it infeasible to verify their equivalence with automated sequential equivalence checking techniques. We discuss our ongoing effort using ACL2 to certify loop pipelining transformation. The completion of the proof is work in progress. However, some of the insights developed so far may already be of …
Design And Implementation Of E-Commerce Site For Online Shopping, 2014 Governors State University
Design And Implementation Of E-Commerce Site For Online Shopping, Sidhartha Reddy Vatrapu
All Capstone Projects
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Shopping is a lifestyle e-commerce web application, which retails various fashion and lifestyle products (Currently Men’s Wear). This project allows viewing various products available enables registered users to purchase desired products instantly using PayPal payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to …
Uos : A Resource Rerouting Middleware For Ubiquitous Games, 2013 Universidde de Brasilia
Uos : A Resource Rerouting Middleware For Ubiquitous Games, Fabricio N. Buzeto, Miriam A M Capretz, Carla D. Castanho, Ricardo P. Jacobi
Electrical and Computer Engineering Publications
Ubiquitous computing (ubicomp) relies on the computation distributed over the environment to simplify the tasks performed by its users. A smart space is an instance of a ubiquitous environment, composed of a dynamic and heterogeneous set of devices that interact to support the execution of distributed smart applications. In this context, mobile devices provide new resources when they join the environment, which disappear when they leave it. This introduces the challenge of self-adaptation, in which smart applications may either include new resources as they become available or replace them when they become unavailable. Ubiquitous games combine ubicomp and computer game …
In Perfect Xen, A Performance Study Of The Emerging Xen Scheduler, 2013 California Polytechnic State University, San Luis Obispo
In Perfect Xen, A Performance Study Of The Emerging Xen Scheduler, Ryan Hnarakis
Master's Theses
Fifty percent of Fortune 500 companies trust Xen, an open-source bare-metal hypervisor, to virtualize their websites and mission critical services in the cloud. Providing superior fault tolerance, scalability, and migration, virtualization allows these companies to run several isolated operating systems simultaneously on the same physical server. These isolated operating systems, called virtual machines, require a virtual traffic guard to cooperate with one another. This guard known as the Credit2 scheduler along with the newest Xen hypervisor was recently developed to supersede the older schedulers. Since wasted CPU cycles can be costly, the Credit2 prototype must undergo significant performance validation before …
A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, 2013 University of Arkansas, Fayetteville
A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews
Graduate Theses and Dissertations
The aftermath of a natural disaster is typically characterized by lack of a reliable medium for dissemination of information to survivors. Current state-of-the-art emergency response systems rely on satellite radio-enabled devices, but survivors, unlike first responders, do not have access to such devices. To mitigate this problem, we present PERPETUU a solar-powered portable GIS microserver. The microserver node can be deployed in a disaster scene, and can serve maps to survivors viewable on browsers of off-the-shelf mobile systems. A key innovation in the design of the PERPETUU node is a multi-tiered hardware architecture-the system combines a low-power micro-controller, a medium-power …
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, 2013 Florida International University
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin
FIU Electronic Theses and Dissertations
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, 2013 The University of Western Ontario
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Designing An Mis Database For Selection And Recruitment, 2013 SelectedWorks
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, 2013 University of Kentucky
A Robust Rgbd Slam System For 3d Environment With Planar Surfaces, Po-Chang Su, Ju Shen, Sen-Ching S. Cheung
Computer Science Faculty Publications
With the increasing popularity of RGB-depth (RGB-D) sensors such as the Microsoft Kinect, there have been much research on capturing and reconstructing 3D environments using a movable RGB-D sensor. The key process behind these kinds of simultaneous location and mapping (SLAM) systems is the iterative closest point or ICP algorithm, which is an iterative algorithm that can estimate the rigid movement of the camera based on the captured 3D point clouds. While ICP is a well-studied algorithm, it is problematic when it is used in scanning large planar regions such as wall surfaces in a room. The lack of depth …
Conferencesense: Monitoring Of Public Events Using Phone Sensors, 2013 Singapore Management University
Conferencesense: Monitoring Of Public Events Using Phone Sensors, Vigneshwaran Subbaraju, Amit Kumar, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, Archan Misra
Research Collection School Of Computing and Information Systems
We explore the use of a participatory sensing paradigm, where data generated from individual smartphones is used to extract and understand collective properties of temporary public gatherings and events (e.g., concerts & conferences). We focus on the use of this paradigm at a technical conference, and describe the design, implementation and deployment of ConferenceSense, an application that uses multiple sensor and human-generated inputs from attendees' smartphones to infer context, such as the start time of a session or the degree of interaction during a tea break. Based on data collected from multiple attendees at a 3-day conference, we explore how …
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, 2013 Loyola University Chicago
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
George K. Thiruvathukal
Recent changes in the environment of Loyola University Chicago’s Department of Computer Science include a better differentiation of our four undergraduate majors, growing interest in computing among science majors, and an increased demand for graduates with mobile and cloud skills. In our continued effort to incorporate parallel and distributed computing topics into the undergraduate curriculum, we are focusing on these three existing courses: CS1: In response to a request from the physics department, we started to offer a CS1 section aimed at majors in physics and other hard sciences this spring semester. This section includes some material on numerical methods …
Network Technologies Used To Aggregate Environmental Data, 2013 Loyola University Chicago
Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
The goal of the Loyola Weather Service (lws) project is to design and build a system of functioning environmental monitoring widgets that can intelligently and autonomously control the environment around them based on set thresholds and triggers. The widgets will also have the ability to aggregate their data and easily display this data in various ways: through a user interface in the room that the widget is placed, via a web application, and programmatically via a RESTful web service.
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, 2013 Loyola University Chicago
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
We explore the application of clusters of commodity tablet devices to problems spanning a “trilogy” of concerns: visualization, sensing, and computation. We conjecture that such clusters provide a low-cost, energy-efficient, flexible, and ultimately effective platform to tackle a wide range of problems within this trilogy. This is a work in progress, and we now elaborate our position and give a preliminary status report. A wide range of Android tablet devices are available in terms of price and capabilities. “You get what you pay for” w.r.t. display resolution, sensors, and chipset---corresponding to the trilogy. $200 gets one a 1280x800-pixel touch display, …
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, 2013 Carnegie Mellon University
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Ole J Mengshoel
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, 2013 Loyola University Chicago
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
Recent changes in the environment of Loyola University Chicago’s Department of Computer Science include a better differentiation of our four undergraduate majors, growing interest in computing among science majors, and an increased demand for graduates with mobile and cloud skills. In our continued effort to incorporate parallel and distributed computing topics into the undergraduate curriculum, we are focusing on these three existing courses:
CS1: In response to a request from the physics department, we started to offer a CS1 section aimed at majors in physics and other hard sciences this spring semester. This section includes some material on numerical methods …
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, 2013 Loyola University Chicago
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
We explore the application of clusters of commodity tablet devices to problems spanning a “trilogy” of concerns: visualization, sensing, and computation. We conjecture that such clusters provide a low-cost, energy-efficient, flexible, and ultimately effective platform to tackle a wide range of problems within this trilogy. This is a work in progress, and we now elaborate our position and give a preliminary status report.
A wide range of Android tablet devices are available in terms of price and capabilities. “You get what you pay for” w.r.t. display resolution, sensors, and chipset---corresponding to the trilogy. $200 gets one a 1280x800-pixel touch display, …
Network Technologies Used To Aggregate Environmental Data, 2013 Loyola University Chicago
Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
The goal of the Loyola Weather Service (lws) project is to design and build a system of functioning environmental monitoring widgets that can intelligently and autonomously control the environment around them based on set thresholds and triggers. The widgets will also have the ability to aggregate their data and easily display this data in various ways: through a user interface in the room that the widget is placed, via a web application, and programmatically via a RESTful web service.