Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10411 - 10440 of 12810

Full-Text Articles in Physical Sciences and Mathematics

Ceg 720-01: Computer Architecture I, Soon M. Chung Apr 2009

Ceg 720-01: Computer Architecture I, Soon M. Chung

Computer Science & Engineering Syllabi

Review of sequential computer architecture and study of parallel computers. Topics include memory hierarchy, reduced instruction set computer, pipeline processing, multiprocessing, various parallel computers, interconnection networks, and fault-tolerant computing.


Ceg 479/679-01: Computer Animation, Thomas Wischgoll Apr 2009

Ceg 479/679-01: Computer Animation, Thomas Wischgoll

Computer Science & Engineering Syllabi

By the end of this quarter, you will have learnt techniques for designing various models and algorithms for animation of such models as well as theur rendering using OpenGL and CIC++.


Ceg 463/663-01: The Personal Software Development Process, John A. Reisner Apr 2009

Ceg 463/663-01: The Personal Software Development Process, John A. Reisner

Computer Science & Engineering Syllabi

In this course, you will learn about more about one particular way to address some of the challenges and issues associated with successful software development. Specifically, you will learn and use the Personal Software Process (PSP), designed to help individual software practitioners become more adept at their craft through the use of project planning, project tracking, defect analysis, review and verification activities, software measurement, and process management. This course-and the PSP-are somewhat unique in that they aim to help software engineers become more successful, not by examining issues associated with large-scale development (as is the case with many software engineering …


Ceg 433/633-01: Operating Systems, Prabhaker Mateti Apr 2009

Ceg 433/633-01: Operating Systems, Prabhaker Mateti

Computer Science & Engineering Syllabi

Overview of operating systems internals. File-system usage and design, process usage and control, virtual memory, multi user systems, access control. Course projects use C++ language. 4 Credit Hours. Three hours lecture, two hours lab. Prerequisites: CEG 320 and CS 400


Ceg 429/629-01: Internet Security, Prabhaker Mateti Apr 2009

Ceg 429/629-01: Internet Security, Prabhaker Mateti

Computer Science & Engineering Syllabi

Introduction to security issues arising primarily from computer networks. Topics include node and service authentication, address spoofing, hijacking, SYN floods, smurfing, sniffing, routing tricks, and privacy of data en route. Buffer overruns and other exploitation of software development errors. Hardening of operating systems. Intrusion detection. Firewalls. Ethics. Prerequisites: CEG 433


Ceg 320/520-01: Computer Organization, Michael L. Raymer Apr 2009

Ceg 320/520-01: Computer Organization, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 220-01: Introduction To C Programming For Engineers, Jay Dejongh Apr 2009

Ceg 220-01: Introduction To C Programming For Engineers, Jay Dejongh

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics). The course includes a scheduled laboratory section for which you must register.


Ceg 211-01: Pc Networking Ii, Karen Meyer Apr 2009

Ceg 211-01: Pc Networking Ii, Karen Meyer

Computer Science & Engineering Syllabi

The goal of this course is to prepare students for the real-world challenges of a networking professional. It is designed for students interested in network and server administration. The text includes extensive hands-on projects, exercises, and review questions in each chapter, which reinforce network administration skills as they are learned. Case projects at the end of each chapter allow students to take on the role of a network administrator, making decisions and troubleshooting real-life problems. Specific topic coverage includes: network administration and management, administering active directory, managing group policy, administering file resources, administering web resources in windows server 2003, administering …


Ceg 210-01: Pc Networking I, Karen Meyer Apr 2009

Ceg 210-01: Pc Networking I, Karen Meyer

Computer Science & Engineering Syllabi

Introduction to networking technologies including infrastructure and architectures, standards, protocols and directory services, administration, security and management. Integrated lecture and lab.


Tree-D-Seek: A Framework For Retrieving Three-Dimensional Scenes, Saurav Mazumdar Apr 2009

Tree-D-Seek: A Framework For Retrieving Three-Dimensional Scenes, Saurav Mazumdar

Electrical & Computer Engineering Theses & Dissertations

In this dissertation, a strategy and framework for retrieving 3D scenes is proposed. The strategy is to retrieve 3D scenes based on a unified approach for indexing content from disparate information sources and information levels. The TREE-D-SEEK framework implements the proposed strategy for retrieving 3D scenes and is capable of indexing content from a variety of corpora at distinct information levels. A semantic annotation model for indexing 3D scenes in the TREE-D-SEEK framework is also proposed. The semantic annotation model is based on an ontology for rapid prototyping of 3D virtual worlds.

With ongoing improvements in computer hardware and 3D …


A Hurricane Evacuation Route System Real-Time Monitoring And Distribution Of Load, Anup Khanal Apr 2009

A Hurricane Evacuation Route System Real-Time Monitoring And Distribution Of Load, Anup Khanal

Electrical & Computer Engineering Theses & Dissertations

Hurricane evacuation is one of the major steps in diminishing the devastating effects of hurricanes on lives and properties. The challenge in evacuating a large number of people in a short time is the severe congestion faced in the transportation network, leading to long delays and shortages. Standard hurricane evacuation plans focus on how to best utilize the main arteries. The research challenge is to not overload the fastest routes and to utilize all the routes efficiently. The evacuation routing system proposed in this thesis focuses on distributing the traffic load throughout the network, utilizing alternative routes not considered in …


A Hidden Markov Model Based Approach To Detect Rogue Access Points, Gayathri Shivaraj Apr 2009

A Hidden Markov Model Based Approach To Detect Rogue Access Points, Gayathri Shivaraj

Electrical & Computer Engineering Theses & Dissertations

One of the most challenging security concerns for network administrators is the presence of Rogue access points. The challenge is to detect and disable a Rogue access point before it can cause hazardous damage to the network. This thesis proposes a statistically based approach to detect Rogue access points using a Hidden Markov Model, which is applied to passively measure packet-header data collected at a gateway router or any monitoring point. This approach utilizes variations in packet inter-arrival time to differentiate between authorized access points and Rouge access points. This approach used the inter-arrival time of a packet as a …


A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly Mar 2009

A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly

Theses and Dissertations

Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity …


Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy Mar 2009

Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy

Theses and Dissertations

With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …


Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen Mar 2009

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen

Theses and Dissertations

This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner Mar 2009

Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner

Theses and Dissertations

Multiple-target tracking (MTT) systems have been implemented on many different platforms, however these solutions are often expensive and have long development times. Such MTT implementations require custom hardware, yet offer very little flexibility with ever changing data sets and target tracking requirements. This research explores how to supplement and enhance MTT performance with an existing graphics processing unit (GPU) on a general computing platform. Typical computers are already equipped with powerful GPUs to support various games and multimedia applications. However, such GPUs are not currently being used in desktop MTT applications. This research explores if and how a GPU can …


Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez Mar 2009

Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez

Theses and Dissertations

Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …


A Neutral Network Based Vehicle Classification System For Pervasive Smart Road Security, Naixue Xiong, Jing (Selena) He, Jong Hyuk Park, Donald Cooley Mar 2009

A Neutral Network Based Vehicle Classification System For Pervasive Smart Road Security, Naixue Xiong, Jing (Selena) He, Jong Hyuk Park, Donald Cooley

Faculty Articles

Pervasive smart computing environments make people get accustomed to convenient and secure services. The overall goal of this research is to classify vehicles along the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs and the expected life of a roadway. The classification of vehicles will be performed by a synthesis of multiple sets of features. All feature sets have not yet been determined; however, one such set will be the reduced wavelet transform of the image of a vehicle. In order to use such a feature, it is necessary that the …


Visual Word Proximity And Linguistics For Semantic Video Indexing And Near-Duplicate Retrieval, Yu-Gang Jiang, Chong-Wah Ngo Mar 2009

Visual Word Proximity And Linguistics For Semantic Video Indexing And Near-Duplicate Retrieval, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Bag-of-visual-words (BoW) has recently become a popular representation to describe video and image content. Most existing approaches, nevertheless, neglect inter-word relatedness and measure similarity by bin-to-bin comparison of visual words in histograms. In this paper, we explore the linguistic and ontological aspects of visual words for video analysis. Two approaches, soft-weighting and constraint-based earth mover’s distance (CEMD), are proposed to model different aspects of visual word linguistics and proximity. In soft-weighting, visual words are cleverly weighted such that the linguistic meaning of words is taken into account for bin-to-bin histogram comparison. In CEMD, a cross-bin matching algorithm is formulated such …


Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez Feb 2009

Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez

Theses and Dissertations

Adaptive optics applies advanced sensing and control to improve the ability of optical systems to collect images through a turbulent atmosphere. The results of this research effort demonstrate that the combination of two recent approaches improves the performance of adaptive optics in directed energy and laser communication scenarios. The first approach is adaptive control, which offers improved performance over fixed-gain controllers in the presence of rapidly changing turbulence. The second approach incorporated into the study is a dual-mirror system. The two mirrors are a high-bandwidth, low-actuator-stroke (tweeter) mirror and a low-bandwidth, large actuator-stroke (woofer) mirror. The woofer-tweeter combination allows for …


Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel Feb 2009

Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel

Theses and Dissertations

This thesis examines techniques to automate configuration of an intrusion detection system utilizing hardware-assisted virtualization. These techniques are used to detect the version of a running guest operating system, automatically configure version-specific operating system information needed by the introspection library, and to locate and monitor important operating system data structures. This research simplifies introspection library configuration and is a step toward operating system independent introspection. An operating system detection algorithm and Windows virtual machine system service dispatch table monitor are implemented using the Xen hypervisor and a modified version of the XenAccess library. All detection and monitoring is implemented from …


An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader Feb 2009

An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader

Theses and Dissertations

This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and tracking the illicit dissemination of sensitive government information using file sharing applications within a target network, and tracking terrorist cells or criminal organizations that are covertly communicating using VoIP applications. A digital forensic tool is developed using an FPGA-based embedded software application. The tool is designed to process file transfers using the BitTorrent peer-to-peer protocol and VoIP phone calls made using the Session …


Learning Image‐Text Associations, Tao Jiang, Ah-Hwee Tan Feb 2009

Learning Image‐Text Associations, Tao Jiang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Web information fusion can be defined as the problem of collating and tracking information related to specific topics on the World Wide Web. Whereas most existing work on Web information fusion has focused on text-based multidocument summarization, this paper concerns the topic of image and text association, a cornerstone of cross-media Web information fusion. Specifically, we present two learning methods for discovering the underlying associations between images and texts based on small training data sets. The first method based on vague transformation measures the information similarity between the visual features and the textual features through a set of predefined domain-specific …


Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole Feb 2009

Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this expected new cohort is to have more practical impact than did its 1990s counterpart, a robust and widely applicable framework will be required that encompasses exactly what, if anything, is hard about parallel programming. This paper revisits the fundamental precepts of concurrent …


Programmer Friendly Refactoring Tools, Emerson Murphy-Hill Feb 2009

Programmer Friendly Refactoring Tools, Emerson Murphy-Hill

Dissertations and Theses

Tools that perform semi-automated refactoring are currently under-utilized by programmers. If more programmers adopted refactoring tools, software projects could make enormous productivity gains. However, as more advanced refactoring tools are designed, a great chasm widens between how the tools must be used and how programmers want to use them. This dissertation begins to bridge this chasm by exposing usability guidelines to direct the design of the next generation of programmer-friendly refactoring tools, so that refactoring tools fit the way programmers behave, not vice-versa.


Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal Jan 2009

Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal

Conference Papers

Semantic interoperability between electronic health record systems and other information systems in the health domain implies agreement about the structure and the meaning of the information that is communicated. There are still a number of similar but different EHR system approaches. Some of the newer approaches adopt the two-layer model approach where a generic reference model is constrained by archetypes into valid clinical concepts which can be exchanged. The meaning of the concepts that are represented by an archetype can be conveyed by embedding codes from a commonly recognised terminology at appropriate points in the archetype. However, as the number …


3d Reconstruction Using Multi-View Imaging System, Conglin Huang Jan 2009

3d Reconstruction Using Multi-View Imaging System, Conglin Huang

University of Kentucky Master's Theses

This thesis presents a new system that reconstructs the 3D representation of dental casts. To maintain the integrity of the 3D representation, a standard model is built to cover the blind spots that the camera cannot reach. The standard model is obtained by scanning a real human mouth model with a laser scanner. Then the model is simplified by an algorithm which is based on iterative contraction of vertex pairs. The simplified standard model uses a local parametrization method to obtain the curvature information. The system uses a digital camera and a square tube mirror in front of the camera …


Toward The Human-Robot Co-Existence Society: On Safety Intelligence For Next Generation Robots, Chien Hsun Chen, Y. H. Weng, C. T. Sun Jan 2009

Toward The Human-Robot Co-Existence Society: On Safety Intelligence For Next Generation Robots, Chien Hsun Chen, Y. H. Weng, C. T. Sun

Chien Hsun Chen

Technocrats from many developed countries, especially Japan and South Korea, are preparing for the human-robot co-existence society that they believe will emerge by 2030. Regulators are assuming that within the next two decades, robots will be capable of adapting to complex, unstructured environments and interacting with humans to assist with the performance of daily life tasks. Unlike heavily regulated industrial robots that toil in isolated settings, Next Generation Robots will have relative autonomy, which raises a number of safety issues that are the focus of this article. Our purpose is to describe a framework for a legal system focused on …


Scheduling Design With Unknown Execution Time Distributions Or Modes, Robert Glaubius, Terry Tidwell, Christopher Gill, William D. Smart Jan 2009

Scheduling Design With Unknown Execution Time Distributions Or Modes, Robert Glaubius, Terry Tidwell, Christopher Gill, William D. Smart

All Computer Science and Engineering Research

Open soft real-time systems, such as mobile robots, experience unpredictable interactions with their environments and yet must respond both adaptively and with reasonable temporal predictability. Because of the uncertainty inherent in such interactions, many of the assumptions of the real-time scheduling techniques traditionally used to ensure predictable timing of system actions do not hold in those environments. In previous work we have developed novel techniques for scheduling policy design where up-front knowledge of execution time distributions can be used to produce both compact representations of resource utilization state spaces and efficient optimal scheduling policies over those state spaces. This paper …