Using Principle Component Analysis To Analyze Tertiary And Quaternary Spectral Mixtures, 2019 Olivet Nazarene University
Using Principle Component Analysis To Analyze Tertiary And Quaternary Spectral Mixtures, David Burnett
Scholar Week 2016 - present
CRISM images from Mars are expected to contain carbonates such as magnesite. Prior research has been successfully able to determine the approximate percent composition of phyllosilicates in binary lab mixtures using Principle Component Analysis (PCA). In order to expand this model to work on CRISM images, one of preliminary steps is allowing the algorithm to work on mixtures with more than two components, which was the primary purpose of this research.
An Application Of Artificial General Intelligence In Board Games, 2019 University of Nebraska at Omaha
An Application Of Artificial General Intelligence In Board Games, Nathan Skalka
Computer Science Graduate Research Workshop
No abstract provided.
Modern Yard Sale Application, 2019 California Polytechnic State University, San Luis Obispo
Modern Yard Sale Application, Lauren Epling, Matthew Piasecki
YardSail is a modern application that provides users a place to post and view local Yard Sales. There is an astounding need for a safe space where users can comfortably post their yard sale address and items for all locals to easily see (without needing to drive down a specific street to find out). Currently, there does not exist an application for users that accomplishes what we set out to accomplish. As a team, we truly believe YardSail could be a popular application that helps users sail through the experience of hosting or visiting a yard sale.
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, 2019 St George Police Department
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists ...
A Framework For Evaluating Model-Driven Self-Adaptive Software Systems, 2019 Dublin Institute of Technology
A Framework For Evaluating Model-Driven Self-Adaptive Software Systems, Basel Magableh
In the last few years, Model Driven Development (MDD), Component-based Software Development (CBSD), and context-oriented software have become interesting alternatives for the design and construction of self-adaptive software systems. In general, the ultimate goal of these technologies is to be able to reduce development costs and effort, while improving the modularity, flexibility, adaptability, and reliability of software systems. An analysis of these technologies shows them all to include the principle of the separation of concerns, and their further integration is a key factor to obtaining high-quality and self-adaptable software systems. Each technology identifies different concerns and deals with them separately ...
A Deep Recurrent Q Network Towards Self-Adapting Distributed Microservices Architecture (In Press), 2019 Dublin Institute of Technology
A Deep Recurrent Q Network Towards Self-Adapting Distributed Microservices Architecture (In Press), Basel Magableh
One desired aspect of microservices architecture is the ability to self-adapt its own architecture and behaviour in response to changes in the operational environment. To achieve the desired high levels of self-adaptability, this research implements the distributed microservices architectures model, as informed by the MAPE-K model. The proposed architecture employs a multi adaptation agents supported by a centralised controller, that can observe the environment and execute a suitable adaptation action. The adaptation planning is managed by a deep recurrent Q-network (DRQN). It is argued that such integration between DRQN and MDP agents in a MAPE-K model offers distributed microservice architecture ...
Context Oriented Software Middleware, 2019 Dublin Institute of Technology
Context Oriented Software Middleware, Basel Magableh
This article proposes a new paradigm for building an adaptive middleware that supports software systems with self-adaptability and dependability. In this article, we wish to explore how far we can support the engineering of self- adaptive applications using a generic and platform-independent middleware architecture provided by non-specialised programming languages such as Context-Oriented Programming (COP), and Aspect-Oriented Programming (AOP), and not limited to a specific platform or framework. This gives the software developers the flexibility to construct a self-adaptive application using a generic and reusable middleware components that employ popular design patterns, instead of forcing the software developers to use a ...
Deep Q Learning For Self Adaptive Distributed Microservices Architecture (In Press), 2019 Dublin Institute of Technology
Deep Q Learning For Self Adaptive Distributed Microservices Architecture (In Press), Basel Magableh
One desired aspect of a self-adapting microservices architecture is the ability to continuously monitor the operational environment, detect and observe anomalous behavior, and provide a reasonable policy for self-scaling, self-healing, and self-tuning the computational resources in order to dynamically respond to a sudden change in its operational environment. The behaviour of a microservices architecture is continuously changing overtime, which makes it a challenging task to use a statistical model to identify both the normal and abnormal behaviour of the services running. The performance of the microservices cluster could fluctuate around the demand to accommodate scalability, orchestration and load balancing demands ...
A Multiline Anchor Concept For Floating Offshore Wind Turbines, 2019 University of Massachusetts Amherst
A Multiline Anchor Concept For Floating Offshore Wind Turbines, Casey Fontana
Floating offshore wind turbines (FOWTs) hold great potential for the renewable energy industry, but capital costs remain high. In efforts to increase FOWT substructure efficiency and reduce costs, this thesis investigates a novel multiline anchor concept in which FOWTs share anchors instead of being moored separately. The goal of this thesis is to evaluate the force dynamics, design, and potential cost reduction of the system. Anchor forces are simulated using the NREL 5 MW reference turbine and OC4-DeepCwind semisubmersible platform, and multiline anchor force is computed as the vector sum of the contributing mooring line tensions.
The use of a ...
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, 2018 Wojciech Budzianowski Consulting Services
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
No abstract provided.
Elevated Temperature Progressive Damage And Failure Of Duplex Stainless Steel, 2018 University of New Mexico - Main Campus
Elevated Temperature Progressive Damage And Failure Of Duplex Stainless Steel, Darren P. Luke
Civil Engineering ETDs
Ductile failure of metals has been the focus of research efforts within academia and industry for many years since it is tremendously important for understanding the failure of structures under extreme loading conditions. However, limited research has been dedicated to elevated temperature ductile failure, which is critical for evaluating catastrophic events such as industrial, structural or shipping vessel fires. A detailed investigation was conducted on the structural response of Duplex Stainless Steel at elevated temperatures. The temperature dependence of elastic modulus, yield strength, ultimate strength, and ductility was measured up to 1000°C and a continuum damage plasticity model was ...
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, 2018 The University of Western Ontario
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...
Variable Input Observer For Nonstationary High-Rate Dynamic Systems, 2018 Iowa State University
Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce
Civil, Construction and Environmental Engineering Publications
Engineering systems experiencing events of amplitudes higher than 100 gn for a duration under 100 ms, here termed high-rate dynamics, can undergo rapid damaging effects. If the structural health of such systems could be accurately estimated in a timely manner, preventative measures could be employed to minimize adverse effects. For complex high-rate problems, adaptive observers have shown promise due to their capability to deal with nonstationary, noisy, and uncertain systems. However, adaptive observers have slow convergence rates, which impede their applicability to the high-rate problems. To improve on the convergence rate, we propose a variable input space concept for ...
A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, 2018 The University of Southern Mississippi
A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver
DEET is a common active ingredient in most spatial repellents. DEET is also a volatile organic compound. DEET prevents mosquitoes from detecting and coming into contact with an human individual. Gas sensing technologies such as metal oxide semiconductor sensors can detect VOCs. The World Health Organization provides the majority of efficacy testing methods. This research adapts methods from the WHO and use of MOS sensors to further understand how and why DEET affects mosquitos. A custom developed system is used to measure DEET dissipation and observe mosquito behavioral response to the DEET. DEET dissipations and mosquito behavior is measured within ...
A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, 2018 University of Arkansas, Fayetteville
A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, Jace J. Mcpherson
Computer Science and Computer Engineering Undergraduate Honors Theses
Cooperative 3D printing is an emerging technology that aims to increase the 3D printing speed and to overcome the size limit of the printable object by having multiple mobile 3D printers (printhead-carrying mobile robots) work together on a single print job on a factory floor. It differs from traditional layer-by-layer 3D printing due to requiring multiple mobile printers to work simultaneously without interfering with each other. Therefore, a new approach for slicing a digital model and generating commands for the mobile printers is needed, which has not been discussed in literature before. We propose a chunk-by-chunk based slicer that divides ...
Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, 2018 University of Arkansas, Fayetteville
Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez
Computer Science and Computer Engineering Undergraduate Honors Theses
Fingerprint identification is one of the most accurate sources of identification, yet it is not widely used in public facilities for security concerns. Moreover, the cost of fingerprint system is inaccessible for small-budget business because of their high cost. Therefore, this study created an open-source solution to secure fingerprint samples in the database while using low-cost hardware components. Locality Sensitive Hashing Algorithms such as ORB and Image hash were compared in this study as a potential alternative to SURF. To test the design, fifteen samples were collected and stored in a database without verifying the quality of the samples. Then ...
Landmine Detection Using Semi-Supervised Learning., 2018 University of Louisville
Landmine Detection Using Semi-Supervised Learning., Graham Reid
Electronic Theses and Dissertations
Landmine detection is imperative for the preservation of both military and civilian lives. While landmines are easy to place, they are relatively difficult to remove. The classic method of detecting landmines was by using metal-detectors. However, many present-day landmines are composed of little to no metal, necessitating the use of additional technologies. One of the most successful and widely employed technologies is Ground Penetrating Radar (GPR). In order to maximize efficiency of GPR-based landmine detection and minimize wasted effort caused by false alarms, intelligent detection methods such as machine learning are used. Many sophisticated algorithms are developed and employed to ...
Blokus Game Solver, 2018 California Polytechnic State University, San Luis Obispo
Blokus Game Solver, Chin Chao
Blokus (officially pronounced as “Block us”) is an abstract strategy board game with transparent Tetris-shaped, color pieces that players are trying to place onto the board. However, the players can only place a piece that touches at least one corner of their own pieces on the board. The ultimate goal of the game is to place as many pieces onto the board as a player can while blocking off the opponent’s ability to place more pieces onto the board. Each player has pieces with different shapes and sizes that can be placed onto the board, where each block within ...
A Validation Study Of Time Series Data Forecasting Using Neural Networks, 2018 Southwestern Oklahoma State University
A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert
Artificial Intelligence(AI) is a growing topic in Computer Science and has many uses in real world applications. One application is using Al, or more specifically Neural Networks to model data and predict outcomes. Neural Networks have been used in the past to predict weather changes, create facial recognition software , and to create self-driving cars. Our project is a validation study of, “Modeling Time Series Data With Deep Fourier Neural Networks” by Gashler and Ashmore, 2016. Here we show that a neural network can be trained to be an effective predictor of weather patterns in Alaska over several years. Our ...
Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, 2018 Louisiana State University
Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, Aly Mousaad Aly
In recent years, as a result of significant climate change, stringent windstorms are becoming more frequent than before. Given the threat that windstorms bring to people and property, wind/structural engineering research is imperative to improve the resilience of existing and new infrastructure, for community safety and assets protection. The Windstorm Impact, Science and Engineering (WISE) research program at Louisiana State University (LSU) focuses on creating new knowledge applicable to the mitigation of existing and new infrastructure, to survive and perform optimally under natural hazards. To achieve our research goals, we address two imperious challenges: (i) characterization of realistic wind ...