Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine Learning (11)
- Robotics (8)
- Machine learning (6)
- Security (6)
- CUDA (5)
-
- Natural Language Processing (5)
- AUV (4)
- Computer Vision (4)
- FPGA (4)
- IoT (4)
- Localization (4)
- Autonomous (3)
- Education (3)
- GPU (3)
- Linux (3)
- Networks (3)
- Neural network (3)
- Accessibility (2)
- Architecture (2)
- Artificial Intelligence (2)
- Artificial intelligence (2)
- Autonomy (2)
- BGP (2)
- Bioinformatics (2)
- Breast Cancer (2)
- Communication (2)
- Compiler (2)
- Compression (2)
- Computer Architecture (2)
- Computer Science (2)
Articles 31 - 60 of 184
Full-Text Articles in Entire DC Network
Impact Of Teaching Practices And Communication Climates On Participation In Computer Science Education, Jackie Krone
Impact Of Teaching Practices And Communication Climates On Participation In Computer Science Education, Jackie Krone
Master's Theses
One way to understand teaching is to view it as a people process rather than a presentation of knowledge. It follows that the role of an educator often extends beyond the primary subject matter and into the realm of classroom management. With this in mind, our research aimed to capture the various teaching practices, participation patterns, and communication climates that occur in virtual computer science classrooms. We sought to answer the following research questions related to virtual computer science classrooms at our institution: Who participates in virtual computer science classrooms, and is participation proportional to student demographics? Is there any …
Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr
Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr
Master's Theses
Wi-Fi Sensing is becoming a prominent field with a wide range of potential applications. Using existing hardware on a wireless network such as access points, cell phones, and smart home devices, important information can be inferred about the current physical environment. Through the analysis of Channel State Information collected in the Neighborhood Discovery Protocol process, the wireless network can detect disturbances in Wi-Fi signals when the physical environment changes. This results in a system that can sense motion within the Wi-Fi network, allowing for movement detection without any wearable devices.
The goal of this thesis is to answer whether Wi-Fi …
Optimizing A Virtual Human Platform For Depression/Suicide Ideation Identification For The American Soldier, Christina M. Monahan
Optimizing A Virtual Human Platform For Depression/Suicide Ideation Identification For The American Soldier, Christina M. Monahan
Master's Theses
Suicide surpassed homicide to be the second leading cause of death among people 10-24 years old in the United States \cite{1}. This statistic is alarming especially when combined with the more than eight distinctly different types of clinical depression among society today \cite{2}. To further complicate this health crisis, let’s consider the current worldwide isolating pandemic often referred to as COVID-19 that has spanned 12 months. It is more important than ever to consider how we can get ahead of the crisis by identifying the symptoms as they set in and more importantly ahead of the decision to commit suicide. …
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse
An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse
Master's Theses
The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …
Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke
Master's Theses
According to the 2020 poverty estimates from the World Bank, it is estimated that 9.1% - 9.4% of the global population lived on less than $1.90 per day. It is estimated that the Covid-19 pandemic further aggravated the issue by pushing more than 1% of the global population below the international poverty line of $1.90 per day (WorldBank, 2020). To provide help and formulate effective measures, poverty needs to be located as exact as possible. For this purpose, it was investigated whether regression methods with aggregated remote-sensing data could be used to estimate poverty in Africa. Therefore, five distinct regression …
Snr: Software Library For Introductory Robotics, Spencer F. Shaw
Snr: Software Library For Introductory Robotics, Spencer F. Shaw
Master's Theses
This thesis introduces "SNR," a Python library for programming robotic systems in the context of introductory robotics courses. Greater demand for roboticists has pressured educational institutions to expand robotics curricula. Students are now more likely to take robotics courses earlier and with less prior programming experience. Students may be attempting to simultaneously learn a systems programming language, a library API, and robotics concepts. SNR is written purely in Python to present familiar semantics, eliminating one of these learning curves. Industry standard robotics libraries such as ROS often require additional build tools and configuration languages. Students in introductory courses frequently lack …
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
Master's Theses
The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …
Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii
Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii
Master's Theses
Data Analytics and technology have changed baseball as we know it. From the increase in defensive shifts to teams using cameras in the outfield to steal signs, teams will try anything to win. One way to gain an edge in baseball is to figure out what pitches a pitcher will pitch. Pitch prediction is a popular task to try to accomplish with all the data that baseball provides. Most methods involve using situational data like the ball and strike count. In this paper, we try a different method of predicting pitch type by only looking at the pitcher's pose in …
A Power System-Based Iot Network For Remote Sensing Applications, Dominic Gaiero
A Power System-Based Iot Network For Remote Sensing Applications, Dominic Gaiero
Master's Theses
Cities around the world are facing increasingly significant challenges, including rapid urbanization, resource management, and environmental threats. In California for example, wildfires present an ever-growing threat that gravely harms people, destroys communities, and causes billions of dollars in damages. The task of addressing these environmental threats and many other challenges is greatly aided with widespread data collection and real-time inference. However, as IoT networks scale and require more energy for near-data analytics, the IoT endpoints require more power and complexity, limiting their deployment. Additionally, deploying endpoints in remote locations creates further challenges with higher reliability and communication constraints. In this …
Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu
Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu
Master's Theses
Modern society places an increasingly high demand on data transmission. Much of that data transmission takes place through communication over the frequency spectrum. The channels on the spectrum are limited resources. Researchers realize that at certain times of day some channels are overloaded, while others are not being fully utilized. A spectrum management system may be beneficial to remedy this efficiency issue. One of the proposed systems, Cognitive Radio Network (CRN), has progressed over the years thanks to studies on a wide range of subjects, including geolocation, data throughput rate, and channel handoff selection algorithm, which provide fundamental support for …
Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui
Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui
Master's Theses
The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …
A Study Of Implementation Methodologies For Distributed Real Time Collaboration, Lauren A. Craft
A Study Of Implementation Methodologies For Distributed Real Time Collaboration, Lauren A. Craft
Master's Theses
Collaboration drives our world and is almost unavoidable in the programming industry. From higher education to the top technological companies, people are working together to drive discovery and innovation. Software engineers must work with their peers to accomplish goals daily in their workplace. When working with others there are a variety of tools to choose from such as Google Docs, Google Colab and Overleaf. Each of the aforementioned collaborative tools utilizes the Operational Transform (OT) technique in order to implement their real time collaboration functionality. Operational transform is the technique seen amongst most if not all major collaborative tools in …
Energy Efficient Computing Using Scalable General Purpose Analog Processors, Ethan Paul Palisoc De Guzman
Energy Efficient Computing Using Scalable General Purpose Analog Processors, Ethan Paul Palisoc De Guzman
Master's Theses
Due to fundamental physical limitations, conventional digital circuits have not been able to scale at the pace expected from Moore’s law. In addition, computationally intensive applications such as neural networks and computer vision demand large amounts of energy from digital circuits. As a result, energy efficient alternatives are needed in order to provide continued performance scaling. Analog circuits have many well known benefits: the ability to store more information onto a single wire and efficiently perform mathematical operations such as addition, subtraction, and differential equation solving. However, analog computing also comes with drawbacks such as its sensitivity to process variation …
Automating Deep-Sea Video Annotation, Hanson Egbert
Automating Deep-Sea Video Annotation, Hanson Egbert
Master's Theses
As the world explores opportunities to develop offshore renewable energy capacity, there will be a growing need for pre-construction biological surveys and post-construction monitoring in the challenging marine environment. Underwater video is a powerful tool to facilitate such surveys, but the interpretation of the imagery is costly and time-consuming. Emerging technologies have improved automated analysis of underwater video, but these technologies are not yet accurate or accessible enough for widespread adoption in the scientific community or industries that might benefit from these tools.
To address these challenges, prior research developed a website that allows to: (1) Quickly play and annotate …
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
Master's Theses
An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.
Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.
In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …
Emergency Landing And Guidance System, Joseph Alarid
Emergency Landing And Guidance System, Joseph Alarid
Master's Theses
Every year there are thousands of aviation accidents along with hundreds of human deaths that happen around the world. While the data is sparse, it is well documented that many of these happen from emergency landings gone awry. While pilots can generally make great landings in clear daytime conditions, they are significantly handicapped when it comes to landing at night or amongst poor visibility conditions.
Due to the nature of this problem and some of the large scale advances in software technology we propose a solution that provides a significant improvement from the status quo. Using transfer learning on neural …
Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel
Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel
Master's Theses
Internet of Things (IoT) devices have been widely adopted in many different applications in recent years, such as smart home applications. An adversary can capture the network traffic of IoT devices and analyze it to reveal user activities even if the traffic is encrypted. Therefore, traffic privacy is a major concern, especially in smart home applications. Traffic shaping can be used to obfuscate the traffic so that no meaningful predictions can be drawn through traffic analysis. Current traffic shaping methods have many tunable variables that are difficult to optimize to balance bandwidth overheads and latencies. In this thesis, we study …
Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke
Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke
Master's Theses
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …
Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok
Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok
Master's Theses
The introduction of autonomous vehicles has the potential to reduce the number of accidents and save countless lives. These benefits can only be realized if autonomous vehicles can prove to be safer than human drivers. There is a large amount of active research around developing robust algorithms for all parts of the autonomous vehicle stack including sensing, localization, mapping, perception, prediction, planning, and control. Additionally, some of these research projects have involved the use of the Robot Operating System (ROS). However, another key aspect of realizing an autonomous vehicle is a fault-tolerant design that can ensure the safe operation of …
Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller
Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller
Master's Theses
Massively Multiplayer Online Role Playing Games (MMORPGs) are a prominent genre in today's video game industry with the most popular MMORPGs generating billions of dollars in revenue and attracting millions of players. As they have grown, they have become a major target for both technological research and sociological research. In such research, it is nearly impossible to reach the same player scale from any self-made technology or sociological experiments. This greatly limits the amount of control and topics that can be explored. In an effort to make up a lacking or non-existent player-base for custom-made MMORPG research scenarios A.I. agents, …
Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le
Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le
Master's Theses
In this thesis, the viability of decentralized, noncooperative multi-robot path planning algorithms is tested. Three algorithms based on the Batch Informed Trees (BIT*) algorithm are presented. The first of these algorithms combines Optimal Reciprocal Collision Avoidance (ORCA) with BIT*. The second of these algorithms uses BIT* to create a path which the robots then follow using an artificial potential field (APF) method. The final algorithm is a version of BIT* that supports replanning. While none of these algorithms take advantage of sharing information between the robots, the algorithms are able to guide the robots to their desired goals, with the …
Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn
Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn
Master's Theses
Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.
Music in video games is essential for establishing developers' intended mood …
Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley
Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley
Master's Theses
This thesis investigates the involuntary signal-based grounding of civilian unmanned aerial systems (UAS) in unauthorized air spaces. The technique proposed here will forcibly land unauthorized UAS in a given area in such a way that the UAS will not be harmed, and the pilot cannot stop the landing. The technique will not involuntarily ground authorized drones which will be determined prior to the landing. Unauthorized airspaces include military bases, university campuses, areas affected by a natural disaster, and stadiums for public events. This thesis proposes an early prototype of a hardware-based signal based involuntary grounding technique to handle the problem …
Utilizing Trajectory Optimization In The Training Of Neural Network Controllers, Nicholas Kimball
Utilizing Trajectory Optimization In The Training Of Neural Network Controllers, Nicholas Kimball
Master's Theses
Applying reinforcement learning to control systems enables the use of machine learning to develop elegant and efficient control laws. Coupled with the representational power of neural networks, reinforcement learning algorithms can learn complex policies that can be difficult to emulate using traditional control system design approaches. In this thesis, three different model-free reinforcement learning algorithms, including Monte Carlo Control, REINFORCE with baseline, and Guided Policy Search are compared in simulated, continuous action-space environments. The results show that the Guided Policy Search algorithm is able to learn a desired control policy much faster than the other algorithms. In the inverted pendulum …
An Application Of Sliding Mode Control To Model-Based Reinforcement Learning, Aaron Thomas Parisi
An Application Of Sliding Mode Control To Model-Based Reinforcement Learning, Aaron Thomas Parisi
Master's Theses
The state-of-art model-free reinforcement learning algorithms can generate admissible controls for complicated systems with no prior knowledge of the system dynamics, so long as sufficient (oftentimes millions) of samples are available from the environ- ment. On the other hand, model-based reinforcement learning approaches seek to leverage known optimal or robust control to reinforcement learning tasks by mod- elling the system dynamics and applying well established control algorithms to the system model. Sliding-mode controllers are robust to system disturbance and modelling errors, and have been widely used for high-order nonlinear system control. This thesis studies the application of sliding mode control …
Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman
Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman
Master's Theses
The application of robotics in cluttered and dynamic environments provides a wealth of challenges. This thesis proposes a deep reinforcement learning based system that determines collision free navigation robot velocities directly from a sequence of depth images and a desired direction of travel. The system is designed such that a real robot could be placed in an unmapped, cluttered environment and be able to navigate in a desired direction with no prior knowledge. Deep Q-learning, coupled with the innovations of double Q-learning and dueling Q-networks, is applied. Two modifications of this architecture are presented to incorporate direction heading information that …
Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty
Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty
Master's Theses
Location privacy preservation has shifted to the forefront of discussions about next generation wireless networks. While pseudonym-changing schemes have been proposed to preserve an individual's privacy, simulation has shown that new association attack models render these schemes useless. The major contribution of this thesis is the implementation of a tracking network with commodity hardware on the California Polytechnic State University campus which leverages the combination of de-anonymization strategies on captured wireless network data to show the effectiveness of a pseudonym-changing scheme for wireless identification across WiFi and Zigbee protocols.
Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork
Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork
Master's Theses
Computer Science is an increasingly important topic in K-12 education. Ever since the "computing crisis" of the early 2000s, where enrollment in CS dropped by over half in a five year span, increasing research has gone into improving and broadening enrollment in CS courses. Research shows the importance of introducing CS at a young age and the need for more exposure for younger children and young adults alike in order to work towards equity in the field. While there are many reasons for disinterest in CS courses, studies found one reason young adults do not want to study CS is …
Smart Dc Wall Outlet Design With Improved Load Voltage Detection, Patrick Donovon Granieri
Smart Dc Wall Outlet Design With Improved Load Voltage Detection, Patrick Donovon Granieri
Master's Theses
A standard home in the United States has access to the 120V AC power grid for use with home appliances. Many electronics used at home are powered by a DC power supply, which loses energy in the conversion from AC power. The DC House project avoids any conversion between AC and DC by storing energy in batteries as DC power and supplying it directly to DC appliances. While AC systems feature a standardized output voltage, no such standard exists for DC systems. The Smart DC Wall Outlet solves this by automatically adjusting its output voltage to meet any required DC …
Surveying Underwater Shipwrecks With Probabilistic Roadmaps, Amy Jeannette Lewis
Surveying Underwater Shipwrecks With Probabilistic Roadmaps, Amy Jeannette Lewis
Master's Theses
Almost two thirds of the Earth's surface is covered in ocean, and yet, only about 5% of it is mapped. There are an unknown amount of sunken ships, planes, and other artifacts hidden below the sea. Extensive search via boat and a sonar tow fish following a standard lawnmower pattern is used to identify sites of interest. Then, if a site has been determined to potentially be historically significant, the most common next step is a survey by either a human dive team or remotely operated vehicle. These are time consuming, error prone, and potentially dangerous options, but autonomous underwater …