Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

Theses/Dissertations

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 748

Full-Text Articles in Entire DC Network

Seal Counting On Our Plages (S.C.O.O.P.), Kaanan Kharwa Sep 2024

Seal Counting On Our Plages (S.C.O.O.P.), Kaanan Kharwa

Master's Theses

The Vertebrate Integrative Physiology (VIP) lab monitors the population of northern elephant seals at the largest mainland breeding colony, located at Piedras Blancas (San Simeon, CA). As the population expands, more human-seal interactions and conflicts over land use occur. The VIP lab's work informs California State Parks and helps with the management of the rookery. Currently, members of the VIP lab fly a drone over the beaches, capture multiple images, and manually count the seals, which takes around 14 to 21 hours of analysis per survey. Machine learning methods such as Convolutional Neural Networks (CNN) and Region-based Convolutional Neural Networks …


Enhancing Strawberry Disease And Quality Detection: Integrating Vision Transformers With Blender-Enhanced Synthetic Data And Swinunet Segmentation Techniques, Kimia Aghamohammadesmaeilketabforoosh Aug 2024

Enhancing Strawberry Disease And Quality Detection: Integrating Vision Transformers With Blender-Enhanced Synthetic Data And Swinunet Segmentation Techniques, Kimia Aghamohammadesmaeilketabforoosh

Electronic Thesis and Dissertation Repository

Agricultural productivity in strawberry cultivation was enhanced through the application of machine learning in this study. Traditional methods for detecting diseases and assessing ripeness in strawberries were identified as labor-intensive and error-prone, which limited farming efficiency and reduced crop yields. To address these challenges, it was hypothesized that advanced machine learning models incorporating attention mechanisms could significantly improve these tasks. The objective was to evaluate the effectiveness of various models by optimizing them for specific agricultural applications. Two datasets of strawberry images were augmented, and three pretrained models—Vision Transformer (ViT), MobileNetV2, and ResNet18—were fine-tuned. Data quality was improved through background …


Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda Aug 2024

Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda

Electronic Theses, Projects, and Dissertations

This project employs machine learning methods like K Nearest Neighbors (KNN), Random Forest, Logistic Regression, and Decision Tree algorithms to monitor crime data based on location and pinpoint areas with risks. The project implements and tunes the four models to improve the precision of predicting crime levels. These models collaborate to offer a trustworthy evaluation of crime patterns. K Nearest Neighbors (KNN) categorizes locations by examining the proximity of data points considering coordinates and other factors to identify trends linked to increased crime data. Logistic Regression gauges the likelihood of crime incidents by studying the connection, between factors (like location …


Real-Time Gun Detection In Video Streams Using Yolo V8, Harish Kumar Reddy Kunchala Aug 2024

Real-Time Gun Detection In Video Streams Using Yolo V8, Harish Kumar Reddy Kunchala

Electronic Theses, Projects, and Dissertations

In this research, we advance the domain of public safety by developing a machine learning model that utilizes the YOLO v8 architecture for real-time detection of firearms in video streams. A diverse and extensive dataset, capturing a range of firearms in varying lighting and backgrounds, was meticulously assembled and preprocessed to enhance the model's adaptability to real-world scenarios. Leveraging the YOLO v8 framework, known for its real-time object detection accuracy, the model was fine-tuned to accurately identify firearms across different shapes and orientations.

The training phase capitalized on GPU computing and transfer learning to expedite the learning process while preserving …


Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic Jun 2024

Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic

Master's Theses

In the rapidly advancing field of autonomous vehicles, ensuring the security and reliability of self-driving systems is crucial. Autonomous vehicle systems, such as cooperative adaptive cruise control (CACC), must undergo significant research and testing before their integration into commercial intelligent transportation systems. CACC considers multiple vehicles in close proximity as a single entity, or platoon, with each vehicle equipped with a controller that uses sensor-based measurements and vehicle-to-vehicle (V2V) communication to control inter-vehicle spacing. While this system offers numerous potential benefits for traffic safety and efficiency, it is also susceptible to False Data Injection (FDI) attacks, which can cause the …


A Comparative Study Of The Npm, Pypi, Maven, And Rubygems Open-Source Communities, Saurav Gupta Jun 2024

A Comparative Study Of The Npm, Pypi, Maven, And Rubygems Open-Source Communities, Saurav Gupta

Master's Theses

Open-source software (OSS) ecosystems, defined as environments composed of package managers and programming languages (e.g., NPM for JavaScript), are essential for software development and foster collaboration and innovation. Although their significance is acknowledged, understanding what makes OSS communities healthy and sustainable requires further exploration. This thesis quantitatively assesses the health of OSS projects and communities within the NPM, PyPI, Maven, and RubyGems ecosystems. We explore five research questions addressing project standards, community responsiveness, contribution distribution, contributor retention, and newcomer integration strategies. Our analysis shows varied documentation practices, insider engagement levels, and contribution patterns. Our findings highlight both strengths and different …


Sequential Memory Generation For Cognitive Models, Eben Miles Sherwood Jun 2024

Sequential Memory Generation For Cognitive Models, Eben Miles Sherwood

Master's Theses

Understanding the process of memory formation in neural systems is of great interest in the field of neuroscience. Valiant’s Neuroidal Model poses a plausible theory for how memories are created within a computational context. Previously, the algorithm JOIN has been used to show how the brain could perform conjunctive and disjunctive coding to store memories. A limitation of JOIN is that it does not consider the coding of temporal information in a meaningful manner. We propose SeqMem, a similar algorithmic primitive that is designed to encode a series of items within a random graph model. We investigate the feasibility of …


Improving Fused Filament Fabrication Additive Manufacturing Through Computer Vision Analysis And Fabrication Optimization, Aliaksei Petsiuk May 2024

Improving Fused Filament Fabrication Additive Manufacturing Through Computer Vision Analysis And Fabrication Optimization, Aliaksei Petsiuk

Electronic Thesis and Dissertation Repository

Additive manufacturing (AM), also known as 3-D printing, is one of the fundamental elements of Industry 4.0. According to ASTM standards, AM can be classified by production principles, types of raw materials, energy sources, and fabrication volumes. Fused filament fabrication (FFF) is one of the most accessible technologies that offers independent manufacturers great opportunities due to its simplicity, scalability, and low cost.

Modern 3-D printing is moving from single-material prototyping to complex multi-material product creation. It is firmly established in a wide range of applications, significantly expanding manufacturing horizons, providing innovative design capabilities, and improving product quality through the optimal …


Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez May 2024

Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez

Computer Science and Engineering Theses and Dissertations

Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …


Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu May 2024

Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu

Master's Theses

The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.

In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …


Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton May 2024

Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton

Honors College Theses

This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …


Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut May 2024

Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut

Theses/Capstones/Creative Projects

This capstone report examines the theory and implementation behind applying game design principles to educational applications, and explores their implementation in an educational game through the Pronunciation Pal application. The gamification of learning tools aims to increase learners' engagement and attentiveness with a subject by restructuring content using game design principles of challenges, rewards and feedback. Feedback can be delivered via visuals and/or sounds, as well as regular indicators of player progress and accomplishment. In addition, a successful game implementation establishes challenges to facilitate a player's intrinsic desire to continue playing and improving at the skills presented by the game. …


Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo May 2024

Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo

Doctoral Dissertations

Neuromorphic computing is a novel, non-von Neumann computing architecture that employs power efficient spiking neural networks on specialized hardware. Taking inspiration from the human brain, spiking neural networks are temporal computation units that propagate information throughout the network via binary spikes. Compared to conventional artificial neural networks, these networks can be more sparse, smaller in size, and more efficient power-wise when realized on neuromorphic hardware. Event-based cameras are novel vision sensors that capture visual information through a temporal stream of events instead of as a conventional RGB frame. These cameras are low-power collections of pixels that asynchronously emit events over …


High-Altitude Ballooning And Payload Design, Matthew Smith May 2024

High-Altitude Ballooning And Payload Design, Matthew Smith

Honors College Theses

The Icarus project began in 2017 where a team performs high-altitude balloon (HAB) launches to conduct atmospheric and payload design research. The project involves sending a data-collecting payload containing recording equipment to high altitudes (~100,000 feet). This paper outlines the Icarus project as well as the efforts to design a payload that will remain stable throughout flight while also protecting the equipment housed within the payload shell. SOLIDWORKS computer-aided design (CAD) software was used to design a unique payload system. The payload parts were manufactured with PLA filament using a Prusa MK4 3D printer. The secondary goal of this thesis …


Geometric Multi-Resolution Analysis Across Signals, Images, And Networks, Felicia Schenkelberg May 2024

Geometric Multi-Resolution Analysis Across Signals, Images, And Networks, Felicia Schenkelberg

Dartmouth College Master’s Theses

This research delves into the transformative potential of Geometric Multi-Resolution Analysis (GMRA) as a robust tool for dimensionality reduction and data analysis in the context of high-dimensional graphs. Statistical techniques for classification have historically been tailored for scenarios wherein the number of observations significantly exceeds the number of features, a paradigm characteristic of low-dimensional datasets. However, recent advancements in technologies have ushered in a transformative era in data collection practices across diverse domains, resulting in the acquisition of extensive feature measurements. As a result of this shift, datasets have transitioned into a high-dimensional realm wherein the number of features significantly …


Diegetic Sonification For Low Vision Gamers, Jhané Dawes May 2024

Diegetic Sonification For Low Vision Gamers, Jhané Dawes

Master's Theses

There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …


Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula May 2024

Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula

Electronic Theses, Projects, and Dissertations

Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].

In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …


Attention Guided Data Augmentation For Improving The Classification Performance Of Vision Transformers., Nada Baili May 2024

Attention Guided Data Augmentation For Improving The Classification Performance Of Vision Transformers., Nada Baili

Electronic Theses and Dissertations

For over a decade, Deep Neural Networks (DNNs) have been rapidly progressing and achieving great success, forming a robust foundation of state of the art machine learning algorithms that impacted various domains. The advances in data acquisition and processing have undeniably played a major role in these breakthroughs. Data is a crucial component in building successful DNNs, as it enables machine learning models to optimize complex architectures, necessary to perform certain difficult tasks. However, acquiring large-scale data sets is not enough to learn robust models with generalizable features. Instead, an ideal training set should be diverse enough and contain enough …


Defining And Labeling Traversable Space In A Forested Environment, James Nguyen May 2024

Defining And Labeling Traversable Space In A Forested Environment, James Nguyen

All Theses

This thesis investigates the problem of identifying traversable terrain in outdoor conditions. We are motivated by research in recent years toward identifying drivable space for the purpose of developing autonomous vehicles. Our motivating application is similar but also different. We envision a “Hiker Helper” that assists humans with dismounted navigation in forested terrain. A common challenge in this type of environment is identifying a viable path for moving through terrain that is congested with trees, bushes, other flora, and natural obstacles that would make navigation difficult. We envision training an artificial intelligence (AI) model to automatically analyze images of this …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway Apr 2024

Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway

Master's Theses

During our education at KSU, we have learned about various factors that affect productivity such as schedule, budget, and risks, but those are often controlled outside of what we could learn as software engineering principles, patterns, or practices. On top of that, other off-work factors such as health conditions, emotional distress, or political climate, just to name a few, could drastically affect the productivity of a software engineering team. We see a demarcation between those factors that affect productivity in software engineering but are not inherent to the discipline itself, which we call resistance factors, and the factors that are …


Cyber Attacks Against Industrial Control Systems, Adam Kardorff Apr 2024

Cyber Attacks Against Industrial Control Systems, Adam Kardorff

LSU Master's Theses

Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …


Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner Apr 2024

Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner

Honors College Theses

Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …


A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos Mar 2024

A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos

Master's Theses

Breast cancer is one of the deadliest cancers for women. In the US, 1 in 8 women will be diagnosed with breast cancer within their lifetimes. Detection and diagnosis play an important role in saving lives. To this end, many classifiers with varying structures have been designed to classify breast cancer histopathological images. However, randomly partitioning data, like many previous works have done, can lead to artificially inflated accuracies and classifiers that do not generalize. Data leakage occurs when researchers assume that every image in a dataset is independent of each other, which is often not the case for medical …


Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao Mar 2024

Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao

Master's Theses

Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …


Customer Churn Prediction Based On Sentiment Score, Shadha Al-Safi Feb 2024

Customer Churn Prediction Based On Sentiment Score, Shadha Al-Safi

Theses and Dissertations

In recent years, the telecommunications industry has witnessed intensified competition, wherein the expense associated with acquiring new consumers exceeds that of sustaining existing ones. Consequently, predicting customer churn prior to its occurrence has become essential. This study proposes a sentiment-based customer churn prediction model in which the sentiment of customers is predicted using Random Forest. Subsequently, the derived sentiment predictions are combined with additional features to predict customer churn. The ensemble technique is applied to predict churn, consisting of K-nearest neighbors, Support Vector Machines, Random Forest as base learners, and Multiple Layer Perceptron as a meta learner. Moreover, mutual information …


Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo Feb 2024

Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo

Dissertations, Theses, and Capstone Projects

This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …


A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor Jan 2024

A Memory Efficient Deep Recurrent Q-Learning Approach For Autonomous Wildfire Surveillance, Jeremy A. Cantor

UNF Graduate Theses and Dissertations

Previous literature demonstrates that autonomous UAVs (unmanned aerial vehicles) have the po- tential to be utilized for wildfire surveillance. This advanced technology empowers firefighters by providing them with critical information, thereby facilitating more informed decision-making processes. This thesis applies deep Q-learning techniques to the problem of control policy design under the objective that the UAVs collectively identify the maximum number of locations that are under fire, assuming the UAVs can share their observations. The prohibitively large state space underlying the control policy motivates a neural network approximation, but prior work used only convolutional layers to extract spatial fire information from …


Explainable Automated Inconsistency Detection In Biomedical And Health Literature, Prajwol Lamichhane Jan 2024

Explainable Automated Inconsistency Detection In Biomedical And Health Literature, Prajwol Lamichhane

UNF Graduate Theses and Dissertations

Given the exponential growth of scientific information online, researchers often face the daunting task of detecting contradictory statements on crucial health topics. This work develops a comprehensive pipeline for automated contradiction detection that integrates an Information Retrieval (IR) system, machine learning classifiers, and Explainable AI (XAI). The Information Retrieval system is tailored for biomedical data and comprises a datastore, syntactic, and semantic components. Users can input queries, initiating a pipeline that identifies top documents through syntactic analysis and refines results via semantic examination for relevant research claims. Employing a diverse range of Large Language Models such as pre-trained Distil-BERT, BioBERT, …


Securing Internet Of Things (Iot) Data Storage, Savannah Malo Jan 2024

Securing Internet Of Things (Iot) Data Storage, Savannah Malo

Honors Theses and Capstones

Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …