Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim Dec 2016

Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim

Open Access Theses

Sport-related Traumatic Brain Injury (TBI) is one of the major concerns for collision based sports athletes and their families. The ability to measure impacts on the head is imperative to monitor brain injury and prevent serious TBI. Recent research by the Purdue Neurotrauma Group (PNG) indicates that accumulation of subconcussive impacts may cause permanent neurological damage. Currently available commercial impact monitoring systems are designed as an event-based models which collect impact data above pre-determined acceleration thresholds. To track long-term effects of sub-concussive impacts, event-based modeling is inadequate. The PNG developed a biomechanical sports telemetry system that is capable of storing …


Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon Dec 2016

Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon

Open Access Theses

Traumatic brain injuries (TBI) while playing sports are a major concern for the general public today. Recently, studies have shown that repetitive subconcussive hits can lead to neurological disorders. In order to prevent the athletes from suffering traumatic brain injuries, many organizations related to contact based sports and the military employ commercialized head impact telemetry systems. However, a majority of the commercialized systems is event based which only collects the linear acceleration that exceeds a certain threshold. To accurately record and utilize the data from the impact telemetry system, it is necessary to record all the linear and angular acceleration …


A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan Dec 2016

A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan

Open Access Theses

Preserving transaction atomicity and ensuring its commitment is key to the maintenance of data integrity in a distributed database. The distributed consensus protocol is a prominent example of a mechanism used to accomplish safe commitment of a distributed transaction. These protocols are based primarily on repeated message exchange among all sites/nodes and their performance is characterized not only by the number of these messages but also by the underlying communication topology. This thesis proposes a measure of performance known as average message complexity and proposes a communication structure based on folded even graphs called the Folded Even Network (FEN). Performance …


Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat Dec 2016

Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat

Open Access Theses

Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.

This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …


Liquid Metal Particle Popping: Nanoscale To Macroscale, Trevor R. Lear Dec 2016

Liquid Metal Particle Popping: Nanoscale To Macroscale, Trevor R. Lear

Open Access Theses

Liquid metal nanoparticles can be used to produce stretchable electronic devices. Understanding the mechanical properties of liquid metal nanoparticles is crucial to optimizing their use in various applications, especially printing of flexible, stretchable electronics. Smaller nanoparticles are desired for high-resolution printing and compatibility with existing scalable manufacturing methods; however, they contain less liquid metal and are more difficult to rupture than larger particles, making them less desirable for post-processing functionality. This study investigates the mechanics of liquid metal particle rupture as a function of particle size. We employ compression of particle films to characterize the composition of the particle core …


Algorithms For Lidar Based Traffic Tracking: Development And Demonstration, Vamsi K. Bandaru Aug 2016

Algorithms For Lidar Based Traffic Tracking: Development And Demonstration, Vamsi K. Bandaru

Open Access Theses

The current state of the art of traffic tracking is based on the use of video, and requires extensive manual intervention for it to work, including hours of painstaking human examination of videos frame by frame which also make the acquisition of data extremely expensive. Fundamentally, this is because we do not have observability of the actual scene from a camera which captures a 2D projection of the 3D world. Even if video were to be automated, it would involve such algorithms as RANSACK for outlier elimination while matching features across frames or across multiple cameras. This results in algorithms …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


A Study Of Applications Of 3d Animation For Emergency Medicine Pedagogy, Huilong Zheng Aug 2016

A Study Of Applications Of 3d Animation For Emergency Medicine Pedagogy, Huilong Zheng

Open Access Theses

There is ample precedent for the use of 3D animation in education, though little research on specific applications in the field of medicine. An experiment was carried out to assess the suitability of 3D animation for educational purposes in emergency medicine courses. Two groups of experimental participants were assessed on their ability to respond to three emergency medical situations in simulated test scenarios. Both groups received equivalent information on how to treat the three different medical emergencies. The control group received the information in traditional lecture format. The experimental group instead received the information from a set of 3D animations. …


Command Shaping With Constrained Peak Input Acceleration To Minimize Residual Vibration In A Flexible-Joint Robot, Yumeng Wu Aug 2016

Command Shaping With Constrained Peak Input Acceleration To Minimize Residual Vibration In A Flexible-Joint Robot, Yumeng Wu

Open Access Theses

Rapid point-to-point motion is limited when flexibilities exist in the system. In order to minimize the vibrations related to joint flexibilities, much work has been done, including modifying the system so that vibrations can be damped out more quickly, calculating the inverse dynamics of the system and constructing shaped input profiles that avoid system natural frequencies. In this work, the earlier fixed-time command shaping method has been extended to a peak-acceleration-constrained approach with two basis functions, the ramped sinusoid function and the versine function, such that the maximum acceleration is guaranteed without overconstraining the input profiles. The approach is developed …


Analysis Of Feedback Control Applied With Command Shaping To Minimize Residual Vibration, Nicholas L. Jacobs Aug 2016

Analysis Of Feedback Control Applied With Command Shaping To Minimize Residual Vibration, Nicholas L. Jacobs

Open Access Theses

Joint flexibility is a physical trait that affects all robotic systems to some degree. This characteristic has been shown to be very detrimental to the performance of these robotic systems when implementing fast point-to-point motion. During such motion, the robot will induce vibrations in its structure that will extend past the completion of the move. Many techniques have been applied over the years in order to minimize these residual vibrations. One such method is known as command shaping, which will construct the input profile so as to avoid exciting the natural frequencies of the system. This work seeks to extend …


Stochastic Modeling And Dem Simulation Of Granular Media Subsidence Due To Underground Activity, Rodrigo Borela Valente Aug 2016

Stochastic Modeling And Dem Simulation Of Granular Media Subsidence Due To Underground Activity, Rodrigo Borela Valente

Open Access Theses

Many communities around the world have been established in areas of ongoing, as well as ceased, underground mining activity. Ground movements induced by ore extraction methods and the collapse of abandoned cavities have long been recognized as a hazard to surface structures. A number of approaches have been proposed for the prediction of subsidence in underground mining regions, and their integration to Geographic Information Systems (GIS) can produce a powerful risk management tool. Nevertheless, this application is often limited by either a lack of generality or excessive computational cost of the methods available.

In this work, the stochastic subsidence model …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


Fast Voxel Line Update For Time-Space Image Reconstruction, Xiao Wang Aug 2016

Fast Voxel Line Update For Time-Space Image Reconstruction, Xiao Wang

Open Access Theses

Recent applications of model-based iterative reconstruction(MBIR) algorithm to time-space Computed Tomography (CT) have shown that MBIR can greatly improve image quality by increasing resolution as well as reducing noise and some artifacts. Among the various iterative methods that have been studied for MBIR, iterative coordinate descent(ICD) has been found to have relatively low overall computational requirements due to its fast convergence. However, high computational cost and long reconstruction times remain as a barrier to the use of MBIR in practical applications. This disadvantage is especially prominent in time-space reconstruction because of the large volume of data. This thesis presents a …


User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal Apr 2016

User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal

Open Access Theses

Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …


A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq Apr 2016

A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq

Open Access Theses

Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …