Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Wetting-Driven Formation Of Present-Day Loess Structure, Yanrong Li, Weiwei Zhang, Shengdi He, Adnan Aydin Nov 2020

Wetting-Driven Formation Of Present-Day Loess Structure, Yanrong Li, Weiwei Zhang, Shengdi He, Adnan Aydin

Faculty and Student Publications

© 2020 The Authors Present-day loess, especially Malan loess formed in Later Quaternary, has a characteristic structure composed of vertically aligned strong units and weak segments. Hypotheses describing how this structure forms inside original loess deposits commonly relate it to wetting-drying process. We tested this causal relationship by conducting unique experiments on synthetic samples of initial loess deposits fabricated by free-fall of loess particles. These samples were subjected to a wetting-drying cycle, and their structural evolutions were documented by close-up photography and CT scanning. Analysis of these records revealed three key stages of structural evolution: initiation (evenly distributed cracks appear …


A Mathematical Framework For Estimating Risk Of Airborne Transmission Of Covid-19 With Application To Face Mask Use And Social Distancing, Rajat Mittal, Charles Meneveau, Wen Wu Oct 2020

A Mathematical Framework For Estimating Risk Of Airborne Transmission Of Covid-19 With Application To Face Mask Use And Social Distancing, Rajat Mittal, Charles Meneveau, Wen Wu

Faculty and Student Publications

© 2020 Author(s). A mathematical model for estimating the risk of airborne transmission of a respiratory infection such as COVID-19 is presented. The model employs basic concepts from fluid dynamics and incorporates the known scope of factors involved in the airborne transmission of such diseases. Simplicity in the mathematical form of the model is by design so that it can serve not only as a common basis for scientific inquiry across disciplinary boundaries but it can also be understandable by a broad audience outside science and academia. The caveats and limitations of the model are discussed in detail. The model …


Methods To Detect Forgeries In Static Signatures, Jennifer Lauriello May 2020

Methods To Detect Forgeries In Static Signatures, Jennifer Lauriello

Honors Theses

Statistical and machine learning approaches to forgery detection in offline sig- natures are attempted and evaluated. Offline signatures are static signatures found on physical media, mainly a piece of paper. A dataset of 330 signatures for 33 people is used, containing five genuine and five forged signatures for each person. The statistical analysis approach proves more successful than a machine learning approach, likely due to the size of the dataset.


Implementation Of A Computer-Vision System As A Supportive Diagnostic Tool For Parkinson’S Disease, Diego Machado Reyes May 2020

Implementation Of A Computer-Vision System As A Supportive Diagnostic Tool For Parkinson’S Disease, Diego Machado Reyes

Honors Theses

Parkinson’s disease is the second most common neurodegenerative disorder, affecting nearly 1 million people in the US and it is predicted that the number will keep increasing. Parkinson’s disease is difficult to diagnose due to its similarity with other diseases that share the parkinsonian symptoms and the subjectivity of its assessment, thus increasing the probabilities of misdiagnosis. Therefore, it is relevant to develop diagnostic tools that are quantitatively based and monitoring tools to improve the patient’s quality of life. Computer-based assessment systems have shown to be successful in this field through diverse approaches that can be classified into two main …


Empirical Evaluation Of Vehicle Detection, Tracking And Recognition Algorithms Operating On Real Time Video Feeds, Yunik Tamrakar May 2020

Empirical Evaluation Of Vehicle Detection, Tracking And Recognition Algorithms Operating On Real Time Video Feeds, Yunik Tamrakar

Honors Theses

A traffic surveillance camera system is an important part of an intelligent transportation system.(Zhang et al., 2013) This system is capable of performing useful object detections on the incoming feed. These detected objects can then be used for tracking purposes which forms the basis for monitoring important traffic data such as collisions, vehicle count, pedestrian count and so on. Furthermore, other additional information such as the weather conditions, time of day as well as date can also be extracted from a live feed. (Sun et al., 2004) Different algorithms can yield different results for any given video input. Not only …


Brief Survey And Testbed Development For Blockchain Based Internet Of Things, Aishwant Ghimire May 2020

Brief Survey And Testbed Development For Blockchain Based Internet Of Things, Aishwant Ghimire

Honors Theses

Blockchain and the Internet of Things are uprising in today’s technology world. Internet of Things or IoT are the devices with unique identifiers that share data or information over the internet whereas, Blockchain is a peer to peer network with a distributed ledger that contains a list of blocks that are linked together by cryptography. Fascinated and motivated by blockchain and Internet of Things (IoT), this thesis provides a review on blockchain based internet of things and also introduces a working testbed that integrates the two together. It also uses IoT device to invoke transactions into the blockchain. The reasons …


Minet Magnetic Indoor Localization, Michael Drake Apr 2020

Minet Magnetic Indoor Localization, Michael Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of …


Load-Balancing Rendezvous Approach For Mobility-Enabled Adaptive Energy-Efficient Data Collection In Wsns, Jian Zhang, Jian Tang, Zhonghui Wang, Feng Wang, Gang Yu Jan 2020

Load-Balancing Rendezvous Approach For Mobility-Enabled Adaptive Energy-Efficient Data Collection In Wsns, Jian Zhang, Jian Tang, Zhonghui Wang, Feng Wang, Gang Yu

Faculty and Student Publications

Copyright © 2020 KSII The tradeoff between energy conservation and traffic balancing is a dilemma problem in Wireless Sensor Networks (WSNs). By analyzing the intrinsic relationship between cluster properties and long distance transmission energy consumption, we characterize three node sets of the cluster as a theoretical foundation to enhance high performance of WSNs, and propose optimal solutions by introducing rendezvous and Mobile Elements (MEs) to optimize energy consumption for prolonging the lifetime of WSNs. First, we exploit an approximate method based on the transmission distance from the different node to an ME to select suboptimal Rendezvous Point (RP) on the …


Revisiting Lightweight Encryption For Iot Applications: Error Performance And Throughput In Wireless Fading Channels With And Without Coding, Yazid M. Khattabi, Mustafa M. Matalgah, Mohammed M. Olama Jan 2020

Revisiting Lightweight Encryption For Iot Applications: Error Performance And Throughput In Wireless Fading Channels With And Without Coding, Yazid M. Khattabi, Mustafa M. Matalgah, Mohammed M. Olama

Faculty and Student Publications

© 2013 IEEE. Employing heavy conventional encryption algorithms in communications suffers from added overhead and processing time delay; and in wireless communications, in particular, suffers from severe performance deterioration (avalanche effect) due to fading. Consequently, a tremendous reduction in data throughput and increase in complexity and time delay may occur especially when information traverse resource-limited devices as in Internet-of-Things (IoT) applications. To overcome these drawbacks, efficient lightweight encryption algorithms have been recently proposed in literature. One of those, that is of particular interest, requires using conventional encryption only for the first block of data in a given frame being transmitted. …


Cooperative Relay Selection For Load Balancing With Mobility In Hierarchical Wsns: A Multi-Armed Bandit Approach, Jian Zhang, Jian Tang, Feng Wang Jan 2020

Cooperative Relay Selection For Load Balancing With Mobility In Hierarchical Wsns: A Multi-Armed Bandit Approach, Jian Zhang, Jian Tang, Feng Wang

Faculty and Student Publications

© 2013 IEEE. Energy efficiency is the major concern in hierarchical wireless sensor networks(WSNs), where the major energy consumption originates from radios for communication. Due to notable energy expenditure of long-range transmission for cluster members and data aggregation for Cluster Head (CH), saving and balancing energy consumption is a tricky challenge in WSNs. In this paper, we design a CH selection mechanism with a mobile sink (MS) while proposing relay selection algorithms with multi-user multi-armed bandit (UM-MAB) to solve the problem of energy efficiency. According to the definition of node density and residual energy, we propose a conception referred to …


Timcc: On Data Freshness In Privacy-Preserving Incentive Mechanism Design For Continuous Crowdsensing Using Reverse Auction, Xiaoqiang Ma, Weiwei Deng, Feng Wang, Menglan Hu, Fei Chen, Mohammad Mehedi Hassan Jan 2020

Timcc: On Data Freshness In Privacy-Preserving Incentive Mechanism Design For Continuous Crowdsensing Using Reverse Auction, Xiaoqiang Ma, Weiwei Deng, Feng Wang, Menglan Hu, Fei Chen, Mohammad Mehedi Hassan

Faculty and Student Publications

© 2013 IEEE. As an emerging paradigm that leverages the wisdom and efforts of the crowd, mobile crowdsensing has shown its great potential to collect distributed data. The crowd may incur such costs and risks as energy consumption, memory consumption, and privacy leakage when performing various tasks, so they may not be willing to participate in crowdsensing tasks unless they are well-paid. Hence, a proper privacy-preserving incentive mechanism is of great significance to motivate users to join, which has attracted a lot of research efforts. Most of the existing works regard tasks as one-shot tasks, which may not work very …


Understanding Depression During The Covid-19 Pandemic Through Social Media Data, Nusrat Armin Jan 2020

Understanding Depression During The Covid-19 Pandemic Through Social Media Data, Nusrat Armin

Electronic Theses and Dissertations

The COVID-19 pandemic has dramatically affected peoples’ daily lives all over theworld - physically, economically, and emotionally. Due to the virus, many people have died, and many hospitalized. A record number of people have lost their job, and many businesses have closed. The global economy is at risk. People are facing new realities of their lives. Studies have shown that the level of depression is three times higher than before this pandemic. Previous studies have shown that people use social media to express their emotions and feelings. The purpose of this study is to understand the depression during this COVID-19 …