Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Theses/Dissertations

2019

Institution
Keyword
Publication

Articles 331 - 360 of 362

Full-Text Articles in Engineering

Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov Jan 2019

Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov

Browse all Theses and Dissertations

Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The …


Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy Jan 2019

Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy

Browse all Theses and Dissertations

One hotly debated research topic is, “What is the best approach for modeling ontologies?”. In the earlier stages of modeling ontologies, researchers have favored the usage of description logic to capture knowledge. One such choice is the Web Ontology Language (OWL) that is based on description logic. Many tools were designed around this principle and are still widely being used to model and explore ontologies. However, not all users find description logic to be intuitive, at least not without an extensive background in formal logics. Due to this, researchers have tried to explore other ways that will enable such users …


Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal Jan 2019

Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal

Browse all Theses and Dissertations

The development of the next-generation sequencing technology has enabled systems immunology researchers to conduct detailed immune repertoire analysis at the molecule level. Large sequence datasets (e.g., millions of sequences) are being collected to comprehensively understand how the immune system of a patient evolves over different stages of disease development. A recent study has shown that the hierarchical clustering (HC) algorithm gives the best results for B-cell clones analysis - an important type of immune repertoire sequencing (IR-Seq) analysis. However, due to the inherent complexity, the classical hierarchical clustering algorithm does not scale well to large sequence datasets. Surprisingly, no algorithms …


Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa Jan 2019

Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa

Master’s Theses

The research aims at developing a framework for testing systems such as closed-loop physiology management systems to ensure that they are safe and effective for use with patients. Building medical devices that are both robust and safe is a challenge. There has been a tremendous increase in modernization and innovation of various medical systems but many of these systems either fail trials or are recalled due to safety issues.

Medical operation rooms require care teams responsible for monitoring the patients and other technical surgical devices. The care process requires a balancing administration that takes care of the drugs and fluids …


Volumetric Error Compensation For Industrial Robots And Machine Tools, Le Ma Jan 2019

Volumetric Error Compensation For Industrial Robots And Machine Tools, Le Ma

Doctoral Dissertations

“A more efficient and increasingly popular volumetric error compensation method for machine tools is to compute compensation tables in axis space with tool tip volumetric measurements. However, machine tools have high-order geometric errors and some workspace is not reachable by measurement devices, the compensation method suffers a curve-fitting challenge, overfitting measurements in measured space and losing accuracy around and out of the measured space. Paper I presents a novel method that aims to uniformly interpolate and extrapolate the compensation tables throughout the entire workspace. By using a uniform constraint to bound the tool tip error slopes, an optimal model with …


Neuroengineering Of Clustering Algorithms, Leonardo Enzo Brito Da Silva Jan 2019

Neuroengineering Of Clustering Algorithms, Leonardo Enzo Brito Da Silva

Doctoral Dissertations

"Cluster analysis can be broadly divided into multivariate data visualization, clustering algorithms, and cluster validation. This dissertation contributes neural network-based techniques to perform all three unsupervised learning tasks. Particularly, the first paper provides a comprehensive review on adaptive resonance theory (ART) models for engineering applications and provides context for the four subsequent papers. These papers are devoted to enhancements of ART-based clustering algorithms from (a) a practical perspective by exploiting the visual assessment of cluster tendency (VAT) sorting algorithm as a preprocessor for ART offline training, thus mitigating ordering effects; and (b) an engineering perspective by designing a family of …


Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy Jan 2019

Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy

Graduate Theses, Dissertations, and Problem Reports

Exhaust gas flow rate from a vehicle tailpipe has a great influence on emission mass rate calculations, as the emission fractions of individual gases in the exhaust are calculated by using the measured exhaust flow rate. The development of high-end sensor technologies and emission pollutant measurement instruments, which can give instantaneous values of volume concentration of pollutants flowing out of the engine are gaining importance because of their ease of operation. The volume concentrations measured can then be used with the instantaneous exhaust flow rate values to obtain mass flow rates of pollutants.

With the recent promulgation of real world …


Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu Jan 2019

Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu

Browse all Theses and Dissertations

According to a Pew Research study, 41% of Americans have personally experienced online harassment and two-thirds of Americans have witnessed harassment in 2017. Hence, online harassment detection is vital for securing and sustaining the popularity and viability of online social networks. Machine learning techniques play a crucial role in automatic harassment detection. One of the challenges of using supervised approaches is training data imbalance. Existing text generation techniques can help augment the training data, but they are still inadequate and ineffective. This research explores the role of domain-specific knowledge to complement the limited training data available for training a text …


Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker Jan 2019

Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker

Browse all Theses and Dissertations

In the growing world of cybersecurity, being able to map and analyze how software and hardware interact is key to understanding and protecting critical embedded systems like the Engine Control Unit (ECU). The aim of our research is to use our understanding of the ECU's control flow attained through manual analysis to automatically map and identify sensor functions found within the ECU. We seek to do this by generating unique sets of feature vectors for every function within the binary file of a car ECU, and then using those feature sets to locate functions within each binary similar to their …


Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth Jan 2019

Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth

Browse all Theses and Dissertations

The recognition of single objects is an old research field with many techniques and robust results. The probabilistic recognition of incomplete objects, however, remains an active field with challenging issues associated to shadows, illumination and other visual characteristics. With object incompleteness, we mean missing parts of a known object and not low-resolution images of that object. The employment of various single machine-learning methodologies for accurate classification of the incomplete objects did not provide a robust answer to the challenging problem. In this dissertation, we present a suite of high-level, model-based computer vision techniques encompassing both geometric and machine learning approaches …


Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi Jan 2019

Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi

Browse all Theses and Dissertations

In recent years, the research in deep learning and knowledge engineering has made a wide impact on the data and knowledge representations. The research in knowledge engineering has frequently focused on modeling the high level human cognitive abilities, such as reasoning, making inferences, and validation. Semantic Web Technologies and Deep Learning have an interest in creating intelligent artifacts. Deep learning is a set of machine learning algorithms that attempt to model data representations through many layers of non-linear transformations. Deep learning is in- creasingly employed to analyze various knowledge representations mentioned in Semantic Web and provides better results for Semantic …


Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat Jan 2019

Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat

Browse all Theses and Dissertations

Information Extraction (IE) techniques are developed to extract entities, relationships, and other detailed information from unstructured text. The majority of the methods in the literature focus on designing supervised machine learning techniques, which are not very practical due to the high cost of obtaining annotations and the difficulty in creating high quality (in terms of reliability and coverage) gold standard. Therefore, semi-supervised and distantly-supervised techniques are getting more traction lately to overcome some of the challenges, such as bootstrapping the learning quickly. This dissertation focuses on information extraction, and in particular entities, i.e., Named Entity Recognition (NER), from multiple domains, …


Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen Jan 2019

Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen

Graduate Theses, Dissertations, and Problem Reports

Chronic Kidney Disease (CKD) is the leading cause for kidney failure. It is a global health problem affecting approximately 10% of the world population and about 15% of US adults. Chronic Kidney Diseases do not generally show any disease specific symptoms in early stages thus it is hard to detect and prevent such diseases. Early detection and classification are the key factors in managing Chronic Kidney Diseases.

In this thesis, we propose a new machine learning technique for Kidney Ailment Prediction. We focus on two key issues in machine learning, especially in its application to disease prediction. One is related …


Light Touch Based Virtual Cane For Balance Assistance During Standing, Sindhu Reddy Alluri Jan 2019

Light Touch Based Virtual Cane For Balance Assistance During Standing, Sindhu Reddy Alluri

Masters Theses

"Can additional information about one's body kinematics provided through hands improve human balance? Light-Touch (LT) through hands helps improve balance in a wide range of populations, both healthy and impaired. The force is too small to provide any meaningful mechanical assistance -- rather, it is suggested that the additional sensory information through hands helps the body improve balance.

To investigate the potential for improving human balance through biofeedback through hands, we developed a Virtual Cane (VC) for balance assistance during standing. The VC mimics the physical cane's function of providing information about one's body in space. Balance experiments on 10 …


Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister Jan 2019

Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister

Masters Theses

"Multiple recurrent reinforcement learners were implemented to make trading decisions based on real and freely available macro-economic data. The learning algorithm and different reinforcement functions (the Differential Sharpe Ratio, Differential Downside Deviation Ratio and Returns) were revised and the performances were compared while transaction costs were taken into account. (This is important for practical implementations even though many publications ignore this consideration.) It was assumed that the traders make long-short decisions in the S&P500 with complementary 3-month treasury bill investments. Leveraged positions in the S&P500 were disallowed. Notably, the Differential Sharpe Ratio and the Differential Downside Deviation Ratio are risk …


Controlled Switching In Kalman Filtering And Iterative Learning Controls, He Li Jan 2019

Controlled Switching In Kalman Filtering And Iterative Learning Controls, He Li

Masters Theses

“Switching is not an uncommon phenomenon in practical systems and processes, for examples, power switches opening and closing, transmissions lifting from low gear to high gear, and air planes crossing different layers in air. Switching can be a disaster to a system since frequent switching between two asymptotically stable subsystems may result in unstable dynamics. On the contrary, switching can be a benefit to a system since controlled switching is sometimes imposed by the designers to achieve desired performance. This encourages the study of system dynamics and performance when undesired switching occurs or controlled switching is imposed. In this research, …


Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey Jan 2019

Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey

Dissertations, Master's Theses and Master's Reports

The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.

A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To …


Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle Jan 2019

Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle

Graduate Theses, Dissertations, and Problem Reports

This thesis presents Virtual Morphology (VM), a method that explores a different perspective on the design of robot autonomy using inspiration from morphological computing and programmed computation. Morphological computation offers physical solutions that solve complex tasks, like robotic grasping of unknown objects, with relative ease. Unfortunately, these physical solutions are difficult to adjust post-development, and are usually designed to complete only one or a few specific tasks. Programmed computational approaches are more flexible because they can be implemented and adjusted through software, but unfortunately, these approaches can become rather complex as tasks become more difficult. This thesis explores the potential …


Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan Jan 2019

Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan

Williams Honors College, Honors Research Projects

This honors project will also serve as an engineering senior design project.

The objective is to design and build the software and electrical systems for a 60 lb weight class combat robot that will function autonomously and outperform manually driven robots during competition.

While running autonomously, the robot will use LiDAR sensors to detect and attack opponent robots. This robot will also be able to be remote controlled in manual mode. This will mitigate the risk in case the autonomy or sensors fail. LED lights on the robot will indicate whether it is in autonomous or manual mode. The system …


Safe Pass, Alycia Riese, Julia Hariharan, Greg Synek, Jonathan Hall Jan 2019

Safe Pass, Alycia Riese, Julia Hariharan, Greg Synek, Jonathan Hall

Williams Honors College, Honors Research Projects

The purpose of this project is to design a sensor to be mounted on Class IV and higher vehicles to detect on-coming traffic. If traffic has been detected, the system is to warn drivers behind the stopped vehicle that passing is unsafe. The vehicle detection is to be implemented using a LiDAR detection method along with signal processing. A wireless transceiver is to transmit from the front radar module to the rear warning indicator module when the conditions are unsafe for passing. The project goals are to increase road safety and maintain traffic flow. The report details the challenges due …


Smart Parking Deck, Ryne Turner, Matthew Mcdade, Julie Aichinger, Laveréna Wienclaw Jan 2019

Smart Parking Deck, Ryne Turner, Matthew Mcdade, Julie Aichinger, Laveréna Wienclaw

Williams Honors College, Honors Research Projects

The Smart Parking Deck employs elementary circuit design elements and mobile application development. Each device module uses laser proximity sensors to check the availability of an individual parking space and a Zigbee unit to communicate with the adjacent device module. The modules are connected to a network hub that manages all of the incoming and outgoing parking data. This data is displayed on the mobile application. The system is easily manageable and energy efficient, significantly decreasing the costs associated with other smart parking systems on the market. This system is aimed at decreasing commute time for students by allowing them …


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP/MPFM Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …


The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi Jan 2019

The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi

Theses and Dissertations

Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue …


Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam Jan 2019

Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam

Theses and Dissertations

Future computing will require significant development in new computing device paradigms. This is motivated by CMOS devices reaching their technological limits, the need for non-Von Neumann architectures as well as the energy constraints of wearable technologies and embedded processors. The first device proposal, an energy-efficient voltage-controlled domain wall device for implementing an artificial neuron and synapse is analyzed using micromagnetic modeling. By controlling the domain wall motion utilizing spin transfer or spin orbit torques in association with voltage generated strain control of perpendicular magnetic anisotropy in the presence of Dzyaloshinskii-Moriya interaction (DMI), different positions of the domain wall are realized …


A Compiler Target Model For Line Associative Registers, Paul S. Eberhart Jan 2019

A Compiler Target Model For Line Associative Registers, Paul S. Eberhart

Theses and Dissertations--Electrical and Computer Engineering

LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.


Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona Jan 2019

Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona

Theses and Dissertations--Electrical and Computer Engineering

Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.

Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …


T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus Jan 2019

T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus

Theses and Dissertations--Electrical and Computer Engineering

With the emergence of quantum physics and computer science in the 20th century, a new era was born which can solve very difficult problems in a much faster rate or problems that classical computing just can't solve. In the 21st century, quantum computing needs to be used to solve tough problems in engineering, business, medical, and other fields that required results not today but yesterday. To make this dream come true, engineers in the semiconductor industry need to make the quantum circuits a reality.

To realize quantum circuits and make them scalable, they need to be fault tolerant, …


Quantum Comparator Circuit On Superconducting Quantum Computer, Naphan Benchasattabuse Jan 2019

Quantum Comparator Circuit On Superconducting Quantum Computer, Naphan Benchasattabuse

Chulalongkorn University Theses and Dissertations (Chula ETD)

In this thesis, we present an optimised quantum comparator circuit based on Cuccaro's ripple-carry quantum adder using relative phase techniques from Maslov's multiple control Toffoli optimisation. We extend the cost function from simply counting C-Not and Toffoli gate to Qiskit cost which defines arbitrary single qubit gate cost as unity and C-Not as the only two qubit gate cost as ten. We report the comparison result between our comparator circuit with previous comparator circuits from literature using optimal Toffoli implementation with Qiskit cost, C-Not count, and circuit depth. We also report our experiment of implementing a two-bit comparator on IBM …


A Peer-To-Peer Protocol For Prioritized Software Updates On Wireless Sensor Networks, Natchanon Nuntanirund Jan 2019

A Peer-To-Peer Protocol For Prioritized Software Updates On Wireless Sensor Networks, Natchanon Nuntanirund

Chulalongkorn University Theses and Dissertations (Chula ETD)

Software updating is essential for devices in wireless sensor networks for adding new features, improving performance, or patching vulnerabilities. But since some deployed devices are unable to be accessed directly, data dissemination protocol is used for distributing the update to those devices. However, each software updating may have different priority, for instance, an update that adds an optional feature does not have to be applied as fast as an update that patches severe vulnerabilities. This research presents a reliable data dissemination protocol which is configurable for energy-speed trade-off deriving some concepts from BitTorrent such as Handshaking, Segmented File Transfer, and …


Semantic Segmentation On Remotely Sensed Images Using Deep Convolutional Encoder-Decoder Neural Network, Teerapong Panboonyuen Jan 2019

Semantic Segmentation On Remotely Sensed Images Using Deep Convolutional Encoder-Decoder Neural Network, Teerapong Panboonyuen

Chulalongkorn University Theses and Dissertations (Chula ETD)

One of the fundamental tasks in remote sensing is the semantic segmentation of the aerial and satellite images. It plays a vital role in applications, such as agriculture planning, map updates, route optimization, and navigation. The state-of-the-art model is the Deep Convolutional Encoder-Decoder (DCED). However, the accuracy is still limited since the architecture is not designed for recovering low-level features, e.g., river, low vegetation on remotely sensed images, and the training data in this domain are deficient. In this dissertation, we aim to propose the semantic segmentation architecture in five aspects, designed explicitly for the remotely sensed field. First, we …