Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

Theses/Dissertations

2022

Institution
Keyword
Publication

Articles 1 - 30 of 61

Full-Text Articles in Engineering

Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost Dec 2022

Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost

Major Papers

The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak Dec 2022

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke Dec 2022

Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke

Electronic Thesis and Dissertation Repository

The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li Dec 2022

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton Dec 2022

Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton

Theses and Dissertations

All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …


Digital Forensics For Investigating Control-Logic Attacks In Industrial Control Systems, Nauman Zubair Dec 2022

Digital Forensics For Investigating Control-Logic Attacks In Industrial Control Systems, Nauman Zubair

University of New Orleans Theses and Dissertations

Programmable logic controllers (PLC) are required to handle physical processes and thus crucial in critical infrastructures like power grids, nuclear facilities, and gas pipelines. Attacks on PLCs can have disastrous consequences, considering attacks like Stuxnet and TRISIS. Those attacks are examples of exploits where the attacker aims to inject into a target PLC malicious control logic, which engineering software compiles as a reliable code. When investigating a security incident, acquiring memory can provide valuable insight such as runtime system activities and memory-based artifacts which may contain the attacker's footprints. The existing memory acquisition tools for PLCs require a hardware-level debugging …


A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed Dec 2022

A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed

Electronic Theses, Projects, and Dissertations

Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …


Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed Dec 2022

Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed

Electronic Theses and Dissertations

Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …


The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten Dec 2022

The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten

Honors Theses

Mental health issues have become increasingly important in today's society. With that being said, researchers and consumers are looking for new ways to manage and treat mental health using new technologies in labs and the consumer space. This innovation has led to the presence of mobile self-help mental health applications, applications for peoples’ phones that are used to manage symptoms of mental health problems, such as depression and anxiety, track goals, meditate, and more. However, mobile mental health applications, and mobile applications in general, have a problem concerning user satisfaction and overall user retention – studies have shown that 95% …


Large Genomes Assembly Using Mapreduce Framework, Yuehua Zhang Dec 2022

Large Genomes Assembly Using Mapreduce Framework, Yuehua Zhang

All Dissertations

Knowing the genome sequence of an organism is the essential step toward understanding its genomic and genetic characteristics. Currently, whole genome shotgun (WGS) sequencing is the most widely used genome sequencing technique to determine the entire DNA sequence of an organism. Recent advances in next-generation sequencing (NGS) techniques have enabled biologists to generate large DNA sequences in a high-throughput and low-cost way. However, the assembly of NGS reads faces significant challenges due to short reads and an enormously high volume of data. Despite recent progress in genome assembly, current NGS assemblers cannot generate high-quality results or efficiently handle large genomes …


Lung Cancer Type Classification, Mohit Ramajibhai Ankoliya Dec 2022

Lung Cancer Type Classification, Mohit Ramajibhai Ankoliya

Electronic Theses, Projects, and Dissertations

Lung cancer is the third most common cancer in the U.S. This research focuses on classifying lung cancer cells based on their tumor cell, shape, and biological traits in images automatically obtained by passing through the

convolutional layers. Additionally, I classify whether the lung cell is adenocarcinoma, large cell carcinoma, squamous cell carcinoma, or normal cell carcinoma. The benefit of this classification is an accurate prognosis, leading to patients receiving proper therapy. The Lung Cancer CT(Computed Tomography) image dataset from Kaggle has been drawn with 1000 CT images of various types of lung cancer. Two state-of-the-art convolutional neural networks (CNNs) …


Effects Of Surface Noise On Printing Artifacts: An Artistic Approach To Hiding Print Artifacts, Samuel New Dec 2022

Effects Of Surface Noise On Printing Artifacts: An Artistic Approach To Hiding Print Artifacts, Samuel New

All Theses

This research focuses on improving the quality of Fused Filament Fabrication (FFF) 3D printing by using fractal noise to mask certain print artifacts (e.g. layer lines and stair-stepping). The use of textures is quite common in digital sculpting for aesthetic reasons. This study focuses on finding specific textures that minimize visible 3D print artifacts.


Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha Nov 2022

Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha

LSU Master's Theses

In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …


Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane Oct 2022

Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane

LSU Master's Theses

Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …


Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia Oct 2022

Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia

Doctoral Dissertations and Master's Theses

Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …


Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda Sep 2022

Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda

Dissertations, Theses, and Capstone Projects

With the increase of deception and misinformation especially in social media, it has become crucial to develop machine learning methods to automatically identify deception. In this dissertation, we identify key challenges underlying text-based deception detection in a cross-domain setting, where we do not have training data in the target domain. We analyze the differences between domains and as a result develop methods to improve cross-domain deception detection. We additionally develop approaches that take advantage of cross-lingual properties to support deception detection across languages. This involves the usage of either multilingual NLP models or translation models. Finally, to better understand multi-modal …


Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile Aug 2022

Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile

Electronic Thesis and Dissertation Repository

Corporate networks are constantly bombarded by malicious actors trying to gain access. The current state of the art in protecting networks is deep learning-based intrusion detection systems (IDS). However, for an IDS to be effective it needs to be trained on a good dataset. The best datasets for training an IDS are real data captured from large corporate networks. Unfortunately, companies cannot release their network data due to privacy concerns creating a lack of public cybersecurity data. In this thesis I take a novel approach to network dataset anonymization using character-level LSTM models to learn the characteristics of a dataset; …


Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani Aug 2022

Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani

Doctoral Dissertations

Deep learning-based algorithms have remarkably improved the performance in many computer vision tasks. However, deep networks often demand a large-scale and carefully annotated dataset and sufficient sample coverage of every training category. However, it is not practical in many real-world applications where only a few examples may be available, or the data annotation is costly and require expert knowledge. To mitigate this issue, learning with limited data has gained considerable attention and is investigated thorough different learning methods, including few-shot learning, weakly/semi supervised learning, open-set learning, etc.

In this work, the classification problem is investigated under an open-world assumption to …


A Digital Healthcare Application For Patient Monitoring And Assessment, Brandon Shumin Aug 2022

A Digital Healthcare Application For Patient Monitoring And Assessment, Brandon Shumin

All Theses

The COVID-19 pandemic strained our healthcare resources and exacerbated the existing issues of primary care shortages and burnout rates for healthcare professionals. Due in part to these factors, telehealth has seen more wide-spread use during this time. However, current asynchronous telehealth applications require stable Internet to function fully. Since many medically underserved populations in the United States lack Internet access in their homes, an application that offers patient monitoring and assessment could extend their access to medical resources. This work proposes such a digital healthcare application for iOS devices and evaluates it based on the system requirements of availability, data …


Improving The Programmability Of Networked Energy Systems, Noman Bashir Jun 2022

Improving The Programmability Of Networked Energy Systems, Noman Bashir

Doctoral Dissertations

Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …


Researching The Impact Of Cal Poly Classes On Computing Students Perceptions Of Computer Ethics And Social Responsibility, Annie Joss Jun 2022

Researching The Impact Of Cal Poly Classes On Computing Students Perceptions Of Computer Ethics And Social Responsibility, Annie Joss

Computer Engineering

The importance and impact of socio-technical systems are playing an increasing role in the education of computing students. Discussion of ethics and social responsibility has always been a tenant of computer science education; however, research has shown engineering and computer science students lose focus on these values over their engineering education. Cal Poly computing departments have taken steps to emphasize social responsibility and ethics through required and suggested courses. This project focuses on examining the values and beliefs of Cal Poly computing students, who were surveyed over Winter and Spring Quarters in 2022. This project is inspired by Dr. Cech’s …


Digital Forensics Range, Cody P. Shanahan, Bryson Y. Shishido, Samuel R. Mckee, Justin Siu, Lisa Li, Maxwell Brewer Jun 2022

Digital Forensics Range, Cody P. Shanahan, Bryson Y. Shishido, Samuel R. Mckee, Justin Siu, Lisa Li, Maxwell Brewer

Computer Engineering

The Digital Forensics Range was developed to serve as an online training for groups interested in computer forensics. This year's team had the goal to expand upon last year, by adding a new forensics image, unity scenario, and additional AWS functionality. The team still wanted to continue with last year's goals of keeping the training easily runnable, quickly deployable, and rapidly scalable through the use of the cloud. Adding to last year's work, this year's team hoped to further increase the educational value of the simulation with more practice, and the addition of feedback. The training is meant to be …


Smartphone Control Of Rc Cars, Weston R. Fitzgerald Jun 2022

Smartphone Control Of Rc Cars, Weston R. Fitzgerald

Electrical Engineering

The smartphone-controlled RC (remote-controlled) car is an inexpensive remote-controlled car designed to be fast and portable. Instead of manufacturing, packaging, and shipping a separate controller, the remote control is implemented in a phone application, which saves time and money in both the design process and the manufacturing process. Utilizing the user’s smartphone is more cost-effective since mobile devices are a common recurrence, and packaging fewer devices results in overall better portability of the product.

This smartphone-controlled car is speedy and intuitive to learn for typical smartphone users. The user can change the car’s speed and direction wirelessly using their phone; …


Happiness And Policy Implications: A Sociological View, Sarah M. Kahl Jun 2022

Happiness And Policy Implications: A Sociological View, Sarah M. Kahl

Dissertations, Theses, and Capstone Projects

The World Happiness Report is released every year, ranking each country by who is “happier” and explaining the variables and data they have used. This project attempts to build from that base and create a machine learning algorithm that can predict if a country will be in a “happy” or “could be happier” category. Findings show that taking a broader scope of variables can better help predict happiness. Policy implications are discussed in using both big data and considering social indicators to make better and lasting policies.


Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity Jun 2022

Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity

Master's Theses

Over the past two decades there has been a rapid decline in public oversight of state and local governments. From 2003 to 2014, the number of journalists assigned to cover the proceedings in state houses has declined by more than 30\%. During the same time period, non-profit projects such as Digital Democracy sought to collect and store legislative bill and hearing information on behalf of the public. More recently, AI4Reporters, an offshoot of Digital Democracy, seeks to actively summarize interesting legislative data.

This thesis presents STRAINER, a parallel project with AI4Reporters, as an active data retrieval and filtering system for …


Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli Jun 2022

Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli

Master's Theses

Though exploring one’s family lineage through genealogical family trees can be insightful to developing one’s identity, this knowledge is typically held behind closed doors by private companies or require expensive technologies, such as DNA testing, to uncover. With the ever-booming explosion of data on the world wide web, many unstructured text documents, both old and new, are being discovered, written, and processed which contain rich genealogical information. With access to this immense amount of data, however, entails a costly process whereby people, typically volunteers, have to read large amounts of text to find relationships between people. This delays having genealogical …


A Machine Learning Approach To Predicting The Onset Of Type Ii Diabetes In A Sample Of Pima Indian Women, Meriem Benarbia Jun 2022

A Machine Learning Approach To Predicting The Onset Of Type Ii Diabetes In A Sample Of Pima Indian Women, Meriem Benarbia

Dissertations, Theses, and Capstone Projects

Type II diabetes is a disease that affects how the body regulates and uses sugar (glucose) as a fuel. This chronic disease results in too much sugar circulating in the bloodstream. High blood sugar levels can lead to circulatory, nervous, and immune systems disorders. Machine learning (ML) techniques have proven their strength in diabetes diagnosis. In this paper, we aimed to contribute to the literature on the use of ML methods by examining the value of a number of supervised machine learning algorithms such as logistic regression, decision tree classifiers, random forest classifiers, and support vector classifiers to identify factors …


Personal Library Organization And Tracking Application (Plot), Katie Honsinger May 2022

Personal Library Organization And Tracking Application (Plot), Katie Honsinger

Honors Projects

This project is inspired by my family's gloriously unmanageable book collection. Its primary goal is to provide a simple way to track your book collection, to avoid double-buying and help disorganized book-lovers everywhere stay sane! You can also track where a particular book is physically (or at least, where it should be!). There are a few features I'd still like to implement, but mainly I want this app to stay simple so it is easy to use and maintain.


Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen May 2022

Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen

Honors Theses

This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …


Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan May 2022

Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan

All Dissertations

Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a project. A single contract package, especially of a design-build (DB) project, comprises hundreds of documents including thousands of requirements. Precise comprehension and management of the requirements are critical to ensure that all important explicit and implicit requirements of the project scope are captured, managed, and completed. Since requirements are mainly written in a natural human language, the current manual methods impose a significant burden on practitioners to process and restructure them into …