Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

Theses/Dissertations

2022

Institution
Keyword
Publication

Articles 31 - 60 of 61

Full-Text Articles in Engineering

Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber May 2022

Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber

Physics Undergraduate Honors Theses

In the search for life beyond our solar system, the study of M-dwarfs has become increasingly important due to their unique characteristics including their small size, flaring capabilities, and long lifespans. Their small size allows for exoplanet detection due to observable gravitational interactions, and the stellar flares could potentially trigger prebiotic life on exoplanets in the system. Lastly, their long lifespans may provide the conditions necessary to foster prebiotic life and the development of more complex organisms over time. Flare rate is a critical factor in determining the habitability of the exoplanet due to its potential to damage or incubate …


Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha May 2022

Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha

Honors Theses

The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …


A Research Framework And Initial Study Of Browser Security For The Visually Impaired, Elaine Lau, Zachary Peterson May 2022

A Research Framework And Initial Study Of Browser Security For The Visually Impaired, Elaine Lau, Zachary Peterson

Master's Theses

The growth of web-based malware and phishing attacks has catalyzed significant advances in the research and use of interstitial warning pages and modals by a browser prior to loading the content of a suspect site. These warnings commonly use visual cues to attract users' attention, including specialized iconography, color, and an absence of buttons to communicate the importance of the scenario. While the efficacy of visual techniques has improved safety for sighted users, these techniques are unsuitable for blind and visually impaired users. This is likely not due to a lack of interest or technical capability by browser manufactures, where …


Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn Apr 2022

Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the degree Master of Science by Thomas A. Buteyn on April 25, 2022.


Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri Apr 2022

Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri

Electronic Thesis and Dissertation Repository

Electricity load forecasting has been attracting increasing attention because of its importance for energy management, infrastructure planning, and budgeting. In recent years, the proliferation of smart meters has created new opportunities for forecasting on the building and even individual household levels. Machine learning (ML) has achieved great successes in this domain; however, conventional ML techniques require data transfer to a centralized location for model training, therefore, increasing network traffic and exposing data to privacy and security risks. Also, traditional approaches employ offline learning, which means that they are only trained once and miss out on the possibility to learn from …


A Component-Based Analysis For Online Proctoring, Salma Roshdy Ali Apr 2022

A Component-Based Analysis For Online Proctoring, Salma Roshdy Ali

Theses and Dissertations

The switch to online learning due to the COVID-19 revealed flaws in the existing learning methods, especially with online proctored assessments. Hence, online proctoring using computers was needed for a fair evaluation. Many studies develop cheating detection systems using several approaches. However, to the best of our knowledge, none of the existing studies investigated the impact of their system components in detecting cheating behaviors. Combining system components, even if they do not significantly improve the system performance in cheating detection, can cause an overload on the system. Therefore, our goal is to investigate the system components’ impact, individually and combined, …


Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan Apr 2022

Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan

LSU Doctoral Dissertations

As a new class of smart materials, shape memory polymer (SMP) is gaining great attention in both academia and industry. One challenge is that the chemical space is huge, while the human intelligence is limited, so that discovery of new SMPs becomes more and more difficult. In this dissertation, by adopting a series of machine learning (ML) methods, two frameworks are established for discovering new thermoset shape memory polymers (TSMPs). Specifically, one of them is performed by a combination of four methods, i.e., the most recently proposed linear notation BigSMILES, supplementing existing dataset by reasonable approximation, a mixed dimension (1D …


Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor Apr 2022

Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor

Senior Theses

Current work in the field of deep learning and neural networks revolves around several variations of the same mathematical model for associative learning. These variations, while significant and exceptionally applicable in the real world, fail to push the limits of modern computational prowess. This research does just that: by leveraging high order tensors in place of 2nd order tensors, quadratic neural networks can be developed and can allow for substantially more complex machine learning models which allow for self-interactions of collected and analyzed data. This research shows the theorization and development of mathematical model necessary for such an idea to …


Learning Analytics For The Formative Assessment Of New Media Skills, Negar Shabihi Mar 2022

Learning Analytics For The Formative Assessment Of New Media Skills, Negar Shabihi

Electronic Thesis and Dissertation Repository

Recent theories of education have shifted learning environments towards student-centred education. Also, the advancement of technology and the need for skilled individuals in different areas have led to the introduction of new media skills. Along with new pedagogies and content, these changes require new forms of assessment. However, assessment as the core of learning has not been modified as much as other educational aspects. Hence, much attention is required to develop assessment methods based on current educational requirements. To address this gap, we have implemented two data-driven systematic literature reviews to recognize the existing state of the field in the …


Efficient Information Retrieval For Software Bug Localization, Saket Khatiwada Mar 2022

Efficient Information Retrieval For Software Bug Localization, Saket Khatiwada

LSU Doctoral Dissertations

Software systems are often shipped with defects. When a bug is reported, developers use the information available in the associated report to locate source code fragments that need to be modified to fix the bug. However, as software systems evolve in size and complexity, bug localization can become a tedious and time-consuming process. Contemporary bug localization tools utilize Information Retrieval (IR) methods for automated support to minimize the manual effort. IR methods exploit the textual content of bug reports to capture and rank relevant buggy source files. However, for an IR-based bug localization tool to be useful, it must achieve …


A Date With Cheemis: Bullying In The Virtual Space, Nicholas Roger Nolasco Mar 2022

A Date With Cheemis: Bullying In The Virtual Space, Nicholas Roger Nolasco

Liberal Arts and Engineering Studies

A Date With Cheemis is an alternative game mode for the social platform VRChat designed in the Unity real-time 3D development platform. The project is an experience where the player meets many non-playable characters (NPCs) and makes decisions based on different scenarios. The game tells the story of a VRChat user named Cheemis who is bullied for the avatar they use and how they interact with other characters. The player must make choices of how to react to the way the NPCs treat Cheemis, whether that be defending him or being a bystander. This experience is only available through the …


Adding Temporal Information To Lidar Semantic Segmentation For Autonomous Vehicles, Mohammed Anany Jan 2022

Adding Temporal Information To Lidar Semantic Segmentation For Autonomous Vehicles, Mohammed Anany

Theses and Dissertations

Semantic segmentation is an essential technique to achieve scene understanding for various domains and applications. Particularly, it is of crucial importance in autonomous driving applications. Autonomous vehicles usually rely on cameras and light detection and ranging (LiDAR) sensors to gain contextual information from the environment. Semantic segmentation has been employed to process images and point clouds that were captured from cameras and LiDAR sensors respectively. One important research direction to consider is investigating the impact of utilizing temporal information in the domain of semantic segmentation. Many contributions exist in the field with regards to utilizing temporal information for semantic segmentation …


Camera And Lidar Fusion For Point Cloud Semantic Segmentation, Ali Abdelkader Jan 2022

Camera And Lidar Fusion For Point Cloud Semantic Segmentation, Ali Abdelkader

Theses and Dissertations

Perception is a fundamental component of any autonomous driving system. Semantic segmentation is the perception task of assigning semantic class labels to sensor inputs. While autonomous driving systems are currently equipped with a suite of sensors, much focus in the literature has been on semantic segmentation of camera images only. Research in the fusion of different sensor modalities for semantic segmentation has not been investigated as much. Deep learning models based on transformer architectures have proven successful in many tasks in computer vision and natural language processing. This work explores the use of deep learning transformers to fuse information from …


Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed Jan 2022

Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed

Theses and Dissertations

The task of summarization can be categorized into two methods, extractive and abstractive summarization. Extractive approach selects highly meaningful sentences to form a summary while the abstractive approach interprets the original document and generates the summary in its own words. The task of generating a summary, whether extractive or abstractive, has been studied with different approaches such as statistical-based, graph-based, and deep-learning based approaches. Deep learning has achieved promising performance in comparison with the classical approaches and with the evolution of neural networks such as the attention network or commonly known as the Transformer architecture, there are potential areas for …


Interpretable And Anti-Bias Machine Learning Models For Human Event Sequence Data, Zihan Zhou Jan 2022

Interpretable And Anti-Bias Machine Learning Models For Human Event Sequence Data, Zihan Zhou

LSU Doctoral Dissertations

Growing volumes and varieties of human event sequence data are available in many applications such as recommender systems, social network, medical diagnosis, and predictive policing. Human event sequence data is usually clustered and exhibits self-exciting properties. Machine learning models especially deep neural network models have shown great potential in improving the prediction accuracy of future events. However, current approaches still suffer from several drawbacks such as model transparency, unfair prediction and the poor prediction accuracy due to data sparsity and bias. Another issue in modeling human event data is that data collected from real word is usually incomplete, and even …


Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette Jan 2022

Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette

Theses, Dissertations and Capstones

Conventional sensors are rapidly approaching efficiency limitations at their current size. In designing more efficient sensors, low dimensional materials such as carbon nanotubes (CNTs), quantum dots, and DNA origami can be used to enable higher degrees of sensitivity. Because of the high atomic surface to core ratio, these materials can be used to detect slight changes in chemical composition, strain, and temperature. CNTs offer unique advantages in different types of sensors due to their electromechanical properties. In temperature sensing, the high responsiveness to temperature and durability can be used to produce an accurate, reliable sensor in even extreme temperatures. This …


Intelligent Voice Guidance In Vr: Understanding The Value Of Nlp In Virtual Environments, Zhiyu Xiao Jan 2022

Intelligent Voice Guidance In Vr: Understanding The Value Of Nlp In Virtual Environments, Zhiyu Xiao

Dartmouth College Master’s Theses

Virtual assistants such as Google Assistant, Alexa and Siri emerged because of the growth of NLP(natural language processing) technology. At the same time, virtual reality has developed rapidly in recent years and has become a crucial tool in engineering product development procedures. However, people feel overwhelmed in some complicated VR environments. Thus, this thesis tries to incorporate NLP technology into the VR environment and explores the value of intelligent voice guidance in VR environments. In this thesis, a car repair training system with intelligent voice guidance is designed: users can utilize voice to perform various tasks in this system, such …


Backlog Burner: An Adventure Into Automated Scheduling, Anjolaoluwa J. Olubusi Jan 2022

Backlog Burner: An Adventure Into Automated Scheduling, Anjolaoluwa J. Olubusi

Senior Independent Study Theses

The focus of this independent study is to explain the nurse scheduling problem (NSP) and use it as a basis to create an automated scheduling program. The nurse scheduling problem is an operational research problem that sets to find an optimal hospital schedule that fulfills the needs of the hospital and the personal requests of the nurses. The majority of solutions for the nurse scheduling problem are often designed within a hospital setting. The objective of this independent study is to use the solutions of the nurse scheduling problem to develop an automated scheduling program for the College of Wooster …


An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar Jan 2022

An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar

Dissertations, Master's Theses and Master's Reports

The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.

In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …


Modeling Document Classification To Automate Mental Health Diagnosis, William M. Tadlock Jan 2022

Modeling Document Classification To Automate Mental Health Diagnosis, William M. Tadlock

EWU Masters Thesis Collection

The objective of this study is to determine if diagnosis documents can be used with document classification to automatically diagnose mental health conditions. Document classification allows text documents to be analyzed and organized into their appropriate classes based on the features and words presented in the text. One application of this is within the medical field to automatically classify different patient diagnosis based on medical or patient notes. This research applied mental health diagnosis documents to automatically diagnose a group of patients with a mental health condition based on text-based survey data. This classification was approached through several feature engineering …


An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman Jan 2022

An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman

Theses and Dissertations--Computer Science

The ever-increasing parallelism in computer systems has made software more prone to concurrency failures, causing problems during both pre- and post-development. Debugging concurrent programs is difficult because of the non-deterministic behavior and the specific sequences of interleaving in the execution flow. Debugging is a technique where programmers reproduce the bug, identify the root cause, and then take necessary steps to remove the bug from the system. The failure information may come from the bug reports of the testing phase or the production runs. In both cases, there should be steps taken to reproduce and localize the failure. However, reproducing and …


A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye Jan 2022

A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye

Graduate Theses, Dissertations, and Problem Reports

Lung cancer has the second highest cancer incidence rate and the top cancer-related mortality worldwide. An estimate from the American Cancer Society shows that, in 2022, there will be about 236,740 lung cancer cases (117,910 men and 118,830 women) in the US. To date, there are no prognostic/predictive biomarkers to select chemotherapy, immunotherapy, and radiotherapy in individual non-small cell lung cancer (NSCLC) patients. There is an unmet clinical need to identify patients with early-stage NSCLC who are likely to develop recurrence and to predict their therapeutic responses. This dissertation developed a novel computational methodology for modeling molecular gene association networks …


Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean Jan 2022

Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean

Graduate Theses, Dissertations, and Problem Reports

Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …


An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez Jan 2022

An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez

Graduate Theses, Dissertations, and Problem Reports

An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …


Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu Jan 2022

Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu

Graduate Theses, Dissertations, and Problem Reports

Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …


Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy Jan 2022

Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy

Graduate Theses, Dissertations, and Problem Reports

Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.

This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …


Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire Jan 2022

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire

Graduate Theses, Dissertations, and Problem Reports

Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …


Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei Jan 2022

Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei

Dissertations, Master's Theses and Master's Reports

The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.

Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …


Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey Jan 2022

Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey

Williams Honors College, Honors Research Projects

In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …


Penetration Testing In A Small Business Network, Lee Kandle Jan 2022

Penetration Testing In A Small Business Network, Lee Kandle

Williams Honors College, Honors Research Projects

Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …