Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 52 of 52

Full-Text Articles in Engineering

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta Jan 2021

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta

Browse all Theses and Dissertations

Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …


Sample Mislabeling Detection And Correction In Bioinformatics Experimental Data, Soon Jye Kho Jan 2021

Sample Mislabeling Detection And Correction In Bioinformatics Experimental Data, Soon Jye Kho

Browse all Theses and Dissertations

Sample mislabeling or incorrect annotation has been a long-standing problem in biomedical research and contributes to irreproducible results and invalid conclusions. These problems are especially prevalent in multi-omics studies in which a large set of biological samples are characterized by multiple types of omics platforms at different times or different labs. While multi-omics studies have demonstrated tremendous value in understanding disease biology and improving patient outcomes, the complexity of these studies may increase opportunities for human error. Fortunately, the interrelated nature of the data collected in multi-omics studies can be exploited to facilitate the identification and, in some cases, correction …


Arise - Augmented Reality In Surgery And Education, Sadan Suneesh Menon Jan 2021

Arise - Augmented Reality In Surgery And Education, Sadan Suneesh Menon

Browse all Theses and Dissertations

Human errors in healthcare can be fatal. Proper physical assessment of patients to avoid such errors is of paramount importance. Incorrect or insufficient assessment of the patient can cause treatment delays that may lead to negative outcomes. In this dissertation we introduce innovative technology to assist surgeons in patient assessment as well as during the training of nurses in order to enhance learning. Technological advancements have made it possible to visualize overlays of computer-generated 3D models on real-world surfaces. This technology is called augmented reality. Using Steady State Topography (SST) brain imaging to examine the brain activity of people who …


Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett Jan 2020

Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett

Browse all Theses and Dissertations

Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.


Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan Jan 2020

Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan

Browse all Theses and Dissertations

Recent advances in location acquisition services have resulted in vast amounts of trajectory data; providing valuable insight into human mobility. The field of trajectory data mining has exploded as a result, with literature detailing algorithms for (pre)processing, map matching, pattern mining, and the like. Unfortunately, obtaining trajectory data for the design and evaluation of such algorithms is problematic due to privacy, ethical, dataset size, researcher access, and sampling frequency concerns. Synthetic trajectories provide a solution to such a problem as they are cheap to produce and are derived from a fully controllable generation procedure. Citing deficiencies in modern synthetic trajectory …


Enabling Static Program Analysis Using A Graph Database, Jialun Liu Jan 2020

Enabling Static Program Analysis Using A Graph Database, Jialun Liu

Browse all Theses and Dissertations

This thesis presents the design, the implementation, and the evaluation of a database-oriented static program analysis engine for the PHP programming language. This engine analyzes PHP programs by representing their semantics using a graph-based data structure, which will be subsequently stored into a graph database. Such scheme will fundamentally facilitate various program analysis tasks such as static taint analysis, visualization, and data mining. Specifically, these complex program analysis tasks can now be translated into built-in declarative graph database operations with rich features. Our engine fundamentally differs from other existing static program analysis systems that mainly leverage intermediate representation (IRs) to …


Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja Jan 2019

Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja

Browse all Theses and Dissertations

Educating people about vaccination tends to target vaccine acceptance and reduction of hesitancy. Social media provides a promising platform for studying public perception regarding vaccination. In this study, we harvested tweets over a year related to vaccines from February 2018 to January 2019. We present a two-stage classifier to: (1) classify the tweets as relevant or non-relevant and (2) categorize them in terms of pro-vaccination, anti-vaccination, or neutral outlook. We found that the classifier was able to distinguish clearly between anti-vaccination and pro-vaccination tweets, but also misclassified many of these as neutral. Using Latent Dirichlet Allocation, we found that two …


Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra Jan 2019

Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra

Browse all Theses and Dissertations

Coaching patients to follow the rehabilitation routines correctly and timely after surgery is often a challenge due to the limited medical knowledge of patients and limited availability of clinicians. Similarly, it is also a challenge to train medical professionals with both the technical and communication skills required in their practices. The recent emergence of VR technologies shines the light on improving the current training practices. In this thesis research, I will look at the development and application of VR-based immersive training games for two particular cases: 1. Post hand surgery rehab; and, 2. Training for Social determinants of health (SDOH) …


Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris Jan 2019

Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris

Browse all Theses and Dissertations

In recent decades, field programmable gate arrays (FPGAs) have evolved beyond simple, expensive computational components with minimal computing power to complex, inexpensive computational engines. Today, FPGAs can perform algorithmically complex problems with improved performance compared to sequential CPUs by taking advantage of parallelization. This concept can be readily applied to the computationally dense field of image manipulation and analysis. Processed on a standard CPU, image manipulation suffers with large image sets processed by highly sequential algorithms, but by carefully adhering to data dependencies, parallelized FPGA functions or kernels offer the possibility of significant improvement through threaded CPU functions. This thesis …


Static Evaluation Of Type Inference And Propagation On Global Variables With Varying Context, Ivan Frasure Jan 2019

Static Evaluation Of Type Inference And Propagation On Global Variables With Varying Context, Ivan Frasure

Browse all Theses and Dissertations

Software reverse engineering (SRE) is a broad field with motivations ranging from verifying or documenting gordian source code files to understanding and reimplementing binary object files and executables. SRE of binaries is exceptionally compelling and challenging due to large amounts of information that can be lost in the compilation progress. A central area in SRE is type inference. Type inference is built around a fundamental step in understanding the behavior of a binary, recovering the types of data in the program. Type inference has many unique techniques in both static and dynamic type inference systems that have been implemented in …


Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li Jan 2019

Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li

Browse all Theses and Dissertations

Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …


Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma Jan 2019

Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma

Browse all Theses and Dissertations

With massive data collections and needs for building powerful predictive models, data owners may choose to outsource storage and expensive machine learning computations to public cloud providers (Cloud). Data owners may choose cloud outsourcing due to the lack of in-house storage and computation resources or the expertise of building models. Similarly, users, who subscribe to specialized services such as movie streaming and social networking, voluntarily upload their data to the service providers' site for storage, analytics, and better services. The service provider, in turn, may also choose to benefit from ubiquitous cloud computing. However, outsourcing to a public cloud provider …


Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar Jan 2019

Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar

Browse all Theses and Dissertations

Navigating in a Virtual Environment with traditional input devices such as mouse, joysticks and keyboards provide limited maneuverability and is also time consuming. While working in a virtual environment, changing parameters to obtain the desired visualization requires time to achieve by manually entering parameter values in an algorithm to test outcomes. The following thesis presents an alternate user interface to reduce user efforts, while navigating within the Virtual Environment. The user interface is an Android application which is designed to accommodate spoken commands. This Speech Enabled User Interface termed as the Speech Navigation Application (SNA), provides the user with an …


Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter Jan 2019

Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter

Browse all Theses and Dissertations

In recent years embedded devices have become more ubiquitous than ever before and are expected to continue this trend. Embedded devices typically have a singular or more focused purpose, a smaller footprint, and often interact with the physical world. Some examples include routers, wearable heart rate monitors, and thermometers. These devices are excellent at providing real time data or completing a specific task quickly, but they lack many features that make security issues more obvious. Generally, Embedded devices are not easily secured. Malware or rootkits in the firmware of an embedded system are difficult to detect because embedded devices do …


Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker Jan 2019

Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker

Browse all Theses and Dissertations

In the growing world of cybersecurity, being able to map and analyze how software and hardware interact is key to understanding and protecting critical embedded systems like the Engine Control Unit (ECU). The aim of our research is to use our understanding of the ECU's control flow attained through manual analysis to automatically map and identify sensor functions found within the ECU. We seek to do this by generating unique sets of feature vectors for every function within the binary file of a car ECU, and then using those feature sets to locate functions within each binary similar to their …


A Framework To Understand Emoji Meaning: Similarity And Sense Disambiguation Of Emoji Using Emojinet, Sanjaya Wijeratne Jan 2018

A Framework To Understand Emoji Meaning: Similarity And Sense Disambiguation Of Emoji Using Emojinet, Sanjaya Wijeratne

Browse all Theses and Dissertations

Pictographs, commonly referred to as `emoji’, have become a popular way to enhance electronic communications. They are an important component of the language used in social media. With their introduction in the late 1990’s, emoji have been widely used to enhance the sentiment, emotion, and sarcasm expressed in social media messages. They are equally popular across many social media sites including Facebook, Instagram, and Twitter. In 2015, Instagram reported that nearly half of the photo comments posted on Instagram contain emoji, and in the same year, Twitter reported that the `face with tears of joy’ emoji has been tweeted 6.6 …


Interactive Visualization Of Search Results Of Large Document Sets, James D. Anderson Jan 2018

Interactive Visualization Of Search Results Of Large Document Sets, James D. Anderson

Browse all Theses and Dissertations

When presented with many search results, finding information or patterns within the data poses a challenge. This thesis presents the design, implementation and evaluation of a visualization enabling users to browse through voluminous information and comprehend the data. Implemented with the JavaScript library Data Driven Documents (D3), the visualization represents the search as clusters of similar documents grouped into bubbles with the contents depicted as word-clouds. Highly interactive features such as touch gestures and intuitive menu actions allow for expeditious exploration of the search results. Other features include drag-and-drop functionality for articles among bubbles, merging nodes, and refining the search …


An Autonomous Intelligent Robotic Wheelchair To Assist People In Need: Standing-Up, Turning-Around And Sitting-Down, Iosif Papadakis Ktistakis Jan 2018

An Autonomous Intelligent Robotic Wheelchair To Assist People In Need: Standing-Up, Turning-Around And Sitting-Down, Iosif Papadakis Ktistakis

Browse all Theses and Dissertations

The world’s ageing population has significantly increased over the last decades, which will result in one of the most significant transformations of the twenty-first century. As people age, they become more vulnerable to diseases and their health may need constant monitoring. At the same time, the number of people who have some kind of disability is also increasing. These people with disabilities may need daily assistance and monitoring of their health condition that is provided by specialists (health providers) at a high cost. A possible solution to the aforementioned problem comes from the assistive and intelligent robotics research area. The …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis Jan 2015

Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis

Browse all Theses and Dissertations

Ultrasound Imaging (USI) or Medical Sonography (MS), as it is formally called, has been widely used in biomedical applications over the last decades. USI can provide clinicians with a thorough view of the internal parts of the human body, making use of sound waves of higher frequencies than humans can perceive. USI systems are considered highly portable and of low-cost, compared to other imaging modalities. However, despite those advantages, Ultrasound Systems (US) and especially 3D ones, have not been yet extensively utilized for Point-of-Care (POC) applications, due to numerous restrictions and artifacts that they currently present.

Hardware complexity and real-time …


A Workload Balanced Mapreduce Framework On Gpu Platforms, Yue Zhang Jan 2015

A Workload Balanced Mapreduce Framework On Gpu Platforms, Yue Zhang

Browse all Theses and Dissertations

The MapReduce framework is a programming model proposed by Google to process large datasets. It is an efficient framework that can be used in many areas, such as social network, scientific research, electronic business, etc. Hence, more and more MapReduce frameworks are implemented on different platforms, including Phoenix (based on multicore CPU), MapCG (based on GPU), and StreamMR (based on GPU). However, these MapReduce frameworks have limitations, and they cannot handle the collision problem in the map phase, and the unbalanced workload problems in the reduce phase. To improve the performance of the MapReduce framework on GPGPUs, in this thesis, …


Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have …