Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Session 2: The Effect Of Boom Leveling On Spray Dispersion, Travis A. Burgers, Miguel Bustamante, Juan F. Vivanco Feb 2023

Session 2: The Effect Of Boom Leveling On Spray Dispersion, Travis A. Burgers, Miguel Bustamante, Juan F. Vivanco

SDSU Data Science Symposium

Self-propelled sprayers are commonly used in agriculture to disperse agrichemicals. These sprayers commonly have two boom wings with dozens of nozzles that disperse the chemicals. Automatic boom height systems reduce the variability of agricultural sprayer boom height, which is important to reduce uneven spray dispersion if the boom is not at the target height.

A computational model was created to simulate the spray dispersion under the following conditions: a) one stationary nozzle based on the measured spray pattern from one nozzle, b) one stationary model due to an angled boom, c) superposition of multiple stationary nozzles due an angled boom, …


Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng Jan 2022

Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng

Electronic Theses and Dissertations

Convolutional Neural Network (CNN) is a neural network developed for processing image data. CNNs have been studied extensively and have been used in numerous computer vision tasks such as image classification and segmentation, object detection and recognition, etc. [1] Although, the CNNs-based approaches showed humanlevel performances in these tasks [2], they require heavy computation in both training and inference stages, and the models consist of millions of parameters. This hinders the development and deployment of CNN-based models for real world applications. Neural Network Pruning and Compression techniques have been proposed [3, 4] to reduce the computation complexity of trained CNNs …


Sentiment Without Sentiment Analysis: Using The Recommendation Outcome Of Steam Game Reviews As Sentiment Predictor, Anqi Zhang Jan 2022

Sentiment Without Sentiment Analysis: Using The Recommendation Outcome Of Steam Game Reviews As Sentiment Predictor, Anqi Zhang

Electronic Theses and Dissertations

This paper presents and explores a novel way to determine the sentiment of a Steam game review based on the predicted recommendation of the review, testing different regression models on a combination of Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) features. A dataset of Steam game reviews extracted from the Programming games genre consisting of 21 games along with other significant features such as the number of helpful likes on the recommendation, number of hours played, and others. Based on the features, they are grouped into three datasets: 1) either having keyword features only, 2) keyword features …


Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan Jan 2022

Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan

Electronic Theses and Dissertations

Neural Networks have been used in many decision-making models and been employed in computer vision, and natural language processing. Several works have also used Neural Networks for developing Pseudo-Random Number Generators [2, 4, 5, 7, 8]. However, despite great performance in the National Institute of Standards and Technology (NIST) statistical test suite for randomness, they fail to discuss how the complexity of a neural network affects such statistical results. This work introduces: 1) a series of new Long Short- Term Memory Network (LSTM) based and Fully Connected Neural Network (FCNN – baseline [2] + variations) Pseudo Random Number Generators (PRNG) …


Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi Jan 2021

Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi

Electronic Theses and Dissertations

Since technologies have been developing rapidly, Wireless Body Area Network (WBAN) has emerged as a promising technique for healthcare systems. People can monitor patients’ body condition and collect data remotely and continuously by using WBAN with small and compact wearable sensors. These sensors can be located in, on, and around the patient’s body and measure the patient’s health condition. Afterwards sensor nodes send the data via short-range wireless communication techniques to an intermediate node. The WBANs deal with critical health data, therefore, secure communication within the WBAN is important. There are important criteria in designing a security protocol for a …


Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang Jan 2021

Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang

Electronic Theses and Dissertations

Damages assessment of bridges is important to derive immediate response after severe events to decide serviceability. Especially, past earthquakes have proven the vulnerability of bridges with insufficient detailing. Due to lack of a national and unified post-earthquake inspection procedure for bridges, conventional damage assessments are performed by sending professional personnel to the onsite, detecting visually and measuring the damage state. To get accurate and fast damage result of bridge condition is important to save not only lives but also costs.
There have been studies using image processing techniques to assess damage of bridge column without sending individual to onsite. Convolutional …


Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin Jan 2021

Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin

Electronic Theses and Dissertations

As the demand of individual health monitoring rose, Wireless Body Area Networks (WBAN) are becoming highly distinctive within health applications. Nowadays, WBAN is much easier to access then what it used to be. However, due to WBAN’s limitation, properly sophisticated security protocols do not exist. As WBAN devices deal with sensitive data and could be used as a threat to the owner of the data or their family, securing individual devices is highly important. Despite the importance in securing data, existing WBAN security methods are focused on providing light weight security methods. This led to most security methods for WBAN …


Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin Jan 2021

Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin

Electronic Theses and Dissertations

In order to fulfill the needs of everyday monitoring for healthcare and emergency advice, many HAR systems have been designed [1]. Based on the healthcare purpose, these systems can be implanted into an astronaut’s spacesuit to provide necessary life movement monitoring and healthcare suggestions. Most of these systems use acceleration data-based data record as human activity representation [2,3]. But this data attribute approach has a limitation that makes it impossible to be used as an activity monitoring system for astronavigation. Because an accelerometer senses acceleration by distinguishing acceleration data based on the earth’s gravity offset [4], the accelerometer cannot read …


Pig Pose Estimation Based On Extracted Data Of Mask R-Cnn With Vgg Neural Network For Classifications, Sang Kwan Lee Jan 2020

Pig Pose Estimation Based On Extracted Data Of Mask R-Cnn With Vgg Neural Network For Classifications, Sang Kwan Lee

Electronic Theses and Dissertations

This paper proposes a pig pose estimation operating with Region Proposal Network (RPN) of Mask Region based Convolutional Neural Network (Mask R-CNN) and Visual Geometry Group (VGG) Neural Network (NN). Object pose estimations generates from the associations of different key points. Key points could be explained as specific location of an object such as different joints of a human body or joints of different object. Hourglass network is one of a NN delivering key points of an object. Associating the different key points with the hourglass network results could be represented as instance-level detection [3]. However, the instance-level detection shows …


Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee Jan 2019

Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee

Electronic Theses and Dissertations

The instance segmentation and object detection are important tasks in smart car applications. Recently, a variety of neural network-based approaches have been proposed. One of the challenges is that there are various scales of objects in a scene, and it requires the neural network to have a large receptive field to deal with the scale variations. In other words, the neural network must have deep architectures which slow down computation. In smart car applications, the accuracy of detection and segmentation of vehicle and pedestrian is hugely critical. Besides, 2D images do not have distance information but enough visual appearance. On …


Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri Jan 2018

Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri

Electronic Theses and Dissertations

Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …


Adaptive Audio Classification Framework For In-Vehicle Environment With Dynamic Noise Characteristics, Haitham Alsaadan Jan 2017

Adaptive Audio Classification Framework For In-Vehicle Environment With Dynamic Noise Characteristics, Haitham Alsaadan

Electronic Theses and Dissertations

With ever-increasing number of car-mounted electric devices that are accessed, managed, and controlled with smartphones, car apps are becoming an important part of the automotive industry. Audio classification is one of the key components of car apps as a front-end technology to enable human-app interactions. Existing approaches for audio classification, however, fall short as the unique and time-varying audio characteristics of car environments are not appropriately taken into account. Leveraging recent advances in mobile sensing technology that allows for an active and accurate driving environment detection, in this thesis, we develop an audio classification framework for mobile apps that categorizes …


Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack Jan 2017

Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack

Electronic Theses and Dissertations

Most recently developed Computer Aided Diagnosis (CAD) systems and their related research is based on medical images that are usually obtained through conventional imaging techniques such as Magnetic Resonance Imaging (MRI), x-ray mammography, and ultrasound. With the development of a new imaging technology called Microwave Tomography Imaging (MTI), it has become inevitable to develop a CAD system that can show promising performance using new format of data. The platform can have a flexibility on its input by adopting Artificial Neural Network (ANN) as a classifier. Among the various phases of CAD system, we have focused on optimizing the classification phase …


Enhanced Breast Cancer Classification With Automatic Thresholding Using Support Vector Machine And Harris Corner Detection, Mohammad Taheri Jan 2017

Enhanced Breast Cancer Classification With Automatic Thresholding Using Support Vector Machine And Harris Corner Detection, Mohammad Taheri

Electronic Theses and Dissertations

Image classification and extracting the characteristics of a tumor are the powerful tools in medical science. In case of breast cancer medical treatment, the breast cancer classification methods can be used to classify input images as benign and malignant classes for better diagnoses and earlier detection with breast tumors. However, classification process can be challenging because of the existence of noise in the images, and complicated structures of the image. Manual classification of the images is timeconsuming, and need to be done only by medical experts. Hence using an automated medical image classification tool is useful and necessary. In addition, …


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved …


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …