Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 683

Full-Text Articles in Engineering

Elicitation And Aggregation Of Data In Knowledge Intensive Crowdsourcing, Dohoon Kim May 2020

Elicitation And Aggregation Of Data In Knowledge Intensive Crowdsourcing, Dohoon Kim

All Computer Science and Engineering Research

With the significant advance of internet and connectivity, crowdsourcing gained more popularity and various crowdsourcing platforms emerged. This project focuses on knowledge-intensive crowdsourcing, in which agents are presented with the tasks that require certain knowledge in domain. Knowledge-intensive crowdsourcing requires agents to have experiences on the specific domain. With the constraint of resources and its trait as sourcing from crowd, platform is likely to draw agents with different levels of expertise and knowledge and asking same task can result in bad performance. Some agents can give better information when they are asked with more general question or more knowledge-specific task …


A Virtual 4d Ct Scanner, Xiwen Li May 2020

A Virtual 4d Ct Scanner, Xiwen Li

All Computer Science and Engineering Research

4D CT scan is widely used in medical imaging. Images are acquired through phases. In this case, we can track the motion of organs such as heart. However, it also introduces motion artifacts. A lot of research focuses on remove these artifacts. It is difficult to acquire artifact data by a real CT scanner. In this project, we implement a virtual CT machine to simulate the real 4D CT scan. we also conduct experi- ments to check its clinical reality with respect to respiratory and heart motion parameters.


Centrality Of Blockchain, Zixuan Li May 2020

Centrality Of Blockchain, Zixuan Li

All Computer Science and Engineering Research

Decentralization is widely recognized as the property and one of most important advantage of blockchain over legacy systems. However, decentralization is often discussed on the consensus layer and recent research shows the trend of centralization on several subsystem of blockchain. In this project, we measured centralization of Bitcoin and Ethereum on source code, development eco-system, and network node levels. We found that the programming language of project is highly centralized, code clone is very common inside Bitcoin and Ethereum community, and developer contribution distribution is highly centralized. We further discuss how could these centralizations lead to security issues in blockchain. …


Solving Disappearance At Gastech With Visual Analytic Techniques, Saulet Yskak May 2020

Solving Disappearance At Gastech With Visual Analytic Techniques, Saulet Yskak

All Computer Science and Engineering Research

We are living in a society, where images and charts speak louder than words. Therefore, information visualization plays a major role in solving complex problems since it provides a visual summary of data that makes it easier to identify trends and patterns.

In this master project, I propose a web – based visual analytics tool that enables to analyze complex email and time based / event series data. The visual analytics framework uses test data from IEEE VAST Challenge 2014: Mini challenge 1 that concentrated on the disappearance of employees of a fictional GAStech company, but the tool allows users …


The Effects Of Mixed-Initiative Visualization Systems On Exploratory Data Analysis, Alvitta Ottley, Adam Kern Jan 2020

The Effects Of Mixed-Initiative Visualization Systems On Exploratory Data Analysis, Alvitta Ottley, Adam Kern

All Computer Science and Engineering Research

The primary purpose of information visualization is to act as a window between a user and the data. Historically, this has been accomplished via a single-agent framework: the only decision-maker in the relationship between visualization system and analyst is the analyst herself. Yet this framework arose not from first principles, but a necessity. Before this decade, computers were limited in their decision-making capabilities, especially in the face of large, complex datasets and visualization systems. This paper aims to present the design and evaluation of a mixed-initiative system that aids the user in handling large, complex datasets and dense visualization systems. …


Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li Dec 2019

Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li

All Computer Science and Engineering Research

In this project, we explore new techniques and architectures for applying deep neural networks when the input is point cloud data. We first consider applying convolutions on regular pixel and voxel grids, using polynomials of point coordinates and Fourier transforms to get a rich feature representation for all points mapped to the same pixel or voxel. We also apply these ideas to generalize the recently proposed "interpolated convolution", by learning continuous-space kernels as a combination of polynomial and Fourier basis kernels. Experiments on the ModelNet40 dataset demonstrate that our methods have superior performance over the baselines in 3D object recognition.


Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole Dec 2019

Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole

All Computer Science and Engineering Research

Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key sinks or parts of the system without needing access to …


Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly Sep 2019

Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly

All Computer Science and Engineering Research

A pipeline is a particular type of parallel program structure, often used to represent loops with cross-iteration dependencies. Pipelines cannot be expressed with the typical parallel language constructs offered by most environments. Therefore, in order to run pipelines, it is necessary to write a parallel language and scheduler with specialized support for them. Some such schedulers are written exclusively for pipelines and unable to run any other type of program, which allows for certain optimizations that take advantage of the pipeline structure. Other schedulers implement support for pipelines on top of a general-purpose scheduling algorithm. One example of such an …


Smart Home Audio Assistant, Xipeng Wang May 2019

Smart Home Audio Assistant, Xipeng Wang

All Computer Science and Engineering Research

This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.


A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley May 2019

A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley

All Computer Science and Engineering Research

There is ample evidence in the visualization commu- nity that individual differences matter. These prior works high- light various traits and cognitive abilities that can modulate the use of the visualization systems and demonstrate a measurable influence on speed, accuracy, process, and attention. Perhaps the most important implication of this body of work is that we can use individual differences as a mechanism for estimating people’s potential to effectively leverage visual interfaces or to identify those people who may struggle. As visual literacy and data fluency continue to become essential skills for our everyday lives, we must embrace the growing …


Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu Apr 2019

Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu

All Computer Science and Engineering Research

Wireless devices have become a major part in Smart Home industry. Almost every smart home company has its own wireless solutions and cloud services. Normally, customers can only monitor and control smart devices through applications or platforms companies provided. It causes inconveniences and problems when we have lots of smart devices. In my master project, I did two projects to implement smart home IoT applications. From a single functionality IoT application to a more complicated smart home system, there are lots of challenges and problems appeared. This article will mainly focus on challenges in integrating IoT in a smart home.


Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li Apr 2019

Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li

All Computer Science and Engineering Research

Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.


Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju Apr 2019

Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju

All Computer Science and Engineering Research

When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool. This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree. First, this tool is developed by using JavaScript so that users don't need to install any software …


Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka Aug 2018

Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka

All Computer Science and Engineering Research

This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing. Authentication ensures that the user is who he/she claims to be. Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data. Provenance allows an efficient tracking of the data and resources …


Decoupling Information And Connectivity In Information-Centric Networking, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley Jul 2017

Decoupling Information And Connectivity In Information-Centric Networking, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley

All Computer Science and Engineering Research

This paper introduces and demonstrates the concept of Information-Centric Transport as a mechanism for cleanly decoupling the information plane from the connectivity plane in Information-Centric Networking (ICN) architectures, such as NDN and CICN. These are coupled in today's incarnations of NDN and CICN through the use of forwarding strategy, which is the architectural component for deciding how to forward packets in the presence of either multiple next-hop options or dynamic feedback. As presently designed, forwarding strategy is not sustainable: application developers can only confidently specify strategy if they understand connectivity details, while network node operators can only confidently assign strategies …


Multipath And Rate Stability, Junjie Liu, Roch A. Guérin Dec 2016

Multipath And Rate Stability, Junjie Liu, Roch A. Guérin

All Computer Science and Engineering Research

Originally Published In Proc. IEEE Globecom Conference - CQRM: Communication QoS, Reliability & Modeling Symposium


In-Network Retransmissions In Named Data Networking, Hila Ben Abraham, Patrick Crowley Jul 2016

In-Network Retransmissions In Named Data Networking, Hila Ben Abraham, Patrick Crowley

All Computer Science and Engineering Research

The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy. A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it …


Mercator (Mapping Enumerator For Cuda) User's Manual, Stephen V. Cole, Jeremy Buhler Jul 2016

Mercator (Mapping Enumerator For Cuda) User's Manual, Stephen V. Cole, Jeremy Buhler

All Computer Science and Engineering Research

Welcome to the MERCATOR user's manual! MERCATOR is a CUDA/C++ system designed to assist you in writing efficient CUDA applications by automatically generating significant portions of the GPU-side application code. We hope you find it helpful; please feel free to contact the authors with any questions or feedback.


Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures (Revised), Jonathan Turner Jan 2016

Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures (Revised), Jonathan Turner

All Computer Science and Engineering Research

This report provides an (updated) overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11. The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/. Source code documentation is at www.arl.wustl.edu/~jst/doc/grafalgo.


Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal Jan 2016

Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal

All Computer Science and Engineering Research

Dynamic task graph schedulers automatically balance work across processor cores by scheduling tasks among available threads while preserving dependences. In this paper, we design NabbitC, a provably efficient dynamic task graph scheduler that accounts for data locality on NUMA systems. NabbitC allows users to assign a color to each task representing the location (e.g., a processor core) that has the most efficient access to data needed during that node’s execution. NabbitC then automatically adjusts the scheduling so as to preferentially execute each node at the location that matches its color—leading to better locality because the node is likely to make …


Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner Dec 2015

Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner

All Computer Science and Engineering Research

A maximum priority matching is a matching in an undirected graph that maximizes a priority score defined with respect to given vertex priorities. An earlier paper showed how to find maximum priority matchings in unweighted graphs. This paper describes an algorithm for bipartite graphs that is faster when the number of distinct priority classes is limited. For graphs with k distinct priority classes it runs in O(kmn1/2) time, where n is the number of vertices in the graph and m is the number of edges.


The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner Dec 2015

The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner

All Computer Science and Engineering Research

This paper introduces a variant of the classical edge coloring problem in graphs that can be applied to an offline scheduling problem for crossbar switches. We show that the problem is NP-complete, develop three lower bounds bounds on the optimal solution value and evaluate the performance of several approximation algorithms, both analytically and experimentally. We show how to approximate an optimal solution with a worst-case performance ratio of 3/2 and our experimental results demonstrate that the best algorithms produce results that very closely track a lower bound.


Maximum Priority Matchings, Jonathan Turner Nov 2015

Maximum Priority Matchings, Jonathan Turner

All Computer Science and Engineering Research

Let G=(V,E) be an undirected graph with n vertices and m edges, in which each vertex u is assigned an integer priority in [1,n], with 1 being the ``highest'' priority. Let M be a matching of G. We define the priority score of M to be an n-ary integer in which the i-th most-significant digit is the number of vertices with priority i that are incident to an edge in M. We describe a variation of the augmenting path method (Edmonds' algorithm) that finds a matching with maximum priority score in O(mn) time.


Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, Chengjie Wu, Dolvara Gunatilaka, Mo Sha, Chenyang Lu Sep 2015

Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, Chengjie Wu, Dolvara Gunatilaka, Mo Sha, Chenyang Lu

All Computer Science and Engineering Research

Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. Real-time scheduling and delay analysis have been studied for WSAN extensively. End-to-end delay in WSANs highly depends on routing, which is still open problem. This paper presents the first real-time routing design for WSAN. We first discuss end-to-end delays of WSANs, then present our real-time routing design. We have implemented and experimented our routing designs on a wireless testbed of 69 nodes. Both experimental results and simulations show that our routing design can improve the …


Maximizing Network Lifetime Of Wireless Sensor-Actuator Networks Under Graph Routing, Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah, Mo Sha, Paras Tiwari, Chenyang Lu, Yixin Chen Sep 2015

Maximizing Network Lifetime Of Wireless Sensor-Actuator Networks Under Graph Routing, Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah, Mo Sha, Paras Tiwari, Chenyang Lu, Yixin Chen

All Computer Science and Engineering Research

Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. The dynamics of industrial environments and stringent reliability requirements necessitate high degrees of fault tolerance in routing. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. WirelessHART employs graph routing schemes to achieve network reliability through multiple paths. Since many industrial devices operate on batteries in harsh environments where changing batteries are prohibitively labor-intensive, WSANs need to achieve long network lifetime. To meet industrial demand for long-term reliable communication, this paper studies the problem of maximizing network lifetime for WSANs under graph routing. We …


Woodstocc: Extracting Latent Parallelism From A Dna Sequence Aligner On A Gpu, Stephen V. Cole, Jacob R. Gardner, Jeremy D. Buhler Sep 2015

Woodstocc: Extracting Latent Parallelism From A Dna Sequence Aligner On A Gpu, Stephen V. Cole, Jacob R. Gardner, Jeremy D. Buhler

All Computer Science and Engineering Research

An exponential increase in the speed of DNA sequencing over the past decade has driven demand for fast, space-efficient algorithms to process the resultant data. The first step in processing is alignment of many short DNA sequences, or reads, against a large reference sequence. This work presents WOODSTOCC, an implementation of short-read alignment designed for Graphics Processing Unit (GPU) architectures. WOODSTOCC translates a novel CPU implementation of gapped short-read alignment, which has guaranteed optimal and complete results, to the GPU. Our implementation combines an irregular trie search with dynamic programming to expose regularly structured parallelism. We first describe this implementation, …


The Edge Group Coloring Problem With Applications To Multicast Switching, Jonathan Turner Aug 2015

The Edge Group Coloring Problem With Applications To Multicast Switching, Jonathan Turner

All Computer Science and Engineering Research

This paper introduces a natural generalization of the classical edge coloring problem in graphs that provides a useful abstraction for two well-known problems in multicast switching. We show that the problem is NP-hard and evaluate the performance of several approximation algorithms, both analytically and experimentally. We find that for random χ-colorable graphs, the number of colors used by the best algorithms falls within a small constant factor of χ, where the constant factor is mainly a function of the ratio of the number of outputs to inputs. When this ratio is less than 10, the best algorithms produces solutions that …


Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures, Jonathan Turner Jan 2015

Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures, Jonathan Turner

All Computer Science and Engineering Research

This report provides an overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11. The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/. Source code documentation is at www.arl.wustl.edu/~jst/doc/grafalgo. While not designed as production …


Data Transport System, Rahav Dor Dec 2014

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …


Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin Nov 2014

Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin

All Computer Science and Engineering Research

Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but also which users …