Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Systems And Methods For Scalable Retinal Screening Programs, Jeremy Richard Benson Dec 2021

Systems And Methods For Scalable Retinal Screening Programs, Jeremy Richard Benson

Computer Science ETDs

This dissertation addresses gaps in artificial intelligence-based computer vision tasks in the medical image processing field. We demonstrate effective methods for standardizing and augmenting digital fundus photographs so that robust convolutional neural network-based systems can perform high-throughput disease classification and generalize to never-before-seen data from novel camera technologies, scaling with the changing hardware landscape, as well as keeping up with vast amount of incoming data from the ever-increasing population. We also tackle the problem of discovering relevant samples in an unlabeled cohort of image data, thus widening the bottleneck to all downstream supervised machine learning tasks.


Cognizant Composites: Seamless Integration Of Circuitry And Sensors Into Structural Composites, Reuben Fresquez Nov 2021

Cognizant Composites: Seamless Integration Of Circuitry And Sensors Into Structural Composites, Reuben Fresquez

Computer Science ETDs

This thesis describes a set of novel techniques for embedding sensors, circuitry, and electronics into structural composites. I leverage recent developments in human computer interaction to create sensors and circuitry that are seamlessly incorporated into structural composites. I fabricate bend and compression sensors, along with circuitry, from textiles, which enables me to add electronic capabilities without impacting the composite’s structural integrity. I describe the construction of these “cognizant composites” and demonstrate their functionality. I also explore techniques for embedding standard electronic components, including microcontrollers, into structural composites. Potential applications of this technology include buildings that can warn occupants if load-bearing …


Intelligent Networks For High Performance Computing, William Whitney Schonbein Dec 2020

Intelligent Networks For High Performance Computing, William Whitney Schonbein

Computer Science ETDs

There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …


Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle Nov 2020

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle

Computer Science ETDs

Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …


Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander Dec 2019

Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander

Computer Science ETDs

Most traditional network measurement scans and attacks are carried out through the use of direct, on-path network packet transmission. This requires that a machine be on-path (i.e, involved in the packet transmission process) and as a result have direct access to the data packets being transmitted. This limits network scans and attacks to situations where access can be gained to an on-path machine. If, for example, a researcher wanted to measure the round trip time between two machines they did not have access to, traditional scans would be of little help as they require access to an on-path machine to …


Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang Dec 2019

Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang

Computer Science ETDs

Robot motion planning in dynamic environments is critical for many robotic applications, such as self-driving cars, UAVs and service robots operating in changing environments. However, motion planning in dynamic environments is very challenging as this problem has been shown to be NP-Hard and in PSPACE, even in the simplest case. As a result, the lack of safe, efficient planning solutions for real-world robots is one of the biggest obstacles for ubiquitous adoption of robots in everyday life. Specifically, there are four main challenges facing motion planning in dynamic environments: obstacle motion uncertainty, obstacle interaction, complex robot dynamics and noise, and …


Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal Sep 2019

Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal

Computer Science ETDs

Distributed systems are ubiquitous today: from the Internet used by billions of people around the world to the small scale IoT devices. With this rapidly increasing need to perform computation at scales larger than ever before, comes the need to ensure resilience to adversarial failures so that these systems can continue to behave as intended even when some malicious tampering happens.

In this dissertation, we explore the power of randomness and the difficulty of rationally approximating the Golden Ratio to thwart adversarial behavior in two different problems in distributed computing: interactive communication and robust collaborative search. While randomness helps with …


An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu Jul 2019

An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu

Computer Science ETDs

Searching and collecting multiple resources from large unmapped environments is an important challenge. It is particularly difficult given limited time, a large search area and incomplete data about the environment. This search task is an abstraction of many real-world applications such as search and rescue, hazardous material clean-up, and space exploration. The collective foraging behavior of robot swarms is an effective approach for this task. In our work, individual robots have limited sensing and communication range (like ants), but they are organized and work together to complete foraging tasks collectively. An efficient foraging algorithm coordinates robots to search and collect …


The Nature Of Ephemeral Secrets In Reverse Engineering Tasks, Antonio Miguel Espinoza Dec 2018

The Nature Of Ephemeral Secrets In Reverse Engineering Tasks, Antonio Miguel Espinoza

Computer Science ETDs

Reverse engineering is typically carried out on static binary objects, such as files or compiled programs. Often the goal of reverse engineering is to extract a secret that is ephemeral and only exists while the system is running. Automation and dynamic analysis enable reverse engineers to extract ephemeral secrets from dynamic systems, obviating the need for analyzing static artifacts such as executable binaries.

I support this thesis through four automated reverse engineering efforts: (1) named entity extraction to track Chinese Internet censorship based on keywords; (2) dynamic information flow tracking to locate secret keys in memory for a live program; …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Data-Driven Uncertainty Quantification Interpretation With High Density Regions, Matthew Gregor Peterson Jul 2018

Data-Driven Uncertainty Quantification Interpretation With High Density Regions, Matthew Gregor Peterson

Computer Science ETDs

In a time when data is being constantly generated by phones, vehicles, sensor net- works, social media, etc. detecting anomalies with in the data can be very crucial. In cases where we know little prior knowledge about the data, it becomes difficult to extract uncertainty about our results. In this thesis, we will propose a framework in which we can extract uncertainty distributions from data-driven modeling prob- lems. We will show some concrete examples of how to apply framework and provide some insight into what the uncertainty distributions are telling us using High Density Regions (HDRs).


Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga May 2018

Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga

Computer Science ETDs

The traditional methods for analyzing information in digital documents have evolved with the ever-increasing volume of data. Some challenges in analyzing scientific publications include the lack of a unified vocabulary and a defined context, different standards and formats in presenting information, various types of data, and diverse areas of knowledge. These challenges hinder detecting, understanding, comparing, sharing, and querying information rapidly.

I design a dynamic conceptual data model with common elements in publications from any domain, such as context, metadata, and tables. To enhance the models, I use related definitions contained in ontologies and the Internet. Therefore, this dissertation generates …


Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham Nov 2017

Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham

Computer Science ETDs

The compute capacity growth in high performance computing (HPC) systems is outperforming improvements in other areas of the system for example, memory capacity, network bandwidth and I/O bandwidth. Therefore, the cost of executing a floating point operation is decreasing at a faster rate than moving that data. This increasing performance gap causes wasted CPU cycles while waiting for slower I/O operations to complete in the memory hierarchy, network, and storage. These bottlenecks decrease application time to solution performance, and increase energy consumption, resulting in system under utilization. In other words, data movement is becoming a key concern for future HPC …


Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh Oct 2017

Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh

Computer Science ETDs

As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …


Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni Jul 2017

Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni

Computer Science ETDs

In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …


Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee Apr 2017

Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee

Computer Science ETDs

Communication is an important factor in the foraging performance of social insects, such as ants. During foraging, ants keep track of food sources by using memory (site fidelity) or by communicating through pheromones. Previous field experiments showed that the rate of seed collection depends on the distribution of food in the environment. If food is spatially clustered, then it is beneficial for ants recruit nest mates to collect seeds from large clusters. However, we do not know when the recruitment occurs in natural ant population. To explore this question, we used a power law distribution to arrange seeds in piles …