Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 181

Full-Text Articles in Engineering

An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse Dec 2021

An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse

Master's Theses

The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …


Optimizing A Virtual Human Platform For Depression/Suicide Ideation Identification For The American Soldier, Christina M. Monahan Dec 2021

Optimizing A Virtual Human Platform For Depression/Suicide Ideation Identification For The American Soldier, Christina M. Monahan

Master's Theses

Suicide surpassed homicide to be the second leading cause of death among people 10-24 years old in the United States \cite{1}. This statistic is alarming especially when combined with the more than eight distinctly different types of clinical depression among society today \cite{2}. To further complicate this health crisis, let’s consider the current worldwide isolating pandemic often referred to as COVID-19 that has spanned 12 months. It is more important than ever to consider how we can get ahead of the crisis by identifying the symptoms as they set in and more importantly ahead of the decision to commit suicide. …


Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr Dec 2021

Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr

Master's Theses

Wi-Fi Sensing is becoming a prominent field with a wide range of potential applications. Using existing hardware on a wireless network such as access points, cell phones, and smart home devices, important information can be inferred about the current physical environment. Through the analysis of Channel State Information collected in the Neighborhood Discovery Protocol process, the wireless network can detect disturbances in Wi-Fi signals when the physical environment changes. This results in a system that can sense motion within the Wi-Fi network, allowing for movement detection without any wearable devices.

The goal of this thesis is to answer whether Wi-Fi …


Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke Sep 2021

Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke

Master's Theses

According to the 2020 poverty estimates from the World Bank, it is estimated that 9.1% - 9.4% of the global population lived on less than $1.90 per day. It is estimated that the Covid-19 pandemic further aggravated the issue by pushing more than 1% of the global population below the international poverty line of $1.90 per day (WorldBank, 2020). To provide help and formulate effective measures, poverty needs to be located as exact as possible. For this purpose, it was investigated whether regression methods with aggregated remote-sensing data could be used to estimate poverty in Africa. Therefore, five distinct regression …


Snr: Software Library For Introductory Robotics, Spencer F. Shaw Aug 2021

Snr: Software Library For Introductory Robotics, Spencer F. Shaw

Master's Theses

This thesis introduces "SNR," a Python library for programming robotic systems in the context of introductory robotics courses. Greater demand for roboticists has pressured educational institutions to expand robotics curricula. Students are now more likely to take robotics courses earlier and with less prior programming experience. Students may be attempting to simultaneously learn a systems programming language, a library API, and robotics concepts. SNR is written purely in Python to present familiar semantics, eliminating one of these learning curves. Industry standard robotics libraries such as ROS often require additional build tools and configuration languages. Students in introductory courses frequently lack …


A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii Jun 2021

A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii

Master's Theses

The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui Jun 2021

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …


Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu Jun 2021

Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu

Master's Theses

Modern society places an increasingly high demand on data transmission. Much of that data transmission takes place through communication over the frequency spectrum. The channels on the spectrum are limited resources. Researchers realize that at certain times of day some channels are overloaded, while others are not being fully utilized. A spectrum management system may be beneficial to remedy this efficiency issue. One of the proposed systems, Cognitive Radio Network (CRN), has progressed over the years thanks to studies on a wide range of subjects, including geolocation, data throughput rate, and channel handoff selection algorithm, which provide fundamental support for …


Automating Deep-Sea Video Annotation, Hanson Egbert Jun 2021

Automating Deep-Sea Video Annotation, Hanson Egbert

Master's Theses

As the world explores opportunities to develop offshore renewable energy capacity, there will be a growing need for pre-construction biological surveys and post-construction monitoring in the challenging marine environment. Underwater video is a powerful tool to facilitate such surveys, but the interpretation of the imagery is costly and time-consuming. Emerging technologies have improved automated analysis of underwater video, but these technologies are not yet accurate or accessible enough for widespread adoption in the scientific community or industries that might benefit from these tools.

To address these challenges, prior research developed a website that allows to: (1) Quickly play and annotate …


Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii Jun 2021

Using Pitch Tipping For Baseball Pitch Prediction, Brian Ishii

Master's Theses

Data Analytics and technology have changed baseball as we know it. From the increase in defensive shifts to teams using cameras in the outfield to steal signs, teams will try anything to win. One way to gain an edge in baseball is to figure out what pitches a pitcher will pitch. Pitch prediction is a popular task to try to accomplish with all the data that baseball provides. Most methods involve using situational data like the ball and strike count. In this paper, we try a different method of predicting pitch type by only looking at the pitcher's pose in …


A Study Of Implementation Methodologies For Distributed Real Time Collaboration, Lauren A. Craft Jun 2021

A Study Of Implementation Methodologies For Distributed Real Time Collaboration, Lauren A. Craft

Master's Theses

Collaboration drives our world and is almost unavoidable in the programming industry. From higher education to the top technological companies, people are working together to drive discovery and innovation. Software engineers must work with their peers to accomplish goals daily in their workplace. When working with others there are a variety of tools to choose from such as Google Docs, Google Colab and Overleaf. Each of the aforementioned collaborative tools utilizes the Operational Transform (OT) technique in order to implement their real time collaboration functionality. Operational transform is the technique seen amongst most if not all major collaborative tools in …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


Emergency Landing And Guidance System, Joseph Alarid Dec 2020

Emergency Landing And Guidance System, Joseph Alarid

Master's Theses

Every year there are thousands of aviation accidents along with hundreds of human deaths that happen around the world. While the data is sparse, it is well documented that many of these happen from emergency landings gone awry. While pilots can generally make great landings in clear daytime conditions, they are significantly handicapped when it comes to landing at night or amongst poor visibility conditions.

Due to the nature of this problem and some of the large scale advances in software technology we propose a solution that provides a significant improvement from the status quo. Using transfer learning on neural …


Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel Aug 2020

Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel

Master's Theses

Internet of Things (IoT) devices have been widely adopted in many different applications in recent years, such as smart home applications. An adversary can capture the network traffic of IoT devices and analyze it to reveal user activities even if the traffic is encrypted. Therefore, traffic privacy is a major concern, especially in smart home applications. Traffic shaping can be used to obfuscate the traffic so that no meaningful predictions can be drawn through traffic analysis. Current traffic shaping methods have many tunable variables that are difficult to optimize to balance bandwidth overheads and latencies. In this thesis, we study …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller Jun 2020

Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller

Master's Theses

Massively Multiplayer Online Role Playing Games (MMORPGs) are a prominent genre in today's video game industry with the most popular MMORPGs generating billions of dollars in revenue and attracting millions of players. As they have grown, they have become a major target for both technological research and sociological research. In such research, it is nearly impossible to reach the same player scale from any self-made technology or sociological experiments. This greatly limits the amount of control and topics that can be explored. In an effort to make up a lacking or non-existent player-base for custom-made MMORPG research scenarios A.I. agents, …


Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok Jun 2020

Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok

Master's Theses

The introduction of autonomous vehicles has the potential to reduce the number of accidents and save countless lives. These benefits can only be realized if autonomous vehicles can prove to be safer than human drivers. There is a large amount of active research around developing robust algorithms for all parts of the autonomous vehicle stack including sensing, localization, mapping, perception, prediction, planning, and control. Additionally, some of these research projects have involved the use of the Robot Operating System (ROS). However, another key aspect of realizing an autonomous vehicle is a fault-tolerant design that can ensure the safe operation of …


Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn Mar 2020

Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn

Master's Theses

Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.

Music in video games is essential for establishing developers' intended mood …


Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le Mar 2020

Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le

Master's Theses

In this thesis, the viability of decentralized, noncooperative multi-robot path planning algorithms is tested. Three algorithms based on the Batch Informed Trees (BIT*) algorithm are presented. The first of these algorithms combines Optimal Reciprocal Collision Avoidance (ORCA) with BIT*. The second of these algorithms uses BIT* to create a path which the robots then follow using an artificial potential field (APF) method. The final algorithm is a version of BIT* that supports replanning. While none of these algorithms take advantage of sharing information between the robots, the algorithms are able to guide the robots to their desired goals, with the …


Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley Dec 2019

Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley

Master's Theses

This thesis investigates the involuntary signal-based grounding of civilian unmanned aerial systems (UAS) in unauthorized air spaces. The technique proposed here will forcibly land unauthorized UAS in a given area in such a way that the UAS will not be harmed, and the pilot cannot stop the landing. The technique will not involuntarily ground authorized drones which will be determined prior to the landing. Unauthorized airspaces include military bases, university campuses, areas affected by a natural disaster, and stadiums for public events. This thesis proposes an early prototype of a hardware-based signal based involuntary grounding technique to handle the problem …


An Application Of Sliding Mode Control To Model-Based Reinforcement Learning, Aaron Thomas Parisi Sep 2019

An Application Of Sliding Mode Control To Model-Based Reinforcement Learning, Aaron Thomas Parisi

Master's Theses

The state-of-art model-free reinforcement learning algorithms can generate admissible controls for complicated systems with no prior knowledge of the system dynamics, so long as sufficient (oftentimes millions) of samples are available from the environ- ment. On the other hand, model-based reinforcement learning approaches seek to leverage known optimal or robust control to reinforcement learning tasks by mod- elling the system dynamics and applying well established control algorithms to the system model. Sliding-mode controllers are robust to system disturbance and modelling errors, and have been widely used for high-order nonlinear system control. This thesis studies the application of sliding mode control …


Utilizing Trajectory Optimization In The Training Of Neural Network Controllers, Nicholas Kimball Sep 2019

Utilizing Trajectory Optimization In The Training Of Neural Network Controllers, Nicholas Kimball

Master's Theses

Applying reinforcement learning to control systems enables the use of machine learning to develop elegant and efficient control laws. Coupled with the representational power of neural networks, reinforcement learning algorithms can learn complex policies that can be difficult to emulate using traditional control system design approaches. In this thesis, three different model-free reinforcement learning algorithms, including Monte Carlo Control, REINFORCE with baseline, and Guided Policy Search are compared in simulated, continuous action-space environments. The results show that the Guided Policy Search algorithm is able to learn a desired control policy much faster than the other algorithms. In the inverted pendulum …


Smart Dc Wall Outlet Design With Improved Load Voltage Detection, Patrick Donovon Granieri Jun 2019

Smart Dc Wall Outlet Design With Improved Load Voltage Detection, Patrick Donovon Granieri

Master's Theses

A standard home in the United States has access to the 120V AC power grid for use with home appliances. Many electronics used at home are powered by a DC power supply, which loses energy in the conversion from AC power. The DC House project avoids any conversion between AC and DC by storing energy in batteries as DC power and supplying it directly to DC appliances. While AC systems feature a standardized output voltage, no such standard exists for DC systems. The Smart DC Wall Outlet solves this by automatically adjusting its output voltage to meet any required DC …


Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork Jun 2019

Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork

Master's Theses

Computer Science is an increasingly important topic in K-12 education. Ever since the "computing crisis" of the early 2000s, where enrollment in CS dropped by over half in a five year span, increasing research has gone into improving and broadening enrollment in CS courses. Research shows the importance of introducing CS at a young age and the need for more exposure for younger children and young adults alike in order to work towards equity in the field. While there are many reasons for disinterest in CS courses, studies found one reason young adults do not want to study CS is …


Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty Jun 2019

Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty

Master's Theses

Location privacy preservation has shifted to the forefront of discussions about next generation wireless networks. While pseudonym-changing schemes have been proposed to preserve an individual's privacy, simulation has shown that new association attack models render these schemes useless. The major contribution of this thesis is the implementation of a tracking network with commodity hardware on the California Polytechnic State University campus which leverages the combination of de-anonymization strategies on captured wireless network data to show the effectiveness of a pseudonym-changing scheme for wireless identification across WiFi and Zigbee protocols.


Surveying Underwater Shipwrecks With Probabilistic Roadmaps, Amy Jeannette Lewis Jun 2019

Surveying Underwater Shipwrecks With Probabilistic Roadmaps, Amy Jeannette Lewis

Master's Theses

Almost two thirds of the Earth's surface is covered in ocean, and yet, only about 5% of it is mapped. There are an unknown amount of sunken ships, planes, and other artifacts hidden below the sea. Extensive search via boat and a sonar tow fish following a standard lawnmower pattern is used to identify sites of interest. Then, if a site has been determined to potentially be historically significant, the most common next step is a survey by either a human dive team or remotely operated vehicle. These are time consuming, error prone, and potentially dangerous options, but autonomous underwater …


Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman Jun 2019

Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman

Master's Theses

The application of robotics in cluttered and dynamic environments provides a wealth of challenges. This thesis proposes a deep reinforcement learning based system that determines collision free navigation robot velocities directly from a sequence of depth images and a desired direction of travel. The system is designed such that a real robot could be placed in an unmapped, cluttered environment and be able to navigate in a desired direction with no prior knowledge. Deep Q-learning, coupled with the innovations of double Q-learning and dueling Q-networks, is applied. Two modifications of this architecture are presented to incorporate direction heading information that …


A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi May 2019

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented …


Comparison Of Lqr And Lqr-Mrac For Linear Tractor-Trailer Model, Kevin Richard Gasik May 2019

Comparison Of Lqr And Lqr-Mrac For Linear Tractor-Trailer Model, Kevin Richard Gasik

Master's Theses

The United States trucking industry is immense. Employing over three million drivers and traveling to every city in the country. Semi-Trucks travel millions of miles each week and encompass roads that civilians travel on. These vehicles should be safe and allow efficient travel for all. Autonomous vehicles have been discussed in controls for many decades. Now fleets of autonomous vehicles are beginning their integration into society. The ability to create an autonomous system requires domain and system specific knowledge. Approaches to implement a fully autonomous vehicle have been developed using different techniques in control systems such as Kalman Filters, Neural …


Relevance Analysis For Document Retrieval, Eric Labouve Mar 2019

Relevance Analysis For Document Retrieval, Eric Labouve

Master's Theses

Document retrieval systems recover documents from a dataset and order them according to their perceived relevance to a user’s search query. This is a difficult task for machines to accomplish because there exists a semantic gap between the meaning of the terms in a user’s literal query and a user’s true intentions. Even with this ambiguity that arises with a lack of context, users still expect that the set of documents returned by a search engine is both highly relevant to their query and properly ordered. The focus of this thesis is on document retrieval systems that explore methods of …