Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Engineering

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 3531

Full-Text Articles in Engineering

Android And Web Application For Tracking Employees, Kaival Dholakia Dec 2019

Android And Web Application For Tracking Employees, Kaival Dholakia

Electronic Theses, Projects, and Dissertations

The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner ...


Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha Dec 2019

Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha

Theses and Dissertations

This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction plays a key role while we derive the networks, thus our technique relies upon our ability to determine when two characters are in conversation. Our process involves encoding plain literary text into the Text Encoding Initiative’s (TEI) XML format, character name identification, conversation and co-occurrence detection, and social network construction. Previous work in social network construction for literature have focused on drama, specifically manually TEI-encoded Shakespearean plays in which character interactions are much easier ...


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the ...


Mobile Ad Hoc Networks In Transportation Data Collection And Dissemination, Kontigue Konte Oct 2019

Mobile Ad Hoc Networks In Transportation Data Collection And Dissemination, Kontigue Konte

Theses and Dissertations

The field of transportation is rapidly changing with new opportunities for systems solutions and emerging technologies. The global economic impact of congestion and accidents are significant. Improved means are needed to solve them. Combined with the increasing numbers of vehicles on the road, the net economic impact is measured in the many billions of dollars. Promising methodologies explored in this thesis include the use of the Internet of Things (IoT) and Mobile Ad Hoc Networks (MANET). Interconnecting vehicles using Dedicated Short Range Communication technology (DSRC) brings many benefits. Integrating DSRC into roadway vehicles offers the promise of reducing the problems ...


Adaptive-Hybrid Redundancy For Radiation Hardening, Nicolas S. Hamilton Sep 2019

Adaptive-Hybrid Redundancy For Radiation Hardening, Nicolas S. Hamilton

Theses and Dissertations

An Adaptive-Hybrid Redundancy (AHR) mitigation strategy is proposed to mitigate the effects of Single Event Upset (SEU) and Single Event Transient (SET) radiation effects. AHR is adaptive because it switches between Triple Modular Redundancy (TMR) and Temporal Software Redundancy (TSR). AHR is hybrid because it uses hardware and software redundancy. AHR is demonstrated to run faster than TSR and use less energy than TMR. Furthermore, AHR allows space vehicle designers, mission planners, and operators the flexibility to determine how much time is spent in TMR and TSR. TMR mode provides faster processing at the expense of greater energy usage. TSR ...


Mnews: A Study Of Multilingual News Search Interfaces, Chenjun Ling Sep 2019

Mnews: A Study Of Multilingual News Search Interfaces, Chenjun Ling

Engineering Ph.D. Theses

With the global expansion of the Internet and the World Wide Web, users are becoming increasingly diverse, particularly in terms of languages. In fact, the number of polyglot Web users across the globe has increased dramatically.

However, even such multilingual users often continue to suffer from unbalanced and fragmented news information, as traditional news access systems seldom allow users to simultaneously search for and/or compare news in different languages, even though prior research results have shown that multilingual users make significant use of each of their languages when searching for information online.

Relatively little human-centered research has been conducted ...


Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. De Stefan Aug 2019

Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. De Stefan

Dissertations

Despite an extensive history of oceanic observation, researchers have only begun to build a complete picture of oceanic currents. Sparsity of instrumentation has created the need to maximize the information extracted from every source of data in building this picture. Within the last few decades, autonomous vehicles, or AVs, have been employed as tools to aid in this research initiative. Unmanned and self-propelled, AVs are capable of spending weeks, if not months, exploring and monitoring the oceans. However, the quality of data acquired by these vehicles is highly dependent on the paths along which they collect their observational data. The ...


Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu Aug 2019

Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu

Dissertations

Recently, some researchers have attempted to find a relationship between the evolution of rare events and temporal-spatial patterns of social media activities. Their studies verify that the relationship exists in both time and spatial domains. However, few of those studies can accurately deduce a time point when social media activities are most highly affected by a rare event because producing an accurate temporal pattern of social media during the evolution of a rare event is very difficult. This work expands the current studies along three directions. Firstly, we focus on the intensity of information volume and propose an innovative clustering ...


Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham Aug 2019

Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham

Engineering and Applied Science Theses & Dissertations

The power of Information-Centric Networking architectures (ICNs) lies in their abstraction for communication --- the request for named data. This abstraction was popularized by the HyperText Transfer Protocol (HTTP) as an application-layer abstraction, and was extended by ICNs to also serve as their network-layer abstraction. In recent years, network mechanisms for ICNs, such as scalable name-based forwarding, named-data routing and in-network caching, have been widely explored and researched. However, to the best of our knowledge, the impact of this network abstraction on ICN applications has not been explored or well understood. The motivation of this dissertation is to address this research ...


Knn Optimization For Multi-Dimensional Data, Arialdis Japa Aug 2019

Knn Optimization For Multi-Dimensional Data, Arialdis Japa

Master of Science in Computer Science Theses

The K-Nearest Neighbors (KNN) algorithm is a simple but powerful technique used in the field of data analytics. It uses a distance metric to identify existing samples in a dataset which are similar to a new sample. The new sample can then be classified via a class majority voting of its most similar samples, i.e. nearest neighbors. The KNN algorithm can be applied in many fields, such as recommender systems where it can be used to group related products or predict user preferences. In most cases, the performance of the KNN algorithm tends to suffer as the size of ...


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better ...


Incremental Processing For Improving Conversational Grounding In A Chatbot, Aprajita Shukla Aug 2019

Incremental Processing For Improving Conversational Grounding In A Chatbot, Aprajita Shukla

Boise State University Theses and Dissertations

Current Digital Personal Assistants can be quite efficient while performing routine tasks like setting up reminders and looking up information. However, they do not attempt to establish common ground–the process of establishing and building mutual understanding–and require a significant amount of initial data to learn how to understand user intent. In this thesis, an incremental processing framework is leveraged through a chatbot interface which updates its understanding state at each inputted word, asks the user to clarify input when the system is unsure and prompts user to give feedback several times during an interaction, all of which are ...


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be ...


Cognitive Satellite Communications And Representation Learning For Streaming And Complex Graphs., Wenqi Liu Aug 2019

Cognitive Satellite Communications And Representation Learning For Streaming And Complex Graphs., Wenqi Liu

Electronic Theses and Dissertations

This dissertation includes two topics. The first topic studies a promising dynamic spectrum access algorithm (DSA) that improves the throughput of satellite communication (SATCOM) under the uncertainty. The other topic investigates distributed representation learning for streaming and complex networks. DSA allows a secondary user to access the spectrum that are not occupied by primary users. However, uncertainty in SATCOM causes more spectrum sensing errors. In this dissertation, the uncertainty has been addressed by formulating a DSA decision-making process as a Partially Observable Markov Decision Process (POMDP) model to optimally determine which channels to sense and access. Large-scale networks have attracted ...


An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari Aug 2019

An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari

Electronic Theses and Dissertations

Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less ...


A Simulation Tool For Evaluating The Environmental Impacts Of Management Scenarios For Modern Broiler Production Systems, Martin Andrew Christie Aug 2019

A Simulation Tool For Evaluating The Environmental Impacts Of Management Scenarios For Modern Broiler Production Systems, Martin Andrew Christie

Theses and Dissertations

The purpose of this work is to provide a simulation tool that allows broiler production practitioners and researchers to simulate the effects of farm design and management practices on resource consumption and environmental impacts. This tool allows the user to design unique farms and simulates on farm processes required to raise broiler chicks to a marketable age. The use can input data such as farm location, broiler breed, flock size, ration type, barn dimensions, and climate control equipment specifications. The algorithms used to simulate broiler breed specific feed intake, broiler weight gain, and other on farm processes such as heating ...


Stamina: Stochastic Approximate Model-Checker For Infinite-State Analysis, Thakur Neupane Aug 2019

Stamina: Stochastic Approximate Model-Checker For Infinite-State Analysis, Thakur Neupane

All Graduate Theses and Dissertations

Reliable operation of every day use computing system, from simple coffee machines to complex flight controller system in an aircraft, is necessary to save time, money, and in some cases lives. System testing can check for the presence of unwanted execution but cannot guarantee the absence of such. Probabilistic model checking techniques have demonstrated significant potential in verifying performance and reliability of various systems whose execution are defined with likelihood. However, its inability to scale limits its applicability in practice.

This thesis presents a new model checker, STAMINA, with efficient and scalable model truncation for probabilistic verification. STAMINA uses a ...


Predicting Critical Warps In Near-Threshold Gpgpu Applications Using A Dynamic Choke Point Analysis, Sourav Sanyal Aug 2019

Predicting Critical Warps In Near-Threshold Gpgpu Applications Using A Dynamic Choke Point Analysis, Sourav Sanyal

All Graduate Theses and Dissertations

General purpose graphics processing units (GP-GPU), owing to their enormous thread-level parallelism, can significantly improve the power consumption at the near-threshold (NTC) operating region, while offering close to a super-threshold performance. However, process variation (PV) can drastically reduce the GPU performance at NTC. In this work, choke points—a unique device-level characteristic of PV at NTC—that can exacerbate the warp criticality problem in GPUs have been explored. It is shown that the modern warp schedulers cannot tackle the choke point induced critical warps in an NTC GPU. Additionally, Choke Point Aware Warp Speculator, a circuit-architectural solution is proposed to ...


Fake Review Detection Using Data Mining, Md Forhad Hossain Aug 2019

Fake Review Detection Using Data Mining, Md Forhad Hossain

MSU Graduate Theses

Online spam reviews are deceptive evaluations of products and services. They are often carried out as a deliberate manipulation strategy to deceive the readers. Recognizing such reviews is an important but challenging problem. In this work, I try to solve this problem by using different data mining techniques. I explore the strength and weakness of those data mining techniques in detecting fake review. I start with different supervised techniques such as Support Vector Ma- chine (SVM), Multinomial Naive Bayes (MNB), and Multilayer Perceptron. The results attest that all the above mentioned supervised techniques can successfully detect fake review with more ...


Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez Jul 2019

Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez

Electronic Thesis and Dissertation Repository

Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make ...


An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu Jul 2019

An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu

Computer Science ETDs

Searching and collecting multiple resources from large unmapped environments is an important challenge. It is particularly difficult given limited time, a large search area and incomplete data about the environment. This search task is an abstraction of many real-world applications such as search and rescue, hazardous material clean-up, and space exploration. The collective foraging behavior of robot swarms is an effective approach for this task. In our work, individual robots have limited sensing and communication range (like ants), but they are organized and work together to complete foraging tasks collectively. An efficient foraging algorithm coordinates robots to search and collect ...


Large Scale Electronic Health Record Data And Echocardiography Video Analysis For Mortality Risk Prediction, Alvaro Emilio Ulloa Cerna Jul 2019

Large Scale Electronic Health Record Data And Echocardiography Video Analysis For Mortality Risk Prediction, Alvaro Emilio Ulloa Cerna

Electrical and Computer Engineering ETDs

Electronic health records contain the clinical history of patients. The enormous potential for discovery in such a rich dataset is hampered by their complexity. We hypothesize that machine learning models trained on EHR data can predict future clinical events significantly better than current models. We analyze an EHR database of 594,862 Echocardiography studies from 272,280 unique patients with both unsupervised and supervised machine learning techniques.

In the unsupervised approach, we first develop a simulation framework to evaluate a family of different clustering pipelines. We apply the optimized approach to 41,645 patients with heart failure without providing any ...


Nonlinear Attitude And Pose Filters With Superior Convergence Properties, Hashim Abdellah Hashim Mohamed Jul 2019

Nonlinear Attitude And Pose Filters With Superior Convergence Properties, Hashim Abdellah Hashim Mohamed

Electronic Thesis and Dissertation Repository

In this thesis, several deterministic and stochastic attitude filtering solutions on the special orthogonal group SO(3) are proposed. Firstly, the attitude estimation problem is approached on the basis of nonlinear deterministic filters on SO(3) with guaranteed transient and steady-state measures. The second solution to the attitude estimation problem considers nonlinear stochastic filters on SO(3) with superior convergence properties with two filters being developed in the sense of Ito, and one in the sense of Stratonovich.

This thesis also presents several deterministic and stochastic pose filtering solutions developed on the special Euclidean group SE(3). The first solution ...


Developing 5gl Concepts From User Interactions, David Stuckless Meyer Jul 2019

Developing 5gl Concepts From User Interactions, David Stuckless Meyer

Masters Theses

In the fulfilling of the contracts generated in Test Driven Development, a developer could be said to act as a constraint solver, similar to those used by a 5th Generation Language(5GL). This thesis presents the hypothesis that 5GL linguistic mechanics, such as facts, rules and goals, will be emergent in the communications of developer pairs performing Test Driven Development, validating that 5GL syntax is congruent with the ways that practitioners communicate. Along the way, nomenclatures and linguistic patterns may be observed that could inform the design of future 5GL languages.


Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh Jun 2019

Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Although the Internet was not originally designed for exchanging multimedia streams, consumers heavily depend on it for audiovisual data delivery. The intermittent nature of multimedia traffic, the unguaranteed underlying communication infrastructure, and dynamic user behavior collectively result in the degradation of Quality-of-Service (QoS) and Quality-of-Experience (QoE) perceived by end-users. Consequently, the volume of signalling messages is inevitably increased to compensate for the degradation of the desired service qualities. Improved multimedia services could leverage adaptive streaming as well as blockchain-based solutions to enhance media-rich experiences over the Internet at the cost of increased signalling volume. Many recent studies in the literature ...


Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin Jun 2019

Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin

Graduate Theses and Dissertations

This dissertation addresses the top two “most critical web-application security risks” by combining two high-level contributions.

The first high-level contribution introduces and evaluates collaborative authentication, or coauthentication, a single-factor technique in which multiple registered devices work together to authenticate a user. Coauthentication provides security benefits similar to those of multi-factor techniques, such as mitigating theft of any one authentication secret, without some of the inconveniences of multi-factor techniques, such as having to enter passwords or biometrics. Coauthentication provides additional security benefits, including: preventing phishing, replay, and man-in-the-middle attacks; basing authentications on high-entropy secrets that can be generated and updated automatically ...


Homebook, Stephen Poth, Simon Stauber, Jake Vargas Jun 2019

Homebook, Stephen Poth, Simon Stauber, Jake Vargas

Computer Science and Engineering Senior Theses

Having a reliable address system is something that is often taken for granted, but simply having one comes with immense benefits. People can easily find locations of friends and family, services like taxis know exactly where to pick customers up, and emergency response units can accurately find the scene of emergencies quickly. However, in many developing countries, these are luxuries only afforded by the wealthy and privileged neighborhoods. Locations are given haphazardly through description, often leading to late arrivals. In some cases this can be a dire possibility. Our solution aims to change this by developing a mobile application that ...


Trippit: An Optimal Itinerary Generator, Andrew Nguyen, Osama Shoubber Jun 2019

Trippit: An Optimal Itinerary Generator, Andrew Nguyen, Osama Shoubber

Computer Science and Engineering Senior Theses

Travelers often lose interest and joy when traveling in tourist-packed areas around the world. As more restaurants and attractions open up in popular cities, the wait and travel time from one location to another inevitably increases. Each attraction has certain hours throughout the day where visitors surge and the wait times increase. In addition, traffic and travel time is an important factor to consider when looking to optimize ones trip. However, with large amounts of attractions, it is difficult to calculate and consider the most optimal routes and times an individual should use to visit each possible attraction. Travelers ultimately ...


A Questioning Agent For Literary Discussion, Robbie Culkin, Tim Shur Jun 2019

A Questioning Agent For Literary Discussion, Robbie Culkin, Tim Shur

Computer Science and Engineering Senior Theses

Developing a compelling and cohesive thesis for analytical writing can be a daunting task, even for those who have produced many written works, and finding others to engage with in literary discussion can be equally challenging. In this paper, we describe our solution: Questioner, a discussion tool that engages users in conversation about an academic topic of their choosing for the purpose of collecting thoughts on a subject and constructing an argument. This system will ask informed questions that prompt further discussion about the topic and provide a discussion report after the conversation has ended. We found that our system ...


Deaddropbox: A Time-Locked Safe For Data, Robert Herriott, Peter Paulson, Nathaniel Kragas Jun 2019

Deaddropbox: A Time-Locked Safe For Data, Robert Herriott, Peter Paulson, Nathaniel Kragas

Computer Science and Engineering Senior Theses

This project is a proof-of-concept for software which would allow users to securely store sensitive data in such a way that it is difficult or impossible for third parties to compromise the data, even when the user is compelled to assist them. It will operate by storing data across multiple devices in a unreadable form so that it is inaccessible until the data is reunified. The user may specify the circumstances under which different pieces of the data may be accessed, so that it is impossible to access under circumstances of duress.