Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Deep Learning (2)
- Vehicular Ad Hoc Networks (2)
- Accumulation (1)
- Algorithm design (1)
- Arduino microcontroller (1)
-
- Artificial neural networks (ANNs) (1)
- Bayesian optimization (BO) (1)
- Computer Vision (1)
- Contrastive Learning (1)
- Convolutional neural networks (CNNs) (1)
- Cournot Games (1)
- Cyber-physical systems (1)
- Data synthesis (1)
- Differential privacy (1)
- Distribution system state estimation (DSSE) (1)
- Distribution system state forecasting (DSSF) (1)
- Dynamic Environments (1)
- Few-shot Learning (1)
- Flexible Spatial Accelerators (1)
- Gaussian processes (GP) (1)
- Hedonic Coalition Formation Games (1)
- Heritage Science (1)
- Internet of things (1)
- Intrusion Detection (1)
- Location-based services (1)
- Long short-term memory networks (LSTMs) (1)
- Machine Learning (1)
- Machine learning (1)
- Matching (1)
- Micro-Computed Tomography (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan
Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan
Theses and Dissertations--Mechanical Engineering
This thesis presents a new parallelized real-time path planning process. This process is an extension of the Real-Time Rapidly Exploring Random Trees* (RT-RRT*) algorithm developed by Naderi et al in 2015 [1]. The RT-RRT* algorithm was demonstrated on a simulated two-dimensional dynamic environment while finding paths to a varying target state. We demonstrate that the original algorithm is incapable of running at a sufficient rate for control of a 7-degree-of-freedom (7-DoF) robotic arm while maintaining a path planning tree in 7 dimensions. This limitation is due to the complexity of maintaining a tree in a high-dimensional space and the network …
A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose
A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose
Theses and Dissertations--Electrical and Computer Engineering
As deep neural network (DNN) models increase significantly in complexity and size, it has become important to increase the computing capability of specialized hardware architectures typically used for DNN processing. The major linear operations of DNNs, which comprise the fully connected and convolution layers, are commonly converted into general matrix-matrix multiplication (GEMM) operations for acceleration. Specialized GEMM accelerators are typically employed to implement these GEMM operations, where a GEMM operation is decomposed into multiple vector-dot-product operations that run in parallel. A common challenge that arises in modern DNNs is the mismatch between the matrices used for GEMM operations and the …
Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons
Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons
Theses and Dissertations--Computer Science
The Herculaneum scrolls were buried and carbonized by the eruption of Mount Vesuvius in A.D. 79 and represent the only classical library discovered in situ. Charred by the heat of the eruption, the scrolls are extremely fragile. Since their discovery two centuries ago, some scrolls have been physically opened, leading to some textual recovery but also widespread damage. Many other scrolls remain in rolled form, with unknown contents. More recently, various noninvasive methods have been attempted to reveal the hidden contents of these scrolls using advanced imaging. Unfortunately, their complex internal structure and lack of clear ink contrast has prevented …
Machine-Learning-Powered Cyber-Physical Systems, Enrico Casella
Machine-Learning-Powered Cyber-Physical Systems, Enrico Casella
Theses and Dissertations--Computer Science
In the last few years, we witnessed the revolution of the Internet of Things (IoT) paradigm and the consequent growth of Cyber-Physical Systems (CPSs). IoT devices, which include a plethora of smart interconnected sensors, actuators, and microcontrollers, have the ability to sense physical phenomena occurring in an environment and provide copious amounts of heterogeneous data about the functioning of a system. As a consequence, the large amounts of generated data represent an opportunity to adopt artificial intelligence and machine learning techniques that can be used to make informed decisions aimed at the optimization of such systems, thus enabling a variety …
Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade
Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade
Theses and Dissertations--Computer Science
Multi-agent systems are prevalent in the real world in various domains. In many multi-agent systems, interaction among agents is inevitable, and cooperation in some form is needed among agents to deal with the task at hand. We model the type of multi-agent systems where autonomous agents inhabit an environment with no global control or global knowledge, decentralized in the true sense. In particular, we consider game-theoretical problems such as the hedonic coalition formation games, matching problems, and Cournot games. We propose novel decentralized learning and multi-agent reinforcement learning approaches to train agents in learning behaviors and adapting to the environments. …
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
Theses and Dissertations--Computer Science
Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …
Personalized Point Of Interest Recommendations With Privacy-Preserving Techniques, Longyin Cui
Personalized Point Of Interest Recommendations With Privacy-Preserving Techniques, Longyin Cui
Theses and Dissertations--Computer Science
Location-based services (LBS) have become increasingly popular, with millions of people using mobile devices to access information about nearby points of interest (POIs). Personalized POI recommender systems have been developed to assist users in discovering and navigating these POIs. However, these systems typically require large amounts of user data, including location history and preferences, to provide personalized recommendations.
The collection and use of such data can pose significant privacy concerns. This dissertation proposes a privacy-preserving approach to POI recommendations that address these privacy concerns. The proposed approach uses clustering, tabular generative adversarial networks, and differential privacy to generate synthetic user …
Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina
Theses and Dissertations--Computer Science
The incidence of computer network intrusions has significantly increased over the last decade, partially attributed to a thriving underground cyber-crime economy and the widespread availability of advanced tools for launching such attacks. To counter these attacks, researchers in both academia and industry have turned to machine learning (ML) techniques to develop Intrusion Detection Systems (IDSes) for computer networks. However, many of the datasets use to train ML classifiers for detecting intrusions are not balanced, with some classes having fewer samples than others. This can result in ML classifiers producing suboptimal results. In this dissertation, we address this issue and present …
Application Of Conventional Feedforward And Deep Neural Networks To Power Distribution System State Estimation And State Forecasting, James Paul Carmichael
Application Of Conventional Feedforward And Deep Neural Networks To Power Distribution System State Estimation And State Forecasting, James Paul Carmichael
Theses and Dissertations--Electrical and Computer Engineering
Classical neural networks such as feedforward multilayer perceptron models (MLPs) are well established as universal approximators and as such, show promise in applications such as static state estimation in power transmission systems. This research investigates the application of conventional neural networks (MLPs) and deep learning based models such as convolutional neural networks (CNNs) and long short-term memory networks (LSTMs) to mitigate challenges in power distribution system state estimation and forecasting based upon conventional analytic methods. The ability of MLPs to perform regression to perform power system state estimation will be investigated. MLPs are considered based upon their promise to learn …