Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Other Computer Engineering

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 464

Full-Text Articles in Engineering

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury Dec 2019

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury

Boise State University Theses and Dissertations

Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.

In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):

RQ1: Is ...


Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz Dec 2019

Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz

Computer Science and Computer Engineering Undergraduate Honors Theses

The increasing complexity and demand of software systems and the greater availability of test automation software is quickly rendering manual end-to-end (E2E) testing techniques for mobile platforms obsolete. This research seeks to explore the potential increase in automated test efficacy and maintainability through the use of computer vision algorithms when applied with Appium, a leading cross-platform mobile test automation framework. A testing framework written in a Node.js environment was created to support the development of E2E test scripts that examine and report the functional capabilities of a mobile test app. The test framework provides a suite of functions that ...


Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval Dec 2019

Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval

Computer Science and Computer Engineering Undergraduate Honors Theses

Deep learning has advanced progressively in the last years and now demonstrates state-of-the-art performance in various fields. In the era of big data, transformation of data into valuable knowledge has become one of the most important challenges in computing. Therefore, we will review multiple algorithms for face recognition that have been researched for a long time and are maturely developed, and analyze deep learning, presenting examples of current research.

To provide a useful and comprehensive perspective, in this paper we categorize research by deep learning architecture, including neural networks, convolutional neural networks, depthwise Separable Convolutions, densely connected convolutional networks, and ...


Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh Oct 2019

Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh

Doctoral Dissertations

Society has benefited from the technological revolution and the tremendous growth in computing powered by Moore's law. However, we are fast approaching the ultimate physical limits in terms of both device sizes and the associated energy dissipation. It is important to characterize these limits in a physically grounded and implementation-agnostic manner, in order to capture the fundamental energy dissipation costs associated with performing computing operations with classical information in nano-scale quantum systems. It is also necessary to identify and understand the effect of quantum in-distinguishability, noise, and device variability on these dissipation limits. Identifying these parameters is crucial to ...


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better ...


Fake Review Detection Using Data Mining, Md Forhad Hossain Aug 2019

Fake Review Detection Using Data Mining, Md Forhad Hossain

MSU Graduate Theses

Online spam reviews are deceptive evaluations of products and services. They are often carried out as a deliberate manipulation strategy to deceive the readers. Recognizing such reviews is an important but challenging problem. In this work, I try to solve this problem by using different data mining techniques. I explore the strength and weakness of those data mining techniques in detecting fake review. I start with different supervised techniques such as Support Vector Ma- chine (SVM), Multinomial Naive Bayes (MNB), and Multilayer Perceptron. The results attest that all the above mentioned supervised techniques can successfully detect fake review with more ...


An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari Aug 2019

An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari

Electronic Theses and Dissertations

Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less ...


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be ...


Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez Jul 2019

Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez

Electronic Thesis and Dissertation Repository

Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make ...


Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng Jul 2019

Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng

Doctoral Dissertations

Today we are living in a world awash with data. Large volumes of data are acquired, analyzed and applied to tasks through machine learning algorithms in nearly every area of science, business, and industry. For example, medical scientists analyze the gene expression data from a single specimen to learn the underlying causes of disease (e.g. cancer) and choose the best treatment; retailers can know more about customers' shopping habits from retail data to adjust their business strategies to better appeal to customers; suppliers can enhance supply chain success through supply chain systems built on knowledge sharing. However, it is ...


Computer Vision Machine Learning And Future-Oriented Ethics, Abagayle Lee Blank Jun 2019

Computer Vision Machine Learning And Future-Oriented Ethics, Abagayle Lee Blank

Honors Projects

Computer Vision Machine Learning (CVML) in the application of facial recognition is currently being researched, developed, and deployed across the world. It is of interest to governments, technology companies, and consumers. However, fundamental issues remain related to human rights, error rates, and bias. These issues have the potential to create societal backlash towards the technology which could limit its benefits as well as harm people in the process. To develop facial recognition technology that will be beneficial to society in and beyond the next decade, society must put ethics at the forefront. Drawing on AI4People’s adaption of bioethics for ...


Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt Jun 2019

Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt

Computer Engineering

This project was designed to explore and analyze the potential abilities and usefulness of applying machine learning models to data collected by parking sensors at a major metro shopping mall. By examining patterns in rates at which customer enter and exit parking garages on the campus of the Bellevue Collection shopping mall in Bellevue, Washington, a recurrent neural network will use data points from the previous hours will be trained to forecast future trends.


Reach - A Community Service Application, Samuel Noel Magana Jun 2019

Reach - A Community Service Application, Samuel Noel Magana

Computer Engineering

Communities are familiar threads that unite people through several shared attributes and interests. These commonalities are the core elements that link and bond us together. Many of us are part of multiple communities, moving in and out of them depending on our needs. These common threads allow us to support and advocate for each other when facing a common threat or difficult situation. Healthy and vibrant communities are fundamental to the operation of our society. These interactions within our communities define the way we as individuals interact with each other, and society at large. Being part of a community helps ...


Keylime, Matthew Orgill Jun 2019

Keylime, Matthew Orgill

Computer Engineering

This project creates an iOS mobile app geared specifically toward the students of California Polytechnic State University. The app aims to provide the ability for users to discover new restaurants to checkout in the central coast area. These restaurants can be filtered to the user’s choosing based on the price of food, rating the restaurant has received, distance away from the user, and type of food. In addition, featured deals that local restaurants currently offer can be found on the app. Each restaurant can be favorited by the user to allow for better filtering of discovering new restaurants and ...


Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves Jun 2019

Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves

Computer Engineering

This project is a 3D village generator tool for Unity. It consists of three components: a building, mountain, and river generator. All of these generators use grammar-based procedural generation in order to create a unique and logical village and landscape each time the program is run.


Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch Jun 2019

Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch

Computer Engineering

With the increasing development of autonomous vehicles, being able to detect driveable paths in arbitrary environments has become a prevalent problem in multiple industries. This project explores a technique which utilizes a discretized output map that is used to color an image based on the confidence that each block is a driveable path. This was done using a generalized convolutional neural network that was trained on a set of 3000 images taken from the perspective of a robot along with matching masks marking which portion of the image was a driveable path. The techniques used allowed for a labeling accuracy ...


Digital Forensics Challenge, Zoe Lie, Sydney Marie Mendoza Jun 2019

Digital Forensics Challenge, Zoe Lie, Sydney Marie Mendoza

Computer Engineering

No abstract provided.


Bpm: Blz Package Manager, Kenneth Huang Jun 2019

Bpm: Blz Package Manager, Kenneth Huang

Computer Engineering

bpm (BLZ Package Manager) is a package manager for the open-source programming language BLZ, built in Java. It allows users of the BLZ programming language to create and upload their own packages, as well as downloading necessary dependency packages for their packages. To do this, the program communicates with the “cardiovascular”, a web server designed for users to upload and download BLZ packages.

The program has three primary functions. The first one, “init”, initializes a package directory for use with the package manager. Part of this initialization is creating a “heartbeat” meta file, which holds information about the package’s ...


Keylime, Joshua Michael Magera Jun 2019

Keylime, Joshua Michael Magera

Computer Engineering

New freshmen arrive at Cal Poly every year, experience Week of Welcome, and, if they haven’t been to Firestone Grill within the first week, they can consider themselves an anomaly. But how long until those freshmen find the amazing sandwiches and breakfast burritos served at Gus’s Grocery or hear about the free burger promo at Sylvester’s? The goal of this senior project was to create an app, KeyLime, that makes it easy for college students to find new eateries and fresh deals that are local, affordable, and tasty. KeyLime aims to target college students and create a ...


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera Jun 2019

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on ...


Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork Jun 2019

Evaluating Creative Choice In K-12 Computer Science Curriculum, Kirsten L. Mork

Master's Theses and Project Reports

Computer Science is an increasingly important topic in K-12 education. Ever since the "computing crisis" of the early 2000s, where enrollment in CS dropped by over half in a five year span, increasing research has gone into improving and broadening enrollment in CS courses. Research shows the importance of introducing CS at a young age and the need for more exposure for younger children and young adults alike in order to work towards equity in the field. While there are many reasons for disinterest in CS courses, studies found one reason young adults do not want to study CS is ...


Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta May 2019

Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta

Computer Science and Engineering Theses and Dissertations

Demonstrating software reliability across multiple software releases has become essential in making informed decisions of upgrading software releases without impacting significantly end users' characterized processes and software quality standards. Standard defect and workload data normally collected in a typical small software development organization can be used for this purpose. Objective of this study was to demonstrate how to measure software reliability in multiple releases and whether continuous defect fixes and code upgrades increased software reliability. This study looked at techniques such as trend test that evaluated software system's overall trend and stability, input domain reliability models (IDRM) that assessed ...


Granny Pod Virtual Assistant, David Connolly, Bing Chen May 2019

Granny Pod Virtual Assistant, David Connolly, Bing Chen

Theses/Capstones/Creative Projects

Dr. Chen is working on a sustainable small house (SSH) project, sometimes called the “Granny Pod”. Regulations will soon allow homeowners to house their parents on their property, which can be an opportunity live independently in a cheap, sustainable, and convenient alternative to a retirement community. To help achieve this vision, a Virtual Assistant system for the SSH was developed. The system uses a Google Home or Amazon Echo to respond to the voice command “Hey Google (or Alexa), I need help” by contacting the nearby homeowner or caretaker. It alerts the resident who is at the door when the ...


Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan May 2019

Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan

Boise State University Theses and Dissertations

Application performance often depends on achieved memory bandwidth. Achieved memory bandwidth varies greatly given specific combinations of instruction mix and order, working set size, and access pattern. Achieving good application performance depends on optimizing these characteristics within the constraints of the given application. This task is complicated due to the lack of information about the impact of small changes on the performance. Some information is provided by benchmarks, but most memory benchmarks are confined to simple access patterns that are not representative of patterns found in real applications.

This thesis presents AdaptMemBench, a configurable benchmark framework designed to explore the ...


A Purely Defeasible Argumentation Framework, Zimi Li May 2019

A Purely Defeasible Argumentation Framework, Zimi Li

All Dissertations, Theses, and Capstone Projects

Argumentation theory is concerned with the way that intelligent agents discuss whether some statement holds. It is a claim-based theory that is widely used in many areas, such as law, linguistics and computer science. In the past few years, formal argumentation frameworks have been heavily studied and applications have been proposed in fields such as natural language processing, the semantic web and multi-agent systems. Studying argumentation provides results which help in developing tools and applications in these areas. Argumentation is interesting as a logic-based approach to deal with inconsistent information. Arguments are constructed using a process like logical inference, with ...


Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer May 2019

Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common ...


Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj . Apr 2019

Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .

Master of Science in Software Engineering Theses

In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large ...


Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren Apr 2019

Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren

Undergraduate Honors Theses

This paper examines developing machine learning and statistic models to build forecast models for equity returns in an emergent market, with an emphasis on computing. Distributed systems were pared with random search and Bayesian optimization to find good hyperparameters for neural networks. No significant results were found.


Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn Apr 2019

Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn

Senior Theses

Bridgr is an iOS application that facilitates long distance carpooling. This application allows drivers to post destinations on an interactable map so that they can be linked with students that need a ride to a location within close proximity of the posted destination. The riders and driver are linked in a common chat board where they can discuss ride details among themselves. The goal of Bridgr is to allow drivers to utilize extra space in their car in turn for fellowship and/or gas money.


A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka Apr 2019

A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka

Computer Science and Engineering Theses and Dissertations

Diagnosing and correcting failures in complex, distributed systems is difficult. In a network of perhaps dozens of nodes, each of which is executing dozens of interacting applications, sometimes from different suppliers or vendors, finding the source of a system failure is a confusing, tedious piece of detective work. The person assigned this task must trace the failing command, event, or operation through the network components and find a deviation from the correct, desired interaction sequence. After a deviation is identified, the failing applications must be found, and the fault or faults traced to the incorrect source code.

Often the primary ...