Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Other Computer Engineering

2018

Institution
Keyword
Publication

Articles 1 - 30 of 63

Full-Text Articles in Engineering

Localization Using Convolutional Neural Networks, Shannon D. Fong Dec 2018

Localization Using Convolutional Neural Networks, Shannon D. Fong

Computer Engineering

With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These …


A Survey Of Virtual Network Architectures, Lenoy Avidan Dec 2018

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science and Software Engineering

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures, …


Exploring Photo Privacy Protection On Smartphones, David Darling Dec 2018

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence …


Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour Dec 2018

Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour

Boise State University Theses and Dissertations

Industrial Control System (ICS) is responsible for controlling and managing critical infrastructures like nuclear plants and power plants. ICS is equipped with various devices like communication media, Programmable Logic Controller (PLC), actuators, and sensors. Sensors are used to measure a physical phenomenon and send these measurements through the sensory channel to the control devices so they can make decisions on the movements of the actuators in the systems. While tampering with the sensor measurements has been the focus of many studies, there is some research that has concentrated on misusing a sensor and sensory channel as an axillary attack device …


Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage Dec 2018

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage

Electronic Theses and Dissertations

The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in …


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist Dec 2018

Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist

Architectural Engineering

Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic event. …


Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen Dec 2018

Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen

Master's Theses

There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.

To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on a shared power …


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla Dec 2018

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to …


Social Network For Software Developers, Sanket Prabhakar Jadhav Dec 2018

Social Network For Software Developers, Sanket Prabhakar Jadhav

Electronic Theses, Projects, and Dissertations

This project is the design and implementation of a web-based message board for software developers. The purpose of “Social Network for Software Developers” is to connect inexperienced software developers with experienced software developers.


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie Nov 2018

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …


Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone Nov 2018

Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone

Electrical and Computer Engineering ETDs

Motion estimation has been dominated by time domain methods such as block matching and optical flow. However, these methods have problems with multiple moving objects in the video scene, moving backgrounds, noise, and fractional pixel/frame motion. This dissertation proposes a frequency domain method (FDM) that solves these problems. The methodology introduced here addresses multiple moving objects, with or without a moving background, 3-D frequency domain decomposition of digital video as the sum of locally translational (or, in the case of background, a globally translational motion), with high noise rejection. Additionally, via a version of the chirp-Z, fractional pixel/frame motion detection …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang Oct 2018

Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang

Doctoral Dissertations

This dissertation proposes a series of multi-sensor localization and tracking algorithms particularly developed for two important application domains, which are disaster management and indoor wayfinding for blind and visually impaired (BVI) users. For disaster management, we developed two different localization algorithms, one each for Radio Frequency Identification (RFID) and Bluetooth Low Energy (BLE) technology, which enable the disaster management system to track patients in real-time. Both algorithms work in the absence of any pre-deployed infrastructure along with smartphones and wearable devices. Regarding indoor wayfinding for BVI users, we have explored several types of indoor positioning techniques including BLE-based, inertial, visual …


Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma Oct 2018

Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma

Doctoral Dissertations

Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator. Transient …


Effective Methods And Tools For Mining App Store Reviews, Nishant Jha Oct 2018

Effective Methods And Tools For Mining App Store Reviews, Nishant Jha

LSU Doctoral Dissertations

Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these major …


A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani Oct 2018

A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani

Electrical and Computer Engineering ETDs

Situational awareness and indoor positioning of firefighters are types of information of paramount importance to the success of search and rescue operations. GPS units are undependable for use in Indoor Positioning Systems due to their associated mar- gins of error in position and their reliance on satellite communication that can be interrupted inside large structures. There are few other techniques like dead reck- oning, Wifi and bluetooth based triangulation, Structure from Motion (SFM) based scene reconstruction for Indoor positioning system. However due to high temper- atures, the rapidly changing environment of fires, and low parallax in the thermal images, the …


Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan Oct 2018

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …


Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani Aug 2018

Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani

Electronic Thesis and Dissertation Repository

Recurrent Neural Networks (RNN) show a remarkable result in sequence learning, particularly in architectures with gated unit structures such as Long Short-term Memory (LSTM). In recent years, several permutations of LSTM architecture have been proposed mainly to overcome the computational complexity of LSTM. In this dissertation, a novel study is presented that will empirically investigate and evaluate LSTM architecture variants such as Gated Recurrent Unit (GRU), Bi-Directional LSTM, and Dynamic-RNN for LSTM and GRU specifically on detecting network intrusions. The investigation is designed to identify the learning time required for each architecture algorithm and to measure the intrusion prediction accuracy. …


Improved Iterative Truncated Arithmetic Mean Filter, Prathyusha Surampudi Venkata Aug 2018

Improved Iterative Truncated Arithmetic Mean Filter, Prathyusha Surampudi Venkata

University of New Orleans Theses and Dissertations

This thesis discusses image processing and filtering techniques with emphasis on Mean filter, Median filter, and different versions of the Iterative Truncated Arithmetic Mean (ITM) filter. Specifically, we review in detail the ITM algorithms (ITM1 and ITM2) proposed by Xudong Jiang. Although filtering is capable of reducing noise in an image, it usually also results in smoothening or some other form of distortion of image edges and file details. Therefore, maintaining a proper trade off between noise reduction and edge/detail distortion is key. In this thesis, an improvement over Xudong Jiang’s ITM filters, namely ITM3, has been proposed and tested …


Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu Aug 2018

Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu

Electronic Theses and Dissertations

Crowdsourcing is proposed as a powerful mechanism for accomplishing large scale tasks via anonymous workers online. It has been demonstrated as an effective and important approach for collecting labeled data in application domains which require human intelligence, such as image labeling, video annotation, natural language processing, etc. Despite the promises, one big challenge still exists in crowdsourcing systems: the difficulty of controlling the quality of crowds. The workers usually have diverse education levels, personal preferences, and motivations, leading to unknown work performance while completing a crowdsourced task. Among them, some are reliable, and some might provide noisy feedback. It is …


Power Laws In Complex Graphs: Parsimonious Generative Models, Similarity Testing Algorithms, And The Origins, Shan Lu Jul 2018

Power Laws In Complex Graphs: Parsimonious Generative Models, Similarity Testing Algorithms, And The Origins, Shan Lu

Doctoral Dissertations

This dissertation mainly discussed topics related to power law graphs, including graph similarity testing algorithms and power law generative models. For graph similarity testing, we proposed a method based on the mathematical theory of diffusion over manifolds using random walks over graphs. We show that our method not only distinguishes between graphs with different degree distributions, but also graphs with the same degree distributions. We compare the undirected power law graphs generated by Barabasi-Albert model and directed power law graphs generated by Krapivsky's model to the random graphs generated by Erdos-Renyi model. We also compare power law graphs generated by …


Intelligent Computational Transportation, Yuming Zhang Jul 2018

Intelligent Computational Transportation, Yuming Zhang

Electrical and Computer Engineering ETDs

Transportation is commonplace around our world. Numerous researchers dedicate great efforts to vast transportation research topics. The purpose of this dissertation is to investigate and address a couple of transportation problems with respect to geographic discretization, pavement surface automatic examination, and traffic ow simulation, using advanced computational technologies. Many applications require a discretized 2D geographic map such that local information can be accessed efficiently. For example, map matching, which aligns a sequence of observed positions to a real-world road network, needs to find all the nearby road segments to the individual positions. To this end, the map is discretized by …


Delegation Application, Erik Matthew Phillips Jun 2018

Delegation Application, Erik Matthew Phillips

Computer Science and Software Engineering

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Forumsphere.Com, Nicholas Scott Gatehouse, Sam Robert Rastovich Jun 2018

Forumsphere.Com, Nicholas Scott Gatehouse, Sam Robert Rastovich

Computer Science and Software Engineering

We live in the Age of Information & Technology where social media has become an integral part of our society. Social media platforms such as Facebook help bring people and ideas together in one place. However, currently there is no centralized hub on the internet that is geared towards individual college campuses. Our goal is to create an environment that promotes structured and productive discussion between students, alumni, and staff. A platform like ours is needed to bring a campus closer if the community is willing and able to help one another.

There are other platforms that focus on social …


Generalized Featured Product Page, Andrew J. Pirondini Jun 2018

Generalized Featured Product Page, Andrew J. Pirondini

Computer Science and Software Engineering

The goal of my senior project was to generalize the process of creating featured product pages with iFixit. Featured product pages are pages with custom content describing an individual product such as text blurbs, images, and even some responsive components. These do not have a simple template like products you might see on Amazon but instead involve scrolling through a variable amount of content.

In order to generalize these, each part of the page was broken into discrete components that contain custom content. There are components for images, paragraph blurbs, lists, footers and more. These components are implemented with React …


Home Weather Station, Jarrett William Corr Jun 2018

Home Weather Station, Jarrett William Corr

Computer Engineering

This senior project implements a mobile weather station that can relay weather data to an indoor module with an LCD display. The outdoor module utilizes a temperature, humidity, and pressure sensor to collect atmospheric weather data and a radio transceiver to transmit the data to a display station via radio frequency communications. The indoor station displays the temperature, humidity and time with an LCD display. The indoor station has a settings menu which allows the user to configure the unit of measurement for the temperature and time where the device is located.


Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball Jun 2018

Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball

Computer Engineering

The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work that …


Abbott Alarm System, Galen Wu Jun 2018

Abbott Alarm System, Galen Wu

Computer Engineering

In order to improve production efficiency of implantable cardioverter defibrillators, the Sylmar’s Abbott product manufacturing team requested assistance from the Sylmar hardware development team to construct a system to monitor a UB25, a resistance welder. This system shall monitor the welder for false welds, regulate the number of welds the operator executes, and alerts the operator and floor supervisor of these events. These tasks will ultimately improve the quality of the product and decrease the risk and cost to the customer.


Tracking Eye Movements Over Source Code, Faith Chan Jun 2018

Tracking Eye Movements Over Source Code, Faith Chan

Computer Engineering

Studies on software developers’ behavior guide the development of tools that facilitate source code reading and reviewing. Eye trackers have allowed researchers to study this behavior in more detail–to pinpoint where the developer is looking, or even to detect which source code element the developer is viewing. However, systems that map gaze to characteristics as specific as source code elements are often expensive, either because of the cost of compatible eye trackers or because of the cost of the required software. This project aims to use existing technology to create a lower-cost system that provides information on the source code …