Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (25)
- Louisiana State University (4)
- University of Arkansas, Fayetteville (4)
- University of Louisville (4)
- University of New Mexico (4)
-
- University of Massachusetts Amherst (3)
- Western University (3)
- California State University, San Bernardino (2)
- Cleveland State University (2)
- Southern Methodist University (2)
- Bard College (1)
- Boise State University (1)
- Claremont Colleges (1)
- James Madison University (1)
- Kennesaw State University (1)
- Michigan Technological University (1)
- The University of Maine (1)
- University of New Orleans (1)
- University of North Florida (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Machine Learning (4)
- Computer Engineering (3)
- Computer Science (3)
- Computer Vision (3)
- Android (2)
-
- Computer vision (2)
- Deep Learning (2)
- Education (2)
- Fault Tolerance (2)
- Game (2)
- IOS (2)
- JavaScript (2)
- Machine learning (2)
- Neural Network (2)
- Neural network (2)
- React (2)
- Simulation (2)
- AI (1)
- API (1)
- ARCE (1)
- AUC (1)
- AUV (1)
- AWS (1)
- Abstract Tile Assembly System (1)
- Academic -- UNF -- Computing; offloading (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Accessibility (1)
- Accuracy (1)
- Adaboost (1)
- Advanced metering infrastructure (1)
- Publication
-
- Master's Theses (9)
- Computer Engineering (8)
- Computer Science and Software Engineering (5)
- Electronic Theses and Dissertations (5)
- Computer Science and Computer Engineering Undergraduate Honors Theses (4)
-
- Doctoral Dissertations (3)
- Electrical and Computer Engineering ETDs (3)
- Electronic Thesis and Dissertation Repository (3)
- ETD Archive (2)
- Electrical Engineering (2)
- Electronic Theses, Projects, and Dissertations (2)
- LSU Doctoral Dissertations (2)
- LSU Master's Theses (2)
- Architectural Engineering (1)
- Boise State University Theses and Dissertations (1)
- CMC Senior Theses (1)
- Computer Science ETDs (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Electrical Engineering Theses and Dissertations (1)
- Master of Science in Computer Science Theses (1)
- Masters Theses, 2010-2019 (1)
- Senior Projects Spring 2018 (1)
- Theses and Dissertations (1)
- UNF Graduate Theses and Dissertations (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 30 of 63
Full-Text Articles in Engineering
Localization Using Convolutional Neural Networks, Shannon D. Fong
Localization Using Convolutional Neural Networks, Shannon D. Fong
Computer Engineering
With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These …
A Survey Of Virtual Network Architectures, Lenoy Avidan
A Survey Of Virtual Network Architectures, Lenoy Avidan
Computer Science and Software Engineering
With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures, …
Exploring Photo Privacy Protection On Smartphones, David Darling
Exploring Photo Privacy Protection On Smartphones, David Darling
Computer Science and Computer Engineering Undergraduate Honors Theses
The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence …
Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour
Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour
Boise State University Theses and Dissertations
Industrial Control System (ICS) is responsible for controlling and managing critical infrastructures like nuclear plants and power plants. ICS is equipped with various devices like communication media, Programmable Logic Controller (PLC), actuators, and sensors. Sensors are used to measure a physical phenomenon and send these measurements through the sensory channel to the control devices so they can make decisions on the movements of the actuators in the systems. While tampering with the sensor measurements has been the focus of many studies, there is some research that has concentrated on misusing a sensor and sensory channel as an axillary attack device …
Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage
Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage
Electronic Theses and Dissertations
The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in …
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Architectural Engineering
Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic event. …
Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen
Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen
Master's Theses
There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.
To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on a shared power …
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Electronic Theses, Projects, and Dissertations
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to …
Social Network For Software Developers, Sanket Prabhakar Jadhav
Social Network For Software Developers, Sanket Prabhakar Jadhav
Electronic Theses, Projects, and Dissertations
This project is the design and implementation of a web-based message board for software developers. The purpose of “Social Network for Software Developers” is to connect inexperienced software developers with experienced software developers.
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Master of Science in Computer Science Theses
The evolution of machine learning and computer vision in technology has driven a lot of
improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …
Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone
Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone
Electrical and Computer Engineering ETDs
Motion estimation has been dominated by time domain methods such as block matching and optical flow. However, these methods have problems with multiple moving objects in the video scene, moving backgrounds, noise, and fractional pixel/frame motion. This dissertation proposes a frequency domain method (FDM) that solves these problems. The methodology introduced here addresses multiple moving objects, with or without a moving background, 3-D frequency domain decomposition of digital video as the sum of locally translational (or, in the case of background, a globally translational motion), with high noise rejection. Additionally, via a version of the chirp-Z, fractional pixel/frame motion detection …
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Computer Science ETDs
Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.
In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …
Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang
Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang
Doctoral Dissertations
This dissertation proposes a series of multi-sensor localization and tracking algorithms particularly developed for two important application domains, which are disaster management and indoor wayfinding for blind and visually impaired (BVI) users. For disaster management, we developed two different localization algorithms, one each for Radio Frequency Identification (RFID) and Bluetooth Low Energy (BLE) technology, which enable the disaster management system to track patients in real-time. Both algorithms work in the absence of any pre-deployed infrastructure along with smartphones and wearable devices. Regarding indoor wayfinding for BVI users, we have explored several types of indoor positioning techniques including BLE-based, inertial, visual …
Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma
Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma
Doctoral Dissertations
Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator. Transient …
Effective Methods And Tools For Mining App Store Reviews, Nishant Jha
Effective Methods And Tools For Mining App Store Reviews, Nishant Jha
LSU Doctoral Dissertations
Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these major …
A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani
A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani
Electrical and Computer Engineering ETDs
Situational awareness and indoor positioning of firefighters are types of information of paramount importance to the success of search and rescue operations. GPS units are undependable for use in Indoor Positioning Systems due to their associated mar- gins of error in position and their reliance on satellite communication that can be interrupted inside large structures. There are few other techniques like dead reck- oning, Wifi and bluetooth based triangulation, Structure from Motion (SFM) based scene reconstruction for Indoor positioning system. However due to high temper- atures, the rapidly changing environment of fires, and low parallax in the thermal images, the …
Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan
Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan
Electrical Engineering Theses and Dissertations
The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.
Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …
Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani
Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani
Electronic Thesis and Dissertation Repository
Recurrent Neural Networks (RNN) show a remarkable result in sequence learning, particularly in architectures with gated unit structures such as Long Short-term Memory (LSTM). In recent years, several permutations of LSTM architecture have been proposed mainly to overcome the computational complexity of LSTM. In this dissertation, a novel study is presented that will empirically investigate and evaluate LSTM architecture variants such as Gated Recurrent Unit (GRU), Bi-Directional LSTM, and Dynamic-RNN for LSTM and GRU specifically on detecting network intrusions. The investigation is designed to identify the learning time required for each architecture algorithm and to measure the intrusion prediction accuracy. …
Improved Iterative Truncated Arithmetic Mean Filter, Prathyusha Surampudi Venkata
Improved Iterative Truncated Arithmetic Mean Filter, Prathyusha Surampudi Venkata
University of New Orleans Theses and Dissertations
This thesis discusses image processing and filtering techniques with emphasis on Mean filter, Median filter, and different versions of the Iterative Truncated Arithmetic Mean (ITM) filter. Specifically, we review in detail the ITM algorithms (ITM1 and ITM2) proposed by Xudong Jiang. Although filtering is capable of reducing noise in an image, it usually also results in smoothening or some other form of distortion of image edges and file details. Therefore, maintaining a proper trade off between noise reduction and edge/detail distortion is key. In this thesis, an improvement over Xudong Jiang’s ITM filters, namely ITM3, has been proposed and tested …
Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu
Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu
Electronic Theses and Dissertations
Crowdsourcing is proposed as a powerful mechanism for accomplishing large scale tasks via anonymous workers online. It has been demonstrated as an effective and important approach for collecting labeled data in application domains which require human intelligence, such as image labeling, video annotation, natural language processing, etc. Despite the promises, one big challenge still exists in crowdsourcing systems: the difficulty of controlling the quality of crowds. The workers usually have diverse education levels, personal preferences, and motivations, leading to unknown work performance while completing a crowdsourced task. Among them, some are reliable, and some might provide noisy feedback. It is …
Power Laws In Complex Graphs: Parsimonious Generative Models, Similarity Testing Algorithms, And The Origins, Shan Lu
Doctoral Dissertations
This dissertation mainly discussed topics related to power law graphs, including graph similarity testing algorithms and power law generative models. For graph similarity testing, we proposed a method based on the mathematical theory of diffusion over manifolds using random walks over graphs. We show that our method not only distinguishes between graphs with different degree distributions, but also graphs with the same degree distributions. We compare the undirected power law graphs generated by Barabasi-Albert model and directed power law graphs generated by Krapivsky's model to the random graphs generated by Erdos-Renyi model. We also compare power law graphs generated by …
Intelligent Computational Transportation, Yuming Zhang
Intelligent Computational Transportation, Yuming Zhang
Electrical and Computer Engineering ETDs
Transportation is commonplace around our world. Numerous researchers dedicate great efforts to vast transportation research topics. The purpose of this dissertation is to investigate and address a couple of transportation problems with respect to geographic discretization, pavement surface automatic examination, and traffic ow simulation, using advanced computational technologies. Many applications require a discretized 2D geographic map such that local information can be accessed efficiently. For example, map matching, which aligns a sequence of observed positions to a real-world road network, needs to find all the nearby road segments to the individual positions. To this end, the map is discretized by …
Delegation Application, Erik Matthew Phillips
Delegation Application, Erik Matthew Phillips
Computer Science and Software Engineering
Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.
Forumsphere.Com, Nicholas Scott Gatehouse, Sam Robert Rastovich
Forumsphere.Com, Nicholas Scott Gatehouse, Sam Robert Rastovich
Computer Science and Software Engineering
We live in the Age of Information & Technology where social media has become an integral part of our society. Social media platforms such as Facebook help bring people and ideas together in one place. However, currently there is no centralized hub on the internet that is geared towards individual college campuses. Our goal is to create an environment that promotes structured and productive discussion between students, alumni, and staff. A platform like ours is needed to bring a campus closer if the community is willing and able to help one another.
There are other platforms that focus on social …
Generalized Featured Product Page, Andrew J. Pirondini
Generalized Featured Product Page, Andrew J. Pirondini
Computer Science and Software Engineering
The goal of my senior project was to generalize the process of creating featured product pages with iFixit. Featured product pages are pages with custom content describing an individual product such as text blurbs, images, and even some responsive components. These do not have a simple template like products you might see on Amazon but instead involve scrolling through a variable amount of content.
In order to generalize these, each part of the page was broken into discrete components that contain custom content. There are components for images, paragraph blurbs, lists, footers and more. These components are implemented with React …
Home Weather Station, Jarrett William Corr
Home Weather Station, Jarrett William Corr
Computer Engineering
This senior project implements a mobile weather station that can relay weather data to an indoor module with an LCD display. The outdoor module utilizes a temperature, humidity, and pressure sensor to collect atmospheric weather data and a radio transceiver to transmit the data to a display station via radio frequency communications. The indoor station displays the temperature, humidity and time with an LCD display. The indoor station has a settings menu which allows the user to configure the unit of measurement for the temperature and time where the device is located.
Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball
Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball
Computer Engineering
The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work that …
Abbott Alarm System, Galen Wu
Abbott Alarm System, Galen Wu
Computer Engineering
In order to improve production efficiency of implantable cardioverter defibrillators, the Sylmar’s Abbott product manufacturing team requested assistance from the Sylmar hardware development team to construct a system to monitor a UB25, a resistance welder. This system shall monitor the welder for false welds, regulate the number of welds the operator executes, and alerts the operator and floor supervisor of these events. These tasks will ultimately improve the quality of the product and decrease the risk and cost to the customer.
Tracking Eye Movements Over Source Code, Faith Chan
Tracking Eye Movements Over Source Code, Faith Chan
Computer Engineering
Studies on software developers’ behavior guide the development of tools that facilitate source code reading and reviewing. Eye trackers have allowed researchers to study this behavior in more detail–to pinpoint where the developer is looking, or even to detect which source code element the developer is viewing. However, systems that map gaze to characteristics as specific as source code elements are often expensive, either because of the cost of compatible eye trackers or because of the cost of the required software. This project aims to use existing technology to create a lower-cost system that provides information on the source code …