Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Other Computer Engineering

2018

Institution
Keyword
Publication

Articles 31 - 60 of 63

Full-Text Articles in Engineering

Otd 360 Corsa Plate And Pcb Recreation, Patrick Ryan Malapira Jun 2018

Otd 360 Corsa Plate And Pcb Recreation, Patrick Ryan Malapira

Computer Engineering

Mechanical keyboards have a rich history alongside the development of personal computers with keyboards from leading manufacturers such as IBM and Apple, which are sought after by today’s enthusiast. As the hobby matured and hobbyist began straying from original equipment manufacturer, OEM, mechanical keyboards, enthusiasts sought to create their own keyboards.The custom mechanical keyboard hobby’s origins can be traced back to Korea on an online forum otd.kr. Custom mechanical keyboards has progressed far past the provided OEM solutions focusing on various aspects such as ergonomics, programmability, and portability. In today’s do it yourself, DIY, culture, hobbyists can play a role …


Career Path Web Application, Annamarie Roger Jun 2018

Career Path Web Application, Annamarie Roger

Computer Science and Software Engineering

This web application provides a new approach to organizing career advice. It allows a prospective student to outline career priorities and receive suggestions drawing from a repository of reports from professionals in their respective fields. This gives the student access to advice from individuals who do not know the user personally and aims to remove the possible bias that may exist on that level. Furthermore, the system is periodically updated to include recent reports.


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


Portable High-Definition Audio Spectrum Analyzer, Alex Zahn, Jamie Corr Jun 2018

Portable High-Definition Audio Spectrum Analyzer, Alex Zahn, Jamie Corr

Electrical Engineering

The Portable High-definition Audio Spectrum Analyzer (PHASA) allows the user to visualize the audio frequency spectrum of an incoming line-level stereo audio signal. Upon pressing the touch screen spectrum graph, the PHASA displays the corresponding frequency and volume levels as well as crosshairs at the touched location. The PHASA features multiple left/right channel display modes— Left channel only, right channel only, both channels simultaneously, and the average between the two channels. The PHASA features multiple resolution display modes (standard-resolution and high-resolution) and multiple dynamics display modes (standard dynamics, averaging, and peak/hold). The PHASA accepts input audio via a 1/4" TRS …


Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong Jun 2018

Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong

Electrical Engineering

There are many instances in day-to-day life where people cannot or would rather not pay full attention to their surroundings. Walking while preoccupied with a smartphone or walking while blind are excellent examples where technology could be used to make the task of avoiding 2collisions reactive, instead of proactive. A device which monitors a user’s surroundings and notifies the user when a potential collision is detected (and, additionally, notifying them as to where the obstacle is with respect to them) could be used to make walking distracted less of a hazard for the user and those around the user and …


Developing, Evaluating, And Demonstrating An Open Source Gateway And Mobile Application For The Smartfarm Decision Support System, Caleb D. Fink Jun 2018

Developing, Evaluating, And Demonstrating An Open Source Gateway And Mobile Application For The Smartfarm Decision Support System, Caleb D. Fink

Master's Theses

The purpose of this research is to design, develop, evaluate, and demonstrate an open source gateway and mobile application for the SmartFarm open source decision support system to improve agricultural stewardship, environmental conservation, and provide farmers with a system that they own. There are very limited options for an open source gateway for collecting data on the farm. The options available are: expensive, require professional maintenance, are not portable between systems, improvements are made only by the manufacturer, limited in customization options, difficult to operate, and data is owned by the company rather than the farmer. The gateway is designed …


Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson Jun 2018

Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson

Master's Theses

Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their own …


Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard Jun 2018

Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard

Master's Theses

Autonomous vehicle navigation is a complex and challenging task. Land and aerial vehicles often use highly accurate GPS sensors to localize themselves in their environments. These sensors are ineffective in underwater environments due to signal attenuation. Autonomous underwater vehicles utilize one or more of the following approaches for successful localization and navigation: inertial/dead-reckoning, acoustic signals, and geophysical data. This thesis examines autonomous localization in a simulated environment for an OpenROV Underwater Drone using a Kalman Filter. This filter performs state estimation for a dead reckoning system exhibiting an additive error in location measurements. We evaluate the accuracy of this Kalman …


Polycommit: Building Better Habits Through Gamification, Elliot Fiske Jun 2018

Polycommit: Building Better Habits Through Gamification, Elliot Fiske

Master's Theses

Computer-assisted learning is older than Turing machines, and constantly evolves as technology improves. While some teachers are resistant to using technology in the classroom, “e-learning” techniques are becoming more common in almost every school, from K-12 to universities. As technology becomes more widespread, it becomes crucial to examine the various methodologies of computer-assisted learning and find the techniques that are most effective.

This paper explores the effectiveness of one such methodology, spaced repetition. This technique applies to homework assignments available to students online. We include an exploration of several existing apps that use this technique, and introduce our own novel …


Leave The Features: Take The Cannoli, Jonathan Joseph Catanio Jun 2018

Leave The Features: Take The Cannoli, Jonathan Joseph Catanio

Master's Theses

Programming languages like Python, JavaScript, and Ruby are becoming increasingly popular due to their dynamic capabilities. These languages are often much easier to learn than other, statically type checked, languages such as C++ or Rust. Unfortunately, these dynamic languages come at the cost of losing compile-time optimizations. Python is arguably the most popular language for data scientists and researchers in the artificial intelligence and machine learning communities. As this research becomes increasingly popular, and the problems these researchers face become increasingly computationally expensive, questions are being raised about the performance of languages like Python. Language features found in Python, more …


Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang Jun 2018

Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang

Master's Theses

Gomoku, also called Five in a row, is one of the earliest checkerboard games invented by humans. For a long time, it has brought countless pleasures to us. We humans, as players, also created a lot of skills in playing it. Scientists normalize and enter these skills into the computer so that the computer knows how to play Gomoku. However, the computer just plays following the pre-entered skills, it doesn’t know how to develop these skills by itself. Inspired by Google’s AlphaGo Zero, in this thesis, by combining the technologies of Monte Carlo Tree Search, Deep Neural Networks, and Reinforcement …


Resource Brokering In Grid Computing, Adrian T. Bienkowski May 2018

Resource Brokering In Grid Computing, Adrian T. Bienkowski

Electronic Thesis and Dissertation Repository

Grid Computing has emerged in the academia and evolved towards the bases of what is currently known as Cloud Computing and Internet of Things (IoT). The vast collection of resources that provide the nature for Grid Computing environment is very complex; multiple administrative domains control access and set policies to the shared computing resources. It is a decentralized environment with geographically distributed computing and storage resources, where each computing resource can be modeled as an autonomous computing entity, yet collectively can work together. This is a class of Cooperative Distributed Systems (CDS). We extend this by applying characteristic of open …


Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta May 2018

Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta

Computer Science and Engineering Theses and Dissertations

Modern System-on-Chips (SoCs) provide benefits such as reduction in overall system cost, and size, increased performance, and lower power consumption. Increasing complexity of these Integrated Circuits (ICs) has resulted in a higher probability of manufacturing defects. Manufacturing defects can result in the faulty operation of a system. Thus, it is essential to test an IC after it is manufactured to detect any possible faults in it. These SoCs include on-chip embedded instruments that can be used for test, debug, diagnosis, validation, monitoring, characterization, configuration, or functional purposes. IEEE 1687 Std. (IJTAG) provides a standard interface for the reconfigurable access and …


Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab May 2018

Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab

Masters Theses, 2010-2019

Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on …


Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith May 2018

Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we compare the results of ResNet image classification with the results of Google Image search. We created a collection of 1,000 images by performing ten Google Image searches with a variety of search terms. We classified each of these images using ResNet and inspected the results. The ResNet classifier predicted the category that matched the search term of the image 77.5% of the time. In our best case, with the search term “forklift”, the classifier categorized 92 of the 100 images as forklifts. In the worst case, for the category “hammer”, the classifier matched the search term …


Training Machine Learning Agents In A 3d Game Engine, Diego Calderon May 2018

Training Machine Learning Agents In A 3d Game Engine, Diego Calderon

Computer Science and Computer Engineering Undergraduate Honors Theses

Artificial intelligence (AI) and video games benefit from each other. Games provide a challenging domain for testing learning algorithms, and AI provides a framework to designing and implementing intelligent behavior, which reinforces meaningful play. Medium and small studios, and independent game developers, have limited resources to design, implement, and maintain agents with reactive behavior. In this research, we trained agents using machine learning (ML), aiming to find an alternative to expensive traditional algorithms for intelligent behavior used in video games. We use Unity as a game engine to implement the environments and TensorFlow for the neural network training.


The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz May 2018

The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we prove that the three-dimensional abstract Tile Assembly Model (3DaTAM) is intrinsically universal. This means that there is a universal tile set in the 3DaTAM which can be used to simulate any 3DaTAM system. This result adds to a body of work on the intrinsic universality of models of self-assembly, and is specifically motivated by a result in FOCS 2016 showing that any intrinsically universal tile set for the 2DaTAM requires nondeterminism (i.e. undirectedness) even when simulating directed systems. To prove our result we have not only designed, but also fully implemented what we believe to be …


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman May 2018

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The …


Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao Apr 2018

Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao

Electronic Theses and Dissertations

Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.

In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project is …


Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel Apr 2018

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel

LSU Master's Theses

A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …


Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani Apr 2018

Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani

LSU Doctoral Dissertations

In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.

In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the …


Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar Mar 2018

Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar

LSU Master's Theses

We believe that using the classification accuracy is not enough to evaluate the performances of classification algorithms. It can be misleading due to overlooking an important element which is the cost if classification is inaccurate. Furthermore, the Receiver Operational Characteristic (ROC) is one of the most popular graphs used to evaluate classifiers performances. However, one of the biggest ROC’s shortcomings is the assumption of equal costs for all misclassified data. Therefore, our goal is to reduce the total cost of decision making by selecting the classifier that has the least total misclassification cost. Nevertheless, the exact misclassification cost is usually …


Skylux Smartphone Controlled Skylight, James A. Green Vi Mar 2018

Skylux Smartphone Controlled Skylight, James A. Green Vi

Computer Engineering

There are numerous electric skylight openers available for purchase for home-use, but the majority of them are remote based, or operated by a wall-unit. Furthermore, these devices are in hard to reach places, so if one were to lose the remote on a remote operated system, the only option is to contact the manufacturer for a new device. As such, my senior project, in collaboration with Colton Sundstrom’s senior project, build upon our existing capstone project in order to allow operation of the Internet of Things (IoT) device over the internet. Our client, Richard Murray, was unsatisfied with the current …


Plant Identification Using Tensorflow, Kody G. Dangtongdee Mar 2018

Plant Identification Using Tensorflow, Kody G. Dangtongdee

Computer Engineering

Exploring the diverse nature that is available in San Luis Obispo is one of my favorite activities, however, I often am frustrated that I am unable to identify or learn more about the plants that I appreciate. This project is an attempt at using the concepts of neural networks to create an image classifier which can identify plants. Machine learning is one of the biggest topics in computer science at the moment, and its many uses make it a topic that will continue to be researched for a very long time. Convolutional neural networks are a popular realm of machine …


Predicting The Vote Using Legislative Speech, Aditya Budhwar Mar 2018

Predicting The Vote Using Legislative Speech, Aditya Budhwar

Master's Theses

As most dedicated observers of voting bodies like the U.S. Supreme Court can attest, it is possible to guess vote outcomes based on statements made during deliberations or questioning by the voting members. In most forms of representative democracy, citizens can actively petition or lobby their representatives, and that often means understanding their intentions to vote for or against an issue of interest. In some U.S. state legislators, professional lobby groups and dedicated press members are highly informed and engaged, but the process is basically closed to ordinary citizens because they do not have enough background and familiarity with the …


Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste Jan 2018

Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste

Electronic Thesis and Dissertation Repository

The DNA Next Generation Sequencing (NGS) technologies produce data at a low cost, enabling their application to many ambitious fields such as cancer research, disease control, personalized medicine etc. However, even after a decade of research, the modern aligners and assemblers are far from providing efficient and error free genome alignments and assemblies respectively. This is due to the inherent nature of the genome alignment and assembly problem, which involves many complexities. Many algorithms to address this problem have been proposed over the years, but there still is a huge scope for improvement in this research space.

Many new genome …


Blockchain Scalability And Security, Tuyet Duong Jan 2018

Blockchain Scalability And Security, Tuyet Duong

Theses and Dissertations

Cryptocurrencies like Bitcoin have proven to be a phenomenal success. The underlying techniques hold huge promise to change the future of financial transactions, and eventually the way people and companies compute, collaborate, and interact. At the same time, the current Bitcoin-like proof-of-work based blockchain systems are facing many challenges. In more detail, a huge amount of energy/electricity is needed for maintaining the Bitcoin blockchain. In addition, their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption is …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans Jan 2018

Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans

ETD Archive

In recent years, researchers had been inquisitive about the use of technology to enhance the healthcare and wellness of patients with dementia. Dementia symptoms are associated with the decline in thinking skills and memory severe enough to reduce a person’s ability to pay attention and perform daily activities. Progression of dementia can be assessed by monitoring the daily activities of the patients. This thesis encompasses continuous localization and behavioral analysis of patient’s motion pattern over a wide area indoor living space using multiple calibrated Kinect sensors connected over the network. The skeleton data from all the sensor is transferred to …


A Deep Learning Agent For Games With Hidden Information, Robert A. Mills Jan 2018

A Deep Learning Agent For Games With Hidden Information, Robert A. Mills

Senior Projects Spring 2018

The goal of this project is to develop an agent capable of playing a particular game at an above average human level. In order to do so we investigated reinforcement and deep learning techniques for making decisions in discrete action spaces with hidden information. The methods we used to accomplish this goal include a standard word2vec implementation, an alpha-beta minimax tree search, and an LSTM network to evaluate game states. Given just the rules of the game and a vector representation of the game states, the agent learned to play the game by competitive self play. The emergent behavior from …