Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Engineering

Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao Mar 2024

Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao

Master's Theses

Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …


Enhancing Telecom Churn Prediction: Adaboost With Oversampling And Recursive Feature Elimination Approach, Long Dinh Tran Jun 2023

Enhancing Telecom Churn Prediction: Adaboost With Oversampling And Recursive Feature Elimination Approach, Long Dinh Tran

Master's Theses

Churn prediction is a critical task for businesses to retain their valuable customers. This paper presents a comprehensive study of churn prediction in the telecom sector using 15 approaches, including popular algorithms such as Logistic Regression, Support Vector Machine, Decision Tree, Random Forest, and AdaBoost.

The study is segmented into three sets of experiments, each focusing on a different approach to building the churn prediction model. The model is constructed using the original training set in the first set of experiments. The second set involves oversampling the training set to address the issue of imbalanced data. Lastly, the third set …


Analysis And Usage Of Natural Language Features In Success Prediction Of Legislative Testimonies, Marine Cossoul Mar 2023

Analysis And Usage Of Natural Language Features In Success Prediction Of Legislative Testimonies, Marine Cossoul

Master's Theses

Committee meetings are a fundamental part of the legislative process in which
constituents, lobbyists, and legislators alike can speak on proposed bills at the
local and state level. Oftentimes, unspoken “rules” or standards are at play in
political processes that can influence the trajectory of a bill, leaving constituents
without a political background at an inherent disadvantage when engaging with
the legislative process. The work done in this thesis aims to explore the extent to
which the language and phraseology of a general public testimony can influence a
vote, and examine how this information can be used to promote civic …


A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen Dec 2022

A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen

Master's Theses

Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …


Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong Dec 2022

Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong

Master's Theses

Depth perception has become a heavily researched area as companies and researchers are striving towards the development of self-driving cars. Self-driving cars rely on perceiving the surrounding area, which heavily depends on technology capable of providing the system with depth perception capabilities. In this paper, we explore developing a single camera (monocular) depth prediction model that is trained on panoramic depth images. Our model makes novel use of transfer learning efficient encoder models, pre-training on a larger dataset of flat depth images, and optimizing the model for use with a Jetson Nano. Additionally, we present a training and optimization framework …


Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. Mcgrath Jun 2022

Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. Mcgrath

Mechanical Engineering

Solar farms like the Gold Tree Solar Farm at Cal Poly San Luis Obispo have difficulty delivering a consistent level of power output. Cloudy days can trigger a significant drop in the utility of a farm’s solar panels, and an unexpected loss of power from the farm could potentially unbalance the electrical grid. Being able to predict these power output drops in advance could provide valuable time to prepare a grid and keep it stable. Furthermore, with modern data analysis methods such as machine learning, these predictions are becoming more and more accurate – given a sufficient data set. The …


A Study Of Grammar-Based Fuzzing Approaches, Ziwei Wu Jun 2022

A Study Of Grammar-Based Fuzzing Approaches, Ziwei Wu

Master's Theses

Fuzzing is the process of finding security vulnerabilities in code by creating inputs that will activate the exploits. Grammar-based fuzzing uses a grammar, which represents the syntax of all inputs a target program will accept, allowing the fuzzer to create well-formed complex inputs. This thesis conducts an in-depth study on two blackbox grammar-based fuzzing methods, GLADE and Learn&Fuzz, on their performance and usability to the average user. The blackbox fuzzer Radamsa was also used to compare fuzzing effectiveness. From our results in fuzzing PDF objects, GLADE beats both Radamsa and Learn&Fuzz in terms of coverage and pass rate. XML inputs …


Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli Jun 2022

Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli

Master's Theses

Though exploring one’s family lineage through genealogical family trees can be insightful to developing one’s identity, this knowledge is typically held behind closed doors by private companies or require expensive technologies, such as DNA testing, to uncover. With the ever-booming explosion of data on the world wide web, many unstructured text documents, both old and new, are being discovered, written, and processed which contain rich genealogical information. With access to this immense amount of data, however, entails a costly process whereby people, typically volunteers, have to read large amounts of text to find relationships between people. This delays having genealogical …


Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity Jun 2022

Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity

Master's Theses

Over the past two decades there has been a rapid decline in public oversight of state and local governments. From 2003 to 2014, the number of journalists assigned to cover the proceedings in state houses has declined by more than 30\%. During the same time period, non-profit projects such as Digital Democracy sought to collect and store legislative bill and hearing information on behalf of the public. More recently, AI4Reporters, an offshoot of Digital Democracy, seeks to actively summarize interesting legislative data.

This thesis presents STRAINER, a parallel project with AI4Reporters, as an active data retrieval and filtering system for …


Classifying Electrocardiogram With Machine Learning Techniques, Hillal Jarrar Dec 2021

Classifying Electrocardiogram With Machine Learning Techniques, Hillal Jarrar

Master's Theses

Classifying the electrocardiogram is of clinical importance because classification can be used to diagnose patients with cardiac arrhythmias. Many industries utilize machine learning techniques that consist of feature extraction methods followed by Naive- Bayesian classification in order to detect faults within machinery. Machine learning techniques that analyze vibrational machine data in a mechanical application may be used to analyze electrical data in a physiological application. Three of the most common feature extraction methods used to prepare machine vibration data for Naive-Bayesian classification are the Fourier transform, the Hilbert transform, and the Wavelet Packet transform. Each machine learning technique consists of …


Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke Sep 2021

Subnational Map Of Poverty Generated From Remote-Sensing Data In Africa: Using Machine Learning Models And Advanced Regression Methods For Poverty Estimation, Lionel N. Hanke

Master's Theses

According to the 2020 poverty estimates from the World Bank, it is estimated that 9.1% - 9.4% of the global population lived on less than $1.90 per day. It is estimated that the Covid-19 pandemic further aggravated the issue by pushing more than 1% of the global population below the international poverty line of $1.90 per day (WorldBank, 2020). To provide help and formulate effective measures, poverty needs to be located as exact as possible. For this purpose, it was investigated whether regression methods with aggregated remote-sensing data could be used to estimate poverty in Africa. Therefore, five distinct regression …


Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani Jun 2021

Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani

Computer Science and Software Engineering

The purpose of this project is to observe the evolution of two artificial agents, a ‘Seeker’ and a ‘Hider’, as they play a simplified version of the game Hide and Seek. These agents will improve through machine learning, and will only be given an understanding of the rules of the game and the ability to navigate through the grid-like space where the game shall be played; they will not be taught or given any strategies, and will be made to learn from a clean slate. Of particular interest is observing the particular playstyle of hider and seeker intelligences as new …


Implementing A Data Acquisition System For The Training Of Cloud Coverage Neural Networks, Weston C. Montgomery Jun 2021

Implementing A Data Acquisition System For The Training Of Cloud Coverage Neural Networks, Weston C. Montgomery

Master's Theses

Cal Poly is home to a solar farm designed to nominally generate 4.5 MW of electricity. The Gold Tree Solar Farm (GTSF) is currently the largest photovoltaic array in the California State University (CSU) system, and it was claimed to be able to produce approximately 11 GWh per year. These types of projections come from power generation models which have been developed to predict power production of these large solar fields. However, when it comes to near-term forecasting of power generation with variable sources such as wind and solar, there is definitely room for improvement.

The two primary factors that …


Soarnet, Deep Learning Thermal Detection For Free Flight, Jake T. Tallman Jun 2021

Soarnet, Deep Learning Thermal Detection For Free Flight, Jake T. Tallman

Master's Theses

Thermals are regions of rising hot air formed on the ground through the warming of the surface by the sun. Thermals are commonly used by birds and glider pilots to extend flight duration, increase cross-country distance, and conserve energy. This kind of powerless flight using natural sources of lift is called soaring. Once a thermal is encountered, the pilot flies in circles to keep within the thermal, so gaining altitude before flying off to the next thermal and towards the destination. A single thermal can net a pilot thousands of feet of elevation gain, however estimating thermal locations is not …


Comparison Of Classification Algorithms And Undersampling Methods On Employee Churn Prediction: A Case Study Of A Tech Company, Heather Cooper Dec 2020

Comparison Of Classification Algorithms And Undersampling Methods On Employee Churn Prediction: A Case Study Of A Tech Company, Heather Cooper

Master's Theses

Churn prediction is a common data mining problem that many companies face across industries. More commonly, customer churn has been studied extensively within the telecommunications industry where there is low customer retention due to high market competition. Similar to customer churn, employee churn is very costly to a company and by not deploying proper risk mitigation strategies, profits cannot be maximized, and valuable employees may leave the company. The cost to replace an employee is exponentially higher than finding a replacement, so it is in any company’s best interest to prioritize employee retention.

This research combines machine learning techniques with …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Combining Machine Learning And Empirical Engineering Methods Towards Improving Oil Production Forecasting, Andrew J. Allen Jul 2020

Combining Machine Learning And Empirical Engineering Methods Towards Improving Oil Production Forecasting, Andrew J. Allen

Master's Theses

Current methods of production forecasting such as decline curve analysis (DCA) or numerical simulation require years of historical production data, and their accuracy is limited by the choice of model parameters. Unconventional resources have proven challenging to apply traditional methods of production forecasting because they lack long production histories and have extremely variable model parameters. This research proposes a data-driven alternative to reservoir simulation and production forecasting techniques. We create a proxy-well model for predicting cumulative oil production by selecting statistically significant well completion parameters and reservoir information as independent predictor variables in regression-based models. Then, principal component analysis (PCA) …


Visual Speech Recognition Using A 3d Convolutional Neural Network, Matthew Rochford Dec 2019

Visual Speech Recognition Using A 3d Convolutional Neural Network, Matthew Rochford

Master's Theses

Main stream automatic speech recognition (ASR) makes use of audio data to identify spoken words, however visual speech recognition (VSR) has recently been of increased interest to researchers. VSR is used when audio data is corrupted or missing entirely and also to further enhance the accuracy of audio-based ASR systems. In this research, we present both a framework for building 3D feature cubes of lip data from videos and a 3D convolutional neural network (CNN) architecture for performing classification on a dataset of 100 spoken words, recorded in an uncontrolled envi- ronment. Our 3D-CNN architecture achieves a testing accuracy of …


Comparison Of Modern Controls And Reinforcement Learning For Robust Control Of Autonomously Backing Up Tractor-Trailers To Loading Docks, Journey Mcdowell Nov 2019

Comparison Of Modern Controls And Reinforcement Learning For Robust Control Of Autonomously Backing Up Tractor-Trailers To Loading Docks, Journey Mcdowell

Master's Theses

Two controller performances are assessed for generalization in the path following task of autonomously backing up a tractor-trailer. Starting from random locations and orientations, paths are generated to loading docks with arbitrary pose using Dubins Curves. The combination vehicles can be varied in wheelbase, hitch length, weight distributions, and tire cornering stiffness. The closed form calculation of the gains for the Linear Quadratic Regulator (LQR) rely heavily on having an accurate model of the plant. However, real-world applications cannot expect to have an updated model for each new trailer. Finding alternative robust controllers when the trailer model is changed was …


Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt Jun 2019

Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt

Computer Engineering

This project was designed to explore and analyze the potential abilities and usefulness of applying machine learning models to data collected by parking sensors at a major metro shopping mall. By examining patterns in rates at which customer enter and exit parking garages on the campus of the Bellevue Collection shopping mall in Bellevue, Washington, a recurrent neural network will use data points from the previous hours will be trained to forecast future trends.


Development Of A Model And Imbalance Detection System For The Cal Poly Wind Turbine, Ryan Miki Takatsuka Jun 2019

Development Of A Model And Imbalance Detection System For The Cal Poly Wind Turbine, Ryan Miki Takatsuka

Master's Theses

This thesis develops a model of the Cal Poly Wind Turbine that is used to determine if there is an imbalance in the turbine rotor. A theoretical model is derived to estimate the expected vibrations when there is an imbalance in the rotor. Vibration and acceleration data are collected from the turbine tower during operation to confirm the model is useful and accurate for determining imbalances in the turbine.

Digital signal processing techniques for analyzing the vibration data are explored and tested with simulation data. This includes frequency shifts, lock-in amplifiers, phase-locked loops, discrete Fourier transforms, and decimation filters. The …


Localization Using Convolutional Neural Networks, Shannon D. Fong Dec 2018

Localization Using Convolutional Neural Networks, Shannon D. Fong

Computer Engineering

With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These …


Predicting The Vote Using Legislative Speech, Aditya Budhwar Mar 2018

Predicting The Vote Using Legislative Speech, Aditya Budhwar

Master's Theses

As most dedicated observers of voting bodies like the U.S. Supreme Court can attest, it is possible to guess vote outcomes based on statements made during deliberations or questioning by the voting members. In most forms of representative democracy, citizens can actively petition or lobby their representatives, and that often means understanding their intentions to vote for or against an issue of interest. In some U.S. state legislators, professional lobby groups and dedicated press members are highly informed and engaged, but the process is basically closed to ordinary citizens because they do not have enough background and familiarity with the …


Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu Dec 2017

Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu

Master's Theses

Genealogical records play a crucial role in helping people to discover their lineage and to understand where they come from. They provide a way for people to celebrate their heritage and to possibly reconnect with family they had never considered. However, genealogical records are hard to come by for ordinary people since their information is not always well established in known databases. There often is free form text that describes a person’s life, but this must be manually read in order to extract the relevant genealogical information. In addition, multiple texts may have to be read in order to create …


Complementary Companion Behavior In Video Games, Gavin Scott Jun 2017

Complementary Companion Behavior In Video Games, Gavin Scott

Master's Theses

Companion characters in are present in many video games across genres, serving the role of the player's partner. Their goal is to support the player's strategy and to immerse the player by providing a believable companion. These companions often only perform rigidly scripted actions and fail to adapt to an individual player's play-style, detracting from their usefulness. Behavior like this can also become frustrating to the player if the companions become more of a hindrance than they are a benefit. Other work, including this project's precursor, focused on building companions that mimic the player. These strategies customize the companion's actions …


Laff-O-Tron: Laugh Prediction In Ted Talks, Andrew D. Acosta Oct 2016

Laff-O-Tron: Laugh Prediction In Ted Talks, Andrew D. Acosta

Master's Theses

Did you hear where the thesis found its ancestors? They were in the "parent-thesis"! This joke, whether you laughed at it or not, contains a fascinating and mysterious quality: humor. Humor is something so incredibly human that if you squint, the two words can even look the same. As such, humor is not often considered something that computers can understand. But, that doesn't mean we won't try to teach it to them.

In this thesis, we propose the system Laff-O-Tron to attempt to predict when the audience of a public speech would laugh by looking only at the text of …


Smart Weights, Luke W. Rafla-Yuan, Austin C. Fox Jun 2014

Smart Weights, Luke W. Rafla-Yuan, Austin C. Fox

Electrical Engineering

The goal of this project is to design and implement weights which can record and analyze work out patterns. Motivation for this project stems from the high cost of personal training. The hope is that this device will provide many of the benefits a user receives from personal training at only a fraction of the cost. The Smart Weight is designed with an on-board Inertial Measurement Unit providing acceleration, gyroscope, and magnetometer data. A microcontroller records and analyzes changes in motion, feeding this data into Multiplicative Recurrent Neural Network (MRNN) for exercise classification. A Raspberry Pi was chosen as the …


Atrengine: An Orientation-Based Algorithm For Automatic Target Recognition, Justin Ting-Jeuan Kuo Jun 2014

Atrengine: An Orientation-Based Algorithm For Automatic Target Recognition, Justin Ting-Jeuan Kuo

Master's Theses

Automatic Target Recognition (ATR) is a subject involving the use of sensor data to develop an algorithm for identifying targets of significance. It is of particular interest in military applications such as unmanned aerial vehicles and missile tracking systems. This thesis develops an orientation-based classification approach from previous ATR algorithms for 2-D Synthetic Aperture Radar (SAR) images. Prior work in ATR includes Chessa Guilas’ Hausdorff Probabilistic Feature Analysis Approach in 2005 and Daniel Cary’s Optimal Rectangular Fit in 2007.

A system incorporating multiple modules performing different tasks is developed to streamline the data processing of previous algorithms. Using images from …