Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 88

Full-Text Articles in Engineering

Advanced Traffic Video Analytics For Robust Traffic Accident Detection, Hadi Ghahremannezhad Aug 2023

Advanced Traffic Video Analytics For Robust Traffic Accident Detection, Hadi Ghahremannezhad

Dissertations

Automatic traffic accident detection is an important task in traffic video analysis due to its key applications in developing intelligent transportation systems. Reducing the time delay between the occurrence of an accident and the dispatch of the first responders to the scene may help lower the mortality rate and save lives. Since 1980, many approaches have been presented for the automatic detection of incidents in traffic videos. In this dissertation, some challenging problems for accident detection in traffic videos are discussed and a new framework is presented in order to automatically detect single-vehicle and intersection traffic accidents in real-time.

First, …


Toward Smart And Efficient Scientific Data Management, Jinzhen Wang Aug 2023

Toward Smart And Efficient Scientific Data Management, Jinzhen Wang

Dissertations

Scientific research generates vast amounts of data, and the scale of data has significantly increased with advancements in scientific applications. To manage this data effectively, lossy data compression techniques are necessary to reduce storage and transmission costs. Nevertheless, the use of lossy compression introduces uncertainties related to its performance. This dissertation aims to answer key questions surrounding lossy data compression, such as how the performance changes, how much reduction can be achieved, and how to optimize these techniques for modern scientific data management workflows.

One of the major challenges in adopting lossy compression techniques is the trade-off between data accuracy …


Integrating Kano Model With Data Mining Techniques To Enhance Customer Satisfaction, Khaled Abdulla Ali Al Rabaiei Nov 2022

Integrating Kano Model With Data Mining Techniques To Enhance Customer Satisfaction, Khaled Abdulla Ali Al Rabaiei

Dissertations

The business world is becoming more competitive from time to time; therefore, businesses are forced to improve their strategies in every single aspect. So, determining the elements that contribute to the clients' contentment is one of the critical needs of businesses to develop successful products in the market. The Kano model is one of the models that help determine which features must be included in a product or service to improve customer satisfaction. The model focuses on highlighting the most relevant attributes of a product or service along with customers’ estimation of how these attributes can be used to predict …


Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu Aug 2022

Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu

Dissertations

In array signal processing over challenging environments, due to the non-stationarity nature of data, it is difficult to obtain enough number of data snapshots to construct an adaptive beamformer (ABF) for detecting weak signal embedded in strong interferences. One type of adaptive method targeting for such applications is the dominant mode rejection (DMR) method, which uses a reshaped eigen-decomposition of sample covariance matrix (SCM) to define a subspace containing the dominant interferers to be rejected, thereby allowing it to detect weak signal in the presence of strong interferences. The DMR weight vector takes a form similar to the adaptive minimum …


Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba Aug 2022

Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba

Dissertations

Over the past thirty years, the idea of computing based on models inspired by human brains and biological neural networks emerged. Artificial neural networks play an important role in the field of machine learning and hold the key to the success of performing many intelligent tasks by machines. They are used in various applications such as pattern recognition, data classification, stock market prediction, aerospace, weather forecasting, control systems, intelligent automation, robotics, and healthcare. Their architectures generally consist of an input layer, multiple hidden layers, and one output layer. They can be implemented on software or hardware. Nowadays, various structures with …


Application Of Deep Learning For Medical Sciences And Epidemiology Data Analysis And Diagnostic Modeling, Somenath Chakraborty Jul 2022

Application Of Deep Learning For Medical Sciences And Epidemiology Data Analysis And Diagnostic Modeling, Somenath Chakraborty

Dissertations

Machine Learning and Artificial Intelligence have made significant progress concurrent with new advancements in hardware and software technologies. Deep learning methods heavily utilize parallel computing and Graphical Processing Units(GPU). It is already used in many applications ranging from image classification, object detection, segmentation, cyber security problems and others. Deep Learning is emerging as a viable choice in dealing with today’s real-time medical problems. We need new methods and technologies in the field of Medical Science and Epidemiology for detecting and diagnosing emerging threats from new viruses such as COVID-19. The use of Artificial Intelligence in these domains is becoming more …


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Outdoor Operations Of Multiple Quadrotors In Windy Environment, Deepan Lobo May 2022

Outdoor Operations Of Multiple Quadrotors In Windy Environment, Deepan Lobo

Dissertations

Coordinated multiple small unmanned aerial vehicles (sUAVs) offer several advantages over a single sUAV platform. These advantages include improved task efficiency, reduced task completion time, improved fault tolerance, and higher task flexibility. However, their deployment in an outdoor environment is challenging due to the presence of wind gusts. The coordinated motion of a multi-sUAV system in the presence of wind disturbances is a challenging problem when considering collision avoidance (safety), scalability, and communication connectivity. Performing wind-agnostic motion planning for sUAVs may produce a sizeable cross-track error if the wind on the planned route leads to actuator saturation. In a multi-sUAV …


Design And Control Of Next-Generation Uavs For Effectively Interacting With Environments, Caiwu Ding May 2022

Design And Control Of Next-Generation Uavs For Effectively Interacting With Environments, Caiwu Ding

Dissertations

In this dissertation, the design and control of a novel multirotor for aerial manipulation is studied, with the aim of endowing the aerial vehicle with more degrees of freedom of motion and stability when interacting with the environments. Firstly, it presents an energy-efficient adaptive robust tracking control method for a class of fully actuated, thrust vectoring unmanned aerial vehicles (UAVs) with parametric uncertainties including unknown moment of inertia, mass and center of mass, which would occur in aerial maneuvering and manipulation. The effectiveness of this method is demonstrated through simulation. Secondly, a humanoid robot arm is adopted to serve as …


Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee Dec 2021

Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee

Dissertations

People nowadays use the Internet to project their assessments, impressions, ideas, and observations about various subjects or products on numerous social networking sites. These sites serve as a great source of gathering information for data analytics, sentiment analysis, natural language processing, etc. The most critical challenge is interpreting this data and capturing the sentiment behind these expressions. Sentiment analysis is analyzing, processing, concluding, and inferencing subjective texts with the views. Companies use sentiment analysis to understand public opinions, perform market research, analyze brand reputation, recognize customer experiences, and study social media influence. According to the different needs for aspect granularity, …


Machine Learning Techniques For Network Analysis, Irfan Lateef Dec 2021

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu Dec 2021

On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu

Dissertations

Due to the rapid transition from traditional experiment-based approaches to large-scale, computational intensive simulations, next-generation scientific applications typically involve complex numerical modeling and extreme-scale simulations. Such model-based simulations oftentimes generate colossal amounts of data, which must be transferred over high-performance network (HPN) infrastructures to remote sites and analyzed against experimental or observation data on high-performance computing (HPC) facility. Optimizing the performance of both data transfer in HPN and simulation-based model development on HPC is critical to enabling and accelerating knowledge discovery and scientific innovation. However, such processes generally involve an enormous set of attributes including domain-specific model parameters, network transport …


A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko Dec 2021

A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko

Dissertations

To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …


Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao Aug 2021

Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao

Dissertations

The physical intelligence, which emphasizes physical capabilities such as dexterous manipulation and dynamic mobility, is essential for robots to physically coexist with humans. Much research on robot physical intelligence has achieved success on hyper robot motor capabilities, but mostly through heavily case-specific engineering. Meanwhile, in terms of robot acquiring skills in a ubiquitous manner, robot learning from human demonstration (LfD) has achieved great progress, but still has limitations handling dynamic skills and compound actions. In this dissertation, a composite learning scheme which goes beyond LfD and integrates robot learning from human definition, demonstration, and evaluation is proposed. This method tackles …


Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu Jun 2021

Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu

Dissertations

The unprecedented increase in volume and influx of structured and unstructured data has overwhelmed conventional data management system capabilities in organizing, analyzing, and procuring useful information in a timely fashion. Structured data sources have a pre-defined pattern that makes data preprocessing and information retrieval tasks relatively easy for the current technologies that have been designed to handle structured and repeatable data. Unlike structured data, unstructured data usually exists in an unorganized format that offers no or little insight unless indexed and stored in an organized fashion. The inherent format of unstructured data exacerbates difficulties in data preprocessing and information extraction. …


Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao May 2021

Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao

Dissertations

Internet of drones (IoD), which utilize drones as Internet of Things (IoT) devices, deploys several drones in the air to collect ground information and send them to the IoD gateway for further processing. Computing tasks are usually offloaded to the cloud data center for intensive processing. However, many IoD applications require real-time processing and event response (e.g., disaster response and virtual reality applications). Hence, data processing by the remote cloud may not satisfy the strict latency requirement. Fog computing attaches fog nodes, which are equipped with computing, storage and networking resources, to IoD gateways to assume a substantial amount of …


Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen May 2021

Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen

Dissertations

Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on convolutional neural network (CNN) and two image anti-forensics methods based on generative adversarial network (GAN).

Detecting unsharp masking (USM) sharpened image is the first study in this dissertation. A CNN architecture comprises four convolutional layers and a classification module is proposed to discriminate sharpened images and unsharpened images. The results …


Towards Improving The Security Of The Software Supply Chain, Hammad Afzali May 2021

Towards Improving The Security Of The Software Supply Chain, Hammad Afzali

Dissertations

A software supply chain comprises a series of steps performed to develop and distribute a software product. History has shown that each of these steps is vulnerable to attacks that can have serious repercussions and can affect many users at once. To address the attacks against the software supply chain, end users must be provided with verifiable guarantees about the individual steps of the chain and with assurances that the steps are securely chained together.

In this dissertation, the security of several individual steps in the software supply chain is enhanced. The first step of the chain, managing the source …


Improving Multi-Threaded Qos In Clouds, Weiwei Jia May 2021

Improving Multi-Threaded Qos In Clouds, Weiwei Jia

Dissertations

Multi-threading and resource sharing are pervasive and critical in clouds and data-centers. In order to ease management, save energy and improve resource utilization, multi-threaded applications from different tenants are often encapsulated in virtual machines (VMs) and consolidated on to the same servers. Unfortunately, despite much effort, it is still extremely challenging to maintain high quality of service (QoS) for multi-threaded applications of different tenants in clouds, and these applications often suffer severe performance degradation, poor scalability, unfair resource allocation, and so on.

The dissertation identifies the causes of the QoS problems and improves the QoS of multi-threaded execution with three …


Human-Robot Interaction For Assistive Robotics, Jiawei Li Dec 2020

Human-Robot Interaction For Assistive Robotics, Jiawei Li

Dissertations

This dissertation presents an in-depth study of human-robot interaction (HRI) withapplication to assistive robotics. In various studies, dexterous in-hand manipulation is included, assistive robots for Sit-To-stand (STS) assistance along with the human intention estimation. In Chapter 1, the background and issues of HRI are explicitly discussed. In Chapter 2, the literature review introduces the recent state-of-the-art research on HRI, such as physical Human-Robot Interaction (HRI), robot STS assistance, dexterous in hand manipulation and human intention estimation. In Chapter 3, various models and control algorithms are described in detail. Chapter 4 introduces the research equipment. Chapter 5 presents innovative theories and …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu Dec 2020

Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu

Dissertations

Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …


Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou Aug 2020

Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou

Dissertations

In the era of big data, the rapidly growing flood of data represents an immense opportunity. New computational methods are desired to fully leverage the potential that exists within massive structured and unstructured data. However, decision-makers are often confronted with multiple diverse heterogeneous data sources. The heterogeneity includes different data types, different granularities, and different dimensions, posing a fundamental challenge in many applications. This dissertation focuses on designing hybrid deep neural networks for modeling various kinds of data heterogeneity.

The first part of this dissertation concerns modeling diverse data types, the first kind of data heterogeneity. Specifically, image data and …


Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif Aug 2020

Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif

Dissertations

Media production data centers are undergoing a major architectural shift to introduce digitization concepts to media creation and media processing workflows. Content companies such as NBC Universal, CBS/Viacom and Disney are modernizing their workflows to take advantage of the flexibility of IP and virtualization.

In these new environments, multicast is utilized to provide point-to-multi-point communications. In order to build point-to-multi-point trees, Multicast has an established set of control protocols such as IGMP and PIM. The existing multicast protocols do not optimize multicast tree formation for maximizing network throughput which lead to decreased fabric utilization and decreased total number of admitted …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …


Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari Aug 2020

Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari

Dissertations

A myriad of emerging applications from simple to complex ones involve human cognizance in the computation loop. Using the wisdom of human workers, researchers have solved a variety of problems, termed as “micro-tasks” such as, captcha recognition, sentiment analysis, image categorization, query processing, as well as “complex tasks” that are often collaborative, such as, classifying craters on planetary surfaces, discovering new galaxies (Galaxyzoo), performing text translation. The current view of “humans-in-the-loop” tends to see humans as machines, robots, or low-level agents used or exploited in the service of broader computation goals. This dissertation is developed to shift the focus back …


Towards Practical Homomorphic Encryption And Efficient Implementation, Gyana R. Sahu Aug 2020

Towards Practical Homomorphic Encryption And Efficient Implementation, Gyana R. Sahu

Dissertations

Cloud computing has gained significant traction over the past few years and its application continues to soar as evident from its rapid adoption in various industries. One of the major challenges involved in cloud computing services is the security of sensitive information as cloud servers have been often found to be vulnerable to snooping by malicious adversaries. Such data privacy concerns can be addressed to a greater extent by enforcing cryptographic measures. Fully homomorphic encryption (FHE), a special form of public key encryption has emerged as a primary tool in deploying such cryptographic security assurances without sacrificing many of the …


Software Quality Control Through Formal Method, Jialiang Chang Aug 2020

Software Quality Control Through Formal Method, Jialiang Chang

Dissertations

With the improvement of theories in the software industry, software quality is becoming the most significant part of the procedure of software development. Due to the implicit and explicit vulnerabilities inside the software, software quality control has caught more researchers and engineers’ attention and interest.

Current research on software quality control and verification are involving various manual and automated testing methods, which can be categorized into static analysis and dynamic analysis. However, both of them have their own disadvantages. With static analysis methods, inputs will not be taken into consideration because the software system isn’t executed so we do not …


Communications With Spectrum Sharing In 5g Networks Via Drone-Mounted Base Stations, Liang Zhang May 2020

Communications With Spectrum Sharing In 5g Networks Via Drone-Mounted Base Stations, Liang Zhang

Dissertations

The fifth generation wireless network is designed to accommodate enormous traffic demands for the next decade and to satisfy varying quality of service for different users. Drone-mounted base stations (DBSs) characterized by high mobility and low cost intrinsic attributes can be deployed to enhance the network capacity. In-band full-duplex (IBFD) is a promising technology for future wireless communications that can potentially enhance the spectrum efficiency and the throughput capacity. Therefore, the following issues have been identified and investigated in this dissertation in order to achieve high spectrum efficiency and high user quality of service.

First, the problem of deploying DBSs …