Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Engineering

Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh Jan 2019

Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh

Graduate Theses, Dissertations, and Problem Reports

Lung cancer is the leading cause of cancer-related death in the world. Lung cancer can be categorized as non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). NSCLC makes up about 80% to 85% of lung cancer cases diagnosed, whereas SCLC is responsible for 10% to 15% of the cases. It remains a challenge for physicians to identify patients who shall benefit from chemotherapy. In such a scenario, identifying genes that can facilitate therapeutic target discoveries and better understanding disease mechanisms and their regulation in different stages of lung cancer, remains an important topic of research.

In this …


Immunity-Based Framework For Autonomous Flight In Gps-Challenged Environment, Mohanad Al Nuaimi Jan 2019

Immunity-Based Framework For Autonomous Flight In Gps-Challenged Environment, Mohanad Al Nuaimi

Graduate Theses, Dissertations, and Problem Reports

In this research, the artificial immune system (AIS) paradigm is used for the development of a conceptual framework for autonomous flight when vehicle position and velocity are not available from direct sources such as the global navigation satellite systems or external landmarks and systems. The AIS is expected to provide corrections of velocity and position estimations that are only based on the outputs of onboard inertial measurement units (IMU). The AIS comprises sets of artificial memory cells that simulate the function of memory T- and B-cells in the biological immune system of vertebrates. The innate immune system uses information about …


Leveraging Writing And Photography Styles For Drug Trafficker Identification In Darknet Markets, Wei Song Jan 2019

Leveraging Writing And Photography Styles For Drug Trafficker Identification In Darknet Markets, Wei Song

Graduate Theses, Dissertations, and Problem Reports

Due to its anonymity, there has been a dramatic growth of underground drug markets hosted in the darknet (e.g., Dream Market and Valhalla). To combat drug trafficking (a.k.a. illicit drug trading) in the cyberspace, there is an urgent need for automatic analysis of participants in darknet markets. However, one of the key challenges is that drug traffickers (i.e., vendors) may maintain multiple accounts across different markets or within the same market.

To address this issue, in this thesis, we propose and develop an intelligent system named uStyle-uID leveraging both writing and photography styles for drug trafficker identification at the first …


Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen Jan 2019

Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen

Graduate Theses, Dissertations, and Problem Reports

Chronic Kidney Disease (CKD) is the leading cause for kidney failure. It is a global health problem affecting approximately 10% of the world population and about 15% of US adults. Chronic Kidney Diseases do not generally show any disease specific symptoms in early stages thus it is hard to detect and prevent such diseases. Early detection and classification are the key factors in managing Chronic Kidney Diseases.

In this thesis, we propose a new machine learning technique for Kidney Ailment Prediction. We focus on two key issues in machine learning, especially in its application to disease prediction. One is related …


Roadnet: Robust Adaptive Network For Information Diffusion In Vanet, Priyashraba Misra Jan 2019

Roadnet: Robust Adaptive Network For Information Diffusion In Vanet, Priyashraba Misra

Graduate Theses, Dissertations, and Problem Reports

The automotive industry has changed more in the last one decade than ever before. Rapid advancements in autonomous driving have opened up opportunities for CAVs (Connected and Automated Vehicles). Vehicles today rely on a sensor-suite to map the surrounding and use that information for safety and navigation. The sensor's view is limited to its line of sight and this drawback can be tapered off by using Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), generally referred to as Vehicle to Everything (V2X) communication. In this thesis, we specifically focus on utilizing V2V communication using on-board Dedicated Short Range Communication …


An Empirical Analysis Of An Algorithm For The Budgeted Maximum Vertex Cover Problem In Trees, Mujidat Abisola Adeyemo Jan 2019

An Empirical Analysis Of An Algorithm For The Budgeted Maximum Vertex Cover Problem In Trees, Mujidat Abisola Adeyemo

Graduate Theses, Dissertations, and Problem Reports

Covering problems are commonly studied in fields such as mathematics, computer science, and engineering. They are also applicable in the real world, e.g., given a city, can we build base-stations such that there is network availability everywhere in the city. However, in the real world, there are usually constraints such as cost and resources. The Budgeted Maximum Vertex Cover is a generalization of covering problems. It models situations with constraints. In this thesis, we empirically analyze an algorithm for the problem of finding the Budgeted Maximum Vertex Cover in undirected trees (BMVCT). The BMVCT problem is defined as follows: Given …


Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy Jan 2019

Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy

Graduate Theses, Dissertations, and Problem Reports

Exhaust gas flow rate from a vehicle tailpipe has a great influence on emission mass rate calculations, as the emission fractions of individual gases in the exhaust are calculated by using the measured exhaust flow rate. The development of high-end sensor technologies and emission pollutant measurement instruments, which can give instantaneous values of volume concentration of pollutants flowing out of the engine are gaining importance because of their ease of operation. The volume concentrations measured can then be used with the instantaneous exhaust flow rate values to obtain mass flow rates of pollutants.

With the recent promulgation of real world …


Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav Jan 2019

Textured Contact Lens Based Iris Presentation Attack In Uncontrolled Environment, Daksha Yadav

Graduate Theses, Dissertations, and Problem Reports

The widespread use of smartphones has spurred the research in mobile iris devices. Due to their convenience, these mobile devices are also utilized in unconstrained outdoor conditions. At the same time, iris recognition in the visible spectrum has developed into an active area of research. These scenarios have necessitated the development of reliable iris recognition algorithms for such an uncontrolled environment. Additionally, iris presentation attacks such as textured contact lens pose a major challenge to current iris recognition systems.

Motivated by these factors, in this thesis, a detailed analysis of the effect of textured contact lenses on iris recognition in …


Security Bug Report Classification Using Feature Selection, Clustering, And Deep Learning, Tanner D. Gantzer Jan 2019

Security Bug Report Classification Using Feature Selection, Clustering, And Deep Learning, Tanner D. Gantzer

Graduate Theses, Dissertations, and Problem Reports

As the numbers of software vulnerabilities and cybersecurity threats increase, it is becoming more difficult and time consuming to classify bug reports manually. This thesis is focused on exploring techniques that have potential to improve the performance of automated classification of software bug reports as security or non-security related. Using supervised learning, feature selection was used to engineer new feature vectors to be used in machine learning. Feature selection changes the vocabulary used by selecting words with the greatest impact on classification. Feature selection was able to increase the F-Score across the datasets by increasing the precision. We also explored …


Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle Jan 2019

Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle

Graduate Theses, Dissertations, and Problem Reports

This thesis presents Virtual Morphology (VM), a method that explores a different perspective on the design of robot autonomy using inspiration from morphological computing and programmed computation. Morphological computation offers physical solutions that solve complex tasks, like robotic grasping of unknown objects, with relative ease. Unfortunately, these physical solutions are difficult to adjust post-development, and are usually designed to complete only one or a few specific tasks. Programmed computational approaches are more flexible because they can be implemented and adjusted through software, but unfortunately, these approaches can become rather complex as tasks become more difficult. This thesis explores the potential …