Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Engineering

Distributed Edge Bundling For Large Graphs, Yves Tuyishime Aug 2019

Distributed Edge Bundling For Large Graphs, Yves Tuyishime

Computer Science and Engineering: Theses, Dissertations, and Student Research

Graphs or networks are widely used to depict the relationships between data entities in diverse scientific and engineering applications. A direct visualization (such as node-link diagram) of a graph with a large number of nodes and edges often incurs visual clutter. To address this issue, researchers have developed edge bundling algorithms that visually merge similar edges into curved bundles and can effectively reveal high-level edge patterns with reduced visual clutter. Although the existing edge bundling algorithms achieve appealing results, they are mostly designed for a single machine, and thereby the size of a graph they can handle is limited by ...


Exploring Eye Tracking Data On Source Code Via Dual Space Analysis, Li Zhang Aug 2019

Exploring Eye Tracking Data On Source Code Via Dual Space Analysis, Li Zhang

Computer Science and Engineering: Theses, Dissertations, and Student Research

Eye tracking is a frequently used technique to collect data capturing users' strategies and behaviors in processing information. Understanding how programmers navigate through a large number of classes and methods to find bugs is important to educators and practitioners in software engineering. However, the eye tracking data collected on realistic codebases is massive compared to traditional eye tracking data on one static page. The same content may appear in different areas on the screen with users scrolling in an Integrated Development Environment (IDE). Hierarchically structured content and fluid method position compose the two major challenges for visualization. We present a ...


Dimensional Analysis Of Robot Software Without Developer Annotations, John-Paul W. Ore Jul 2019

Dimensional Analysis Of Robot Software Without Developer Annotations, John-Paul W. Ore

Computer Science and Engineering: Theses, Dissertations, and Student Research

Robot software risks the hazard of dimensional inconsistencies. These inconsistencies occur when a program incorrectly manipulates values representing real-world quantities. Incorrect manipulation has real-world consequences that range in severity from benign to catastrophic. Previous approaches detect dimensional inconsistencies in programs but require extra developer effort and technical complications. The extra effort involves developers creating type annotations for every variable representing a real-world quantity that has physical units, and the technical complications include toolchain burdens like specialized compilers or type libraries.

To overcome the limitations of previous approaches, this thesis presents novel methods to detect dimensional inconsistencies without developer annotations. We ...


The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid Jul 2019

The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid

Computer Science and Engineering: Theses, Dissertations, and Student Research

AIDA, the Ancient Inscription Database and Analytic system can be used to translate and analyze ancient Minoan language. The AIDA system currently stores three types of ancient Minoan inscriptions: Linear A, Cretan Hieroglyph and Phaistos Disk inscriptions. In addition, AIDA provides candidate syllabic values and translations of Minoan words and inscriptions into English. The AIDA system allows the users to change these candidate phonetic assignments to the Linear A, Cretan Hieroglyph and Phaistos symbols. Hence the AIDA system provides for various scholars not only a convenient online resource to browse Minoan inscriptions but also provides an analysis tool to explore ...


Scheduling And Prefetching In Hadoop With Block Access Pattern Awareness And Global Memory Sharing With Load Balancing Scheme, Sai Suman Jun 2019

Scheduling And Prefetching In Hadoop With Block Access Pattern Awareness And Global Memory Sharing With Load Balancing Scheme, Sai Suman

Computer Science and Engineering: Theses, Dissertations, and Student Research

Although several scheduling and prefetching algorithms have been proposed to improve data locality in Hadoop, there has not been much research to increase cluster performance by targeting the issue of data locality while considering the 1) cluster memory, 2) data access patterns and 3) real-time scheduling issues together.

Firstly, considering the data access patterns is crucial because the computation might access some portion of the data in the cluster only once while the rest could be accessed multiple times. Blindly retaining data in memory might eventually lead to inefficient memory utilization.

Secondly, several studies found that the cluster memory goes ...


A Data Driven Approach To Identify Journalistic 5ws From Text Documents, Venkata Krishna Mohan Sunkara Jun 2019

A Data Driven Approach To Identify Journalistic 5ws From Text Documents, Venkata Krishna Mohan Sunkara

Computer Science and Engineering: Theses, Dissertations, and Student Research

Textual understanding is the process of automatically extracting accurate high-quality information from text. The amount of textual data available from different sources such as news, blogs and social media is growing exponentially. These data encode significant latent information which if extracted accurately can be valuable in a variety of applications such as medical report analyses, news understanding and societal studies. Natural language processing techniques are often employed to develop customized algorithms to extract such latent information from text.

Journalistic 5Ws refer to the basic information in news articles that describes an event and include where, when, who, what and why ...


Image Processing Algorithms For Elastin Lamellae Inside Cardiovascular Arteries, Mahmoud Habibnezhad May 2019

Image Processing Algorithms For Elastin Lamellae Inside Cardiovascular Arteries, Mahmoud Habibnezhad

Computer Science and Engineering: Theses, Dissertations, and Student Research

Automated image processing methods are greatly needed to replace the tedious, manual histology analysis still performed by many physicians. This thesis focuses on pathological studies that express the essential role of elastin lamella in the resilience and elastic properties of the arterial blood vessels. Due to the stochastic nature of the shape and distribution of the elastin layers, their morphological features appear as the best candidates to develop a mathematical formulation for the resistance behavior of elastic tissues. However, even for trained physicians and their assistants, the current measurement procedures are highly error-prone and prolonged. This thesis successfully integrates such ...


A Data-Driven Approach For Detecting Stress In Plants Using Hyperspectral Imagery, Suraj Gampa May 2019

A Data-Driven Approach For Detecting Stress In Plants Using Hyperspectral Imagery, Suraj Gampa

Computer Science and Engineering: Theses, Dissertations, and Student Research

A phenotype is an observable characteristic of an individual and is a function of its genotype and its growth environment. Individuals with different genotypes are impacted differently by exposure to the same environment. Therefore, phenotypes are often used to understand morphological and physiological changes in plants as a function of genotype and biotic and abiotic stress conditions. Phenotypes that measure the level of stress can help mitigate the adverse impacts on the growth cycle of the plant. Image-based plant phenotyping has the potential for early stress detection by means of computing responsive phenotypes in a non-intrusive manner. A large number ...


Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende E Silva Apr 2019

Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende E Silva

Computer Science and Engineering: Theses, Dissertations, and Student Research

With the ever-increasing popularity of mobile devices over the last decade, mobile apps and the frameworks upon which they are built frequently change. This rapid evolution leads to a confusing jumble of devices and applications utilizing differing features even within the same framework. For Android apps and devices, representing over 80% of the market share, mismatches between the version of the Android operating system installed on a device and the version of the app installed, can lead to several run-time crashes, providing a poor user experience.

This thesis presents GAINDroid, an analysis approach, backed with a classloader based program analyzer ...


Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia Apr 2019

Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia

Computer Science and Engineering: Theses, Dissertations, and Student Research

Smart home Internet-of-Things (IoT) accompanied by smart home apps has witnessed tremendous growth in the past few years. Yet, the security and privacy of the smart home IoT devices and apps have raised serious concerns, as they are getting increasingly complicated each day, expected to store and exchange extremely sensitive personal data, always on and connected, and commonly exposed to any users in a sensitive environment. Nowadays wireless smart home IoT devices rely on electromagnetic wave-based radio-frequency (RF) technology to establish fast and reliable quality network connections. However, RF has its limitations that can negatively affect the smart home user ...