Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Series

PDF

Computer Engineering

Washington University in St. Louis

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li Dec 2019

Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li

All Computer Science and Engineering Research

In this project, we explore new techniques and architectures for applying deep neural networks when the input is point cloud data. We first consider applying convolutions on regular pixel and voxel grids, using polynomials of point coordinates and Fourier transforms to get a rich feature representation for all points mapped to the same pixel or voxel. We also apply these ideas to generalize the recently proposed "interpolated convolution", by learning continuous-space kernels as a combination of polynomial and Fourier basis kernels. Experiments on the ModelNet40 dataset demonstrate that our methods have superior performance over the baselines in 3D object recognition.


Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole Dec 2019

Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole

All Computer Science and Engineering Research

Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key sinks or parts of the system without needing ...


Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly Sep 2019

Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly

All Computer Science and Engineering Research

A pipeline is a particular type of parallel program structure, often used to represent loops with cross-iteration dependencies. Pipelines cannot be expressed with the typical parallel language constructs offered by most environments. Therefore, in order to run pipelines, it is necessary to write a parallel language and scheduler with specialized support for them. Some such schedulers are written exclusively for pipelines and unable to run any other type of program, which allows for certain optimizations that take advantage of the pipeline structure. Other schedulers implement support for pipelines on top of a general-purpose scheduling algorithm. One example of such an ...


Smart Home Audio Assistant, Xipeng Wang May 2019

Smart Home Audio Assistant, Xipeng Wang

All Computer Science and Engineering Research

This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.


A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley May 2019

A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley

All Computer Science and Engineering Research

There is ample evidence in the visualization commu- nity that individual differences matter. These prior works high- light various traits and cognitive abilities that can modulate the use of the visualization systems and demonstrate a measurable influence on speed, accuracy, process, and attention. Perhaps the most important implication of this body of work is that we can use individual differences as a mechanism for estimating people’s potential to effectively leverage visual interfaces or to identify those people who may struggle. As visual literacy and data fluency continue to become essential skills for our everyday lives, we must embrace the ...


Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu Apr 2019

Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu

All Computer Science and Engineering Research

Wireless devices have become a major part in Smart Home industry. Almost every smart home company has its own wireless solutions and cloud services. Normally, customers can only monitor and control smart devices through applications or platforms companies provided. It causes inconveniences and problems when we have lots of smart devices. In my master project, I did two projects to implement smart home IoT applications. From a single functionality IoT application to a more complicated smart home system, there are lots of challenges and problems appeared. This article will mainly focus on challenges in integrating IoT in a smart home.


Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju Apr 2019

Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju

All Computer Science and Engineering Research

When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool. This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree. First, this tool is developed by using JavaScript so that users don't need to install any software ...


Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li Apr 2019

Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li

All Computer Science and Engineering Research

Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.