Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Series

PDF

Computer Sciences

Institution
Keyword
Publication

Articles 1 - 30 of 204

Full-Text Articles in Engineering

Generating Energy Data For Machine Learning With Recurrent Generative Adversarial Networks, Mohammad Navid Fekri, Ananda M. Ghosh, Katarina Grolinger Dec 2019

Generating Energy Data For Machine Learning With Recurrent Generative Adversarial Networks, Mohammad Navid Fekri, Ananda M. Ghosh, Katarina Grolinger

Electrical and Computer Engineering Publications

The smart grid employs computing and communication technologies to embed intelligence into the power grid and, consequently, make the grid more efficient. Machine learning (ML) has been applied for tasks that are important for smart grid operation including energy consumption and generation forecasting, anomaly detection, and state estimation. These ML solutions commonly require sufficient historical data; however, this data is often not readily available because of reasons such as data collection costs and concerns regarding security and privacy. This paper introduces a recurrent generative adversarial network (R-GAN) for generating realistic energy consumption data by learning from real data. Generativea adversarial ...


Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li Dec 2019

Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li

All Computer Science and Engineering Research

In this project, we explore new techniques and architectures for applying deep neural networks when the input is point cloud data. We first consider applying convolutions on regular pixel and voxel grids, using polynomials of point coordinates and Fourier transforms to get a rich feature representation for all points mapped to the same pixel or voxel. We also apply these ideas to generalize the recently proposed "interpolated convolution", by learning continuous-space kernels as a combination of polynomial and Fourier basis kernels. Experiments on the ModelNet40 dataset demonstrate that our methods have superior performance over the baselines in 3D object recognition.


Using Machine Learning Classification Methods To Detect The Presence Of Heart Disease, Nestor Pereira Dec 2019

Using Machine Learning Classification Methods To Detect The Presence Of Heart Disease, Nestor Pereira

Dissertations

Cardiovascular disease (CVD) is the most common cause of death in Ireland, and probably, worldwide. According to the Health Service Executive (HSE) cardiovascular disease accounting for 36% of all deaths, and one important fact, 22% of premature deaths (under age 65) are from CVD.

Using data from the Heart Disease UCI Data Set (UCI Machine Learning), we use machine learning techniques to detect the presence or absence of heart disease in the patient according to 14 features provide for this dataset. The different results are compared based on accuracy performance, confusion matrix and area under the Receiver Operating Characteristics (ROC ...


Factor Analysis Of Mixed Data (Famd) And Multiple Linear Regression In R, Nestor Pereira Dec 2019

Factor Analysis Of Mixed Data (Famd) And Multiple Linear Regression In R, Nestor Pereira

Dissertations

In the previous projects, it has been worked to statistically analysis of the factors to impact the score of the subjects of Mathematics and Portuguese for several groups of the student from secondary school from Portugal.

In this project will be interested in finding a model, hypothetically multiple linear regression, to predict the final score, dependent variable G3, of the student according to some features divide into two groups. One group, analyses the features or predictors which impact in the final score more related to the performance of the students, means variables like study time or past failures. The second ...


College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas Dec 2019

College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas

Senior Projects (COE)

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the ...


Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole Dec 2019

Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole

All Computer Science and Engineering Research

Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key sinks or parts of the system without needing ...


Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah Dec 2019

Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah

Computer Science and Engineering: Theses, Dissertations, and Student Research

Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic environments, and facilitating interactions across heterogeneous domains. Accordingly, assessing the security thereof is a pressing need, yet requires high levels of scalability and reliability to handle the dynamism involved in such volatile ecosystems.

This dissertation seeks to enhance conventional security detection methods to cope with the emergent features of contemporary software ecosystems. In particular, it analyzes the security of Android and IoT ecosystems by developing rigorous vulnerability detection methods. A critical aspect of this work is the ...


Sensor Emulation With Physiolocal Data In Immersive Virtual Reality Driving Simulator, Jungsu Pak, Oliver Mathias, Ariane Guirguis, Uri Maoz Dec 2019

Sensor Emulation With Physiolocal Data In Immersive Virtual Reality Driving Simulator, Jungsu Pak, Oliver Mathias, Ariane Guirguis, Uri Maoz

Student Scholar Symposium Abstracts and Posters

Can we enhance the safety and comfort of AVs by training AVs with physiological data of human drivers? We will train and compare AV algorithm with/without physiological data.


The Trolley Problem In Virtual Reality, Jungsu Pak, Ariane Guirguis, Nicholas Mirchandani, Scott Cummings, Uri Maoz Dec 2019

The Trolley Problem In Virtual Reality, Jungsu Pak, Ariane Guirguis, Nicholas Mirchandani, Scott Cummings, Uri Maoz

Student Scholar Symposium Abstracts and Posters

Would people react to the Trolley problem differently based on the medium? Immersive Virtual Reality Driving Simulator was used to examine participants respond to the trolley problem in a realistic and controlled simulated environment.


Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park Dec 2019

Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park

VMASC Publications

The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation ...


Formal Modeling And Analysis Of A Family Of Surgical Robots, Niloofar Mansoor Dec 2019

Formal Modeling And Analysis Of A Family Of Surgical Robots, Niloofar Mansoor

Computer Science and Engineering: Theses, Dissertations, and Student Research

Safety-critical applications often use dependability cases to validate that specified properties are invariant, or to demonstrate a counterexample showing how that property might be violated. However, most dependability cases are written with a single product in mind. At the same time, software product lines (families of related software products) have been studied with the goal of modeling variability and commonality and building family-based techniques for both modeling and analysis. This thesis presents a novel approach for building an end to end dependability case for a software product line, where a property is formally modeled, a counterexample is found and then ...


Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque Dec 2019

Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque

Computer Science and Engineering: Theses, Dissertations, and Student Research

Landing an unmanned aerial vehicle (UAV) on a moving platform is a challenging task that often requires exact models of the UAV dynamics, platform characteristics, and environmental conditions. In this thesis, we present and investigate three different machine learning approaches with varying levels of domain knowledge: dynamics randomization, universal policy with system identification, and reinforcement learning with no parameter variation. We first train the policies in simulation, then perform experiments both in simulation, making variations of the system dynamics with wind and friction coefficient, then perform experiments in a real robot system with wind variation. We initially expected that providing ...


Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park Dec 2019

Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park

VMASC Publications

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication ...


Seer: An Explainable Deep Learning Midi-Based Hybrid Song Recommender System, Khalil Damak, Olfa Nasraoui Dec 2019

Seer: An Explainable Deep Learning Midi-Based Hybrid Song Recommender System, Khalil Damak, Olfa Nasraoui

Faculty Scholarship

State of the art music recommender systems mainly rely on either matrix factorization-based collaborative filtering approaches or deep learning architectures. Deep learning models usually use metadata for content-based filtering or predict the next user interaction by learning from temporal sequences of user actions. Despite advances in deep learning for song recommendation, none has taken advantage of the sequential nature of songs by learning sequence models that are based on content. Aside from the importance of prediction accuracy, other significant aspects are important, such as explainability and solving the cold start problem. In this work, we propose a hybrid deep learning ...


Finding Needles In A Haystack: Leveraging Co-Change Dependencies To Recommend Refactorings, Marcos César De Oliveira, Davi Freitas, Rodrigo Bonifacio, Gustavo Pinto, David Lo Dec 2019

Finding Needles In A Haystack: Leveraging Co-Change Dependencies To Recommend Refactorings, Marcos César De Oliveira, Davi Freitas, Rodrigo Bonifacio, Gustavo Pinto, David Lo

Research Collection School Of Computing and Information Systems

A fine-grained co-change dependency arises when two fine-grained source-code entities, e.g., a method,change frequently together. This kind of dependency is relevant when considering remodularization efforts (e.g., to keep methods that change together in the same class). However, existing approaches forrecommending refactorings that change software decomposition (such as a move method) do not explorethe use of fine-grained co-change dependencies. In this paper we present a novel approach for recommending move method and move field refactorings, which removes co-change dependencies and evolutionary smells, a particular type of dependency that arise when fine-grained entities that belong to different classes frequently ...


Digitalization In Practice: The Fifth Discipline Advantage, Siu Loon Hoe Dec 2019

Digitalization In Practice: The Fifth Discipline Advantage, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Purpose The purpose of this paper is to provide advice to organizations on how to become successful in the digital age. The paper revisits Peter Senge's (1990) notion of the learning organization and discusses the relevance of systems thinking and the other four disciplines, namely, personal mastery, mental models, shared vision and team learning in the context of the current digitalization megatrend. Design/methodology/approach This paper is based on content analysis of essays from international organizations, strategy experts and management scholars, and insights gained from the author's consulting experience. A comparative case study from the health and ...


Identifying Regional Trends In Avatar Customization, Peter Mawhorter, Sercan Sengun, Haewoon Kwak, D. Fox Harrell Dec 2019

Identifying Regional Trends In Avatar Customization, Peter Mawhorter, Sercan Sengun, Haewoon Kwak, D. Fox Harrell

Research Collection School Of Computing and Information Systems

Since virtual identities such as social media profiles and avatars have become a common venue for self-expression, it has become important to consider the ways in which existing systems embed the values of their designers. In order to design virtual identity systems that reflect the needs and preferences of diverse users, understanding how the virtual identity construction differs between groups is important. This paper presents a new methodology that leverages deep learning and differential clustering for comparative analysis of profile images, with a case study of almost 100 000 avatars from a large online community using a popular avatar creation ...


A Collaborative Visual Localization Scheme For A Low-Cost Heterogeneous Robotic Team With Non-Overlapping Perspectives, Benjamin Abruzzo, David Cappelleri, Philippos Mordohai Nov 2019

A Collaborative Visual Localization Scheme For A Low-Cost Heterogeneous Robotic Team With Non-Overlapping Perspectives, Benjamin Abruzzo, David Cappelleri, Philippos Mordohai

West Point Research Papers

This paper presents and evaluates a relative localization scheme for a heterogeneous team of low-cost mobile robots. An error-state, complementary Kalman Filter was developed to fuse analytically-derived uncertainty of stereoscopic pose measurements of an aerial robot, made by a ground robot, with the inertial/visual proprioceptive measurements of both robots. Results show that the sources of error, image quantization, asynchronous sensors, and a non-stationary bias, were sufficiently modeled to estimate the pose of the aerial robot. In both simulation and experiments, we demonstrate the proposed methodology with a heterogeneous robot team, consisting of a UAV and a UGV tasked with ...


Robot Simulation Analysis, Jacob Miller, Jeremy Evert Nov 2019

Robot Simulation Analysis, Jacob Miller, Jeremy Evert

Student Research

• Simulate virtual robot for test and analysis

• Analyze SLAM solutions using ROS

• Assemble a functional Turtlebot

• Emphasize projects related to current research trajectories for NASA, and general robotics applications


Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid Nov 2019

Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid

FIU Electronic Theses and Dissertations

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity ...


Boosting Verification Scalability Via Structural Grouping And Semantic Partitioning Of Properties, Rohit Dureja, Jason Baumgartner, Alexander Ivrii, Robert Kanzelman, Kristin Y. Rozier Nov 2019

Boosting Verification Scalability Via Structural Grouping And Semantic Partitioning Of Properties, Rohit Dureja, Jason Baumgartner, Alexander Ivrii, Robert Kanzelman, Kristin Y. Rozier

Aerospace Engineering Conference Papers, Presentations and Posters

From equivalence checking to functional verification to design-space exploration, industrial verification tasks entail checking a large number of properties on the same design. State-of-the-art tools typically solve all properties concurrently, or one-at-a-time. They do not optimally exploit subproblem sharing between properties, leaving an opportunity to save considerable verification resource via concurrent verification of properties with nearly identical cone of influence (COI). These high-affinity properties can be concurrently solved; the verification effort expended for one can be directly reused to accelerate the verification of the others, without hurting per-property verification resources through bloating COI size. We present a near-linear runtime algorithm ...


Cascaded Neural Networks For Identification And Posture-Based Threat Assessment Of Armed People, Benjamin Abruzzo, Kevin Carey, Christopher Lowrance, Eric Sturzinger, Ross Arnold, Christopher Korpela Nov 2019

Cascaded Neural Networks For Identification And Posture-Based Threat Assessment Of Armed People, Benjamin Abruzzo, Kevin Carey, Christopher Lowrance, Eric Sturzinger, Ross Arnold, Christopher Korpela

West Point Research Papers

This paper presents a near real-time, multi-stage classifier which identifies people and handguns in images, and then further assesses the threat-level that a person poses based on their body posture. The first stage consists of a convolutional neural network (CNN) that determines whether a person and a handgun are present in an image. If so, a second stage CNN is then used to estimate the pose of the person detected to have a handgun. Lastly, a feed-forward neural network (NN) makes the final threat assessment based on the joint positions of the person’s skeletal pose estimate from the previous ...


Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim Nov 2019

Design And Modeling Of A New Biomimetic Soft Robotic Jellyfish Using Ipmc-Based Electroactive Polymers, Zakai J. Olsen, Kwang J. Kim

Mechanical Engineering Faculty Publications

Smart materials and soft robotics have been seen to be particularly well-suited for developing biomimetic devices and are active fields of research. In this study, the design and modeling of a new biomimetic soft robot is described. Initial work was made in the modeling of a biomimetic robot based on the locomotion and kinematics of jellyfish. Modifications were made to the governing equations for jellyfish locomotion that accounted for geometric differences between biology and the robotic design. In particular, the capability of the model to account for the mass and geometry of the robot design has been added for better ...


Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang Nov 2019

Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang

Research Collection School Of Computing and Information Systems

With the rapid development and popularization of mobile and wireless communication technologies, ridesourcing companies have been able to leverage internet-based platforms to operate e-hailing services in many cities around the world. These companies connect passengers and drivers in real time and are disruptively changing the transportation indus- try. As pioneers in a general sharing economy context, ridesourcing shared transportation platforms consist of a typical two-sided market. On the demand side, passengers are sensi- tive to the price and quality of the service. On the supply side, drivers, as freelancers, make working decisions flexibly based on their income from the platform ...


Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta Nov 2019

Secure Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to an increasing number of avenues for conducting cross-VM side-channel attacks, the security of multi-tenant public IaaS cloud environments is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. In this paper, we focus on secure VM placement algorithms which a cloud provider can use for the automatic enforcement of security against such co-location based attacks. To do so, we first establish a metric for evaluating and quantifying co-location security of multi-tenant public IaaS clouds, and then propose a novel VM placement ...


Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee Nov 2019

Stressmon: Scalable Detection Of Perceived Stress And Depression Using Passive Sensing Of Changes In Work Routines And Group Interactions, Nur Camellia Binte Zakaria, Rajesh Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

Stress and depression are a common affliction in all walks of life. When left unmanaged, stress can inhibit productivity or cause depression. Depression can occur independently of stress. There has been a sharp rise in mobile health initiatives to monitor stress and depression. However, these initiatives usually require users to install dedicated apps or multiple sensors, making such solutions hard to scale. Moreover, they emphasise sensing individual factors and overlook social interactions, which plays a significant role in influencing stress and depression while being a part of a social system. We present StressMon, a stress and depression detection system that ...


Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma Nov 2019

Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma

Library Philosophy and Practice (e-journal)

Scientometrics is a quantitative analysis of scholarly literature related to a particular subject or area (well defined by some limits, scope and coverage), which helps to understand different aspects about the scholarly literature’s growth in various dimensions of knowledge. Similarly, this study is a quantitative analysis of the Global research trends in cyber security. Some works related to scientometrics of ‘deception, counter-deception in cyberspace’ had been published in 2011, but we have focused on ‘cyber security’ as the topic of research. For analysis we have utilised the published data available in Scopus database, which is directly related to ‘cyber ...


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided ...


Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes Oct 2019

Work-In-Progress: Iot Device Signature Validation, Jeffrey Hemmes

Regis University Faculty Publications

Device fingerprinting is an area of security that has received renewed attention in recent years, with a number of classification methods proposed that rely on characteristics unique to a particular vendor or device type. Current works are limited to determining device type for purposes of access control and MAC address spoof prevention. This work synthesizes multiple sources of information to verify device capabilities in a device profile, which can be used in a number of applications not limited to authentication and authorization. The approach proposed in this paper relies on existing protocols and methods proposed in the literature, using a ...


Integrating Data Science Into A General Education Information Technology Course: An Approach To Developing Data Savvy Undergraduates, Malcolm Haynes, Joshua Groen, Eric Sturzinger, Danny Zhu, Justin Shafer, Timothy Mcgee Oct 2019

Integrating Data Science Into A General Education Information Technology Course: An Approach To Developing Data Savvy Undergraduates, Malcolm Haynes, Joshua Groen, Eric Sturzinger, Danny Zhu, Justin Shafer, Timothy Mcgee

West Point Research Papers

The National Academies recommend academic institutions foster a basic understanding of data science in all undergraduates. However, data science education is not currently a graduation requirement at most colleges and universities. As a result, many graduates lack even basic knowledge of data science. To address the shortfall, academic institutions should incorporate introductory data science into general education courses. A general education IT course provides a unique opportunity to integrate data science education. Modules covering databases, spreadsheets, and presentation software, already present in many survey IT courses, teach concepts and skills needed for data science. As a result, a survey IT ...