Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Theses/Dissertations

Creative Components

Discipline
Keyword
File Type

Articles 1 - 30 of 41

Full-Text Articles in Engineering

Hirepro: Aiding “Aging In Place” Via Connecting Caregiver To Older Adults Through Web Application, Vikas Jyoty Jan 2019

Hirepro: Aiding “Aging In Place” Via Connecting Caregiver To Older Adults Through Web Application, Vikas Jyoty

Creative Components

Our innovation addresses three main problems. First, our innovation is addressing the concept of “aging in place”, or older adults living independently in their own home. Our innovation is focusing on this problem so that older adults will be able to live independently in their homes for a longer period and maintain autonomy, while ensuring a safe environment. Second, this product addresses the issues that service providers face in delivering high quality services and care to older adults, such as staffing and identifying care recipients in need. Third, family members often provide informal care for older adults. However, due to ...


Simulating Severe Supply Chain Disruptions With Multiple Suppliers And Firms, Kevin Korniejczuk Jan 2019

Simulating Severe Supply Chain Disruptions With Multiple Suppliers And Firms, Kevin Korniejczuk

Creative Components

Global supply chains are susceptible to disruptions. Disruptions in one part of the world can lead to supply chain problems for companies around the world. This creative component analyzes a model of severe supply chain disruptions where several suppliers encounter inoperable facilities, resulting in potential shortages for firms which purchase from those suppliers. All entities within the model are able to choose strategic initiatives to maintain operations. If an entity’s facility is closed because of a disruptive event, the entity can choose to move production to an alternate facility. If an entity’s facility is undamaged, the entity can ...


Evaluation Of Earthquake Hazard Of Hongshanzhuang Bridge In Jinghu High-Speed Railway, Chao Ma Jan 2019

Evaluation Of Earthquake Hazard Of Hongshanzhuang Bridge In Jinghu High-Speed Railway, Chao Ma

Creative Components

No abstract provided.


Upgrades To Iseflow: Offloading Arp And Supporting Ipv6, Joel May Jan 2019

Upgrades To Iseflow: Offloading Arp And Supporting Ipv6, Joel May

Creative Components

No abstract provided.


Suppression Of Wingtip Vortices Using Plasma Flow Control, Eric Harper Jan 2019

Suppression Of Wingtip Vortices Using Plasma Flow Control, Eric Harper

Creative Components

An attempt to use Alternating Current Dielectric-Barrier-Discharge actuators to suppress wingtip vortex of a finite wing. A NACA 0012 wing with AC-DBD actuators embedded at the wingtip was used at a Reynolds number of approximately 150,000. A stereoscopic PIV system measured the wake at multiple distances behind the trailing edge. A JR3 multi-axis load cell was used to simultaneously measure the forces on the wing. The angle between the AC-DBD actuators and U changed to determine any impact on the wingtip vortex. Repeated efforts lead to the conclusion that the AC-DBD actuators were too weak to have an observable ...


Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma Jan 2019

Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma

Creative Components

The study of the coexistence capabilities of networks based on the IEEE 802.11 and IEEE 802.15.4 standards has long been of interest to researchers owing to the individual success of these two technologies in various applications of Internet of Things (IoT). Operating in the same Industrial-Scientific-Medical (ISM) band, their coexistence does not always yield satisfactory results. The performance of a network based on IEEE 802.15.4 standard has been shown to be significantly lowered in the presence of a strong IEEE 802.11 based network (Wireless LAN) to the extent that communication based on the IEEE ...


Subspace Tracking From Missing And Corrupted Data Using Norst And Its Heuristic Extensions, Vahid Daneshpajooh Jan 2019

Subspace Tracking From Missing And Corrupted Data Using Norst And Its Heuristic Extensions, Vahid Daneshpajooh

Creative Components

We study the problem of subspace tracking (ST) in the presence of missing and corrupted data. We are able to show that, under assumptions on only the algorithm inputs (input data and/or initialization), the output subspace estimates are close to the true data subspaces at all times. The guarantees hold under mild and easily interpretable assumptions and handle time-varying subspaces. We also show that our algorithm and its extensions are fast and have competitive experimental performance when compared with existing methods. Finally, this solution can be interpreted as a provably correct mini-batch and memory-efficient solution to low rank Matrix ...


Evaluation Of Cnn Models With Fashion Mnist Data, Yue Zhang Jan 2019

Evaluation Of Cnn Models With Fashion Mnist Data, Yue Zhang

Creative Components

The work seeks to evaluate the performance of four CNNs with respect to Fashion MNIST data set. Fashion MNIST is a dataset of images consisting of 70000 28*28 grayscale images, associated with a label from 10 classes. In this report, the accuracy of four popular CNN models that are LeNet-5, AlexNet, VGG-16 and ResNet for classifying MNIST-fashion data revealed that ResNet was the best suited for the selected dataset. The training process has been coded with Tensorflow. After the result accuracy improving, we could use the new model to the fashion company that can help the fashion company more ...


Impact Of Soybean Derived Chemical Additive On The Morphology Of Asphaltenes Extracted From Virgin Asphalt, Polymer Modified Asphalt And Recycled Asphalt Pavement Extracted Binder Through Small-Angle X-Ray Scattering By Solids And Solids In Solution, Barrie Yung Ming Saw, Joseph H. Podolsky, Zahra Sotoodeh Nia, Nacu Hernandez, Benjamin Empric, Michael Forrester, Fang-Yi Lin, Eric W. Cochran, R. Christopher Williams Jan 2019

Impact Of Soybean Derived Chemical Additive On The Morphology Of Asphaltenes Extracted From Virgin Asphalt, Polymer Modified Asphalt And Recycled Asphalt Pavement Extracted Binder Through Small-Angle X-Ray Scattering By Solids And Solids In Solution, Barrie Yung Ming Saw, Joseph H. Podolsky, Zahra Sotoodeh Nia, Nacu Hernandez, Benjamin Empric, Michael Forrester, Fang-Yi Lin, Eric W. Cochran, R. Christopher Williams

Creative Components

Recent work has shown that epoxidized plant oil materials work well as rejuvenators in recycled asphalt pavement (RAP). At the end of the 2017 construction season, a field trial mix with 30% RAP (total recycled binder content of 30.3%) was produced and placed in Northwest Iowa on US-18, east of Sheldon, Iowa. The rejuvenator (SR) was used at a rate of 0.125% by total mix weight. The mix design for the control section used a PG 58-34H. Due to Iowa DOT specification (recycled binder content greater than 20%) a grade bump was needed for the binder in the ...


Ads Searching Service, Ming Wu Jan 2019

Ads Searching Service, Ming Wu

Creative Components

No abstract provided.


Evaluation Of Antenna Design And Energy Harvesting System Of Passive Tag In Uhf Rfid Applications, Chengrui Yang Jan 2019

Evaluation Of Antenna Design And Energy Harvesting System Of Passive Tag In Uhf Rfid Applications, Chengrui Yang

Creative Components

Backscattering communication-based Radio Frequency Identification (RFID) has been essential to the rapid advancement of IoT devices. However, most RFID applications only utilize relatively simple antenna designs. This work contributes in two ways: we investigate the impact of different antenna configurations on a passive network using backscattering technology. In addition, we evaluate the designs of power harvesting technologies valid for Ultra-High-Frequency (UHF) RFID applications. Our evaluations demonstrate that tailored antenna designs can more efficiently achieve application requirements when compared to a simple universal antenna. In addition, we give recommendations on energy harvesters for applications operating in different scenarios.


Deep Learning For Image Classification On Very Small Datasets Using Transfer Learning, Mengying Shu Jan 2019

Deep Learning For Image Classification On Very Small Datasets Using Transfer Learning, Mengying Shu

Creative Components

Since the ImageNet Large Scale Visual Recognition Challenge has been run annually from 2010 to present, researchers have designed lots of brilliant deep convolutional neural networks(D-CNNs). However, most of the existing deep convolutional neural networks are trained with large datasets. It is rare for small datasets to take advantage of deep convolutional neural networks because of overfitting when implementing those models. In this report, I propose a modified deep neural network and use this model to fit a small size dataset. The goal of my work is to show that a proper modified very deep model pre-trained on ImageNet ...


A Brief Literature Review On Recent Progress In Nanopore Thin Film-Based Optical Sensors, Guantong Zhou Jan 2019

A Brief Literature Review On Recent Progress In Nanopore Thin Film-Based Optical Sensors, Guantong Zhou

Creative Components

Anodic aluminum oxide (AAO) material is broadly used in biomedical and biosensing applications nowadays. Most of the AAO nanopore thin film sensors are usually fabricated on a glass substrate. By bonding the AAO nanopore thin film sensors to a layer of transparent polymer thin film (pTF) made with polydimethylsiloxane (PDMS), a new type of flexible nanopore sensors has been developed. The AAO thin film based flexible sensing platform has been used for pressure sensing, temperature sensing, angular sensing, and for disease biomarker detection. This short review will summarize some recent progress using the AAO nanopore thin film as the drug ...


Feature-Rich Models And Feature Reduction For Malicious Urls Classification And Prediction, Shivika Garg Jan 2019

Feature-Rich Models And Feature Reduction For Malicious Urls Classification And Prediction, Shivika Garg

Creative Components

Malicious web site is a foundation of criminal activities on Internet. This links enables partial or full machine control to the attackers. This results in victim systems, which get easily infected allowing attackers to utilize systems for quite a number of cyber-crimes such as stealing credentials, spamming, phishing, denial-of-service and many extra such attacks. Therefore, the methodology and technique to detect such crimes should be fast and precise with the additional capability to detect new malicious websites or content. This paper introduces an automatic tool to extract 110 significant features for a URL. Additionally, this paper also propose various aspects ...


Multimodality Assistive Technology For Users With Dyslexia, Shira Gordon Jan 2019

Multimodality Assistive Technology For Users With Dyslexia, Shira Gordon

Creative Components

To assist dyslexic users with reading and writing, several approaches have been explored to convey text to users using text-to-speech technology (TTS), and to transcribe what the user dictates using speech-to-text technology (STT). The currently available assistive technologies suffer from limitations around compatibility with digital-only formats, and the necessity for speaking out loud to use speech synthesis, and dictation out loud, thus creating social stigmas. If we think beyond singular modal solutions and expand the possibilities to include solutions that are multimodal and multisensory, it opens up the door for creative ways to help people with dyslexia. An alternate approach ...


Implementation Of Image Quality Assessment Algorithms For Descriptive Statistics And Deep Learning On Stegoappdb, Venkata Bhanu Chowdary Allada Jan 2019

Implementation Of Image Quality Assessment Algorithms For Descriptive Statistics And Deep Learning On Stegoappdb, Venkata Bhanu Chowdary Allada

Creative Components

No abstract provided.


Self-Configured Elastic Database With Deep Q-Learning Approach, Yifu Zhou Jan 2019

Self-Configured Elastic Database With Deep Q-Learning Approach, Yifu Zhou

Creative Components

Elastic databases have grown in popularity over conventional databases in recent years due to their ability to be allocated with sufficient capacity for peak load. Especially with the support of the cloud platform, which provides flexible resources and low cost, elastic databases on the cloud show their excellent potential in scalability, flexibility, and accessibility. However, the interaction between the cloud layers of virtual machines (VMs) and databases further complicates the issue of cloud configuration to adapt to dynamic workloads. In this paper, I explore a framework for a self-configured elastic database that can optimize the cloud configuration and adaptively allocate ...


Persitent Memory Test Framework, Caleb Toney Jan 2019

Persitent Memory Test Framework, Caleb Toney

Creative Components

This creative component introduces a trace based testing framework for persistent memory programs. Using a number of tools and techniques, the framework checks for expected output, hangs, and errors. The framework builds on the ideas put forth in previous persistent memory testing frameworks and could be the base of a full featured test framework in the future. The framework introduces a trace generator, memory map generator, and bug checker in conjunction with a program that recovers from power failures by accessing persistent memory. We show that the framework is able to detect synthetic hangs and recovery code errors.


Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava Jan 2019

Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava

Creative Components

Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE protocol, which is the standard for vehicle to vehicle communication. Successful attacks on the device could be used to control the behavior of the connected vehicle. This creative component assesses the security of the device and discusses the vulnerabilities of the applications installed on the device. It reports about our results to exploit the known vulnerabilities of Dropbear ssh, Busybox telnet, and the Linux kernel, which are installed on the device and discusses how to obtain the private keys of the device to use them for attacks ...


Android Third-Party Library Detection, Brody Concannon Jan 2019

Android Third-Party Library Detection, Brody Concannon

Creative Components

Third-party library analysis research is important to many research fields like program analysis, clone-detection, security and privacy. There are many considerations taken when developing a third-party library analysis approach. The approach must be resilient to common obfuscation techniques and be able to determine similarity between two libraries with a high level of confidence. This paper explores this research and the problems that have been solved and reviews the improvements and shortcomings within the third-party library analysis field.


A Configurable General Purpose Graphics Processing Unit For Power, Performance, And Area Analysis, Garrett Lies Jan 2019

A Configurable General Purpose Graphics Processing Unit For Power, Performance, And Area Analysis, Garrett Lies

Creative Components

No abstract provided.


Abnormality Management In Spatial Crowdsourcing For Multi-Skilled Workers Assignment, Srinandan Kota Jan 2019

Abnormality Management In Spatial Crowdsourcing For Multi-Skilled Workers Assignment, Srinandan Kota

Creative Components

Crowdsourcing is dependent on a number of skilled workers who are needed to accomplish spatial tasks. This has been an active area of research and is gaining wide popularity now. Most of these tasks can be completed online due to convenience, but this method fails when there is a need of completing a task at actual physical locations. This has led to a new area called Spatial crowd sourcing that consists of location-specific tasks that require people who can accomplish them to physically arrive at specific locations. The tasks which require specific skillsets, completion times or other constraints are matched ...


Overview Of Sepsis And Sepsis Biomarker Detection, Souvik Kundu Jan 2019

Overview Of Sepsis And Sepsis Biomarker Detection, Souvik Kundu

Creative Components

Sepsis being a fatal physiological state due to an imbalance in the immune system caused by infection, and one of the most common cause for millions of deaths in the non-coronary intensive care unit worldwide requires special attention in its diagnostic methods and cure. Therefore an understanding of literature related to sepsis is of utmost importance. With the advent of inter-disciplinary research, the study and diagnosis of sepsis problem are not limited to the medical field, rather it requires interventions and active participation of other fields of science and technology. However, often subject matter from interdisciplinary research is expounded in ...


Anodic Stripping Voltammetry Using Eval-Adicup 3029, Ranjitha Lakshmi Narayanan Jan 2019

Anodic Stripping Voltammetry Using Eval-Adicup 3029, Ranjitha Lakshmi Narayanan

Creative Components

No abstract provided.


Cyber Defense Competition Card Game, Ryan Luckinbill Jan 2019

Cyber Defense Competition Card Game, Ryan Luckinbill

Creative Components

Cyber Defense Competition Game is a JavaScript web application used to represent a card game version of a Cyber Defense Competition online. Cyber Defense Competitions have often been used to teach the concepts of information security and have participants compete against each other to protect their assets. This game attempts to create many of the same experiences that could be had during a Cyber Defense Competition but without much of the setup and taking much less time.

This project is the first step towards an easily playable card game between two players and a moderator. This version of the game ...


Literature Survey On Ipv6 Over Low Power Personal Area Networks., Roshan Mathew Jan 2019

Literature Survey On Ipv6 Over Low Power Personal Area Networks., Roshan Mathew

Creative Components

As there is an increase in (IOT) Internet of Things, there is a growing implementation of Internet of things in many areas in our day-to-day life. Internet of things entails the linking of different embedded devices like appliances, weather stations and even toys to the internet using the Internet Protocol. Surveys say that the number of embedded devices that are IP-enabled will outnumber the total personal computers in the near future. 6LoWPAN is the name of a concluded working group in the Internet area of the IETF. 6LoWPAN is the technology that enable small, low powered embedded devices to access ...


Quantifying Method Differences In Predicting The Probability Of Detection For Structural Health Monitoring Applications, Emily O'Connor Jan 2019

Quantifying Method Differences In Predicting The Probability Of Detection For Structural Health Monitoring Applications, Emily O'Connor

Creative Components

Periodic nondestructive tests are used to detect cracks on aircraft components that could be catastrophic if not found soon enough. In structural health monitoring (SHM) applications, fixed sensors could be used. However, technology needs to be proven sound before bringing it into industry. This paper describes several different methods for estimating probability of detection for SHM applications. It compares different methods that can be used in several real life scenarios. This paper describes the statistical methods behind the methods and uses simulation to compare methods.


A Platform For Benchmarking Database Management Systems: Cydiw, Ishita Prakash Jan 2019

A Platform For Benchmarking Database Management Systems: Cydiw, Ishita Prakash

Creative Components

Relational databases have been popular since a very long time. They store data in a structured way providing optimisation and simplicity. Although the strict structure does not provide flexibility to the developer. It works on having primary key and foreign keys. Joins are created at runtime which eat a lot of memory and time. Graph databases involve nodes and edges. Each node represents an entity and each edge represents a relationship. So when an equivalent JOIN operation is run in graph databases, it saves the time from doing extensive searching. Although graph databases have started gaining a lot of popularity ...


Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty Jan 2019

Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty

Creative Components

In the past few years, Network Function Virtualization (NFV) has been widely used to reduce the operational and capital costs of implementing network functions with better performance and easier network management. NFV is a network architecture completely built relying on Virtual Network Functions (VNFs). Quite a few developments have been done for the optimization of resource allocation to implement VNFs in various networks. In this report, an algorithm for reducing the cost of placing the VNFs within a Multicast network along with a choice of selecting the precedence of the VNFs is presented. The proposed approach is formulated as a ...


An Investigative Study On Android Verified Boot Process, Brett Weiss Jan 2019

An Investigative Study On Android Verified Boot Process, Brett Weiss

Creative Components

No abstract provided.