Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

PDF

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 37

Full-Text Articles in Computational Engineering

Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula May 2024

Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula

Electronic Theses, Projects, and Dissertations

Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].

In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …


Joint Learning Of Unknown Safety Constraints And Control Policies In Reinforcement Learning, Lunet Abiye Yifru Jan 2024

Joint Learning Of Unknown Safety Constraints And Control Policies In Reinforcement Learning, Lunet Abiye Yifru

Graduate Theses, Dissertations, and Problem Reports

Reinforcement learning (RL) has revolutionized decision-making across a wide range of domains over the past few decades. Yet, deploying RL policies in real-world scenarios presents the crucial challenge of ensuring safety. Traditional safe RL approaches have predominantly focused on incorporating predefined safety constraints into the policy learning process. However, this reliance on predefined safety constraints poses limitations in dynamic and unpredictable real-world settings where such constraints may not be available or sufficiently adaptable. Bridging this gap, we propose a novel approach that concurrently learns a safe RL control policy and identifies the unknown safety constraint parameters of a given environment. …


Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha Jul 2023

Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha

Doctoral Dissertations and Master's Theses

ABSTRACT

The defect detection problem is of outmost importance in high-tech industries such as aerospace manufacturing and is widely employed using automated industrial quality control systems. In the aerospace manufacturing industry, composite materials are extensively applied as structural components in civilian and military aircraft. To ensure the quality of the product and high reliability, manual inspection and traditional automatic optical inspection have been employed to identify the defects throughout production and maintenance. These inspection techniques have several limitations such as tedious, time- consuming, inconsistent, subjective, labor intensive, expensive, etc. To make the operation effective and efficient, modern automated optical inspection …


Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar Jan 2023

Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar

UNF Graduate Theses and Dissertations

This thesis introduces the Farming Lightweight Protocol (FLP) optimized for energy-restricted environments that depend upon secure communication, such as multi-robot information gathering systems within the vision of ``smart'' agriculture. FLP uses a hash-based message authentication code (HMAC) to achieve data integrity. HMAC implementations, resting upon repeated use of the SHA256 hashing operator, impose additional resource requirements and thus also impact system availability. We address this particular integrity/availability trade-off by proposing an energy-saving algorithmic engineering method on the internal SHA256 hashing operator. The energy-efficient hash is designed to maintain the original security benefits yet reduce the negative effects on system availability. …


Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang Jan 2023

Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang

Graduate Theses, Dissertations, and Problem Reports

Computer Vision (CV) enables computers and systems to derive meaningful information from acquired visual inputs, such as images and videos, and make decisions based on the extracted information. Its goal is to acquire, process, analyze, and understand the information by developing a theoretical and algorithmic model. Biometrics are distinctive and measurable human characteristics used to label or describe individuals by combining computer vision with knowledge of human physiology (e.g., face, iris, fingerprint) and behavior (e.g., gait, gaze, voice). Face is one of the most informative biometric traits. Many studies have investigated the human face from the perspectives of various different …


Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity Jun 2022

Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity

Master's Theses

Over the past two decades there has been a rapid decline in public oversight of state and local governments. From 2003 to 2014, the number of journalists assigned to cover the proceedings in state houses has declined by more than 30\%. During the same time period, non-profit projects such as Digital Democracy sought to collect and store legislative bill and hearing information on behalf of the public. More recently, AI4Reporters, an offshoot of Digital Democracy, seeks to actively summarize interesting legislative data.

This thesis presents STRAINER, a parallel project with AI4Reporters, as an active data retrieval and filtering system for …


Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu Jan 2022

Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu

Graduate Theses, Dissertations, and Problem Reports

Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui Jun 2021

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


Evaluación Analítica De Parámetros No Considerados En La Formulación De Resistencia Nominal De Conectores Tipo Espigo, José David Ovalle Fernández, William Oswaldo Ramírez Patiño Jan 2021

Evaluación Analítica De Parámetros No Considerados En La Formulación De Resistencia Nominal De Conectores Tipo Espigo, José David Ovalle Fernández, William Oswaldo Ramírez Patiño

Ingeniería Civil

Existe una gran variedad de sistemas estructurales, cada uno con características específicas para el soporte de cargas verticales y horizontales. Uno de ellos, el sistema compuesto, el cual es desarrollado buscando ventajas como: la optimización del uso de los materiales combinando ambos en una unidad estructural, el uso de mayores luces entre columnas; la posibilidad de reutilización de la estructura; reducción de los costos de construcción debido a la disminución de tiempos en obra; de tamaño de columnas y cimentación; además, del aumento de protección contra el fuego y corrosión.

Con la aplicación de tecnologías como la soldadura, fue posible …


Self && Self, Shuang Cai Jan 2021

Self && Self, Shuang Cai

Senior Projects Spring 2021

Seldom before the COVID-19 pandemic have so many people simultaneously had their lifestyle drastically changed in the same way. The forced physical isolation is, ironically, a communal experience. The sickening quarantine left everyone nothing but time to confront and reconnect with themselves. Another inevitable result of corporal isolation is the predominant awakening awareness of digital existences and connections. Evoking the shared sensitivity and delicacy, studying the tectonic activity of the digital world, the project documents the endured contemplation in the upcoming resurgence.


Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar Jan 2021

Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar

UNF Graduate Theses and Dissertations

Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory, computation) required by each blockchain-enabled host. This thesis applies an energy-reducing algorithmic engineering technique for Merkle Tree root and Proof of Work calculations, two principal elements of blockchain computations, as a means to preserve the promised security benefits but with less compromise to system availability. Using pyRAPL, a python library to measure computational energy, we experiment with both the …


Visualization For Solving Non-Image Problems And Saliency Mapping, Divya Chandrika Kalla Jan 2021

Visualization For Solving Non-Image Problems And Saliency Mapping, Divya Chandrika Kalla

All Master's Theses

High-dimensional data play an important role in knowledge discovery and data science. Integration of visualization, visual analytics, machine learning (ML), and data mining (DM) are the key aspects of data science research for high-dimensional data. This thesis is to explore the efficiency of a new algorithm to convert non-images data into raster images by visualizing data using heatmap in the collocated paired coordinates (CPC). These images are called the CPC-R images and the algorithm that produces them is called the CPC-R algorithm. Powerful deep learning methods open an opportunity to solve non-image ML/DM problems by transforming non-image ML problems into …


Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn Mar 2020

Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn

Master's Theses

Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.

Music in video games is essential for establishing developers' intended mood …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick Aug 2019

Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick

Boise State University Theses and Dissertations

Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and heterogeneity of traffic hinder the manual definition of IDS signatures and deep packet inspection. In this thesis, we propose MINOS, a novel fully unsupervised approach that generates an anomaly score for each host allowing us to classify with high accuracy each host as either infected (generating malicious activities), attacked (under attack), or clean (without any infection). The generated score of each hour is able to detect the time frame of being attacked for an infected or attacked host without any prior knowledge. MINOS automatically creates a personalized traffic …


Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez Jul 2019

Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez

Electronic Thesis and Dissertation Repository

Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make …


On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa Jan 2019

On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa

UNF Graduate Theses and Dissertations

Preferences are very important in research fields such as decision making, recommendersystemsandmarketing. The focus of this thesis is on preferences over combinatorial domains, which are domains of objects configured with categorical attributes. For example, the domain of cars includes car objects that are constructed withvaluesforattributes, such as ‘make’, ‘year’, ‘model’, ‘color’, ‘body type’ and ‘transmission’.Different values can instantiate an attribute. For instance, values for attribute ‘make’canbeHonda, Toyota, Tesla or BMW, and attribute ‘transmission’ can haveautomaticormanual. To this end,thisthesis studiesproblemsonpreference visualization and learning for lexicographic preference trees, graphical preference models that often are compact over complex domains of objects built of …


Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard Jun 2018

Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard

Master's Theses

Autonomous vehicle navigation is a complex and challenging task. Land and aerial vehicles often use highly accurate GPS sensors to localize themselves in their environments. These sensors are ineffective in underwater environments due to signal attenuation. Autonomous underwater vehicles utilize one or more of the following approaches for successful localization and navigation: inertial/dead-reckoning, acoustic signals, and geophysical data. This thesis examines autonomous localization in a simulated environment for an OpenROV Underwater Drone using a Kalman Filter. This filter performs state estimation for a dead reckoning system exhibiting an additive error in location measurements. We evaluate the accuracy of this Kalman …


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


Resource Brokering In Grid Computing, Adrian T. Bienkowski May 2018

Resource Brokering In Grid Computing, Adrian T. Bienkowski

Electronic Thesis and Dissertation Repository

Grid Computing has emerged in the academia and evolved towards the bases of what is currently known as Cloud Computing and Internet of Things (IoT). The vast collection of resources that provide the nature for Grid Computing environment is very complex; multiple administrative domains control access and set policies to the shared computing resources. It is a decentralized environment with geographically distributed computing and storage resources, where each computing resource can be modeled as an autonomous computing entity, yet collectively can work together. This is a class of Cooperative Distributed Systems (CDS). We extend this by applying characteristic of open …


The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz May 2018

The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we prove that the three-dimensional abstract Tile Assembly Model (3DaTAM) is intrinsically universal. This means that there is a universal tile set in the 3DaTAM which can be used to simulate any 3DaTAM system. This result adds to a body of work on the intrinsic universality of models of self-assembly, and is specifically motivated by a result in FOCS 2016 showing that any intrinsically universal tile set for the 2DaTAM requires nondeterminism (i.e. undirectedness) even when simulating directed systems. To prove our result we have not only designed, but also fully implemented what we believe to be …


Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani Apr 2018

Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani

LSU Doctoral Dissertations

In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.

In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the …


Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall Dec 2017

Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall

Computer Engineering

This project was conceived as a desired to have an affordable, flexible and physically compact tracking system for high accuracy spatial and orientation tracking. Specifically, this implementation is focused on providing a low cost motion capture system for future research. It is a tool to enable the further creation of systems that would require the use of accurate placement of landing pads, payload acquires and delivery. This system will provide the quadcopter platform a coordinate system that can be used in addition to GPS.

Field research with quadcopter manufacturers, photographers, agriculture and research organizations were contact and interviewed for information …


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell Jun 2017

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …


Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt Mar 2017

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt

Master's Theses

Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …


An Empirical Investigation Of Collaborative Web Search Tool On Novice's Query Behavior, Mareh Fakhir Al-Sammarraie Jan 2017

An Empirical Investigation Of Collaborative Web Search Tool On Novice's Query Behavior, Mareh Fakhir Al-Sammarraie

UNF Graduate Theses and Dissertations

In the past decade, research efforts dedicated to studying the process of collaborative web search have been on the rise. Yet, a limited number of studies have examined the impact of collaborative information search processes on novices’ query behaviors. Studying and analyzing factors that influence web search behaviors, specifically users’ patterns of queries when using collaborative search systems can help with making query suggestions for group users. Improvements in user query behaviors and system query suggestions help in reducing search time and increasing query success rates for novices.

This thesis investigates the influence of collaboration between experts and novices as …


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez Dec 2016

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …


Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet Jun 2016

Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

Master's Theses

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing …


The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky Jun 2016

The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

Master's Theses

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time …