Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Master's Theses

Discipline
Institution
Keyword
Publication Year

Articles 1 - 30 of 54

Full-Text Articles in Computational Engineering

Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer Mar 2023

Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer

Master's Theses

Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …


Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong Dec 2022

Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong

Master's Theses

Depth perception has become a heavily researched area as companies and researchers are striving towards the development of self-driving cars. Self-driving cars rely on perceiving the surrounding area, which heavily depends on technology capable of providing the system with depth perception capabilities. In this paper, we explore developing a single camera (monocular) depth prediction model that is trained on panoramic depth images. Our model makes novel use of transfer learning efficient encoder models, pre-training on a larger dataset of flat depth images, and optimizing the model for use with a Jetson Nano. Additionally, we present a training and optimization framework …


Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah Dec 2022

Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah

Master's Theses

An investigation into using attention mechanisms for better feature extraction in wildfire spread prediction models. This research examines the U-net architecture to achieve image segmentation, a process that partitions images by classifying pixels into one of two classes. The deep learning models explored in this research integrate modern deep learning architectures, and techniques used to optimize them. The models are trained on 12 distinct observational variables derived from the Google Earth Engine catalog. Evaluation is conducted with accuracy, Dice coefficient score, ROC-AUC, and F1-score. This research concludes that when augmenting U-net with attention mechanisms, the attention component improves feature suppression …


Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity Jun 2022

Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity

Master's Theses

Over the past two decades there has been a rapid decline in public oversight of state and local governments. From 2003 to 2014, the number of journalists assigned to cover the proceedings in state houses has declined by more than 30\%. During the same time period, non-profit projects such as Digital Democracy sought to collect and store legislative bill and hearing information on behalf of the public. More recently, AI4Reporters, an offshoot of Digital Democracy, seeks to actively summarize interesting legislative data.

This thesis presents STRAINER, a parallel project with AI4Reporters, as an active data retrieval and filtering system for …


Evaluating And Improving Domain-Specific Programming Education: A Case Study With Cal Poly Chemistry Courses, Will Fuchs Jun 2022

Evaluating And Improving Domain-Specific Programming Education: A Case Study With Cal Poly Chemistry Courses, Will Fuchs

Master's Theses

Programming is a key skill in many domains outside computer science. When used judiciously, programming can empower people to accomplish what might be impossible or difficult with traditional methods. Unfortunately, students, especially non-CS majors, frequently have trouble while learning to program. This work reports on the challenges and opportunities faced by Physical Chemistry (PChem) students at Cal Poly, SLO as they learn to program in MATLAB. We assessed the PChem students through a multiple-choice concept inventory, as well as through “think-aloud” interviews. Additionally, we examined the students’ perceptions of and attitudes towards programming. We found that PChem students are adept …


Reducing Vale's Memory Management Overhead Through Static Analysis, Theodore C. Watkins Jun 2021

Reducing Vale's Memory Management Overhead Through Static Analysis, Theodore C. Watkins

Master's Theses

Vale is a multi-purpose programming language that focuses on guaranteeing memory safety with minimal effect on performance. To accomplish this, Vale utilizes a memory management system called Hybrid Generational Memory (HGM). HGM uses generational references to track the state of objects in memory, and static analysis to reduce memory management overhead at runtime. This thesis describes the program that performs static analysis on Vale source code during compilation, and analyzes its effect on the performance of Vale programs.


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui Jun 2021

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …


Leveraging Intermediate Artifacts To Improve Automated Trace Link Retrieval, Alberto D. Rodriguez Jun 2021

Leveraging Intermediate Artifacts To Improve Automated Trace Link Retrieval, Alberto D. Rodriguez

Master's Theses

Software traceability establishes a network of connections between diverse artifacts such as requirements, design, and code. However, given the cost and effort of creating and maintaining trace links manually, researchers have proposed automated approaches using information retrieval techniques. Current approaches focus almost entirely upon generating links between pairs of artifacts and have not leveraged the broader network of interconnected artifacts. In this paper we investigate the use of intermediate artifacts to enhance the accuracy of the generated trace links – focus- ing on paths consisting of source, target, and intermediate artifacts. We propose and evaluate combinations of techniques for computing …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


Machine Learning Approaches To Historic Music Restoration, Quinn Coleman Mar 2021

Machine Learning Approaches To Historic Music Restoration, Quinn Coleman

Master's Theses

In 1889, a representative of Thomas Edison recorded Johannes Brahms playing a piano arrangement of his piece titled “Hungarian Dance No. 1”. This recording acts as a window into how musical masters played in the 19th century. Yet, due to years of damage on the original recording medium of a wax cylinder, it was un-listenable by the time it was digitized into WAV format. This thesis presents machine learning approaches to an audio restoration system for historic music, which aims to convert this poor-quality Brahms piano recording into a higher quality one. Digital signal processing is paired with two machine …


A Single-Stage Passive Vibration Isolation System For Scanning Tunneling Microscopy, Toan T. Le Feb 2021

A Single-Stage Passive Vibration Isolation System For Scanning Tunneling Microscopy, Toan T. Le

Master's Theses

Scanning Tunneling Microscopy (STM) uses quantum tunneling effect to study the surfaces of materials on an atomic scale. Since the probe of the microscope is on the order of nanometers away from the surface, the device is prone to noises due to vibrations from the surroundings. To minimize the random noises and floor vibrations, passive vibration isolation is a commonly used technique due to its low cost and simpler design compared to active vibration isolation, especially when the entire vibration isolation system (VIS) stays inside an Ultra High Vacuum (UHV) environment. This research aims to analyze and build a single-stage …


Personality And Mood For Non-Player Characters: A Method For Behavior Simulation In A Maze Environment, Noah L. Paige Dec 2020

Personality And Mood For Non-Player Characters: A Method For Behavior Simulation In A Maze Environment, Noah L. Paige

Master's Theses

When it comes to video games, immersion is key. All types of games aim to keep the player immersed in some form or another. A common aspect of the immersive world in most role-playing games -- but not exclusive to the genre -- is the non-playable character (NPC). At their best, NPCs play an integral role to the sense of immersion the player feels by behaving in a way that feels believable and fits within the world of the game. However, due to lack of innovation in this area of video games, at their worst NPCs can jar the player …


Real-Time Body Tracking And Projection Mapping In The Interactive Arts, Sydney Baroya Dec 2020

Real-Time Body Tracking And Projection Mapping In The Interactive Arts, Sydney Baroya

Master's Theses

Projection mapping, a subtopic of augmented reality, displays computer-generated light visualizations from projectors onto the real environment. A challenge for projection mapping in performing interactive arts is dynamic body movements. Accuracy and speed are key components for an immersive application of body projection mapping and dependent on scanning and processing time.

This thesis presents a novel technique to achieve real-time body projection mapping utilizing a state of the art body tracking device, Microsoft’s Azure Kinect DK, by using an array of trackers for error minimization and movement prediction. The device's Sensor and Bodytracking SDKs allow multiple device synchronization. We combine …


Towards On-Device Detection Of Sharks With Drones, Daniel Moore Dec 2020

Towards On-Device Detection Of Sharks With Drones, Daniel Moore

Master's Theses

Recent years have seen several projects across the globe using drones to detect sharks, including several high profile projects around alerting beach authorities to keep people safe. However, so far many of these attempts have used cloud-based machine learning solutions for the detection component, which complicates setup and limits their use geographically to areas with internet connection. An on-device (or on-controller) shark detector would offer greater freedom for researchers searching for and tracking sharks in the field, but such a detector would need to operate under reduced resource constraints. To this end we look at SSD MobileNet, a popular object …


Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn Mar 2020

Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn

Master's Theses

Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.

Music in video games is essential for establishing developers' intended mood …


Fifth Aeon – A.I Competition And Balancer, William M. Ritson Jun 2019

Fifth Aeon – A.I Competition And Balancer, William M. Ritson

Master's Theses

Collectible Card Games (CCG) are one of the most popular types of games in both digital and physical space. Despite their popularity, there is a great deal of room for exploration into the application of artificial intelligence in order to enhance CCG gameplay and development. This paper presents Fifth Aeon a novel and open source CCG built to run in browsers and two A.I applications built upon Fifth Aeon. The first application is an artificial intelligence competition run on the Fifth Aeon game. The second is an automatic balancing system capable of helping a designer create new cards that do …


Cloneless: Code Clone Detection Via Program Dependence Graphs With Relaxed Constraints, Thomas J. Simko Jun 2019

Cloneless: Code Clone Detection Via Program Dependence Graphs With Relaxed Constraints, Thomas J. Simko

Master's Theses

Code clones are pieces of code that have the same functionality. While some clones may structurally match one another, others may look drastically different. The inclusion of code clones clutters a code base, leading to increased costs through maintenance. Duplicate code is introduced through a variety of means, such as copy-pasting, code generated by tools, or developers unintentionally writing similar pieces of code. While manual clone identification may be more accurate than automated detection, it is infeasible due to the extensive size of many code bases. Software code clone detection methods have differing degree of success based on the analysis …


A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi May 2019

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented …


A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver Dec 2018

A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver

Master's Theses

DEET is a common active ingredient in most spatial repellents. DEET is also a volatile organic compound. DEET prevents mosquitoes from detecting and coming into contact with an human individual. Gas sensing technologies such as metal oxide semiconductor sensors can detect VOCs. The World Health Organization provides the majority of efficacy testing methods. This research adapts methods from the WHO and use of MOS sensors to further understand how and why DEET affects mosquitos. A custom developed system is used to measure DEET dissipation and observe mosquito behavioral response to the DEET. DEET dissipations and mosquito behavior is measured within …


Fluid Agitation Studies For Drug Product Containers Using Computational Fluid Dynamics, Matthew Hiroki Ichinose Dec 2018

Fluid Agitation Studies For Drug Product Containers Using Computational Fluid Dynamics, Matthew Hiroki Ichinose

Master's Theses

At Amgen, the Automated Vision Inspection (AVI) systems capture the movement of unwanted particles in Amgen's drug product containers. For quality inspection, the AVI system must detect these undesired particles using a high speed spin-stop agitation process. To better understand the fluid movements to swirl the particles away from the walls, Computational Fluid Dynamics (CFD) is used to analyze the nature of the two phase flow of air and a liquid solution.

Several 2-D and 3-D models were developed using Fluent to create simulations of Amgen's drug product containers for a 1 mL syringe, 2.25 mL syringe, and a 5 …


Population Curation In Swarms: Predicting Top Performers, Ryan W. Heller Dec 2018

Population Curation In Swarms: Predicting Top Performers, Ryan W. Heller

Master's Theses

In recent years, new Artificial Intelligence technologies have mimicked examples of collective intelligence occurring in the natural world including flocks of birds, schools of fish, and swarms of bees. One company in particular, Unanimous AI, built a platform (UNU Swarm) that enables a group of humans to make decisions as a single mind by forming a real-time closed-loop feedback system for individuals. This platform has proven the ability to amplify the predictive ability of groups of humans in realms including sports, medicine, politics, finance, and entertainment. Previous research has demonstrated it is possible to further enhance knowledge accumulation within a …


The Development And Validation Of Sinatra: A Three-Dimensional Direct Simulation Monte Carlo (Dsmc) Code Written In Object-Oriented C++ And Performed On Cartesian Grids, David Matthew Galvez Aug 2018

The Development And Validation Of Sinatra: A Three-Dimensional Direct Simulation Monte Carlo (Dsmc) Code Written In Object-Oriented C++ And Performed On Cartesian Grids, David Matthew Galvez

Master's Theses

The field of Computational Fluid Dynamics (CFD) primarily involves the approximation of the Navier-Stokes equations. However, these equations are only valid when the flow is considered continuous such that molecular interactions are abundant and predictable. The Knudsen number, $Kn$, which is defined as the ratio of the flow's mean free path, $\lambda$, to some characteristic length, $L$, quantifies the continuity of any flow, and when this parameter is large enough, alternative methods must be employed to simulate gases. The Direct Simulation Monte Carlo (DSMC) method is one which simulates rarefied gas flows by directly simulating the particles that compose the …


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


Automated Pruning Of Greenhouse Indeterminate Tomato Plants, Joey M. Angeja Jun 2018

Automated Pruning Of Greenhouse Indeterminate Tomato Plants, Joey M. Angeja

Master's Theses

Pruning of indeterminate tomato plants is vital for a profitable yield and it still remains a manual process. There has been research in automated pruning of grapevines, trees, and other plants, but tomato plants have yet to be explored. Wage increases are contributing to the depleting profits of greenhouse tomato farmers. Rises in population are the driving force behind the need for efficient growing techniques. The major contribution of this thesis is a computer vision algorithm for detecting greenhouse tomato pruning points without the use of depth sensors. Given an up-close 2-D image of a tomato stem with the background …


N-Slope: A One-Class Classification Ensemble For Nuclear Forensics, Justin Kehl Jun 2018

N-Slope: A One-Class Classification Ensemble For Nuclear Forensics, Justin Kehl

Master's Theses

One-class classification is a specialized form of classification from the field of machine learning. Traditional classification attempts to assign unknowns to known classes, but cannot handle novel unknowns that do not belong to any of the known classes. One-class classification seeks to identify these outliers, while still correctly assigning unknowns to classes appropriately. One-class classification is applied here to the field of nuclear forensics, which is the study and analysis of nuclear material for the purpose of nuclear incident investigations. Nuclear forensics data poses an interesting challenge because false positive identification can prove costly and data is often small, high-dimensional, …


Artificial Neural Network-Based Robotic Control, Justin Ng Jun 2018

Artificial Neural Network-Based Robotic Control, Justin Ng

Master's Theses

Artificial neural networks (ANNs) are highly-capable alternatives to traditional problem solving schemes due to their ability to solve non-linear systems with a nonalgorithmic approach. The applications of ANNs range from process control to pattern recognition and, with increasing importance, robotics. This paper demonstrates continuous control of a robot using the deep deterministic policy gradients (DDPG) algorithm, an actor-critic reinforcement learning strategy, originally conceived by Google DeepMind. After training, the robot performs controlled locomotion within an enclosed area. The paper also details the robot design process and explores the challenges of implementation in a real-time system.


Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard Jun 2018

Towards Autonomous Localization Of An Underwater Drone, Nathan Sfard

Master's Theses

Autonomous vehicle navigation is a complex and challenging task. Land and aerial vehicles often use highly accurate GPS sensors to localize themselves in their environments. These sensors are ineffective in underwater environments due to signal attenuation. Autonomous underwater vehicles utilize one or more of the following approaches for successful localization and navigation: inertial/dead-reckoning, acoustic signals, and geophysical data. This thesis examines autonomous localization in a simulated environment for an OpenROV Underwater Drone using a Kalman Filter. This filter performs state estimation for a dead reckoning system exhibiting an additive error in location measurements. We evaluate the accuracy of this Kalman …


Optimizing The Distributed Hydrology Soil Vegetation Model For Uncertainty Assessment With Serial, Multicore And Distributed Accelerations, Andrew Adriance May 2018

Optimizing The Distributed Hydrology Soil Vegetation Model For Uncertainty Assessment With Serial, Multicore And Distributed Accelerations, Andrew Adriance

Master's Theses

Hydrology is the study of water. Hydrology tracks various attributes of water such as its quality and movement. As a tool Hydrology allows researchers to investigate topics such as the impacts of wildfires, logging, and commercial development. With perfect and complete data collection researchers could answer these questions with complete certainty. However, due to cost and potential sources of error this is impractical. As such researchers rely on simulations.

The Distributed Hydrology Soil Vegetation Model(also referenced to as DHSVM) is a scientific mathematical model to numerically represent watersheds. Hydrology, as with all fields, continues to produce large amounts of data …


Rotordynamic Analysis Of Theoretical Models And Experimental Systems, Cameron R. Naugle Apr 2018

Rotordynamic Analysis Of Theoretical Models And Experimental Systems, Cameron R. Naugle

Master's Theses

This thesis is intended to provide fundamental information for the construction and

analysis of rotordynamic theoretical models, and their comparison the experimental

systems. Finite Element Method (FEM) is used to construct models using Timoshenko

beam elements with viscous and hysteretic internal damping. Eigenvalues

and eigenvectors of state space equations are used to perform stability analysis, produce

critical speed maps, and visualize mode shapes. Frequency domain analysis

of theoretical models is used to provide Bode diagrams and in experimental data

full spectrum cascade plots. Experimental and theoretical model analyses are used

to optimize the control algorithm for an Active Magnetic Bearing …


Applying Neural Networks For Tire Pressure Monitoring Systems, Alex Kost Mar 2018

Applying Neural Networks For Tire Pressure Monitoring Systems, Alex Kost

Master's Theses

A proof-of-concept indirect tire-pressure monitoring system is developed using neural net- works to identify the tire pressure of a vehicle tire. A quarter-car model was developed with Matlab and Simulink to generate simulated accelerometer output data. Simulation data are used to train and evaluate a recurrent neural network with long short-term memory blocks (RNN-LSTM) and a convolutional neural network (CNN) developed in Python with Tensorflow. Bayesian Optimization via SigOpt was used to optimize training and model parameters. The predictive accuracy and training speed of the two models with various parameters are compared. Finally, future work and improvements are discussed.