Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Computer Engineering

Institution
Keyword
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Computational Engineering

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi Dec 2020

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi

Future Computing and Informatics Journal

Sickle cell disease is a severe hereditary disease caused by an abnormality of the red blood cells. The current therapeutic decision-making process applied to sickle cell disease includes monitoring a patient’s symptoms and complications and then adjusting the treatment accordingly. This process is time-consuming, which might result in serious consequences for patients’ lives and could lead to irreversible disease complications. Artificial intelligence, specifically machine learning, is a powerful technique that has been used to support medical decisions. This paper aims to review the recently developed machine learning models designed to interpret medical data regarding sickle cell disease. To propose an …


Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat Nov 2020

Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat

Library Philosophy and Practice (e-journal)

Nowadays, data is considered as a new life force for operations of physical systems in various domains such as manufacturing, healthcare, transportations, etc. However, the hugely generated data, which mirrors the working essence of the product life cycle, is still underutilised. Digital Twin (DT), a collective representation of active and passive captured data, is a virtual counterpart of the physical resources that could help prevent effective preventive maintenance in any applied domain. Currently, lots of research is going on about the applicability of digital twin in smart IOT based manufacturing industry 4.0 environment. Still, it lacks a formal study, which …


Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre Oct 2020

Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre

FIU Electronic Theses and Dissertations

Teachers that are equipped with the skills to manage and prevent disruptive behaviors increase the potential for their students to achieve academically and socially. Student success increases when prevention strategies and effective classroom behavior management (CBM) are implemented in the classroom. However, teachers with less than 5 years of experience, early career teachers (ECTs), are ill equipped to handle disruptive students. ECTs describe disruptive behaviors as a major factor for stress given their limited training in CBM. As a result, disruptive behaviors are reported by ECTs as one of the main reasons for leaving the field.

Virtual training environments (VTEs) …


Software Quality Control Through Formal Method, Jialiang Chang Aug 2020

Software Quality Control Through Formal Method, Jialiang Chang

Dissertations

With the improvement of theories in the software industry, software quality is becoming the most significant part of the procedure of software development. Due to the implicit and explicit vulnerabilities inside the software, software quality control has caught more researchers and engineers’ attention and interest.

Current research on software quality control and verification are involving various manual and automated testing methods, which can be categorized into static analysis and dynamic analysis. However, both of them have their own disadvantages. With static analysis methods, inputs will not be taken into consideration because the software system isn’t executed so we do not …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …


Evaluating Driving Performance Of A Novel Behavior Planning Model On Connected Autonomous Vehicles, Keyur Shah May 2020

Evaluating Driving Performance Of A Novel Behavior Planning Model On Connected Autonomous Vehicles, Keyur Shah

Honors Scholar Theses

Many current algorithms and approaches in autonomous driving attempt to solve the "trajectory generation" or "trajectory following” problems: given a target behavior (e.g. stay in the current lane at the speed limit or change lane), what trajectory should the vehicle follow, and what inputs should the driving agent apply to the throttle and brake to achieve this trajectory? In this work, we instead focus on the “behavior planning” problem—specifically, should an autonomous vehicle change lane or keep lane given the current state of the system?

In addition, current theory mainly focuses on single-vehicle systems, where vehicles do not communicate with …


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh May 2020

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


Minet Magnetic Indoor Localization, Michael Drake Apr 2020

Minet Magnetic Indoor Localization, Michael Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of …


Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, Steven Bramhall, Hayley Horn, Michael Tieu, Nibhrat Lohia Apr 2020

Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, Steven Bramhall, Hayley Horn, Michael Tieu, Nibhrat Lohia

SMU Data Science Review

In this paper, we introduce a proof of concept that addresses the assumption and limitation of linear local boundaries by Local Interpretable Model-Agnostic Explanations (LIME), a popular technique used to add interpretability and explainability to black box models. LIME is a versatile explainer capable of handling different types of data and models. At the local level, LIME creates a linear relationship for a given prediction through generated sample points to present feature importance. We redefine the linear relationships presented by LIME as quadratic relationships and expand its flexibility in non-linear cases and improve the accuracy of feature interpretations. We coin …


Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann Apr 2020

Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann

Mathematics & Statistics ETDs

This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements …


Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn Mar 2020

Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn

Master's Theses

Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.

Music in video games is essential for establishing developers' intended mood …


Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …


Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar Jan 2020

Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar

Theses and Dissertations

With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted …


Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga Jan 2020

Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga

All Master's Theses

Tuberculosis (TB) is a disease responsible for the deaths of more than one million people worldwide every year. Even though it is preventable and curable, it remains a major threat to humanity that needs to be taken care of. It is often diagnosed in developed countries using approaches such as sputum smear microscopy and culture methods. However, since these approaches are rather expensive, they are not commonly used in poor regions of the globe such as India, Africa, and Bangladesh. Instead, the well known and affordable chest x-ray (CXR) interpretation by radiologists is the technique employed in those places. Nevertheless, …


Quantitative Performance Assessment Of Lidar-Based Vehicle Contour Estimation Algorithms For Integrated Vehicle Safety Applications, David M. Mothershed Jan 2020

Quantitative Performance Assessment Of Lidar-Based Vehicle Contour Estimation Algorithms For Integrated Vehicle Safety Applications, David M. Mothershed

Electronic Theses and Dissertations

Many nations and organizations are committing to achieving the goal of `Vision Zero' and eliminate road traffic related deaths around the world. Industry continues to develop integrated safety systems to make vehicles safer, smarter and more capable in safety critical scenarios. Passive safety systems are now focusing on pre-crash deployment of restraint systems to better protect vehicle passengers. Current commonly used bounding box methods for shape estimation of crash partners lack the fidelity required for edge case collision detection and advanced crash modeling. This research presents a novel algorithm for robust and accurate contour estimation of opposing vehicles. The presented …