Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (26)
- Selected Works (22)
- SelectedWorks (18)
- Old Dominion University (17)
- Universidad de La Salle (15)
-
- University of Nebraska - Lincoln (15)
- Technological University Dublin (12)
- University of Massachusetts Amherst (12)
- University of New Mexico (8)
- Western Michigan University (8)
- The University of Southern Mississippi (7)
- Western University (6)
- University of Kentucky (5)
- University of Arkansas, Fayetteville (4)
- University of North Florida (4)
- Embry-Riddle Aeronautical University (3)
- Florida International University (3)
- Munster Technological University (3)
- Purdue University (3)
- University of Tennessee, Knoxville (3)
- West Virginia University (3)
- American University in Cairo (2)
- Boise State University (2)
- California State University, San Bernardino (2)
- Central Washington University (2)
- Chapman University (2)
- Georgia Southern University (2)
- Kean University (2)
- Kennesaw State University (2)
- Louisiana State University (2)
- Keyword
-
- Ubiquitous Computing (10)
- Machine Learning (9)
- Deep Learning (7)
- Machine learning (7)
- Technology (7)
-
- GitHub (5)
- Artificial intelligence (4)
- Bioinformatics (4)
- CSE (Computational Science and Engineering) (4)
- Computer simulation (4)
- Dashboard (4)
- Deep learning (4)
- Defect density (4)
- REST (4)
- Robotics (4)
- Simulation (4)
- Visualization (4)
- Application (3)
- Arrangement detection (3)
- Artificial Intelligence (3)
- Cloud Computing (3)
- Computer Vision (3)
- Engineering (3)
- GPU (3)
- LiDAR (3)
- Localization (3)
- Networked devices (3)
- Performance (3)
- Security (3)
- Software (3)
- Publication Year
- Publication
-
- Master's Theses (17)
- Ingeniería en Automatización (14)
- Dissertations (10)
- Bin Xu (9)
- Computational Modeling & Simulation Engineering Theses & Dissertations (9)
-
- Zheng Sun (9)
- JITP 2011: The Future of Computational Social Science (7)
- Electronic Thesis and Dissertation Repository (6)
- Computer Engineering (5)
- Parallel Computing and Data Science Lab Technical Reports (5)
- Articles (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (4)
- Computer Science and Software Engineering (4)
- Electronic Theses and Dissertations (4)
- Masters Theses (4)
- Publications (4)
- UNF Graduate Theses and Dissertations (4)
- Aveek Purohit (3)
- Branch Mathematics and Statistics Faculty and Staff Publications (3)
- Doctoral Dissertations (3)
- FIU Electronic Theses and Dissertations (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Modeling, Simulation and Visualization Student Capstone Conference (3)
- Theses and Dissertations (3)
- Venkateswar P Oruganti FIETE FIE PMP (3)
- All Master's Theses (2)
- Boise State University Theses and Dissertations (2)
- Center for Cybersecurity (2)
- Cody Bumgardner (2)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Publication Type
- File Type
Articles 1 - 30 of 263
Full-Text Articles in Computer Engineering
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Research Symposium
Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.
Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Publications
The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.
Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye
Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye
Electronic Theses and Dissertations
Autoencoders, a type of artificial neural network, have gained recognition by researchers in various fields, especially machine learning due to their vast applications in data representations from inputs. Recently researchers have explored the possibility to extend the application of autoencoders to solve nonlinear differential equations. Algorithms and methods employed in an autoencoder framework include sparse identification of nonlinear dynamics (SINDy), dynamic mode decomposition (DMD), Koopman operator theory and singular value decomposition (SVD). These approaches use matrix multiplication to represent linear transformation. However, machine learning algorithms often use convolution to represent linear transformations. In our work, we modify these approaches to …
Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright
Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright
Electronic Theses, Projects, and Dissertations
This project is an exploration and implementation of an application using Machine Learning (ML) and Artificial Intelligence (AI) techniques which would be capable of automatically tuning Kalman-Filter parameters used in post-flight trajectory estimation software at Edwards Air Force Base (EAFB), CA. The scope of the work in this paper is to design and develop a skeleton application with modular design, where various AI/ML modules could be developed to plug-in to the application for tuning-switch prediction.
Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh
Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh
Engineering Technical Reports
The growing complexity of data-intensive software demands constant innovation in computer hardware design. Performance is a critical factor in rapidly evolving applications such as artificial intelligence (AI). Transaction-level modeling (TLM) is a valuable technique used to represent hardware and software behavior in a simulated environment. However, extracting actionable insights from TLM simulations is not a trivial task. We present Netmemvisual, an interactive, cross-platform visualization tool for exposing memory bottlenecks in TLM simulations. We demonstrate how Netmemvisual helps system designers rapidly analyze complex TLM simulations to find memory contention. We describe the project’s current features, experimental results with two state-of-the-art deep …
One Formula For Non-Prime Numbers: Motivations And Characteristics, Kamal Hassan Prof., Mahmoud Mansour
One Formula For Non-Prime Numbers: Motivations And Characteristics, Kamal Hassan Prof., Mahmoud Mansour
Basic Science Engineering
Abstract: Primes are essential for computer encryption and cryptography, as they are fundamental units of whole numbers and are of the highest importance due to their mathematical qualities. However, identifying a pattern of primes is not easy. Thinking in a different way may get benefits, by considering the opposite side of the problem which means focusing on non-prime numbers. Recently, researchers introduced, the pattern of non-primes in two maximal sets while in this paper, non-primes are presented in one formula. Getting one-way formula for non-primes may pave the way for further applications based on the idea of primes.
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication
This is the complete volume of HMC Volume 6.
Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha
Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha
Doctoral Dissertations and Master's Theses
ABSTRACT
The defect detection problem is of outmost importance in high-tech industries such as aerospace manufacturing and is widely employed using automated industrial quality control systems. In the aerospace manufacturing industry, composite materials are extensively applied as structural components in civilian and military aircraft. To ensure the quality of the product and high reliability, manual inspection and traditional automatic optical inspection have been employed to identify the defects throughout production and maintenance. These inspection techniques have several limitations such as tedious, time- consuming, inconsistent, subjective, labor intensive, expensive, etc. To make the operation effective and efficient, modern automated optical inspection …
Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial
Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial
Electrical and Computer Engineering ETDs
Radionuclide spectroscopic sensor data is analyzed with minimal power consumption through the use of neuromorphic computing architectures. Memristor crossbars are harnessed as the computational substrate in this non-conventional computing platform and integrated with CMOS-based neurons to mimic the computational dynamics observed in the mammalian brain’s visual cortex. Functional prototypes using spiking sparse locally competitive approximations are presented. The architectures are evaluated for classification accuracy and energy efficiency. The proposed systems achieve a 90% true positive accuracy with a high-resolution detector and 86% with a low-resolution detector.
Explainable Physics-Informed Deep Learning For Rainfall-Runoff Modeling And Uncertainty Assessment Across The Continental United States, Sadegh Sadeghi Tabas
Explainable Physics-Informed Deep Learning For Rainfall-Runoff Modeling And Uncertainty Assessment Across The Continental United States, Sadegh Sadeghi Tabas
All Dissertations
Hydrologic models provide a comprehensive tool to calibrate streamflow response to environmental variables. Various hydrologic modeling approaches, ranging from physically based to conceptual to entirely data-driven models, have been widely used for hydrologic simulation. During the recent years, however, Deep Learning (DL), a new generation of Machine Learning (ML), has transformed hydrologic simulation research to a new direction. DL methods have recently proposed for rainfall-runoff modeling that complement both distributed and conceptual hydrologic models, particularly in a catchment where data to support a process-based model is scared and limited.
This dissertation investigated the applicability of two advanced probabilistic physics-informed DL …
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis
Modeling, Simulation and Visualization Student Capstone Conference
Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz
Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz
Center for Cybersecurity
Technology is a tool that can be used to gain knowledge and for advancements in areas like medicine, machinery, and everyday tasks. It can be used to connect with friends, work from home, and to improve quality of life. But some social media users can use it to hurt others. Cyberbullying is a major issue that has been steadily growing over the past few years. Cyberbullying has also steadily increased the rates of stress, anxiety, depression, violent behavior, low self-esteem and may cause suicide. Cyberbullying is an ongoing problem for social media users, and it is urgent that a solution …
Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou
Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou
Center for Cybersecurity
A Security Operations Center (SOC) is an organizational framework for cybersecurity, staffed by cybersecurity professionals who monitor an organization's security, analyze potential or current breaches, and respond accordingly. The SOC's goal is to diagnose, evaluate, and respond to cybersecurity events using technology solutions and established procedures. SOCs mainly operate 24/7, with security analysts monitoring environmental data for emerging threats and responding as needed. The SOC manages and enhances an organization's overall security posture.
Autonomous 3d Urban And Complex Terrain Geometry Generation And Micro-Climate Modelling Using Cfd And Deep Learning, Tewodros F. Alemayehu
Autonomous 3d Urban And Complex Terrain Geometry Generation And Micro-Climate Modelling Using Cfd And Deep Learning, Tewodros F. Alemayehu
Electronic Thesis and Dissertation Repository
Sustainable building design requires a clear understanding and realistic modelling of the complex interaction between climate and built environment to create safe and comfortable outdoor and indoor spaces. This necessitates unprecedented urban climate modelling at high temporal and spatial resolution. The interaction between complex urban geometries and the microclimate is characterized by complex transport mechanisms. The challenge to generate geometric and physics boundary conditions in an automated manner is hindering the progress of computational methods in urban design. Thus, the challenge of modelling realistic and pragmatic numerical urban micro-climate for wind engineering, environmental, and building energy simulation applications should address …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer
Master's Theses
Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …
Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha
Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha
Faculty Publications
The rapidly increasing number of drones in the national airspace, including those for recreational and commercial applications, has raised concerns regarding misuse. Autonomous drone detection systems offer a probable solution to overcoming the issue of potential drone misuse, such as drug smuggling, violating people’s privacy, etc. Detecting drones can be difficult, due to similar objects in the sky, such as airplanes and birds. In addition, automated drone detection systems need to be trained with ample amounts of data to provide high accuracy. Real-time detection is also necessary, but this requires highly configured devices such as a graphical processing unit (GPU). …
A Computational Model Of Trust Based On Dynamic Interaction In The Stack Overflow Community, Patrick O’Neill
A Computational Model Of Trust Based On Dynamic Interaction In The Stack Overflow Community, Patrick O’Neill
Dissertations
A member’s reputation in an online community is a quantified representation of their trustworthiness within the community. Reputation is calculated using rules-based algorithms which are primarily tied to the upvotes or downvotes a member receives on posts. The main drawback of this form of reputation calculation is the inability to consider dynamic factors such as a member’s activity (or inactivity) within the community. The research involves the construction of dynamic mathematical models to calculate reputation and then determine to what extent these results compare with rules-based models. This research begins with exploratory research of the existing corpus of knowledge. Constructive …
Aplicación De Un Sistema De Gestión Al Proceso De Contratación, Zuly Dayana Rubiano Rodríguez
Aplicación De Un Sistema De Gestión Al Proceso De Contratación, Zuly Dayana Rubiano Rodríguez
Ingeniería en Automatización
Este proyecto aborda un desafío común en muchas empresas: la ineficiencia en la atracción de talento humano y el proceso de selección y contratación de nuevos empleados. Muchas empresas aún realizan estos procesos de manera manual, lo que conlleva deficiencias y la necesidad de reprocesos debido a la pérdida o falta de documentación. Para abordar esta problemática, el proyecto comienza con un análisis exhaustivo de los procesos existentes relacionados con la selección de candidatos, contratación y evaluación de pruebas. Este análisis proporciona una comprensión profunda de los procedimientos y establece las directrices necesarias para la posible automatización utilizando técnicas de …
Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar
Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar
UNF Graduate Theses and Dissertations
This thesis introduces the Farming Lightweight Protocol (FLP) optimized for energy-restricted environments that depend upon secure communication, such as multi-robot information gathering systems within the vision of ``smart'' agriculture. FLP uses a hash-based message authentication code (HMAC) to achieve data integrity. HMAC implementations, resting upon repeated use of the SHA256 hashing operator, impose additional resource requirements and thus also impact system availability. We address this particular integrity/availability trade-off by proposing an energy-saving algorithmic engineering method on the internal SHA256 hashing operator. The energy-efficient hash is designed to maintain the original security benefits yet reduce the negative effects on system availability. …
Neuromorphic Computing Applications In Robotics, Noah Zins
Neuromorphic Computing Applications In Robotics, Noah Zins
Dissertations, Master's Theses and Master's Reports
Deep learning achieves remarkable success through training using massively labeled datasets. However, the high demands on the datasets impede the feasibility of deep learning in edge computing scenarios and suffer from the data scarcity issue. Rather than relying on labeled data, animals learn by interacting with their surroundings and memorizing the relationships between events and objects. This learning paradigm is referred to as associative learning. The successful implementation of associative learning imitates self-learning schemes analogous to animals which resolve the challenges of deep learning. Current state-of-the-art implementations of associative memory are limited to simulations with small-scale and offline paradigms. Thus, …
Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang
Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang
Graduate Theses, Dissertations, and Problem Reports
Computer Vision (CV) enables computers and systems to derive meaningful information from acquired visual inputs, such as images and videos, and make decisions based on the extracted information. Its goal is to acquire, process, analyze, and understand the information by developing a theoretical and algorithmic model. Biometrics are distinctive and measurable human characteristics used to label or describe individuals by combining computer vision with knowledge of human physiology (e.g., face, iris, fingerprint) and behavior (e.g., gait, gaze, voice). Face is one of the most informative biometric traits. Many studies have investigated the human face from the perspectives of various different …
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Electronic Theses and Dissertations
Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …
Energy Dissipation In A Sand Damper Under Cyclic Loading, Ehab Sabi
Energy Dissipation In A Sand Damper Under Cyclic Loading, Ehab Sabi
Civil and Environmental Engineering Theses and Dissertations
Various seismic and wind engineering designs and retrofit strategies have been in development to meet structures' proper and safe operation during earthquake and wind excitation. One such method is the addition of fluid and particle dampers, such as sand dampers, in an effort to reduce excessive and dangerous displacements of structures. The present study implements the discrete element method (DEM) to assess the performance of a pressurized sand damper (PSD) and characterize the dissipated energy under cyclic loading. The idea of a PSD is to exploit the increase in shearing resistance of sand under external pressure and the associated ability …
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Discovery Undergraduate Interdisciplinary Research Internship
Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …
Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong
Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong
Master's Theses
Depth perception has become a heavily researched area as companies and researchers are striving towards the development of self-driving cars. Self-driving cars rely on perceiving the surrounding area, which heavily depends on technology capable of providing the system with depth perception capabilities. In this paper, we explore developing a single camera (monocular) depth prediction model that is trained on panoramic depth images. Our model makes novel use of transfer learning efficient encoder models, pre-training on a larger dataset of flat depth images, and optimizing the model for use with a Jetson Nano. Additionally, we present a training and optimization framework …
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Dissertations
Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.
In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …