Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Sequentially-Closed And Forward-Closed String Rewriting Systems, Yu Zhang Jan 2020

Sequentially-Closed And Forward-Closed String Rewriting Systems, Yu Zhang

Legacy Theses & Dissertations (2009 - 2024)

In this dissertation we introduce the new concept of sequentially-closed string rewriting systems which generalizes forward-closed string rewriting systems and monadic string rewriting systems. We also investigate subclasses and properties of finite and regular sequentially-closed systems and forward-closed systems.


Invariant-Based Online Software Anomaly Detection And Selective Regression Testing, Yizhen Chen Jan 2020

Invariant-Based Online Software Anomaly Detection And Selective Regression Testing, Yizhen Chen

Legacy Theses & Dissertations (2009 - 2024)

Software has been extensively used in various domains to provide online services. With the growing popularity of these types of applications, the quality of the software has a great impact on many of our daily activities [1]. Reliable software executions that deliver expected outcomes are essential for quality services. Software is considered abnormal when its behavior deviates from what is expected at any point during its execution. When anomalous behavior propagates to an exit point of the software and produces an incorrect output or an unexpected termination of the execution, it is considered a software failure. An anomaly may or …


Efficient Detection Of Diseases By Feature Engineering Approach From Chest Radiograph, Avishek Mukherjee Jan 2019

Efficient Detection Of Diseases By Feature Engineering Approach From Chest Radiograph, Avishek Mukherjee

Legacy Theses & Dissertations (2009 - 2024)

Deep Learning is the new state-of-the-art technology in Image Processing. We applied Deep Learning techniques for identification of diseases from Radiographs made publicly available by NIH. We applied some Feature Engineering approach to augment the data from Anterior-Posterior position to Posterior-Anterior position and vice-versa for all the diseases, at the same point we suppressed ‘No Finding’ radiographs which contributed to more than 50% (approximately 60,000) of the dataset to top 1000 images. We also prepared a model by adding a huge amount of noise to the augmented data, which if need be can be deployed at rural locations which lack …


Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar Jan 2019

Emotion Forecasting In Dyadic Conversation : Characterizing And Predicting Future Emotion With Audio-Visual Information Using Deep Learning, Sadat Shahriar

Legacy Theses & Dissertations (2009 - 2024)

Emotion forecasting is the task of predicting the future emotion of a speaker, i.e., the emotion label of the future speaking turn–based on the speaker’s past and current audio-visual cues. Emotion forecasting systems require new problem formulations that differ from traditional emotion recognition systems. In this thesis, we first explore two types of forecasting windows(i.e., analysis windows for which the speaker’s emotion is being forecasted): utterance forecasting and time forecasting. Utterance forecasting is based on speaking turns and forecasts what the speaker’s emotion will be after one, two, or three speaking turns. Time forecasting forecasts what the speaker’s emotion will …


Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem Jan 2019

Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem

Legacy Theses & Dissertations (2009 - 2024)

A core limitation in existing wireless technologies is the scarcity of spectrum, to support the exponential increase in Internet-connected and multimedia-capable mobile devices and the increasing demand for bandwidth-intensive services. As a solution, Dynamic Spectrum Access policies are being ratified to promote spectrum sharing for various spectrum bands and to improve the spectrum utilization. This poses an equally challenging problem of enforcing these spectrum policies. The distributed and dynamic nature of policy violations necessitates the use of autonomous agents to implement efficient and agile enforcement systems. The design of such a fully autonomous enforcement system is complicated due to the …


Synchronous Subgraphs In Networks, Navita Jain Jan 2016

Synchronous Subgraphs In Networks, Navita Jain

Legacy Theses & Dissertations (2009 - 2024)

Community detection is a central problem in network analysis. The majority of existing work defines communities as subsets of nodes that are structurally well-connected and isolated from the rest of the network. Apart from their underlying connectivity, nodes in real-world networks exhibit temporal activity: user posts in social networks, browsing activity on web pages and neuron activations in brain networks to name a few. While edges encode potential for community interactions, participation in the community can be quantified by synchronized member activity. Given both the network structure and individual node activity, how can we detect communities that are both well-connected …


Effective Entity Resolution Methodology For Improving Data Quality And Reliability Of Service-Oriented Applications, Ewa Musial Jan 2014

Effective Entity Resolution Methodology For Improving Data Quality And Reliability Of Service-Oriented Applications, Ewa Musial

Legacy Theses & Dissertations (2009 - 2024)

This dissertation proposes new paradigms for improving the testing, reliability of service-oriented applications as well as the quality of data. Since it is difficult to track information flowing through the multiple tiers of an application, testing service-oriented systems can be very challenging. We present a methodology for testing service-oriented applications that takes into account all the components, including services, external services, and data components. The results of our experiments demonstrate that this approach greatly improves the effectiveness of testing service-oriented applications.