Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 50

Full-Text Articles in Computer Engineering

A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman Aug 2023

A Data-Driven Multi-Regime Approach For Predicting Real-Time Energy Consumption Of Industrial Machines., Abdulgani Kahraman

Electronic Theses and Dissertations

This thesis focuses on methods for improving energy consumption prediction performance in complex industrial machines. Working with real-world industrial machines brings several challenges, including data access, algorithmic bias, data privacy, and the interpretation of machine learning algorithms. To effectively manage energy consumption in the industrial sector, it is essential to develop a framework that enhances prediction performance, reduces energy costs, and mitigates air pollution in heavy industrial machine operations. This study aims to assist managers in making informed decisions and driving the transition towards green manufacturing. The energy consumption of industrial machinery is substantial, and the recent increase in CO2 …


Controllable Language Generation Using Deep Learning, Rohola Zandie Aug 2023

Controllable Language Generation Using Deep Learning, Rohola Zandie

Electronic Theses and Dissertations

The advent of deep neural networks has sparked a revolution in Artificial Intelligence (AI), notably with the creation of Transformer models like GPT-X and ChatGPT. These models have surpassed previous methods in various Natural Language Processing (NLP) tasks. As the NLP field evolves, there is a need to further understand and question the capabilities of these models. Text generation, a crucial part of NLP, remains an area where our comprehension is limited while being critical in research.

This dissertation focuses on the challenging problem of controlling the general behaviors of language models such as sentiment, topical focus, and logical reasoning. …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang May 2023

Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang

Electronic Theses and Dissertations

Future assembly technologies will involve higher levels of automation in order to satisfy increased microscale or nanoscale precision requirements. Traditionally, assembly using a top-down robotic approach has been well-studied and applied to the microelectronics and MEMS industries, but less so in nanotechnology. With the boom of nanotechnology since the 1990s, newly designed products with new materials, coatings, and nanoparticles are gradually entering everyone’s lives, while the industry has grown into a billion-dollar volume worldwide. Traditionally, nanotechnology products are assembled using bottom-up methods, such as self-assembly, rather than top-down robotic assembly. This is due to considerations of volume handling of large …


Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He Mar 2023

Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He

Electronic Theses and Dissertations

Reference-frames, or coordinate systems, are used to express properties and relationships of objects in the environment. While the use of reference-frames is well understood in physical sciences, how the brain uses reference-frames remains a fundamental question. The goal of this dissertation is to reach a better understanding of reference-frames in human perceptual, motor, and cognitive processing. In the first project, we study reference-frames in perception and develop a model to explain the transition from egocentric (based on the observer) to exocentric (based outside the observer) reference-frames to account for the perception of relative motion. In a second project, we focus …


Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha Mar 2023

Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha

Electronic Theses and Dissertations

The majority of smartphone users engage with a recommender system on a daily basis. Many rely on these recommendations to make their next purchase, download the next game, listen to the new music or find the next healthcare provider. Although there are plenty of evidence backed research that demonstrates presence of gender bias in Machine Learning (ML) models like recommender systems, the issue is viewed as a frivolous cause that doesn’t merit much action. However, gender bias poses to effect more than half of the population as by default ML systems are designed to cater to a cisgender man. This …


Artificial Emotional Intelligence In Socially Assistive Robots, Hojjat Abdollahi Jan 2023

Artificial Emotional Intelligence In Socially Assistive Robots, Hojjat Abdollahi

Electronic Theses and Dissertations

Artificial Emotional Intelligence (AEI) bridges the gap between humans and machines by demonstrating empathy and affection towards each other. This is achieved by evaluating the emotional state of human users, adapting the machine’s behavior to them, and hence giving an appropriate response to those emotions. AEI is part of a larger field of studies called Affective Computing. Affective computing is the integration of artificial intelligence, psychology, robotics, biometrics, and many more fields of study. The main component in AEI and affective computing is emotion, and how we can utilize emotion to create a more natural and productive relationship between humans …


Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran Jan 2023

Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran

Electronic Theses and Dissertations

Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Classification Of Electropherograms Using Machine Learning For Parkinson’S Disease, Soroush Dehghan Jan 2022

Classification Of Electropherograms Using Machine Learning For Parkinson’S Disease, Soroush Dehghan

Electronic Theses and Dissertations

Parkinson’s disease (PD) is a neurodegenerative movement disorder that progresses gradually over time. The onset of symptoms in people who are suffering from PD can vary from case to case, and it depends on the progression of the disease in each patient. The PD symptoms gradually develop and exacerbate the patient’s movements throughout time. An early diagnosis of PD could improve the outcomes of treatments and could potentially delay the progression of this disorder and that makes discovering a new diagnostic method valuable. In this study, I investigate the feasibility of using a machine learning (ML) approach to classify PD …


Hardware Implementations Of Spiking Neural Networks And Artificially Intelligent Systems, Alexander J. Leigh Jan 2022

Hardware Implementations Of Spiking Neural Networks And Artificially Intelligent Systems, Alexander J. Leigh

Electronic Theses and Dissertations

Artificial spiking neural networks are gaining increasing prominence due to their potential advantages over traditional, time-static artificial neural networks. Custom hardware implementations of spiking neural networks present many advantages over other implementation mediums. Two main topics are the focus of this work. Firstly, digital hardware implementations of spiking neurons and neuromorphic hardware are explored and presented. These implementations include novel implementations for lowered digital hardware requirements and reduced power consumption.

The second section of this work proposes a novel method for selectively adding sparsity to a spiking neural network based on training set images for pattern recognition applications, thereby greatly …


Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan Jan 2022

Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan

Electronic Theses and Dissertations

Neural Networks have been used in many decision-making models and been employed in computer vision, and natural language processing. Several works have also used Neural Networks for developing Pseudo-Random Number Generators [2, 4, 5, 7, 8]. However, despite great performance in the National Institute of Standards and Technology (NIST) statistical test suite for randomness, they fail to discuss how the complexity of a neural network affects such statistical results. This work introduces: 1) a series of new Long Short- Term Memory Network (LSTM) based and Fully Connected Neural Network (FCNN – baseline [2] + variations) Pseudo Random Number Generators (PRNG) …


Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng Jan 2022

Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng

Electronic Theses and Dissertations

Convolutional Neural Network (CNN) is a neural network developed for processing image data. CNNs have been studied extensively and have been used in numerous computer vision tasks such as image classification and segmentation, object detection and recognition, etc. [1] Although, the CNNs-based approaches showed humanlevel performances in these tasks [2], they require heavy computation in both training and inference stages, and the models consist of millions of parameters. This hinders the development and deployment of CNN-based models for real world applications. Neural Network Pruning and Compression techniques have been proposed [3, 4] to reduce the computation complexity of trained CNNs …


Hrotate: Hybrid Relational Rotation Embedding For Knowledge Graph, Akshay Mukundbhai Shah Oct 2021

Hrotate: Hybrid Relational Rotation Embedding For Knowledge Graph, Akshay Mukundbhai Shah

Electronic Theses and Dissertations

Knowledge Graph (KG) represents the real world's information in the form of triplets (head, relation, and tail). However, most KGs are generated manually or semi-automatically, which resulted in an enormous number of missing information in a KG. The goal of a Knowledge-Graph Completion task is to predict missing links in a given Knowledge Graph. Various approaches exist to predict a missing link in a KG. However, the most prominent approaches are based on tensor factorization and Knowledge-Graph embeddings, such as RotatE and SimplE. The RotatE model depicts each relation as a rotation from the source entity (Head) to the target …


Meta-Heuristic Approach For Course Scheduling Problem, Amanta Sunny Oct 2021

Meta-Heuristic Approach For Course Scheduling Problem, Amanta Sunny

Electronic Theses and Dissertations

Nowadays, much research is being carried out to find efficient algorithms for optimal automated university course timetable problems (UCTP). UCTP allocates the university's events like lectures, exams to the various resources, including instructors, students, lecture time and classrooms. Class scheduling is one of the biggest challenging problems of educational institutions. In this thesis, the aim is to improve the state-of-art for a class scheduling problem considering some hard and soft constraints. Hard constraints must be satisfied. Soft constraints need not be satisfied, but there is a penalty for each soft constraint violation. We also have a timing penalty for scheduling …


Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese Aug 2021

Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese

Electronic Theses and Dissertations

Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …


Multilateration Index., Chip Lynch Aug 2021

Multilateration Index., Chip Lynch

Electronic Theses and Dissertations

We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …


Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi Jan 2021

Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi

Electronic Theses and Dissertations

Since technologies have been developing rapidly, Wireless Body Area Network (WBAN) has emerged as a promising technique for healthcare systems. People can monitor patients’ body condition and collect data remotely and continuously by using WBAN with small and compact wearable sensors. These sensors can be located in, on, and around the patient’s body and measure the patient’s health condition. Afterwards sensor nodes send the data via short-range wireless communication techniques to an intermediate node. The WBANs deal with critical health data, therefore, secure communication within the WBAN is important. There are important criteria in designing a security protocol for a …


Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin Jan 2021

Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin

Electronic Theses and Dissertations

In order to fulfill the needs of everyday monitoring for healthcare and emergency advice, many HAR systems have been designed [1]. Based on the healthcare purpose, these systems can be implanted into an astronaut’s spacesuit to provide necessary life movement monitoring and healthcare suggestions. Most of these systems use acceleration data-based data record as human activity representation [2,3]. But this data attribute approach has a limitation that makes it impossible to be used as an activity monitoring system for astronavigation. Because an accelerometer senses acceleration by distinguishing acceleration data based on the earth’s gravity offset [4], the accelerometer cannot read …


Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani Jan 2021

Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani

Electronic Theses and Dissertations

Outdoor positioning systems based on the Global Navigation Satellite System have several shortcomings that have deemed their use for indoor positioning impractical. Location fingerprinting, which utilizes machine learning, has emerged as a viable method and solution for indoor positioning due to its simple concept and accurate performance. In the past, shallow learning algorithms were traditionally used in location fingerprinting. Recently, the research community started utilizing deep learning methods for fingerprinting after witnessing the great success and superiority these methods have over traditional/shallow machine learning algorithms. The contribution of this dissertation is fourfold:

First, a Convolutional Neural Network (CNN)-based method for …


Deep Siamese Neural Networks For Facial Expression Recognition In The Wild, Wassan Hayale Jan 2020

Deep Siamese Neural Networks For Facial Expression Recognition In The Wild, Wassan Hayale

Electronic Theses and Dissertations

The variation of facial images in the wild conditions due to head pose, face illumination, and occlusion can significantly affect the Facial Expression Recognition (FER) performance. Moreover, between subject variation introduced by age, gender, ethnic backgrounds, and identity can also influence the FER performance. This Ph.D. dissertation presents a novel algorithm for end-to-end facial expression recognition, valence and arousal estimation, and visual object matching based on deep Siamese Neural Networks to handle the extreme variation that exists in a facial dataset. In our main Siamese Neural Networks for facial expression recognition, the first network represents the classification framework, where we …


Automated Recognition Of Facial Affect Using Deep Neural Networks, Behzad Hasani Jan 2020

Automated Recognition Of Facial Affect Using Deep Neural Networks, Behzad Hasani

Electronic Theses and Dissertations

Automated Facial Expression Recognition (FER) has been a topic of study in the field of computer vision and machine learning for decades. In spite of efforts made to improve the accuracy of FER systems, existing methods still are not generalizable and accurate enough for use in real-world applications. Many of the traditional methods use hand-crafted (a.k.a. engineered) features for representation of facial images. However, these methods often require rigorous hyper-parameter tuning to achieve favorable results.

Recently, Deep Neural Networks (DNNs) have shown to outperform traditional methods in visual object recognition. DNNs require huge data as well as powerful computing units …


Facial Action Unit Detection With Deep Convolutional Neural Networks, Siddhesh Padwal Jan 2020

Facial Action Unit Detection With Deep Convolutional Neural Networks, Siddhesh Padwal

Electronic Theses and Dissertations

The facial features are the most important tool to understand an individual's state of mind. Automated recognition of facial expressions and particularly Facial Action Units defined by Facial Action Coding System (FACS) is challenging research problem in the field of computer vision and machine learning. Researchers are working on deep learning algorithms to improve state of the art in the area. Automated recognition of facial action units has man applications ranging from developmental psychology to human robot interface design where companies are using this technology to improve their consumer devices (like unlocking phone) and for entertainment like FaceApp. Recent studies …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


An Explainable Sequence-Based Deep Learning Predictor With Applications To Song Recommendation And Text Classification., Khalil Damak May 2019

An Explainable Sequence-Based Deep Learning Predictor With Applications To Song Recommendation And Text Classification., Khalil Damak

Electronic Theses and Dissertations

Streaming applications are now the predominant tools for listening to music. What makes the success of such software is the availability of songs and especially their ability to provide users with relevant personalized recommendations. State of the art music recommender systems mainly rely on either Matrix factorization-based collaborative filtering approaches or deep learning architectures. Deep learning models usually use metadata for content-based filtering or predict the next user interaction (listening to a song) using a memory-based deep learning structure that learns from temporal sequences of user actions. Despite advances in deep learning models for song recommendation systems, none has taken …


Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee Jan 2019

Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee

Electronic Theses and Dissertations

The instance segmentation and object detection are important tasks in smart car applications. Recently, a variety of neural network-based approaches have been proposed. One of the challenges is that there are various scales of objects in a scene, and it requires the neural network to have a large receptive field to deal with the scale variations. In other words, the neural network must have deep architectures which slow down computation. In smart car applications, the accuracy of detection and segmentation of vehicle and pedestrian is hugely critical. Besides, 2D images do not have distance information but enough visual appearance. On …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Network Science Algorithms For Mobile Networks., Heba Mohamed Elgazzar May 2018

Network Science Algorithms For Mobile Networks., Heba Mohamed Elgazzar

Electronic Theses and Dissertations

Network Science is one of the important and emerging fields in computer science and engineering that focuses on the study and analysis of different types of networks. The goal of this dissertation is to design and develop network science algorithms that can be used to study and analyze mobile networks. This can provide essential information and knowledge that can help mobile networks service providers to enhance the quality of the mobile services. We focus in this dissertation on the design and analysis of different network science techniques that can be used to analyze the dynamics of mobile networks. These techniques …