Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 108

Full-Text Articles in Computer Engineering

Adaptive Two-Stage Edge-Centric Architecture For Deeply-Learned Embedded Real-Time Target Classification In Aerospace Sense-And-Avoidance Applications, Nicholas A. Speranza Jan 2021

Adaptive Two-Stage Edge-Centric Architecture For Deeply-Learned Embedded Real-Time Target Classification In Aerospace Sense-And-Avoidance Applications, Nicholas A. Speranza

Browse all Theses and Dissertations

With the growing number of Unmanned Aircraft Systems, current network-centric architectures present limitations in meeting real-time and time-critical requirements. Current methods utilizing centralized off-platform processing have inherent energy inefficiencies, scalability challenges, performance concerns, and cyber vulnerabilities. In this dissertation, an adaptive, two-stage, energy-efficient, edge-centric architecture is proposed to address these limitations. A novel, edge-centric Sense-and-Avoidance architecture framework is presented, and a corresponding prototype is developed using commercial hardware to validate the proposed architecture. Instead of a network-centric approach, processing is distributed at the logical edge of the sensors, and organized as Detection and Classification Subsystems. Classical machine vision algorithms are …


Partial Facial Re-Imaging Using Generative Adversarial Networks, Derek Desentz Jan 2021

Partial Facial Re-Imaging Using Generative Adversarial Networks, Derek Desentz

Browse all Theses and Dissertations

Existing facial recognition software relies heavily on using neural networks to extract key facial features to accurately classify known individuals. Some of these key features include the shape, size, and distance between an individual’s eyes, nose, and mouth. When these key features cannot be extracted due to facial coverings, existing applications become inaccurate and unreliable. The accuracy and reliability of these technologies are growing concerns as the facial recognition market continues to grow at an exponential rate. In this thesis, we have developed a web-based application service that is able to take in a partially covered face image and generate …


Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey Jan 2021

Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey

Browse all Theses and Dissertations

Homeostatic synaptic plasticity is the process by which neurons alter their activity in response to changes in network activity. Neuroscientists attempting to understand homeostatic synaptic plasticity have developed three different mathematical methods to analyze collections of event recordings from neurons acting as a proxy for neuronal activity. These collections of events are from control data and treatment data, referring to the treatment of neuron cultures with pharmacological agents that augment or inhibit network activity. If the distribution of control events can be functionally mapped to the distribution of treatment events, a better understanding of the biological processes underlying homeostatic synaptic …


Deep Learning For Compressive Sar Imaging With Train-Test Discrepancy, Morgan R. Mccamey Jan 2021

Deep Learning For Compressive Sar Imaging With Train-Test Discrepancy, Morgan R. Mccamey

Browse all Theses and Dissertations

We consider the problem of compressive synthetic aperture radar (SAR) imaging with the goal of reconstructing SAR imagery in the presence of under sampled phase history. While this problem is typically considered in compressive sensing (CS) literature, we consider a variety of deep learning approaches where a deep neural network (DNN) is trained to form SAR imagery from limited data. At the cost of computationally intensive offline training, on-line test-time DNN-SAR has demonstrated orders of magnitude faster reconstruction than standard CS algorithms. A limitation of the DNN approach is that any change to the operating conditions necessitates a costly retraining …


A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou Jan 2021

A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou

Browse all Theses and Dissertations

The rapid increase of published research papers in recent years has escalated the need for automated ways to process and understand them. The successful recognition of the information that is contained in technical documents, depends on the understanding of the document’s individual modalities. These modalities include tables, graphics, diagrams and etc. as defined in Bourbakis’ pioneering work. However, the depth of understanding is correlated to the efficiency of detection and recognition. In this work, a novel methodology is proposed for automatic processing of and understanding of tables and graphics images in technical document. Previous attempts on tables and graphics understanding …


Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia Jan 2021

Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia

Browse all Theses and Dissertations

A great percentage of documents in scientific and engineering disciplines include mathematical formulas and/or algorithms. Exploring the mathematical formulas in the technical documents, we focused on the mathematical operations associations, their syntactical correctness, and the association of these components into attributed graphs and Stochastic Petri Nets (SPN). We also introduce a formal language to generate mathematical formulas and evaluate their syntactical correctness. The main contribution of this work focuses on the automatic segmentation of mathematical documents for the parsing and analysis of detected algorithmic components. To achieve this, we present a synergy of methods, such as string parsing according to …


Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta Jan 2021

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta

Browse all Theses and Dissertations

Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …


Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta Jan 2021

Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta

Browse all Theses and Dissertations

A significant issue in cognitive systems research is to make an agent formulate and manage its own goals. Some cognitive scientists have implemented several goal operations to support this issue, but no one has implemented more than a couple of goal operations within a single agent. One of the reasons for this limitation is the lack of knowledge about how various goals operations interact with one another. This thesis addresses this knowledge gap by implementing multiple-goal operations, including goal formulation, goal change, goal selection, and designing an algorithm to manage any positive or negative interaction between them. These are integrated …


Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti Jan 2021

Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti

Browse all Theses and Dissertations

Conversations are more than just a sequence of text, it is where two or more participants interact in order to achieve their goals. Conversation Understanding (CU) requires all participants to understand each others intent. In the past decade, CU has been extended from automated human-human text processing to build automated conversational agents for human-machine interactions. Despite their popularity, these automated conversational agents (like Siri, Alexa, etc) can't handle more than one or two utterances, and they don't recognize conversations as intents. The development of approaches that extract intents behind an utterance is essential for the advancements of Question Answering (QA) …


Arise - Augmented Reality In Surgery And Education, Sadan Suneesh Menon Jan 2021

Arise - Augmented Reality In Surgery And Education, Sadan Suneesh Menon

Browse all Theses and Dissertations

Human errors in healthcare can be fatal. Proper physical assessment of patients to avoid such errors is of paramount importance. Incorrect or insufficient assessment of the patient can cause treatment delays that may lead to negative outcomes. In this dissertation we introduce innovative technology to assist surgeons in patient assessment as well as during the training of nurses in order to enhance learning. Technological advancements have made it possible to visualize overlays of computer-generated 3D models on real-world surfaces. This technology is called augmented reality. Using Steady State Topography (SST) brain imaging to examine the brain activity of people who …


Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta Jan 2021

Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta

Browse all Theses and Dissertations

A significant issue in cognitive systems research is to make an agent formulate and manage its own goals. Some cognitive scientists have implemented several goal operations to support this issue, but no one has implemented more than a couple of goal operations within a single agent. One of the reasons for this limitation is the lack of knowledge about how various goals operations interact with one another. This thesis addresses this knowledge gap by implementing multiple-goal operations, including goal formulation, goal change, goal selection, and designing an algorithm to manage any positive or negative interaction between them. These are integrated …


Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti Jan 2021

Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti

Browse all Theses and Dissertations

Conversations are more than just a sequence of text, it is where two or more participants interact in order to achieve their goals. Conversation Understanding (CU) requires all participants to understand each others intent. In the past decade, CU has been extended from automated human-human text processing to build automated conversational agents for human-machine interactions. Despite their popularity, these automated conversational agents (like Siri, Alexa, etc) can't handle more than one or two utterances, and they don't recognize conversations as intents. The development of approaches that extract intents behind an utterance is essential for the advancements of Question Answering (QA) …


Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger Jan 2021

Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger

Browse all Theses and Dissertations

The additive manufacturing (AM) field is striving to identify anomalies in laser powder bed fusion (LPBF) using multi-sensor in-process monitoring paired with machine learning (ML). In-process monitoring can reveal the presence of anomalies but creating a ML classifier requires labeled data. The present work approaches this problem by printing hundreds of Inconel-718 coupons with different processing parameters to capture a wide range of process monitoring imagery with multiple sensor types. Afterwards, the process monitoring images are encoded into feature vectors and clustered to isolate groups in each sensor modality. Four texture representations were learned by training two convolutional neural network …


Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta Jan 2021

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta

Browse all Theses and Dissertations

Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …


Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni Jan 2021

Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni

Browse all Theses and Dissertations

Autonomous agents in a multi-agent system coordinate to achieve their goals. However, in a partially observable world, current multi-agent systems are often less effective in achieving their goals. In much part, this limitation is due to an agent's lack of reasoning about other agents and their mental states. Another factor is the agent's inability to share required knowledge with other agents and the lack of explanations in justifying the reasons behind the goal. This research addresses these problems by presenting a general approach for agent goal management in unexpected situations. In this approach, an agent applies three main concepts: goal …


Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia Jan 2021

Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia

Browse all Theses and Dissertations

A great percentage of documents in scientific and engineering disciplines include mathematical formulas and/or algorithms. Exploring the mathematical formulas in the technical documents, we focused on the mathematical operations associations, their syntactical correctness, and the association of these components into attributed graphs and Stochastic Petri Nets (SPN). We also introduce a formal language to generate mathematical formulas and evaluate their syntactical correctness. The main contribution of this work focuses on the automatic segmentation of mathematical documents for the parsing and analysis of detected algorithmic components. To achieve this, we present a synergy of methods, such as string parsing according to …


Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani Jan 2021

Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani

Browse all Theses and Dissertations

People in today's world seek things that are simple to use. Learning is one of the most crucial aspects of the ongoing digital transformation. Everything is now accessible with a single click on mobile devices, making access to instructional materials faster, easier, and more comfortable. It takes time and effort to build abilities and become an expert in the fields of learning, training, and teaching; and music learning demands a great deal of both practice and mentoring. Initially, music teachers and band directors must maintain a steady attention and devote a significant amount of time to manually teaching materials. This …


A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou Jan 2021

A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou

Browse all Theses and Dissertations

The rapid increase of published research papers in recent years has escalated the need for automated ways to process and understand them. The successful recognition of the information that is contained in technical documents, depends on the understanding of the document’s individual modalities. These modalities include tables, graphics, diagrams and etc. as defined in Bourbakis’ pioneering work. However, the depth of understanding is correlated to the efficiency of detection and recognition. In this work, a novel methodology is proposed for automatic processing of and understanding of tables and graphics images in technical document. Previous attempts on tables and graphics understanding …


Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang Jan 2021

Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang

Browse all Theses and Dissertations

Vulnerable web applications fundamentally undermine website security as they often expose critical infrastructures and sensitive information behind them to potential risks and threats. Web applications with unrestricted file upload vulnerabilities allow attackers to upload a file with malicious code, which can be later executed on the server by attackers to enable various attacks such as information exfiltration, spamming, phishing, and spreading malware. This dissertation presents our research in building two novel frameworks to detect server-side applications vulnerable to unrestricted file uploading attacks. We design the innovative model that holistically characterizes both data and control flows using a graphbased data structure. …


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …


Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang Jan 2020

Improving Pain Management In Patients With Sickle Cell Disease Using Machine Learning Techniques, Fan Yang

Browse all Theses and Dissertations

Sickle cell disease (SCD) is an inherited red blood cell disorder that can cause a multitude of complications throughout a patient's life. Pain is the most common complication and a significant cause of morbidity. Since pain is a highly subjective experience, both medical providers and patients express difficulty in determining ideal treatment and management strategies for pain. Therefore, the development of objective pain assessment and pain forecasting methods is critical to pain management in SCD. On the other hand, the rapidly increasing use of mobile health (mHealth) technology and wearable devices gives the ability to build a remote health intervention …


Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett Jan 2020

Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett

Browse all Theses and Dissertations

Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.


Finding Data Races In Software Binaries With Symbolic Execution, Nathan D. Jackson Jan 2020

Finding Data Races In Software Binaries With Symbolic Execution, Nathan D. Jackson

Browse all Theses and Dissertations

Modern software applications frequently make use of multithreading to utilize hardware resources better and promote application responsiveness. In these applications, threads share the program state, and synchronization mechanisms ensure proper ordering of accesses to the program state. When a developer fails to implement synchronization mechanisms, data races may occur. Finding data races in an automated way is an already challenging problem, but often impractical without source code or understanding how to execute the program under analysis. In this thesis, we propose a solution for finding data races on software binaries and present our prototype implementation BINRELAY. Our solution makes use …


Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl Jan 2020

Hierarchical Anomaly Detection For Time Series Data, Ryan E. Sperl

Browse all Theses and Dissertations

With the rise of Big Data and the Internet of Things, there is an increasing availability of large volumes of real-time streaming data. Unusual occurrences in the underlying system will be reflected in these streams, but any human analysis will quickly become out of date. There is a need for automatic analysis of streaming data capable of identifying these anomalous behaviors as they occur, to give ample time to react. In order to handle many high-velocity data streams, detectors must minimize the processing requirements per value. In this thesis, we have developed a novel anomaly detection method which makes use …


Predicting Subjective Sleep Quality Using Objective Measurements In Older Adults, Reza Sadeghi Jan 2020

Predicting Subjective Sleep Quality Using Objective Measurements In Older Adults, Reza Sadeghi

Browse all Theses and Dissertations

Humans spend almost a third of their lives asleep. Sleep has a pivotal effect on job performance, memory, fatigue recovery, and both mental and physical health. Sleep quality (SQ) is a subjective experience and reported via patients’ self-reports. Predicting subjective SQ based on objective measurements can enhance diagnosis and treatment of SQ defects, especially in older adults who are subject to poor SQ. In this dissertation, we assessed enhancement of subjective SQ prediction using an easy-to-use E4 wearable device, machine learning techniques and identifying disease-specific risk factors of abnormal SQ in older adults. First, we designed a clinical decision support …


Design Of A Novel Wearable Ultrasound Vest For Autonomous Monitoring Of The Heart Using Machine Learning, Garrett G. Goodman Jan 2020

Design Of A Novel Wearable Ultrasound Vest For Autonomous Monitoring Of The Heart Using Machine Learning, Garrett G. Goodman

Browse all Theses and Dissertations

As the population of older individuals increases worldwide, the number of people with cardiovascular issues and diseases is also increasing. The rate at which individuals in the United States of America and worldwide that succumb to Cardiovascular Disease (CVD) is rising as well. Approximately 2,303 Americans die to some form of CVD per day according to the American Heart Association. Furthermore, the Center for Disease Control and Prevention states that 647,000 Americans die yearly due to some form of CVD, which equates to one person every 37 seconds. Finally, the World Health Organization reports that the number one cause of …


Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman Jan 2020

Stream Clustering And Visualization Of Geotagged Text Data For Crisis Management, Nathaniel C. Crossman

Browse all Theses and Dissertations

In the last decade, the advent of social media and microblogging services have inevitably changed our world. These services produce vast amounts of streaming data, and one of the most important ways of analyzing and discovering interesting trends in the streaming data is through clustering. In clustering streaming data, it is desirable to perform a single pass over incoming data, such that we do not need to process old data again, and the clustering model should evolve over time not to lose any important feature statistics of the data. In this research, we have developed a new clustering system that …


An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow Jan 2020

An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow

Browse all Theses and Dissertations

This paper presents a framework for the generation of 3D models. This is an important problem for many reasons. For example, 3D models are important for systems that are involved in target recognition. These systems use 3D models to train up accuracy on identifying real world object. Traditional means of gathering 3D models have limitations that the generation of 3D models can help overcome. The framework uses a novel generative adversarial network (GAN) that learns latent representations of two dimensional views of a model to bootstrap the network’s ability to learn to generate three dimensional objects. The novel architecture is …


Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan Jan 2020

Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan

Browse all Theses and Dissertations

Recent advances in location acquisition services have resulted in vast amounts of trajectory data; providing valuable insight into human mobility. The field of trajectory data mining has exploded as a result, with literature detailing algorithms for (pre)processing, map matching, pattern mining, and the like. Unfortunately, obtaining trajectory data for the design and evaluation of such algorithms is problematic due to privacy, ethical, dataset size, researcher access, and sampling frequency concerns. Synthetic trajectories provide a solution to such a problem as they are cheap to produce and are derived from a fully controllable generation procedure. Citing deficiencies in modern synthetic trajectory …


Topological Analysis Of Averaged Sentence Embeddings, Wesley J. Holmes Jan 2020

Topological Analysis Of Averaged Sentence Embeddings, Wesley J. Holmes

Browse all Theses and Dissertations

Sentence embeddings are frequently generated by using complex, pretrained models that were trained on a very general corpus of data. This thesis explores a potential alternative method for generating high-quality sentence embeddings for highly specialized corpora in an efficient manner. A framework for visualizing and analyzing sentence embeddings is developed to help assess the quality of sentence embeddings for a highly specialized corpus of documents related to the 2019 coronavirus epidemic. A Topological Data Analysis (TDA) technique is explored as an alternative method for grouping embeddings for document clustering and topic modeling tasks and is compared to a simple clustering …