Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Computer Engineering

Comparative Analytics On Chilli Plant Disease Using Machine Learning Techniques, Sai Abhishta Roy Seelam Jan 2023

Comparative Analytics On Chilli Plant Disease Using Machine Learning Techniques, Sai Abhishta Roy Seelam

Electronic Theses and Dissertations

This thesis concerns the detection of diseases in chilli plants using machine learning techniques. Three algorithms, viz., Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), and Multi-Layer Perceptron (MLP), and their variants have been employed. Chilli-producing countries, India, Mexico, China, Indonesia, Spain, the United States, and Turkey. India has the world’s largest chilli production of about 49% (according to 2020). Andhra Pradesh (Guntur) is the largest market in India, where their varieties are more popular for pungency and color. This study classifies five kinds of diseases that affect the chilli, namely, leaf spot, whitefly, yellowish, healthy, and leaf curl. A …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Linking Social Media, Medical Literature, And Clinical Notes Using Deep Learning., Mohsen Asghari Aug 2021

Linking Social Media, Medical Literature, And Clinical Notes Using Deep Learning., Mohsen Asghari

Electronic Theses and Dissertations

Researchers analyze data, information, and knowledge through many sources, formats, and methods. The dominant data format includes text and images. In the healthcare industry, professionals generate a large quantity of unstructured data. The complexity of this data and the lack of computational power causes delays in analysis. However, with emerging deep learning algorithms and access to computational powers such as graphics processing unit (GPU) and tensor processing units (TPUs), processing text and images is becoming more accessible. Deep learning algorithms achieve remarkable results in natural language processing (NLP) and computer vision. In this study, we focus on NLP in the …


Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury Dec 2019

Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury

Electronic Theses and Dissertations

A novel, interactive Android app has been developed that monitors the health of type 2 diabetic patients in real-time, providing patients and their physicians with real-time feedback on all relevant parameters of diabetes. The app includes modules for recording carbohydrate intake and blood glucose; for reminding patients about the need to take medications on schedule; and for tracking physical activity, using movement data via Bluetooth from a pair of wearable insole devices. Two machine learning models were developed to detect seven physical activities: sitting, standing, walking, running, stair ascent, stair descent and use of elliptical trainers. The SVM and decision …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He May 2018

How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He

Electronic Theses and Dissertations

In this thesis, we explore the speed, power, and energy performance of the same data process on the central processing unit (CPU) with and without the acceleration of the Graphics Processing Unit (GPU) on the microcomputer Raspberry Pi (RPI). We tested on the RPI in two different fields. The first was comparing the speed, power, and energy usage with and without GPU acceleration in the image processing impacts on RPI model B+. The second was comparing speed, power, energy usage, and accuracy for scientific calculation with and without GPU acceleration on RPI model B+ and 3B.

We used a novel …


Service Integration Design Patterns In Microservices, Meng Wang Jan 2018

Service Integration Design Patterns In Microservices, Meng Wang

Electronic Theses and Dissertations

“Microservices” is a new term in software architecture that was defined in 2014 [1]. It is a method to build a software application with a set of small services. Each service has its process to serve a single purpose and communicates with other services through lightweight mechanisms. Because of a great deal of independently distributed services, it is a challenge to integrate the loose services fully. Too many trivial relationships can be messed up easily during deployment. Also, it is hard to modify the relationships if the services are updated as the source codes need to be re-edited and tested. …


Mazetec: A Scenario-Based Learning Platform, Daniel Bietz Jan 2018

Mazetec: A Scenario-Based Learning Platform, Daniel Bietz

Electronic Theses and Dissertations

This work presents Mazetec, a scenario-based learning platform for delivering non-linear scenarios format asynchronously. It enables subject matter experts to create interactive, state-dependent case studies or courses with branching logic for online learning and knowledge testing. Mazetec is a complex web application designed to deliver decision-based or case-based educational scenarios and simulations in a time-limited, non-linear format. There are many e-learning systems in the open source and commercial markets, but while these systems may have similar functions, we have found none that are both domain independent and able to deliver state-dependent content asynchronous and non-linearly. Mazetec can serve as …


An Interactive Interface For Nursing Robots., Ankita Sahu Aug 2017

An Interactive Interface For Nursing Robots., Ankita Sahu

Electronic Theses and Dissertations

Physical Human-Robot Interaction (pHRI) is inevitable for a human user while working with assistive robots. There are various aspects of pHRI, such as choosing the interface, type of control schemes implemented and the modes of interaction. The research work presented in this thesis concentrates on a health-care assistive robot called Adaptive Robot Nursing Assistant (ARNA). An assistive robot in a health-care environment has to be able to perform routine tasks and be aware of the surrounding environment at the same time. In order to operate the robot, a teleoperation based interaction would be tedious for some patients as it would …


Wind Turbine Noise And Wind Speed Prediction, Tyler H. Blanchard Jan 2017

Wind Turbine Noise And Wind Speed Prediction, Tyler H. Blanchard

Electronic Theses and Dissertations

In order to meet the US Department of Energy projected target of 35% of US energy coming from wind by 2050, there is a strong need to study the management and development of wind turbine technology and its impact on human health, wildlife and environment. The prediction of wind turbine noise and its propagation is very critical to study the impacts of wind turbine noise for long term adoption and acceptance by neighboring communities. The prediction of wind speed is critical in the assessment of feasibility of a potential wind turbine site. This work presents a study on prediction of …


Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis Aug 2015

Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis

Electronic Theses and Dissertations

Power and energy are increasingly important metrics in modern computing systems. Large supercomputers utilize millions of cores and can consume as much power as a small town; monitoring and reducing power consumption is an important task. At the other extreme, power usage of embedded and mobile devices is also critically important. Battery life is a key concern in such devices; having detailed power measurement allows optimizing these devices for power as well. Current systems are not set up to allow easy power measurement. There has been much work in this area, but obtaining power readings is often expensive, intrusive, and …


Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr. May 2015

Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.

Electronic Theses and Dissertations

The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …


Testing Data Vault-Based Data Warehouse, Connard N. Williams Jan 2015

Testing Data Vault-Based Data Warehouse, Connard N. Williams

Electronic Theses and Dissertations

Data warehouse (DW) projects are undertakings that require integration of disparate sources of data, a well-defined mapping of the source data to the reconciled data, and effective Extract, Transform, and Load (ETL) processes. Owing to the complexity of data warehouse projects, great emphasis must be placed on an agile-based approach with properly developed and executed test plans throughout the various stages of designing, developing, and implementing the data warehouse to mitigate against budget overruns, missed deadlines, low customer satisfaction, and outright project failures. Yet, there are often attempts to test the data warehouse exactly like traditional back-end databases and legacy …


Agent-Based And System Dynamics Hybrid Modeling And Simulation Approach Using Systems Modeling Language, Asli Soyler Akbas Jan 2015

Agent-Based And System Dynamics Hybrid Modeling And Simulation Approach Using Systems Modeling Language, Asli Soyler Akbas

Electronic Theses and Dissertations

Agent-based (AB) and system dynamics (SD) modeling and simulation techniques have been studied and used by various research fields. After the new hybrid modeling field emerged, the combination of these techniques started getting attention in the late 1990's. Applications of using agent-based (AB) and system dynamics (SD) hybrid models for simulating systems have been demonstrated in the literature. However, majority of the work on the domain includes system specific approaches where the models from two techniques are integrated after being independently developed. Existing work on creating an implicit and universal approach is limited to conceptual modeling and structure design. This …


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …


Secure Map Generation For Multiplayer, Turn-Based Strategy Games, Stephen L. Rice Jan 2014

Secure Map Generation For Multiplayer, Turn-Based Strategy Games, Stephen L. Rice

Electronic Theses and Dissertations

In strategy games, players compete against each other on randomly generated maps in an attempt to prove their superior skill. Traditionally, these games rely on a client/server architecture with one player fulfilling the role of server and holding responsibility for the map generation process. We propose, analyze and evaluate a method that allows these maps to be created in a peer-to-peer fashion and thus reduce the potential for cheating. We provide an example map generation program that puts these concepts into action and demonstrate how it can be extended and customized for any game. Finally, we analyze the performance of …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Towards A Filmic Look And Feel In Real Time Computer Graphics, Sherief Farouk May 2013

Towards A Filmic Look And Feel In Real Time Computer Graphics, Sherief Farouk

Electronic Theses and Dissertations

Film footage has a distinct look and feel that audience can instantly recognize, making its replication desirable for computer generated graphics. This thesis presents methods capable of replicating significant portions of the film look and feel while being able to fit within the constraints imposed by real-time computer generated graphics on consumer hardware.


Improving The Performance Of The Parallel Ice Sheet Model On A Large-Scale, Distributed Supercomputer, Timothy J. Morey May 2013

Improving The Performance Of The Parallel Ice Sheet Model On A Large-Scale, Distributed Supercomputer, Timothy J. Morey

Electronic Theses and Dissertations

In this thesis, we describe our work to understand and improve the performance and scalability of the Parallel Ice Sheet Model (PISM) on the Ranger supercomputer. PISM enables the simulation of large-scale ice sheets, such as those found in Greenland and Antarctica, which are of particular interest to climate scientists due to their potential to contribute to sea-level rise.

PISM has a unique parallel architecture that is designed to take advantage of the computational resources available on state-of-the-art supercomputers. The problem, however, is that even though PISM can run without modifcation on a supercomputer, it is generally unable to do …


Categorization Of Security Design Patterns, Jeremiah Y. Dangler May 2013

Categorization Of Security Design Patterns, Jeremiah Y. Dangler

Electronic Theses and Dissertations

Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, …


Accelerated Data Delivery Architecture, Michael L. Grecol Jan 2013

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …


Application Of Self-Monitoring For Situational Awareness, Christopher Trickler Jan 2013

Application Of Self-Monitoring For Situational Awareness, Christopher Trickler

Electronic Theses and Dissertations

Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute to …


High-Speed Digital And Mixed-Signal Components For X– And Ku–Band Direct Digital Synthesizers In Indium Phosphide Dhbt Technology, Steven Eugene Turner May 2006

High-Speed Digital And Mixed-Signal Components For X– And Ku–Band Direct Digital Synthesizers In Indium Phosphide Dhbt Technology, Steven Eugene Turner

Electronic Theses and Dissertations

Recently reported double heterojunction bipolar transistor (DHBT) devices manufactured in Indium Phosphide (InP) technology with ft and fmax both over 300 GHz enable advanced high-speed digital and mixed-signal circuits. In this thesis, the use of InP DHBT devices for high-speed accumulator circuits and X– and Ku–band direct digital synthesizer (DDS) circuits are investigated. At these frequencies, new technological challenges in the design of digital and mixed-signal circuits arise in areas including power consumption and clock distribution. This thesis addresses the speed/power tradeoffs in high-speed accumulator designs, the design of DDS circuits, and clock distribution simulation. The results of six accumulator …