Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris Oct 2023

Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris

Electrical & Computer Engineering Theses & Dissertations

Every year in the United States many people are killed or injured when maritime vessels collide with other vessels or fixed objects. According to the United States Coast Guard, the top contributing factors to these collisions are operator inattention, operator inexperience and an improper lookout. Larger commercial vessels are required to have RADAR systems which support Automatic RADAR Plotting Aid (ARPA) which can automatically detect collisions and alert an operator to change course. These systems can be very expensive which put them out of reach of the average recreational boater. It is however possible to implement a low cost ARPA …


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen Apr 2023

Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).