Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Computer Engineering

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny Jun 2023

User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny

Theses and Dissertations

With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …


Virtual Plc Platform For Security And Forensics Of Industrial Control Systems, Syed Ali Qasim Jan 2023

Virtual Plc Platform For Security And Forensics Of Industrial Control Systems, Syed Ali Qasim

Theses and Dissertations

Industrial Control Systems (ICS) are vital in managing critical infrastructures, including nuclear power plants and electric grids. With the advent of the Industrial Internet of Things (IIoT), these systems have been integrated into broader networks, enhancing efficiency but also becoming targets for cyberattacks. Central to ICS are Programmable Logic Controllers (PLCs), which bridge the physical and cyber worlds and are often exploited by attackers. There's a critical need for tools to analyze cyberattacks on PLCs, uncover vulnerabilities, and improve ICS security. Existing tools are hindered by the proprietary nature of PLC software, limiting scalability and efficiency.

To overcome these challenges, …


Machine Learning Models To Automate Radiotherapy Structure Name Standardization, Priyankar Bose Jan 2023

Machine Learning Models To Automate Radiotherapy Structure Name Standardization, Priyankar Bose

Theses and Dissertations

Structure name standardization is a critical problem in Radiotherapy planning systems to correctly identify the various Organs-at-Risk, Planning Target Volumes and `Other' organs for monitoring present and future medications. Physicians often label anatomical structure sets in Digital Imaging and Communications in Medicine (DICOM) images with nonstandard random names. Hence, the standardization of these names for the Organs at Risk (OARs), Planning Target Volumes (PTVs), and `Other' organs is a vital problem. Prior works considered traditional machine learning approaches on structure sets with moderate success. We compare both traditional methods and deep neural network-based approaches on the multimodal vision-language prostate cancer …


Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton Dec 2022

Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton

Theses and Dissertations

All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …


Adding Temporal Information To Lidar Semantic Segmentation For Autonomous Vehicles, Mohammed Anany Jan 2022

Adding Temporal Information To Lidar Semantic Segmentation For Autonomous Vehicles, Mohammed Anany

Theses and Dissertations

Semantic segmentation is an essential technique to achieve scene understanding for various domains and applications. Particularly, it is of crucial importance in autonomous driving applications. Autonomous vehicles usually rely on cameras and light detection and ranging (LiDAR) sensors to gain contextual information from the environment. Semantic segmentation has been employed to process images and point clouds that were captured from cameras and LiDAR sensors respectively. One important research direction to consider is investigating the impact of utilizing temporal information in the domain of semantic segmentation. Many contributions exist in the field with regards to utilizing temporal information for semantic segmentation …


Camera And Lidar Fusion For Point Cloud Semantic Segmentation, Ali Abdelkader Jan 2022

Camera And Lidar Fusion For Point Cloud Semantic Segmentation, Ali Abdelkader

Theses and Dissertations

Perception is a fundamental component of any autonomous driving system. Semantic segmentation is the perception task of assigning semantic class labels to sensor inputs. While autonomous driving systems are currently equipped with a suite of sensors, much focus in the literature has been on semantic segmentation of camera images only. Research in the fusion of different sensor modalities for semantic segmentation has not been investigated as much. Deep learning models based on transformer architectures have proven successful in many tasks in computer vision and natural language processing. This work explores the use of deep learning transformers to fuse information from …


Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed Jan 2022

Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed

Theses and Dissertations

The task of summarization can be categorized into two methods, extractive and abstractive summarization. Extractive approach selects highly meaningful sentences to form a summary while the abstractive approach interprets the original document and generates the summary in its own words. The task of generating a summary, whether extractive or abstractive, has been studied with different approaches such as statistical-based, graph-based, and deep-learning based approaches. Deep learning has achieved promising performance in comparison with the classical approaches and with the evolution of neural networks such as the attention network or commonly known as the Transformer architecture, there are potential areas for …


Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr. Dec 2021

Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.

Theses and Dissertations

Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.

This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …


Accelerating Point Set Registration For Automated Aerial Refueling, Ryan M. Raettig Mar 2021

Accelerating Point Set Registration For Automated Aerial Refueling, Ryan M. Raettig

Theses and Dissertations

The goal of AAR is to control the tanker boom to safely refuel a receiving aircraft with no input or aid from the boom operator. To achieve this, the pose of the receiver relative to the tanker must be known. Point set registration is a fundamental issue used to estimate the relative pose of an object in an environment. However, it's likely a computational bottleneck of a vision processing pipeline. In addition, the matching of each sensed point with a closest truth point, nearest neighbor matching, is the most costly portion of the point set registration process. For this reason, …


Efficient End-To-End Autonomous Driving, Hesham Eraqi Dec 2020

Efficient End-To-End Autonomous Driving, Hesham Eraqi

Theses and Dissertations

Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to train artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, most existing solutions consider only the visual camera frames as input, thus ignoring the temporal relationship between frames. In this work, we propose a Convolution Long Short-Term Memory Recurrent Neural Network (C-LSTM), which is end-to-end trainable, to learn both visual and dynamic temporal dependencies of driving. Additionally, We introduce posing the steering angle regression problem as classification while imposing a spatial relationship between the …


Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor Jul 2020

Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor

Theses and Dissertations

This thesis presents and explores two techniques for automated logging statement evolution. The first technique reinvigorates logging statement levels to reduce information overload using degree of interest obtained via software repository mining. The second technique converts legacy method calls to deferred execution to achieve performance gains, eliminating unnecessary evaluation overhead.


A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger Mar 2020

A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger

Theses and Dissertations

Traditional frame-based technology continues to suffer from motion blur, low dynamic range, speed limitations and high data storage requirements. Event-based sensors offer a potential solution to these challenges. This research centers around a comparative assessment of frame and event-based object detection and tracking. A basic frame-based algorithm is used to compare against two different event-based algorithms. First event-based pseudo-frames were parsed through standard frame-based algorithms and secondly, target tracks were constructed directly from filtered events. The findings show there is significant value in pursuing the technology further.


Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed Jan 2020

Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed

Theses and Dissertations

Radiation oncology is the field of medicine that deals with treating cancer patients through ionizing radiation. The clinical modality or technique used to treat the cancer patients in the radiation oncology domain is referred to as radiation therapy. Radiation therapy aims to deliver precisely measured dose irradiation to a defined tumor volume (target) with as minimal damage as possible to surrounding healthy tissue (organs-at-risk), resulting in eradication of the tumor, high quality of life, and prolongation of survival. A typical radiotherapy process requires the use of different clinical systems at various stages of the workflow. The data generated in these …


Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson Mar 2019

Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson

Theses and Dissertations

Despite ongoing improvements in machine translation, machine translators still lack the capability of incorporating context from which source text may have been derived. Machine translators use text from a source language to translate it into a target language without observing any visual context. This work aims to produce a neural machine translation model that is capable of accepting both text and image context as a multimodal translator from Mandarin Chinese to English. The model was trained on a small multimodal dataset of 700 images and sentences, and compared to a translator trained only on the text associated with those images. …


Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon Mar 2019

Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon

Theses and Dissertations

In the world of machine learning, neural networks have become a powerful pattern recognition technique that gives a user the ability to interpret high-dimensional data whereas conventional methods, such as logistic regression, would fail. There exists many different types of neural networks, each containing its own set of hyper-parameters that are dependent on the type of analysis required, but the focus of this paper will be on the hyper-parameters of convolutional neural networks. Convolutional neural networks are commonly used for classifications of visual imagery. For example, if you were to build a network for the purpose of predicting a specific …


The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi Jan 2019

The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi

Theses and Dissertations

Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue …


Blockchain Scalability And Security, Tuyet Duong Jan 2018

Blockchain Scalability And Security, Tuyet Duong

Theses and Dissertations

Cryptocurrencies like Bitcoin have proven to be a phenomenal success. The underlying techniques hold huge promise to change the future of financial transactions, and eventually the way people and companies compute, collaborate, and interact. At the same time, the current Bitcoin-like proof-of-work based blockchain systems are facing many challenges. In more detail, a huge amount of energy/electricity is needed for maintaining the Bitcoin blockchain. In addition, their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption is …


Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain Mar 2017

Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain

Theses and Dissertations

There has been increasing interest in developing the ability for small unmanned aerial systems (SUAS) to be able to operate in environments where GPS is not available. This research considers the case of a larger aircraft loitering above a smaller GPS-denied SUAS. This larger aircraft is assumed to have greater resources which can overcome the GPS jamming and provide range information to the SUAS flying a mission below. This research demonstrates that using a ranging update combined with an aircraft motion model and visual odometry can greatly improve the accuracy of a SUASs estimated position in a GPS-denied environment.


Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park Jan 2017

Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park

Theses and Dissertations

Identification of accurate tumor location and shape is highly important in lung cancer radiotherapy, to improve the treatment quality by reducing dose delivery errors. Because a lung tumor moves with the patient's respiration, breathing motion should be correctly analyzed and predicted during the treatment for prevention of tumor miss or undesirable treatment toxicity. Besides, in Image-Guided Radiation Therapy (IGRT), the tumor motion causes difficulties not only in delivering accurate dose, but also in assuring superior quality of imaging techniques such as four-dimensional (4D) Cone Beam Computed Tomography (CBCT) and 4D Magnetic Resonance Imaging (MRI). Specifically, 4D CBCT used in CBCT …


Autonomous Navigation With Obstacle Avoidance For Unmanned Aircraft Systems Using Milp, James A. Devens Jan 2016

Autonomous Navigation With Obstacle Avoidance For Unmanned Aircraft Systems Using Milp, James A. Devens

Theses and Dissertations

Autonomous coordination among multiple aerial vehicles to ensure a collision free airspace is a critical aspect of today’s airspace. With the rise of Unmanned Aerial Vehicles (UAVs) in the military and commercial sectors, obstacle avoidance in a densely populated airspace is necessary. This thesis investigates finding optimal or near-optimal trajectories in real-time for aircraft in complex airspaces containing a large number of obstacles. The solution for the trajectories is described as a linear program subject to mixed integer constraints, known as a Mixed Integer Linear Program (MILP). The resulting MILP problem is solved in real time using a well-known, public …


In-Shoe Plantar Pressure System To Investigate Ground Reaction Force Using Android Platform, Ahmed A. Mostfa Jan 2016

In-Shoe Plantar Pressure System To Investigate Ground Reaction Force Using Android Platform, Ahmed A. Mostfa

Theses and Dissertations

Human footwear is not yet designed to optimally relieve pressure on the heel of the foot. Proper foot pressure assessment requires personal training and measurements by specialized machinery. This research aims to investigate and hypothesize about Preferred Transition Speed (PTS) and to classify the gait phase of explicit variances in walking patterns between different subjects. An in-shoe wearable pressure system using Android application was developed to investigate walking patterns and collect data on Activities of Daily Living (ADL). In-shoe circuitry used Flexi-Force A201 sensors placed at three major areas: heel contact, 1st metatarsal, and 5th metatarsal with a PIC16F688 microcontroller …


Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart Jan 2016

Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart

Theses and Dissertations

Today's cloud landscape has evolved computing infrastructure into a dynamic, high utilization, service-oriented paradigm. This shift has enabled the commoditization of large-scale storage and distributed computation, allowing engineers to tackle previously untenable problems without large upfront investment. A key enabler of flexibility in the cloud is the ability to transfer running virtual machines across subnets or even datacenters using live migration. However, live migration can be a costly process, one that has the potential to interfere with other applications not involved with the migration. This work investigates storage interference through experimentation with real-world systems and well-established benchmarks. In order to …


Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy Sep 2013

Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy

Theses and Dissertations

Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone Sep 2013

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Applied Hypergame Theory For Network Defense, Alan S. Gibson Jun 2013

Applied Hypergame Theory For Network Defense, Alan S. Gibson

Theses and Dissertations

Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …


Examining Application Components To Reveal Android Malware, John B. Guptill Mar 2013

Examining Application Components To Reveal Android Malware, John B. Guptill

Theses and Dissertations

Smartphones are becoming ubiquitous in everyday life and malware is exploiting these devices. Therefore, a means to identify the threats of malicious applications is necessary. This paper presents a method to classify and analyze Android malware through application component analysis. The experiment parses select portions from Android packages to collect features using byte sequences and permissions of the application. Multiple machine learning algorithms classify the samples of malware based on these features. The experiment utilizes instance based learner, naive Bayes, decision trees, sequential minimal optimization, boosted naive Bayes, and boosted decision trees to identify the best components that reveal malware …


Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic Jun 2011

Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

Theses and Dissertations

Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a post-quantum era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called Error Reconciliation, a clear-text classical-channel discussion between legitimate …


Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay Mar 2011

Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay

Theses and Dissertations

This research effort examines the theory, application, and results of applying two-dimensional cross-correlation in the time domain to ultra-wideband (UWB) random noise waveforms for simultaneous range and velocity estimation. When applying common Doppler processing techniques to random noise waveforms for the purpose of velocity estimation, the velocity resolution degrades as the signal bandwidth or the target speed increase. To mitigate the degradation, the Doppler approximation is not utilized, and instead, wideband signal processing theory is applied in the time domain. The results show that by accurately interpolating each sample in the digitized reference signal, a target's velocity and range can …


Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer Mar 2011

Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer

Theses and Dissertations

This thesis provides a novel visualization method to analyze the impact that articulations in dismount pose and camera aspect angle have on histograms of oriented gradients (HOG) features and eventual detections. Insights from these relationships are used to identify limitations in a state of the art skin cued HOG dismount detector's ability to detect poses not in a standard upright stances. Improvements to detector performance are made by further leveraging available skin information, reducing false detections by an additional order of magnitude. In addition, a method is outlined for training supplemental support vector machines (SVMs) from computer generated data, for …