Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

University of Nebraska - Lincoln

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 231

Full-Text Articles in Computer Engineering

Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko May 2024

Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep Neural Networks (DNNs) have become a popular instrument for solving various real-world problems. DNNs’ sophisticated structure allows them to learn complex representations and features. However, architecture specifics and floating-point number usage result in increased computational operations complexity. For this reason, a more lightweight type of neural networks is widely used when it comes to edge devices, such as microcomputers or microcontrollers – Binary Neural Networks (BNNs). Like other DNNs, BNNs are vulnerable to adversarial attacks; even a small perturbation to the input set may lead to an errant output. Unfortunately, only a few approaches have been proposed for verifying …


Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens May 2024

Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens

Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research

Mission and flight planning problems for uncrewed aircraft systems (UASs) are typically large and complex in space and computational requirements. With enough time and computing resources, some of these problems may be solvable offline and then executed during flight. In dynamic or uncertain environments, however, the mission may require online adaptation and replanning. In this work, we will discuss methods of creating MDPs for online applications, and a method of using a sliding resolution and receding horizon approach to build and solve Markov Decision Processes (MDPs) in practical planing applications for UASs. In this strategy, called a Sliding Markov Decision …


Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman May 2024

Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …


Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach May 2024

Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technology advances, the field of electrical and computer engineering continuously demands innovative tools and methodologies to facilitate effective learning and comprehension of fundamental concepts. Through a comprehensive literature review, it was discovered that there was a gap in the current research on using VR technology to effectively visualize and comprehend non-observable electrical characteristics of electronic circuits. This thesis explores the integration of Virtual Reality (VR) technology and real-time electronic circuit simulation with enhanced visualization of non-observable concepts such as voltage distribution and current flow within these circuits. The primary objective is to develop an immersive educational platform that makes …


Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson May 2024

Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson

Department of Civil and Environmental Engineering: Dissertations, Theses, and Student Research

Concrete cracks and structural steel corrosion are two of the most common defects in bridges. Quantifying and classifying these defects provide bridge inspectors and engineers with valuable data for assessing deterioration levels. However, the bridge inspection process is typically a subjective, time intensive, and tedious task, as defects can be overlooked or in locations not easily accessible. Previous studies have investigated deep learning-based inspection methods, implementing popular models such as Mask R-CNN and U-Net. The architectures of these models offer certain advantages depending on the required task. This thesis aims to evaluate and compare Mask R-CNN and U-Net regarding their …


In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel Dec 2023

In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel

Honors Theses

In this work, two sensing systems were researched in order to improve in situ environmental monitoring. The first is a pH and Total Alkalinity sensor used to determine these characteristics of sea water. I explored the facets of this sensor over a 7-week internship with Dr. Ellen Briggs in her lab in summer of 2023. The second is a more holistic sensing system that reads temperature, turbidity, and pressure used for studying environmental characteristics of Alaskan bever ponds. Both systems were developed in close collaboration with scientists who are collecting data to better understand the impacts of climate change. Better …


On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez Dec 2023

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez

Department of Mathematics: Dissertations, Theses, and Student Research

In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Experimental Study Of Linux Flightsize Estimation, Mingrui Zhang Aug 2023

Experimental Study Of Linux Flightsize Estimation, Mingrui Zhang

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Transmission Control Protocol (TCP) is a fundamental Internet protocol responsible for controlling and coordinating the Internet traffic. As a result, TCP significantly influences the overall performance and stability of the Internet. One critical information required by a TCP connection to make decisions is FlightSize, which is the total amount of outstanding data contributed by the connection to the Internet. The FlightSize information is used by a TCP connection to determine its future sending rate and also avoid traffic congestion and collapse in the Internet. Consequently, an inaccurate estimation of FlightSize can result in degraded performance and instability of the Internet. …


Sim-To-Real Reinforcement Learning Framework For Autonomous Aerial Leaf Sampling, Ashraful Islam May 2023

Sim-To-Real Reinforcement Learning Framework For Autonomous Aerial Leaf Sampling, Ashraful Islam

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Using unmanned aerial systems (UAS) for leaf sampling is contributing to a better understanding of the influence of climate change on plant species, and the dynamics of forest ecology by studying hard-to-reach tree canopies. Currently, multiple skilled operators are required for UAS maneuvering and using the leaf sampling tool. This often limits sampling to only the canopy top or periphery. Sim-to-real reinforcement learning (RL) can be leveraged to tackle challenges in the autonomous operation of aerial leaf sampling in the changing environment of a tree canopy. However, trans- ferring an RL controller that is learned in simulation to real UAS …


Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly May 2023

Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The use of unmanned aerial vehicles (UAVs) in construction sites has been widely growing for surveying and inspection purposes. Their mobility and agility have enabled engineers to use UAVs in Structural Health Monitoring (SHM) applications to overcome the limitations of traditional approaches that require labor-intensive installation, extended time, and long-term maintenance. One of the critical applications of SHM is measuring bridge deflections during the bridge operation period. Due to the complex remote sites of bridges, remote sensing techniques, such as camera-equipped drones, can facilitate measuring bridge deflections. This work takes a step to build a pipeline using the state-of-the-art computer …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan Dec 2022

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan Dec 2022

Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep neural networks (DNNs) can perform impressively in many natural language processing (NLP) tasks, but their black-box nature makes them inherently challenging to explain or interpret. Self-Explanatory models are a new approach to overcoming this challenge, generating explanations in human-readable languages besides task objectives like answering questions. The main focus of this thesis is the explainability of NLP tasks, as well as how attention methods can help enhance performance. Three different attention modules are proposed, SimpleAttention, CrossSelfAttention, and CrossModality. It also includes a new dataset transformation method called Two-Documents that converts every dataset into two separate documents required by the …


Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal Dec 2022

Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering.

This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide …


Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven Dec 2022

Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Fact verification has become an important process, primarily done manually by humans, to verify the authenticity of claims and statements made online. Increasingly, social media companies have utilized human effort to debunk false claims on their platforms, opting to either tag the content as misleading or false, or removing it entirely to combat misinformation on their sites. In tandem, the field of automatic fact verification has become a subject of focus among the natural language processing (NLP) community, spawning new datasets and research. The most popular dataset is the Fact Extraction and VERification (FEVER) dataset. In this thesis an end-to-end …


Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li Dec 2022

Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Viral metagenomics is independent of lab culturing and capable of investigating viromes of virtually any given environmental niches. While numerous sequences of viral genomes have been assembled from metagenomic studies over the past years, the natural hosts for the majority of these viral contigs have not been determined. Different computational approaches have been developed to predict hosts of bacteria phages. Nevertheless, little progress has been made in the virus-host prediction, especially for viruses that infect eukaryotes and archaea. In this study, by analyzing all documented viruses with known eukaryotic and archaeal hosts, we assessed the predictive power of four computational …


A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha Nov 2022

A Pipeline To Generate Deep Learning Surrogates Of Genome-Scale Metabolic Models, Achilles Rasquinha

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Genome-Scale Metabolic Models (GEMMs) are powerful reconstructions of biological systems that help metabolic engineers understand and predict growth conditions subjected to various environmental factors around the cellular metabolism of an organism in observation, purely in silico. Applications of metabolic engineering range from perturbation analysis and drug-target discovery to predicting growth rates of biotechnologically important metabolites and reaction objectives within dierent single-cell and multi-cellular organism types. GEMMs use mathematical frameworks for quantitative estimations of flux distributions within metabolic networks. The reasons behind why an organism activates, stuns, or fluctuates between alternative pathways for growth and survival, however, remain relatively unknown. GEMMs …


Computer Engineering Education, Marilyn Wolf Nov 2022

Computer Engineering Education, Marilyn Wolf

CSE Conference and Workshop Papers

Computer engineering is a rapidly evolving discipline. How should we teach it to our students?

This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.


Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri Sep 2022

Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to automatically derive …


Feed Forward Neural Networks With Asymmetric Training, Archit Srivastava Aug 2022

Feed Forward Neural Networks With Asymmetric Training, Archit Srivastava

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Our work presents a new perspective on training feed-forward neural networks(FFNN). We introduce and formally define the notion of symmetry and asymmetry in the context of training of FFNN. We provide a mathematical definition to generalize the idea of sparsification and demonstrate how sparsification can induce asymmetric training in FFNN.

In FFNN, training consists of two phases, forward pass and backward pass. We define symmetric training in FFNN as follows-- If a neural network uses the same parameters for both forward pass and backward pass, then the training is said to be symmetric.

The definition of asymmetric training in artificial …


Feature Analysis Of Indus Valley And Dravidian Language Scripts With Similarity Matrices, Sarat Sasank Barla, Sai Surya Sanjay Alamuru, Peter Revesz Aug 2022

Feature Analysis Of Indus Valley And Dravidian Language Scripts With Similarity Matrices, Sarat Sasank Barla, Sai Surya Sanjay Alamuru, Peter Revesz

CSE Conference and Workshop Papers

This paper investigates the similarity between the Indus Valley script and the Kannada, Malayalam, Tamil, and Telugu scripts that are used to write Dravidian languages. The closeness of these scripts is determined by applying a feature analysis of each sign of these scripts and creating similarity matrices that describe the similarity of any pair of signs from two different scripts. The feature list that we use for the analysis of these Dravidian language-related scripts includes six new features beyond the thirteen features that were used for the study of Minoan Linear A and related scripts by Revesz. These new features …


Simulating Sub-Threshold Communication Channels Through Neurons, Richard Maina Jul 2022

Simulating Sub-Threshold Communication Channels Through Neurons, Richard Maina

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Molecular Communication is an emerging paradigm with the potential to revolutionize the technology behind wearable and implantable devices and the broad range of functions they support, from tracking physical activity to medical diagnostics. This can be achieved through intra-body communication networks that take advantage of natural biological processes as a means of transmitting, propagating and receiving information. In this thesis we focus particularly on using the neuron as a means to facilitate information transfer for interconnected wearable or implantable devices through a technique known as sub-threshold electrical stimulation. We develop upon a prior work by introducing a linear model of …


Combining Solution Reuse And Bound Tightening For Efficient Analysis Of Evolving Systems, Clay Stevens, Hamid Bagheri Jul 2022

Combining Solution Reuse And Bound Tightening For Efficient Analysis Of Evolving Systems, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Software engineers have long employed formal verification to ensure the safety and validity of their system designs. As the system changes—often via predictable, domain-specific operations—their models must also change, requiring system designers to repeatedly execute the same formal verification on similar system models. State-of-the-art formal verification techniques can be expensive at scale, the cost of which is multiplied by repeated analysis. This paper presents a novel analysis technique—implemented in a tool called SoRBoT—which can automatically determine domain-specific optimizations that can dramatically reduce the cost of repeatedly analyzing evolving systems. Different from all prior approaches, which focus on either tightening the …


Consemblex: A Consensus-Based Transcriptome Assembly Approach That Extends Consemble And Improves Transcriptome Assembly, Richard Mwaba Jul 2022

Consemblex: A Consensus-Based Transcriptome Assembly Approach That Extends Consemble And Improves Transcriptome Assembly, Richard Mwaba

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

An accurate transcriptome is essential to understanding biological systems enabling omics analyses such as gene expression, gene discovery, and gene-regulatory network construction. However, assembling an accurate transcriptome is challenging, especially for organisms without adequate reference genomes or transcriptomes. While several methods for transcriptome assembly with different approaches exist, it is still difficult to establish the most accurate methods. This thesis explores the different transcriptome assembly methods and compares their performances using simulated benchmark transcriptomes with varying complexity. We also introduce ConSemblEX to improve a consensus-based ensemble transcriptome assembler, ConSemble, in three main areas: we provide the ability to use any …


Asymmetric Control Of Light At The Nanoscale, Christos Argyropoulos Jul 2022

Asymmetric Control Of Light At The Nanoscale, Christos Argyropoulos

Department of Electrical and Computer Engineering: Faculty Publications

Breaking reciprocity at the nanoscale can produce directional formation of images due to the asymmetric nonlinear optical response of subwavelength anisotropic resonators. The self-induced passive non-reciprocity has advantages compared to magnet or time modulation approaches and may impact both classical and quantum photonics.


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao May 2022

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


Characterizing And Predicting Human Visual Perception Of Unmanned Aerial Vehicle Gestures, Paul Fletcher Apr 2022

Characterizing And Predicting Human Visual Perception Of Unmanned Aerial Vehicle Gestures, Paul Fletcher

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Unmanned Aerial Vehicles (UAVs) are being used in public domains and hazardous environments where effective communication strategies are critical. UAV gesture techniques have been shown to communicate meaning to human observers and may be ideal in contexts that require lightweight systems such as unmanned aerial flight, however, this work may be limited to an idealized range of viewer perspectives. As gesture is a visual communication technique it is necessary to consider how the perception of a robot gesture may suffer from obfuscation or self-occlusion from some viewpoints. This thesis presents the results of three online user-studies that examine participants’ ability …


Data Science Applied To Discover Ancient Minoan-Indus Valley Trade Routes Implied By Commonweight Measures, Peter Revesz Jan 2022

Data Science Applied To Discover Ancient Minoan-Indus Valley Trade Routes Implied By Commonweight Measures, Peter Revesz

CSE Conference and Workshop Papers

This paper applies data mining of weight measures to discover possible long-distance trade routes among Bronze Age civilizations from the Mediterranean area to India. As a result, a new northern route via the Black Sea is discovered between the Minoan and the Indus Valley civilizations. This discovery enhances the growing set of evidence for a strong and vibrant connection among Bronze Age civilizations.