Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- 3D small cells (1)
- Access (1)
- Advanced driver assistance (1)
- Analysis (1)
- Android Application (1)
-
- Arduino (1)
- Automation (1)
- Autonomous (1)
- Autonomous Sanitation (1)
- Barrier (1)
- Bayesian (1)
- Boat (1)
- CIR data set (1)
- Coding (1)
- Computational Design (1)
- Computer vision (1)
- Conditional GAN (1)
- Contextual Interference (1)
- Control (1)
- Coordinated Search and Tracking (1)
- Critical Infrastructure (1)
- Cyber-physical Systems (1)
- Damage Assessment (1)
- Data Lineage (1)
- Data Provenance (1)
- Deep Learning (1)
- Detection (1)
- Device free (1)
- Embedded Systems (1)
- Energy systems (1)
- Publication
-
- Graduate Theses and Dissertations (4)
- Computer Engineering (3)
- All Dissertations (2)
- Williams Honors College, Honors Research Projects (2)
- Dissertations, Master's Theses and Master's Reports (1)
-
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Program Theses (1)
- Honors Theses and Capstones (1)
- LSU Master's Theses (1)
- MSU Graduate Theses (1)
- Theses and Dissertations--Computer Science (1)
Articles 1 - 21 of 21
Full-Text Articles in Computer Engineering
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Electronic Thesis and Dissertation Repository
Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Electronic Theses and Dissertations
Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …
A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi
A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi
Graduate Theses and Dissertations
Low latency inferencing is of paramount importance to a wide range of real time and userfacing Machine Learning (ML) applications. Field Programmable Gate Arrays (FPGAs) offer unique advantages in delivering low latency as well as energy efficient accelertors for low latency inferencing. Unfortunately, creating machine learning accelerators in FPGAs is not easy, requiring the use of vendor specific CAD tools and low level digital and hardware microarchitecture design knowledge that the majority of ML researchers do not possess. The continued refinement of High Level Synthesis (HLS) tools can reduce but not eliminate the need for hardware-specific design knowledge. The designs …
Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur
Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur
All Dissertations
The evolution of Cyber-Physical Systems (CPSs) has given rise to an emergent class of CPSs defined by ad-hoc wireless connectivity, mobility, and resource constraints in computation, memory, communications, and battery power. These systems are expected to fulfill essential roles in critical infrastructure sectors. Vehicular Ad-Hoc Network (VANET) and a swarm of Unmanned Aerial Vehicles (UAV swarm) are examples of such systems. The significant utility of these systems, coupled with their economic viability, is a crucial indicator of their anticipated growth in the future. Typically, the tasks assigned to these systems have strict Quality-of-Service (QoS) requirements and require sensing, perception, and …
Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun
Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun
All Dissertations
Machine learning (ML) has been extensively employed for strategy optimization, decision making, data classification, etc. While ML shows great triumph in its application field, the increasing complexity of the learning models introduces neoteric challenges to the ML system designs. On the one hand, the applications of ML on resource-restricted terminals, like mobile computing and IoT devices, are prevented by the high computational complexity and memory requirement. On the other hand, the massive parameter quantity for the modern ML models appends extra demands on the system's I/O speed and memory size. This dissertation investigates feasible solutions for those challenges with software-hardware …
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Doctoral Dissertations
Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …
Barrier Knockdown Test Control System For The Cal Poly Kinesiology Department, Regina M. Chapuis
Barrier Knockdown Test Control System For The Cal Poly Kinesiology Department, Regina M. Chapuis
Computer Engineering
The goal of this project is to design and implement a new control system for the LEDs and buttons on an existing Barrier Knockdown setup in the Cal Poly Kinesiology department. The Barrier Knockdown test is a testing apparatus in which subjects knock down a series of mechanical barriers in one of three patterns. The computer system times their reaction and movement time, and the test as a whole provides students with data to study the phenomenon of Contextual Interference. This system was previously controlled by an old computer setup that ultimately crashed. This project recreates the logic and user …
Mars Prototype Rover Environmental Measurement System, James A. Renick
Mars Prototype Rover Environmental Measurement System, James A. Renick
Computer Engineering
In my senior project, the problem I am trying to solve is how to efficiently design, create, and install an original library onto a Mars prototype rover operating system and to further use that library to integrate a new weather measurement sensor device into the rover system with the necessary software and hardware implementations. This is an important and highly valued problem as many aerospace and other engineering companies utilize rovers and other autonomous systems for important research, explorations, and reconnaissance missions and goals. In solving this problem, I utilized many resources that were available to me such as advisors, …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Structural Checking Tool Restructure And Matching Improvements, Derek Taylor
Structural Checking Tool Restructure And Matching Improvements, Derek Taylor
Graduate Theses and Dissertations
With the rising complexity and size of hardware designs, saving development time and cost by employing third-party intellectual property (IP) into various first-party designs has become a necessity. However, using third-party IPs introduces the risk of adding malicious behavior to the design, including hardware Trojans. Different from software Trojan detection, the detection of hardware Trojans in an efficient and cost-effective manner is an ongoing area of study and has significant complexities depending on the development stage where Trojan detection is leveraged. Therefore, this thesis research proposes improvements to various components of the soft IP analysis methodology utilized by the Structural …
A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur
Graduate Theses and Dissertations
Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing …
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Graduate Theses and Dissertations
Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide …
Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku
Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku
Williams Honors College, Honors Research Projects
Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Dissertations, Master's Theses and Master's Reports
The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.
Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Theses and Dissertations--Computer Science
Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells
Honors Theses and Capstones
Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable …
Multimodal Adversarial Learning, Uche Osahor
Multimodal Adversarial Learning, Uche Osahor
Graduate Theses, Dissertations, and Problem Reports
Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …
Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse
Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse
Honors Program Theses
IoT (Internet of Things) devices have become increasingly popular in recent years while WiFi continues to serve as primary network provider indoors. With the advancements in technology, the networks of IoT devices continue to weave closely with indoor WiFi network deployments. Both kinds of these networks primarily operate in 2.4 GHz ISM Band (though latest WiFi standards can operate in 5 GHz and 60 GHz bands, too). With the multitude of tiny IoT sensors being deployed indoors alongside operational WiFi networks, severe interference scenarios cannot be ruled out. As a result of this interference, performance of WiFi networks is bound …
Smart Uv-C Disinfectant Module, Nicole Baldy, Luke Rogers, Haitham Saleh
Smart Uv-C Disinfectant Module, Nicole Baldy, Luke Rogers, Haitham Saleh
Williams Honors College, Honors Research Projects
The Smart UV Disinfectant device shall sanitize objects which are 18”x14”x8” or smaller and less than 20 lbs. using UV-C light. This device should contain many safety measures to prevent human and animal exposure to the UV-C light and have no public touchpoints to operate the interface. In order to achieve the first objective, this device shall contain a "sanitizing chamber" which completely encloses the object to be sanitized to prevent outside exposure with detection of any lifeforms inside of the chamber; for the second objective, it will contain a wireless interface to an Android application which can be used …
Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory
Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory
MSU Graduate Theses
Spoken communication, for many, is an essential part of everyday life. Some individuals can lose or not be born with the ability to speak. To function on a day-to-day basis, these individuals find other ways of communication. Adaptive speech synthesis is one of those ways. It recreates a user’s previous voice or creates a voice that blends with their regional dialect. Current adaptive speech synthesis techniques that achieve human-like speech require thirty minutes, to a few hours of high-quality audio recordings of a target speaker. This amount of recorded audio is not commonly possessed by people in need of a …