Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu Dec 2017

Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu

Master's Theses

Genealogical records play a crucial role in helping people to discover their lineage and to understand where they come from. They provide a way for people to celebrate their heritage and to possibly reconnect with family they had never considered. However, genealogical records are hard to come by for ordinary people since their information is not always well established in known databases. There often is free form text that describes a person’s life, but this must be manually read in order to extract the relevant genealogical information. In addition, multiple texts may have to be read in order to create …


Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo Dec 2017

Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo

Master's Theses

Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches …


A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh Jun 2017

A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh

Master's Theses

Spacecraft health monitoring is essential to ensure that a spacecraft is operating properly and has no anomalies that could jeopardize its mission. Many of the current methods of monitoring system health are difficult to use as the complexity of spacecraft increase, and are in many cases impractical on CubeSat satellites which have strict size and resource limitations. To overcome these problems, new data-driven techniques such as Inductive Monitoring System (IMS), use data mining and machine learning on archived system telemetry to create models that characterize nominal system behavior. The models that IMS creates are in the form of clusters that …


Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs May 2017

Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs

Master's Theses

Robots are no longer constrained to cages in factories and are increasingly taking on roles alongside humans. Before robots can accomplish their tasks in these dynamic environments, they must be able to navigate while avoiding collisions with pedestrians or other robots. Humans are able to move through crowds by anticipating the movements of other pedestrians and how their actions will influence others; developing a method for predicting pedestrian trajectories is a critical component of a robust robot navigation system. A current state-of-the-art approach for predicting pedestrian trajectories is Social-LSTM, which is a recurrent neural network that incorporates information about neighboring …


Rules Based Analysis Engine For Application Layer Ids, David Scrobonia May 2017

Rules Based Analysis Engine For Application Layer Ids, David Scrobonia

Master's Theses

Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional …


Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt Mar 2017

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt

Master's Theses

Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …


Revalume: Configurable Employee Evaluations In The Cloud, Terrence Zone Li Mar 2017

Revalume: Configurable Employee Evaluations In The Cloud, Terrence Zone Li

Master's Theses

The software industry has seen a shift from annual to more frequent quarterly and even weekly employee reviews. As a result, there is a high demand for employee evaluations to be less costly and less time-consuming, while providing key insights for richer interactions between employees and their employers or managers. Tech com- panies are constantly looking for methods of producing high quality evaluations to prevent costly turnover. In an industry where software engineers are in high demand, tech companies face a challenging problem. Issues with employee evaluations typi- cally include the lack of performance transparency, unhelpful feedback, lack of metrics, …


Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly Mar 2017

Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly

Master's Theses

Code clones are duplicate fragments of code that perform the same task. As software code bases increase in size, the number of code clones also tends to increase. These code clones, possibly created through copy-and-paste methods or unintentional duplication of effort, increase maintenance cost over the lifespan of the software. Code clone detection tools exist to identify clones where a human search would prove unfeasible, however the quality of the clones found may vary. I demonstrate that the performance of such tools can be improved by normalizing the source code before usage. I developed Normalizer, a tool to transform C …