Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Machine learning (2)
- Appsensor (1)
- Artificial intelligence (1)
- Autonomous (1)
- Bicycles (1)
-
- Bike (1)
- Clustering (1)
- Code clones (1)
- Controls (1)
- Cubesat (1)
- Genealogy Extraction (1)
- Genetic algorithms (1)
- IP Mobility (1)
- Information Extraction (1)
- Intrustion detection system (1)
- Machine Learning (1)
- Natural Language Processing (1)
- Networks (1)
- Neural network (1)
- Normalization (1)
- OpenFlow (1)
- Optimization (1)
- Owasp (1)
- Patterson (1)
- Relation Extraction (1)
- Robot (1)
- Rule engine (1)
- SDN (1)
- Satellites (1)
- Security (1)
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu
Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu
Master's Theses
Genealogical records play a crucial role in helping people to discover their lineage and to understand where they come from. They provide a way for people to celebrate their heritage and to possibly reconnect with family they had never considered. However, genealogical records are hard to come by for ordinary people since their information is not always well established in known databases. There often is free form text that describes a person’s life, but this must be manually read in order to extract the relevant genealogical information. In addition, multiple texts may have to be read in order to create …
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Master's Theses
Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches …
A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh
A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh
Master's Theses
Spacecraft health monitoring is essential to ensure that a spacecraft is operating properly and has no anomalies that could jeopardize its mission. Many of the current methods of monitoring system health are difficult to use as the complexity of spacecraft increase, and are in many cases impractical on CubeSat satellites which have strict size and resource limitations. To overcome these problems, new data-driven techniques such as Inductive Monitoring System (IMS), use data mining and machine learning on archived system telemetry to create models that characterize nominal system behavior. The models that IMS creates are in the form of clusters that …
Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs
Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs
Master's Theses
Robots are no longer constrained to cages in factories and are increasingly taking on roles alongside humans. Before robots can accomplish their tasks in these dynamic environments, they must be able to navigate while avoiding collisions with pedestrians or other robots. Humans are able to move through crowds by anticipating the movements of other pedestrians and how their actions will influence others; developing a method for predicting pedestrian trajectories is a critical component of a robust robot navigation system. A current state-of-the-art approach for predicting pedestrian trajectories is Social-LSTM, which is a recurrent neural network that incorporates information about neighboring …
Rules Based Analysis Engine For Application Layer Ids, David Scrobonia
Rules Based Analysis Engine For Application Layer Ids, David Scrobonia
Master's Theses
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional …
Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt
Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt
Master's Theses
Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …
Revalume: Configurable Employee Evaluations In The Cloud, Terrence Zone Li
Revalume: Configurable Employee Evaluations In The Cloud, Terrence Zone Li
Master's Theses
The software industry has seen a shift from annual to more frequent quarterly and even weekly employee reviews. As a result, there is a high demand for employee evaluations to be less costly and less time-consuming, while providing key insights for richer interactions between employees and their employers or managers. Tech com- panies are constantly looking for methods of producing high quality evaluations to prevent costly turnover. In an industry where software engineers are in high demand, tech companies face a challenging problem. Issues with employee evaluations typi- cally include the lack of performance transparency, unhelpful feedback, lack of metrics, …
Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly
Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly
Master's Theses
Code clones are duplicate fragments of code that perform the same task. As software code bases increase in size, the number of code clones also tends to increase. These code clones, possibly created through copy-and-paste methods or unintentional duplication of effort, increase maintenance cost over the lifespan of the software. Code clone detection tools exist to identify clones where a human search would prove unfeasible, however the quality of the clones found may vary. I demonstrate that the performance of such tools can be improved by normalizing the source code before usage. I developed Normalizer, a tool to transform C …