Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

Identifying And Minimizing Underspecification In Breast Cancer Subtyping, Jonathan Cheuk-Kiu Tang Dec 2022

Identifying And Minimizing Underspecification In Breast Cancer Subtyping, Jonathan Cheuk-Kiu Tang

Master's Theses

In the realm of biomedical technology, both accuracy and consistency are crucial to the development and deployment of these tools. While accuracy is easy to measure, consistency metrics are not so simple to measure, especially in the scope of biomedicine where prediction consistency can be difficult to achieve. Typically, biomedical datasets contain a significantly larger amount of features compared to the amount of samples, which goes against ordinary data mining practices. As a result, predictive models may fail to find valid pathways for prediction during training on such datasets. This concept is known as underspecification.

Underspecification has been more accepted …


A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen Dec 2022

A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen

Master's Theses

Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …


Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong Dec 2022

Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong

Master's Theses

Depth perception has become a heavily researched area as companies and researchers are striving towards the development of self-driving cars. Self-driving cars rely on perceiving the surrounding area, which heavily depends on technology capable of providing the system with depth perception capabilities. In this paper, we explore developing a single camera (monocular) depth prediction model that is trained on panoramic depth images. Our model makes novel use of transfer learning efficient encoder models, pre-training on a larger dataset of flat depth images, and optimizing the model for use with a Jetson Nano. Additionally, we present a training and optimization framework …


Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity Jun 2022

Strainer: State Transcript Rating For Informed News Entity Retrieval, Thomas M. Gerrity

Master's Theses

Over the past two decades there has been a rapid decline in public oversight of state and local governments. From 2003 to 2014, the number of journalists assigned to cover the proceedings in state houses has declined by more than 30\%. During the same time period, non-profit projects such as Digital Democracy sought to collect and store legislative bill and hearing information on behalf of the public. More recently, AI4Reporters, an offshoot of Digital Democracy, seeks to actively summarize interesting legislative data.

This thesis presents STRAINER, a parallel project with AI4Reporters, as an active data retrieval and filtering system for …


Viability And Implementation Of A Vector Cryptography Extension For Risc-V, Jonathan W. Skelly Jun 2022

Viability And Implementation Of A Vector Cryptography Extension For Risc-V, Jonathan W. Skelly

Master's Theses

RISC-V is an open-source instruction-set architecture (ISA) forming the basis of thousands of commercial and experimental microprocessors. The Scalar Cryptography extension ratified in December 2021 added scalar instructions that target common hashing and encryption algorithms, including SHA2 and AES. The next step forward for the RISC-V ISA in the field of cryptography and digital security is the development of vector cryptography instructions.

This thesis examines if it is viable to add vector implementations of existing RISC-V scalar cryptography instructions to the existing vector instruction format, and what improvements they can make to the execution of SHA2 and AES algorithms. Vector …


Accelerating Graphics Rendering On Risc-V Gpus, Joshua Simpson Jun 2022

Accelerating Graphics Rendering On Risc-V Gpus, Joshua Simpson

Master's Theses

Graphics Processing Units (GPUs) are commonly used to accelerate massively parallel workloads across a wide range of applications from machine learning to cryptocurrency mining. The original application for GPUs, however, was to accelerate graphics rendering which remains popular today through video gaming and video rendering. While GPUs began as fixed function hardware with minimal programmability, modern GPUs have adopted a design with many programmable cores and supporting fixed function hardware for rasterization, texture sampling, and render output tasks. This balance enables GPUs to be used for general purpose computing and still remain adept at graphics rendering. Previous work at the …


A Nano-Drone Safety Architecture, Connor J. Sexton Jun 2022

A Nano-Drone Safety Architecture, Connor J. Sexton

Master's Theses

As small-form factor drones grow more intelligent, they increasingly require more sophisticated capabilities to record sensor data and system state, ensuring safe and improved operation. Already regulations for black boxes, electronic data recorders (EDRs), for determining liabilities and improving the safety of large-form factor autonomous vehicles are becoming established. Conventional techniques use hardened memory storage units that conserve all sensor (visual) and system operational state; and N-way redundant models for detecting uncertainty in system operation. For small-form factor drones, which are highly limited by weight, power, and computational resources, these techniques become increasingly prohibitive. In this paper, we propose a …


A Study Of Grammar-Based Fuzzing Approaches, Ziwei Wu Jun 2022

A Study Of Grammar-Based Fuzzing Approaches, Ziwei Wu

Master's Theses

Fuzzing is the process of finding security vulnerabilities in code by creating inputs that will activate the exploits. Grammar-based fuzzing uses a grammar, which represents the syntax of all inputs a target program will accept, allowing the fuzzer to create well-formed complex inputs. This thesis conducts an in-depth study on two blackbox grammar-based fuzzing methods, GLADE and Learn&Fuzz, on their performance and usability to the average user. The blackbox fuzzer Radamsa was also used to compare fuzzing effectiveness. From our results in fuzzing PDF objects, GLADE beats both Radamsa and Learn&Fuzz in terms of coverage and pass rate. XML inputs …


Specialized Named Entity Recognition For Breast Cancer Subtyping, Griffith Scheyer Hawblitzel Jun 2022

Specialized Named Entity Recognition For Breast Cancer Subtyping, Griffith Scheyer Hawblitzel

Master's Theses

The amount of data and analysis being published and archived in the biomedical research community is more than can feasibly be sifted through manually, which limits the information an individual or small group can synthesize and integrate into their own research. This presents an opportunity for using automated methods, including Natural Language Processing (NLP), to extract important information from text on various topics. Named Entity Recognition (NER), is one way to automate knowledge extraction of raw text. NER is defined as the task of identifying named entities from text using labels such as people, dates, locations, diseases, and proteins. There …


Low-Cost Uav Swarm For Real-Time Object Detection Applications, Joel Valdovinos Miranda Jun 2022

Low-Cost Uav Swarm For Real-Time Object Detection Applications, Joel Valdovinos Miranda

Master's Theses

With unmanned aerial vehicles (UAVs), also known as drones, becoming readily available and affordable, applications for these devices have grown immensely. One type of application is the use of drones to fly over large areas and detect desired entities. For example, a swarm of drones could detect marine creatures near the surface of the ocean and provide users the location and type of animal found. However, even with the reduction in cost of drone technology, such applications result costly due to the use of custom hardware with built-in advanced capabilities. Therefore, the focus of this thesis is to compile an …


Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli Jun 2022

Improving Relation Extraction From Unstructured Genealogical Texts Using Fine-Tuned Transformers, Carloangello Parrolivelli

Master's Theses

Though exploring one’s family lineage through genealogical family trees can be insightful to developing one’s identity, this knowledge is typically held behind closed doors by private companies or require expensive technologies, such as DNA testing, to uncover. With the ever-booming explosion of data on the world wide web, many unstructured text documents, both old and new, are being discovered, written, and processed which contain rich genealogical information. With access to this immense amount of data, however, entails a costly process whereby people, typically volunteers, have to read large amounts of text to find relationships between people. This delays having genealogical …


A Research Framework And Initial Study Of Browser Security For The Visually Impaired, Elaine Lau, Zachary Peterson May 2022

A Research Framework And Initial Study Of Browser Security For The Visually Impaired, Elaine Lau, Zachary Peterson

Master's Theses

The growth of web-based malware and phishing attacks has catalyzed significant advances in the research and use of interstitial warning pages and modals by a browser prior to loading the content of a suspect site. These warnings commonly use visual cues to attract users' attention, including specialized iconography, color, and an absence of buttons to communicate the importance of the scenario. While the efficacy of visual techniques has improved safety for sighted users, these techniques are unsuitable for blind and visually impaired users. This is likely not due to a lack of interest or technical capability by browser manufactures, where …


Impact Of Teaching Practices And Communication Climates On Participation In Computer Science Education, Jackie Krone Mar 2022

Impact Of Teaching Practices And Communication Climates On Participation In Computer Science Education, Jackie Krone

Master's Theses

One way to understand teaching is to view it as a people process rather than a presentation of knowledge. It follows that the role of an educator often extends beyond the primary subject matter and into the realm of classroom management. With this in mind, our research aimed to capture the various teaching practices, participation patterns, and communication climates that occur in virtual computer science classrooms. We sought to answer the following research questions related to virtual computer science classrooms at our institution: Who participates in virtual computer science classrooms, and is participation proportional to student demographics? Is there any …