Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 61

Full-Text Articles in Computer Engineering

Ai-Powered Information Retrieval In Meeting Records And Transcripts Enhancing Efficiency And User Experience, Srushti Nitin Ghadge May 2024

Ai-Powered Information Retrieval In Meeting Records And Transcripts Enhancing Efficiency And User Experience, Srushti Nitin Ghadge

Theses and Dissertations

This study compares the traditional search methods, which is to search from video recordings of the meetings by moving the slider back and forth or by keyword search in transcripts versus integrated AI video plus transcript search. Based on the previous test results, we introduced some human-centric design features to the AI and built a new enhanced AI search tool for information retrieval. For search technique efficiency testing, the method had two set of experiments. The first results of the experiment showed that AI-based search algorithms were more accurate and faster than conventional search approaches. Participants were also happier with …


Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Cross-Platform Development Of Wake-Up-Word, Christopher Ryan Woodle May 2023

Cross-Platform Development Of Wake-Up-Word, Christopher Ryan Woodle

Theses and Dissertations

The goal of this project will be to explore cross-platform implementation of Wake-Up- Word (WUW). To enable the development of future speech-based artificial intelligence applications, it is important to have robust and accessible implementations of WUW. Adoption of Unix based operating systems continues to expand for server, backend, and embedded applications, therefore a WUW implementation in Unix will become essential. As web technologies continue to grow, WUW will also need to be implemented in web, using technologies such as JavaScript and Web Assembly (WASM). This project encompasses porting the previous implementation of WUW from Microsoft Windows to Unix, building a …


Towards Orchestration In The Cloud-Fog Continuum, Xavier Jesus Merino Aguilera Dec 2022

Towards Orchestration In The Cloud-Fog Continuum, Xavier Jesus Merino Aguilera

Theses and Dissertations

The proliferation of the Internet-of-Things has raised demand for computing, storage, and network resources. The cloud model is ill-equipped to handle the volume and variety of data travelling to and from the cloud’s core as more data is generated and consumed at the network’s edge. Some applications necessitate low-latency connectivity and geographical awareness, highlighting the cloud’s centralization shortcomings. By localizing resources, minimizing bandwidth utilization, and lowering latency, the fog and edge layers are proposed to circumvent these limitations. At these layers, resource orchestration is crucial because poor resource management has an impact on service delivery. The aim of this study …


Modeling, Verification, And Simulation Of A Uav Swarm Consensus Protocol, Rohit Martin Menghani Dec 2022

Modeling, Verification, And Simulation Of A Uav Swarm Consensus Protocol, Rohit Martin Menghani

Theses and Dissertations

Unmanned Aerial Vehicles (UAVs), particularly electrically powered multi-rotors, are becoming increasingly popular in the entertainment, transportation, logistics, and military sectors. One of the main drawbacks presented by these vehicles at the time of writing is the limited range achieved as a consequence of the limits of battery technology. One common method used to overcome such limitations, is the use of multiple vehicles in cooperation to achieve a certain goal. This application of UAVs is called swarming, where multiple agents can coordinate their actions to fly in a certain formation, to access a certain challenging area, or to fly further. As …


Preserving Users’ Privacy In Iot Systems Through Network-Based Access Control, Ahmed Khalid A Alhazmi Jul 2022

Preserving Users’ Privacy In Iot Systems Through Network-Based Access Control, Ahmed Khalid A Alhazmi

Theses and Dissertations

Privacy issues have plagued the rapid proliferation of the Internet of Things (IoT) devices. Resource-constrained IoT devices often obscure transparency for end-users. A lack of transparency and control complicates user trust in IoT. Additionally, a growing history of misuse and abuse exists in IoT. Notably, a smart TV has periodically scanned and collected users’ private information without consent, while power companies have adjusted the temperature of smart thermostats during heat waves. Due to a hybrid of distributed ecosystems within IoT, users cannot easily implement traditional access control over their devices as data flows within different nodes for storage and processing. …


Efficient And Scalable Algorithms For Estimating Structural Properties Of Large Graphs, Shiju Li May 2022

Efficient And Scalable Algorithms For Estimating Structural Properties Of Large Graphs, Shiju Li

Theses and Dissertations

Large complex networks and graphs are everywhere. Examples include social networks, web graphs, communication networks, power grids, and transportation networks. The ongoing rapid expansion of such networks has triggered a tremendous amount of attention in various disciplines. Estimating the structural and topological properties of the large complex networks has been at the heart of the understanding of the networks. However, such estimations often become technically challenging. This dissertation is focused on how to estimate three non-trivial structural quantities on large networks efficiently and scalably by transcending the current state-of-the-art algorithms. The structural quantities to estimate are (1) a function of …


Detecting Cybersecurity And Behavioral Anomalies In Smart Grid Substation, Anfal Yahya Hathah May 2022

Detecting Cybersecurity And Behavioral Anomalies In Smart Grid Substation, Anfal Yahya Hathah

Theses and Dissertations

Due to the increasing number of cyberattacks on smart grid networks globally in the last decade, maintaining a stable electric power supply has become increasingly challenging. The shift from traditional means of measurement instrumentation to smarter devices in electrical substations is experiencing increasing incidents of intrusion. Defense against those intrusions is now a global trending research topic and is attracting governments’ attention. Various techniques have been developed to mitigate the effect of cyberattacks on national power grid systems. The state estimation technique has proven its capability in detecting random false data-injection attacks (FDIAs). However, attackers may have considerable knowledge of …


Flow Choice Architecture: Cognitive Augmentation Of Knowledge Workers, Troy Ricardo Weekes Dec 2021

Flow Choice Architecture: Cognitive Augmentation Of Knowledge Workers, Troy Ricardo Weekes

Theses and Dissertations

The Flow Choice Architecture (FCA) is a biofeedback-based behavior modification tool that was designed for operation by human knowledge workers (KWs) before, during, and after the performance of work tasks. FCA utilizes human-aware artificial intelligence (AI) that senses patterns in its operator’s bio-signals to derive their cognitive and affective states. The states are contextualized using relevant information about the operator, task, and work timeline. The contextualized operator states are then used to recommend effective nudges that orient the human KW towards the flow state. This dissertation outlines the state-of-the-art on flow, neurofeedback, and AI then explains how FCA was designed, …


Forecasting Sep Events Based On Merged Cme Catalogs Using Machine Learning, Peter William Tarsoly Dec 2021

Forecasting Sep Events Based On Merged Cme Catalogs Using Machine Learning, Peter William Tarsoly

Theses and Dissertations

The lack of preparation for a Solar Energetic Particle (SEP) event may be catastrophic for astronauts and aircraft passengers alike, along with their electronic equipment. It is widely theorized that SEP events are caused by Coronal Mass Ejections (CMEs), some occurring up to a full day beforehand, accompanied by additional space weather conditions. The only significant models for SEP forecasting are statistically or machine learning-based, often developed on imprecise data. We present an enhanced catalog of CMEs, along with other space weather phenomena, and their relationship with the occurrence of SEP events. Using the enhanced CME catalog, we combine machine …


Smart Glasses Assisting Visually-Impaired People, Ali Delham Algarni Dec 2021

Smart Glasses Assisting Visually-Impaired People, Ali Delham Algarni

Theses and Dissertations

Smart Glasses Assisting Visually-Impaired artificial intelligence system providing speech recognition, object recognition, face recognition, and distance to all features for visually impaired people's enhanced (daily) autonomy. Smart Glasses Assisting Visually-Impaired People is a new integrative process that combines as such, the invention is both a further use of the technologies supporting the features listed above and an improvement to the overall activities carried out by visually impaired people in their daily lives activities such as: providing vocal commands, being able to read text, being able to receive spoken information about various objects in their surroundings, being aware of their location …


Framework For Reasoning With Speech Processing, Ahmed Laarfi Dec 2020

Framework For Reasoning With Speech Processing, Ahmed Laarfi

Theses and Dissertations

It is known that programming languages are textual. We try here to take the advantages of Speech Recognition (SR) and employ them in creating a verbal Language, which takes its instruction from the voice. Because this work is a novel approach in the programming world, we could not find any resources. This dissertation aims to make essential developments in Speech Recognition (SR)and Artificial Intelligence by constructing a new compiler that receives commands verbally and executes them. That means entering data into the Computer by voice commands. This method of input means that we link several major computer topics with several …


Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari Dec 2020

Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari

Theses and Dissertations

Arabic texts suffer from missing diacritics (short vowels) which become obstacles for new learners. Speech Recognition is the translation of words spoken to text through intelligent computer programs. As of today, it has been integrated into many computer systems. Arabic Speech Recognition has made progress over the years, but it is still not as good as English speech recognition due to the problem of short vowels not being recognized. This is mainly because the Arabic language is unlike the English language in the nature because it is a Semitic language. This is reflected in different characteristics such as grammar, morphology, …


Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih Dec 2020

Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih

Theses and Dissertations

Today’s market with a vast number of Cloud-computing providers creates a challenge for practical cooperation between the various provider cloud service platforms. Not only does Cloud interoperability provide this needed cooperation, but it also avoids vendor lock-in and, additionally, saves time and cost. Although there is no established definition for Cloud interoperability, most researchers agree on the purposes of Cloud interoperability. Research and literature have attempted to explain interoperability as transferring data, moving workloads, and migrating virtual machines between Cloud platforms. Transferring data between Clouds refers to objects migrating between provider-specific domains. In comparison, data migration is the most commonly …


Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott Dec 2020

Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott

Theses and Dissertations

With the growth of the Internet of Things and the rise of Big Data, data processing and machine learning applications are being moved to cheap and low size, weight, and power (SWaP) devices at the edge, often in the form of mobile phones, embedded systems, or microcontrollers. The field of Cyber-Physical Measurements and Signature Intelligence (MASINT) makes use of these devices to analyze and exploit data in ways not otherwise possible, which results in increased data quality, increased security, and decreased bandwidth. However, methods to train and deploy models at the edge are limited, and models with sufficient accuracy are …


Correlation Between Air Quality Index And Traffic Volume Using Internet Of Things (Iot), Omar Sayah Alruwaili Dec 2020

Correlation Between Air Quality Index And Traffic Volume Using Internet Of Things (Iot), Omar Sayah Alruwaili

Theses and Dissertations

In highly populated world areas, such as metropolises, hazardous air pollution has been linked to the presence of damaging climate and health issues, which are becoming increasingly common. Indeed, a major problem facing urban areas today is air pollution. Gas emissions from vehicles can be seen as the most important source of this kind of pollution. Pollutant gases emitted as parts of car exhaust consist of chemicals such as carbon monoxide (CO), nitrogen dioxide (NO2), and sulphur dioxide (SO2), and ozone (O3), as well as particulate matter (PM). In some places in the world, non-governmental and foreign corporations have also …


Performance Analysis Of V2v And V2i Communications Using Empirical Path Loss Models Indicators And Embedded Iot Devices, Ibrahim Lateef Oraibi Al Kinoon Aug 2020

Performance Analysis Of V2v And V2i Communications Using Empirical Path Loss Models Indicators And Embedded Iot Devices, Ibrahim Lateef Oraibi Al Kinoon

Theses and Dissertations

Vehicle management technologies deals with the management of critical vehicle information, including location, idle time, speed, and mileage. Such information can always be transferred through a direct vehicle-to-vehicle communication among cars. However, the limitation of this type of design is that it is based on the assumption that vehicles are always served by cellular bases, which is not always the case. For the effective implementation of the Internet-of-Things (IoT) technology in this sector, it is critical to design vehicles with systems that enable them to transmit essential information in the absence of base stations. IoT technologies can then be used …


One Dimensional Neural Time Series Generation, Kaleb Earl Smith Aug 2020

One Dimensional Neural Time Series Generation, Kaleb Earl Smith

Theses and Dissertations

Time dependent data is a main source of information in today’s data driven world.Generating this type of data though has shown its challenges and made it an interesting research area in the field of generative machine learning. The challenge with this one-dimensional (1D) data has been for applications in machine learning to gain access to a considerable amount of quality data needed for algorithm development and analysis. Modeling synthetic data using a Generative Adversarial Network (GAN) has been at the heart of providing a viable solution. Our work focuses on one dimensional times series and explores the “few shot” generation …


Revisiting Elliptic Curve Cryptography With Applications To Post-Quantum Sidh Ciphers, Wesam Nabil Eid May 2020

Revisiting Elliptic Curve Cryptography With Applications To Post-Quantum Sidh Ciphers, Wesam Nabil Eid

Theses and Dissertations

Elliptic Curve Cryptography (ECC) has positioned itself as one of the most promising candidates for various applications since its introduction by Miller and Kolbitz in 1985 [53, 44]. The core operation for ECC is the scalar multiplication [k]P where many efforts have addressed its computation speed. Here we introduce an efficient approach for calculating elliptic curve operations by a novel regrouping of terms and creating new projective representation operators and increasing parallelism. These operators and the corresponding projective coordinate representations are shown to lead to adjusted versions of scalar multiplication algorithms that are evaluated. These techniques enable more opportunities for …


On The Characterization Of Natural Language Structure And Literary Stylometry - A Network Science Approach, Younis Anas Younis Al Rozz May 2020

On The Characterization Of Natural Language Structure And Literary Stylometry - A Network Science Approach, Younis Anas Younis Al Rozz

Theses and Dissertations

Natural language processing (NLP) techniques have been through many advancements in recent years, linguistics and scientist utilized these techniques to solve many challenges related to written language and literary. Problems such as finding the genetic relationships among languages, attributing author of a text and categorizing text by genre have been treated throughout the years using conventional statistical methods, for instance, bag of words (BoW), N-gram, the frequency of words and the lexical distance between words. By considering written language as a complex system, network science tools and techniques can be used to address those problems. A unified methodology is proposed …


Geolocation Based On Signal Level Measurement And Time Advance Inside The Network, Zaenab Shakir May 2020

Geolocation Based On Signal Level Measurement And Time Advance Inside The Network, Zaenab Shakir

Theses and Dissertations

The increasing demands for location-based services in recent years led to provide accurate location information inside the network. The applications for location-based service are assisting emergency request, fraud defense, social media, and marketing. All these demands make the position accuracy highly required. Various techniques and methods have been developed to estimate the position of mobile device inside the network such as RSS, TOA, AOA, and TDOA. In this work, a new method to estimate the accuracy of locating active LTE cellular subscribers. The proposed method is a network-based technique and relies on the Reference Signal Received Power (RSRP) measurements and …


Model Optimization For Edge Devices, Adolf Anthony D’Costa May 2020

Model Optimization For Edge Devices, Adolf Anthony D’Costa

Theses and Dissertations

Edge devices are undergoing groundbreaking computing transformation, which lets us tap into artificial intelligence, quantum computing, 5th generation network capability, fog networking, and computing complex algorithms. Edge systems have substantial advantages over the conventional system in terms of scalability, optimized resources, reliability, and security. The proliferation of such resource-constrained devices in recent years has resulted in the generation of a large quantity of data; these data-producing devices are attractive targets for applications of machine learning. Machine learning models, especially deep learning neural networks, produced models that have high accuracy and prediction capability, but it comes at the cost of computation …


Improving Wake-Up-Word And General Speech Recognition Systems, Gamal Mohamed Bohouta May 2020

Improving Wake-Up-Word And General Speech Recognition Systems, Gamal Mohamed Bohouta

Theses and Dissertations

Automatic Speech Recognition (ASR), a technology that allows a machine to recognize the utterances spoken into a microphone by a person and then converts it to text, is commonly used for different types of applications, such as command and control systems, personal assistant systems, medical systems, disabilities systems, dictation systems, telephony systems, and embedded applications. Due to its extensive use, interest in ASR technology has surged among inventors and researchers alike. They have worked diligently to improve the performance of the ASR systems by developing several techniques or approaches in different aspects,such as enhancing features, training an acoustic model, enhancing …


Home Automation System By Voice Commands, Noor Kamil Abdalhameed Dec 2019

Home Automation System By Voice Commands, Noor Kamil Abdalhameed

Theses and Dissertations

The Home Automation System is one of the most important technologies that are used by humans for controlling electrical devices to reduce manual efforts in their daily tasks. The home automation system by voice has the ability to understand thousands of voice commands and perform the required action to control various electrical devices. The voice recognition is a bit complex and challenging task since each person has his accent. Therefore, Bitvoicer Server used in the home automation system in this thesis since it supports 17 languages from 26 countries and regions, and has the ability to recognize an unlimited number …


Socialization Of Veterans Using Virtual Reality, Joan M. Savage Dec 2019

Socialization Of Veterans Using Virtual Reality, Joan M. Savage

Theses and Dissertations

Virtual reality, augmented reality, mixed reality, and video games are growing in popularity and fulfilling genuine human needs that the real world is currently unable to satisfy. Games are providing rewards that reality is not. They are teaching and inspiring and engaging us in ways that reality is not (McGonigal, 2011). The purpose of this study was to capture the essence of socialization in virtual reality as a Ph.D. dissertation topic at Florida Institute of Technology - Human-Centered Design. This study used a phenomenology methodology to capture the experiences of beneficial features of players who use virtual reality. The study …


Mitigating Pilot Contamination Through Optimizing Pilot Allocation In Massive Mimo Systems, Rand Abdul Hussain Dec 2019

Mitigating Pilot Contamination Through Optimizing Pilot Allocation In Massive Mimo Systems, Rand Abdul Hussain

Theses and Dissertations

This dissertation has proposed several algorithms to optimize the allocation of pilots to the users’ equipment (UEs) to mitigate the effect of the pilot contamination problem in the massive MIMO systems. Pilot contamination reduces the performance of massive MIMO systems due to the reduction in the quality of the estimated channel between a UE and the serving base station (BS). The limitation of the number of samples in a coherence block limits the number of unique mutually orthogonal pilots, and hence, reusing the set of pilots across the cells causes inter-cell interference during pilot transmission, which is called pilot contamination. …


Machine Learning In The State Design Pattern, Timothy Matthew Von Friesen Dec 2019

Machine Learning In The State Design Pattern, Timothy Matthew Von Friesen

Theses and Dissertations

As the Internet of Things revolution continues to become more prevalent in humanity's daily routine, securing these devices is paramount. Society has seen a substantial increase in activity in the cyber-warfare battle space, resulting in an increasing amount of security breaches every year. The responsibility of securing our devices can no longer rely solely on cyber-security engineers keeping systems hardened through Security Technical Implementation Guides and vulnerability scans; it must shift towards the developer. Previous research has been done in this area of securing our devices. However, these solutions rely heavily on cloud computing resources to perform computationally expensive algorithms. …


Survival Theory Modelling For Information Diffusion, Akshay Aravamudan Jul 2019

Survival Theory Modelling For Information Diffusion, Akshay Aravamudan

Theses and Dissertations

Information diffusion is the spread of information within a network. In this thesis, we model information diffusion as a survival process. We have adopted an existing algorithm called NetRate for modelling information diffusion. This model involves finding the distribution of trasmission time between two nodes in the network. We modify NetRate’s concave-down log-likelihood expression by adding partial parentage information and formulate an Expectation-Minimization (EM) algorithm to learn the parameters. We also describe a simulation scheme for NetRate inspired by point process simulation strategies. Using the assumptions of the NetRate model, we derive a a method to model popularity as a …


Drone Path Scheduling For Data Gathering In Disaster Effected Environments, James Bologna May 2019

Drone Path Scheduling For Data Gathering In Disaster Effected Environments, James Bologna

Theses and Dissertations

Creative networks in a disaster effected area have been a concern for a long time. With the innovation of flying ad hoc networks the problem can be tackled from a more practical standpoint. The use of low altitude drones equipped with wireless transmission and receiving capability can be used under the circumstances to enable ad-hoc communication. Drone coordination and route planning is a critical consideration when determining how to gather data from ground nodes, since the drones are constrained by limited battery capacity. In this research, we set out to explore a wide range of policies for determining the trajectories …