Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

The University of Southern Mississippi

Theses/Dissertations

Discipline
Keyword
Publication Year
Publication

Articles 1 - 28 of 28

Full-Text Articles in Computer Engineering

Characterization And Estimation Of Musculoskeletal Pain Using Machine Learning, Boluwatife Faremi Jul 2023

Characterization And Estimation Of Musculoskeletal Pain Using Machine Learning, Boluwatife Faremi

Master's Theses

Traditional scales utilized for recording pain are known to be highly subjective and biased due to inaccuracies in recollecting actual pain intensities. As a result, machine learning (ML) models that are trained using these scores as ground truth are reported to have low performance for objective pain classification because of the huge disparity between what was felt in moments of pain and the scores recorded afterward.

In the present study, two devices were designed for gathering real-time, continuous in-session subjective pain scores and the recording of the autonomic nervous system (ANS) altered endodermal (EDA) activity. 24 participants were recruited to …


Predicting Suicide Risk Among Youths Using Machine Learning Methods, Saswati Bhattacharjee May 2023

Predicting Suicide Risk Among Youths Using Machine Learning Methods, Saswati Bhattacharjee

Master's Theses

Suicide is the second leading cause of death among youths in the USA. Although machine learning approaches have provided great potential for predicting suicide risk using survey data, prediction accuracy may not meet the need for clinical diagnosis due to the intrinsic characteristics of datasets. In this study, I perform a comparative study of six classification algorithms including naïve Bayes (NB), logistic regression (LR), multilayer perceptron (MLP), AdaBoost (Ada), random forest (RF), and bagging using YRBSS dataset and investigate the effectiveness of several data handling techniques to improve the overall performance of suicide risk prediction.

The dataset consists of 76 …


The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan May 2023

The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan

Honors Theses

Social media use is prevalent and necessary in society—nearly anything can be accomplished with a mobile device or smartphone. Among the US population, two thirds of American adults admit to using social media (Perrin, 2015) and in 2022, Georgiev (2023) found Americans spent an average of two and a half hours daily on social media. Furthermore, social media use is tied to mental well-being, work confidence levels, and feelings of being an imposter (Johnson et al., 2020; Uram & Skalski, 2022; Hernandez & Chalk, 2021; Myers, 2021; Ramm, 2019).

This project examined the role of social media use among college …


Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Application Of Deep Learning For Medical Sciences And Epidemiology Data Analysis And Diagnostic Modeling, Somenath Chakraborty Jul 2022

Application Of Deep Learning For Medical Sciences And Epidemiology Data Analysis And Diagnostic Modeling, Somenath Chakraborty

Dissertations

Machine Learning and Artificial Intelligence have made significant progress concurrent with new advancements in hardware and software technologies. Deep learning methods heavily utilize parallel computing and Graphical Processing Units(GPU). It is already used in many applications ranging from image classification, object detection, segmentation, cyber security problems and others. Deep Learning is emerging as a viable choice in dealing with today’s real-time medical problems. We need new methods and technologies in the field of Medical Science and Epidemiology for detecting and diagnosing emerging threats from new viruses such as COVID-19. The use of Artificial Intelligence in these domains is becoming more …


Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup May 2022

Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup

Honors Theses

Autonomous Vehicles (AV) are a prime example of how innovation and automation are at the forefront of growing technology trends. The concern of parking systems is becoming apparent as research into ways to increase the efficiency and cost-effectiveness of AV continues. To ward against various internet attackers and secure users' sensitive information, an efficient AV parking system must have powerful user privacy and cyber security capabilities. In my work, I present a blockchain-based privacy registration system for AV parking systems that meets the following criteria. The proposed scheme incorporates k-Nearest Neighbor (kNN) - an efficient and lightweight algorithm - for …


Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha May 2022

Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha

Honors Theses

The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


Coordinated Autonomy Of Unmanned Aerial Vehicles (Uavs), Paribartan Dhakal May 2020

Coordinated Autonomy Of Unmanned Aerial Vehicles (Uavs), Paribartan Dhakal

Honors Theses

Unmanned Aerial Vehicles (UAVs) are being extensively used in diverse sectors of the society for various tasks ranging from videography to an extremely sensitive situation such as first responders helping during a disaster. It has been seen that if a fleet of UAVs is deployed, they can perform a task quicker and more efficiently than a single UAV. With an increase in the number of UAVs, a problem arises of handling them with proper control structures. It has been studied that the Behavior Trees (BT) can be a better control architecture to handle the autonomous vehicles, as BTs are more …


Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley Dec 2019

Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley

Master's Theses

This thesis investigates the involuntary signal-based grounding of civilian unmanned aerial systems (UAS) in unauthorized air spaces. The technique proposed here will forcibly land unauthorized UAS in a given area in such a way that the UAS will not be harmed, and the pilot cannot stop the landing. The technique will not involuntarily ground authorized drones which will be determined prior to the landing. Unauthorized airspaces include military bases, university campuses, areas affected by a natural disaster, and stadiums for public events. This thesis proposes an early prototype of a hardware-based signal based involuntary grounding technique to handle the problem …


A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi May 2019

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented …


Autonomous Collision Avoidance In Small Scale Vehicles, Justin T. Sharpe Dec 2018

Autonomous Collision Avoidance In Small Scale Vehicles, Justin T. Sharpe

Honors Theses

The undergraduate research performed in this study focused on autonomous collision avoidance in small scale vehicles. The goal of this study was to find equipment to build a fully autonomous small scale vehicle for use in different applications. Radio frequency communication, ultrasonic sensors, and single board computers were used to create an autonomous vehicle for multiple applications. Different communication protocols and sensors were investigated, and an explanation was specified concerning the hardware choice. The main communication protocol tested was Long Range Wide Area Network, and the main electronics tested and used were ultrasonic sensors, First Person View cameras, and the …


An Empirical Study On The Recovery Speed Of Usb Flash Drives Utilizing Raid-5 Compared To Hdds And Ssds, Joshua Manuel Martins May 2018

An Empirical Study On The Recovery Speed Of Usb Flash Drives Utilizing Raid-5 Compared To Hdds And Ssds, Joshua Manuel Martins

Honors Theses

Since their creation and implementation, storage drives have undergone and continue to undergo drastic changes in speed, size, and reliability. The original storage drives, known as hard disk drives (HDDs), are constructed using moving parts. The second modern type of storage drives, known as solid state drives (SSDs), are constructed using a series of silicon chips that utilize no moving parts. The third and most recent innovation in storage drives, known as USB flash drives (USBs), use only a single silicon chip to provide storage which grants them the smallest form factor of the three drive types.

This study compared …


Multi-Sensory Emotion Recognition With Speech And Facial Expression, Qingmei Yao Aug 2016

Multi-Sensory Emotion Recognition With Speech And Facial Expression, Qingmei Yao

Dissertations

Emotion plays an important role in human beings’ daily lives. Understanding emotions and recognizing how to react to others’ feelings are fundamental to engaging in successful social interactions. Currently, emotion recognition is not only significant in human beings’ daily lives, but also a hot topic in academic research, as new techniques such as emotion recognition from speech context inspires us as to how emotions are related to the content we are uttering.

The demand and importance of emotion recognition have highly increased in many applications in recent years, such as video games, human computer interaction, cognitive computing, and affective computing. …


Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen Dec 2015

Face Recognition With Multi-Stage Matching Algorithms, Xianming Chen

Dissertations

For every face recognition method, the primary goal is to achieve higher recognition accuracy and spend less computational costs. However, as the gallery size increases, especially when one probe image corresponds to only one training image, face recognition becomes more and more challenging. First, a larger gallery size requires more computational costs and memory usage. Meanwhile, that the large gallery sizes degrade the recognition accuracy becomes an even more significant problem to be solved.

A coarse parallel algorithm that equally divides training images and probe images into multiple processors is proposed to deal with the large computational costs and huge …


A Platform For Fast Detection Of Let-7 Micro Rna Using Polyaniline Fluorescence And Image Analysis Techniques, Partha P. Sengupta Dec 2015

A Platform For Fast Detection Of Let-7 Micro Rna Using Polyaniline Fluorescence And Image Analysis Techniques, Partha P. Sengupta

Master's Theses

The project describes a new strategy for transducing hybridization events through modulating intrinsic properties of the electroconductive polymer polyaniline (PANI). When DNA based probes electrostatically interact with PANI, its fluorescence properties are increased, a phenomenon that can be enhanced by UV irradiation. Hybridization of target nucleic acids results in dissociation of probes causing PANI fluorescence to return to basal levels. By monitoring restoration of base PANI fluorescence as little as 10-11 M (10 pM) of target oligonucleotides could be detected within 15 minutes of hybridization. Detection of complementary oligos was specific, with introduction of a single mismatch failing to …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Novel Bioinformatic Approaches For Analyzing Next-Generation Sequencing Data, Yan Peng May 2015

Novel Bioinformatic Approaches For Analyzing Next-Generation Sequencing Data, Yan Peng

Dissertations

In general, DNA reconstruction is deemed as the key of molecular biology since it makes people realize how genotype affects phenotypes. The DNA sequencing technology emerged exactly towards this and has greatly promoted molecular biology’s development. The traditional method, "Sanger," is effective but extremely expensive on a cost-per-base basis. This shortcoming of Sanger method leads to the rapid development of next-generation sequencing technologies. The NGS technologies are widely used by virtue of their low-cost, high-throughput, and fast nature. However, they still face major drawbacks such as huge amounts of data as well as relatively short read length compared with traditional …


Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace Dec 2014

Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace

Dissertations

In today’s global economy, new workforce competencies are needed for success at both individual and societal levels. The new workforce skills extend beyond basic reading, writing, and arithmetic to include higher order processes such as critical thinking and problem solving. Technical job opportunities have grown by approximately 17%, yet the United States continues to decline in science, technology, engineering and mathematics (STEM) disciplines. Further, U.S. students earn average or below average test scores when compared to other developed countries. Researchers cite the need to incorporate the learning of workplace skills into secondary education curriculum, and advocates call for new teaching …


Modeling That Leads To The Prediction Of Photocatalytic Coatings Characterization, Biju Bajracharya Aug 2014

Modeling That Leads To The Prediction Of Photocatalytic Coatings Characterization, Biju Bajracharya

Dissertations

One of the abundant sources of energy on earth is a solar energy which is the clean and safest energy source. It is also known as universal energy, the most important source of renewable energy available today. On realizing that the light source has a crucial role in daily life, several scientists and researchers from centuries ago have studied to establish photo induced systems and utilized them. Long after the knowledge of thermal energy, photovoltaic energy, and photosynthesis in plants, two prominent scientists, Fujishima and Honda, have discovered the electrochemical photolysis of water with the Titanium dioxide electrode which was …


Development And Applications Of The Expanded Equivalent Fluid Method, Bharath Kumar Kandula Aug 2014

Development And Applications Of The Expanded Equivalent Fluid Method, Bharath Kumar Kandula

Dissertations

Ocean acoustics is the study of sound in the oceans. Electromagnetic waves attenuate rapidly in the water medium. Sound is the best means to transmit information underwater. Computational numerical simulations play an important role in ocean acoustics. Simulations of acoustic propagation in the oceans are challenging due to the complexities involved in the ocean environment. Different methods have been developed to simulate underwater sound propagation. The Parabolic-Equation (PE) method is the best choice in several ocean acoustic problems. In shallow water acoustic experiments, sound loses some of its energy when it interacts with the bottom. An equivalent fluid technique was …


Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston May 2014

Reducing Ambiguities In Customer Requirements Through Historical Rule-Based Knowledge In A Small Organization, Silvia Brum Preston

Dissertations

During the elicitation process the requirements for a software application are obtained from the customer. Customers often do not know how to clearly express the requirements of the application to be built, causing requirements to be ambiguous. Many studies have been found to cover different characteristics of the requirements elicitation process including methods for reducing ambiguities in requirements. The methods and findings of these studies were found to be too general when it comes to the specific domain of the requirements and knowledge about the requirements. In addition, some studies did not take into consideration the level of expertise of …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe Dec 2013

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen Dec 2013

New Fault Tolerant Multicast Routing Techniques To Enhance Distributed-Memory Systems Performance, Masoud Esmail Masoud Shaheen

Dissertations

Distributed-memory systems are a key to achieve high performance computing and the most favorable architectures used in advanced research problems. Mesh connected multicomputer are one of the most popular architectures that have been implemented in many distributed-memory systems. These systems must support communication operations efficiently to achieve good performance. The wormhole switching technique has been widely used in design of distributed-memory systems in which the packet is divided into small flits. Also, the multicast communication has been widely used in distributed-memory systems which is one source node sends the same message to several destination nodes. Fault tolerance refers to the …


Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond May 2012

Error Estimation Techniques To Refine Overlapping Aerial Image Mosaic Processes Via Detected Parameters, William Glenn Bond

Dissertations

In this paper, I propose to demonstrate a means of error estimation preprocessing in the assembly of overlapping aerial image mosaics. The mosaic program automatically assembles several hundred aerial images from a data set by aligning them, via image registration using a pattern search method, onto a GIS grid.

The method presented first locates the images from a data set that it predicts will not align well via the mosaic process, then it uses a correlation function, optimized by a modified Hooke and Jeeves algorithm, to provide a more optimal transformation function input to the mosaic program. Using this improved …


Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang Dec 2010

Bemdec: An Adaptive And Robust Methodology For Digital Image Feature Extraction, Isaac Kueth Gang

Dissertations

The intriguing study of feature extraction, and edge detection in particular, has, as a result of the increased use of imagery, drawn even more attention not just from the field of computer science but also from a variety of scientific fields. However, various challenges surrounding the formulation of feature extraction operator, particularly of edges, which is capable of satisfying the necessary properties of low probability of error (i.e., failure of marking true edges), accuracy, and consistent response to a single edge, continue to persist. Moreover, it should be pointed out that most of the work in the area of feature …


Entropy And Certainty In Lossless Data Compression, James Jay Jacobs Dec 2009

Entropy And Certainty In Lossless Data Compression, James Jay Jacobs

Dissertations

Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in information that was proposed by Claude Shannon. Lossless data compression is uniquely tied to entropy theory as the data and the system have a static definition. The static nature of the two requires a mechanism to reduce the entropy without the ability to alter either …


Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li Aug 2009

Inferring Gene Regulatory Networks From Time Series Microarray Data, Peng Li

Dissertations

The innovations and improvements in high-throughput genomic technologies, such as DNA microarray, make it possible for biologists to simultaneously measure dependencies and regulations among genes on a genome-wide scale and provide us genetic information. An important objective of the functional genomics is to understand the controlling mechanism of the expression of these genes and encode the knowledge into gene regulatory network (GRN). To achieve this, computational and statistical algorithms are especially needed.

Inference of GRN is a very challenging task for computational biologists because the degree of freedom of the parameters is redundant. Various computational approaches have been proposed for …