Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Kentucky

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 122

Full-Text Articles in Computer Engineering

Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi Jan 2024

Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi

Theses and Dissertations--Electrical and Computer Engineering

The long-standing technological pillars for computing systems evolution, namely Moore's law and Von Neumann architecture, are breaking down under the pressure of meeting the capacity and energy efficiency demands of computing and communication architectures that are designed to process modern data-centric applications related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In response, both industry and academia have turned to 'more-than-Moore' technologies for realizing hardware architectures for communication and computing. Fortunately, Silicon Photonics (SiPh) has emerged as one highly promising ‘more-than-Moore’ technology. Recent progress has enabled SiPh-based interconnects to outperform traditional electrical interconnects, offering advantages like high bandwidth density, …


Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan Jan 2023

Parallel Real Time Rrt*: An Rrt* Based Path Planning Process, David Yackzan

Theses and Dissertations--Mechanical Engineering

This thesis presents a new parallelized real-time path planning process. This process is an extension of the Real-Time Rapidly Exploring Random Trees* (RT-RRT*) algorithm developed by Naderi et al in 2015 [1]. The RT-RRT* algorithm was demonstrated on a simulated two-dimensional dynamic environment while finding paths to a varying target state. We demonstrate that the original algorithm is incapable of running at a sufficient rate for control of a 7-degree-of-freedom (7-DoF) robotic arm while maintaining a path planning tree in 7 dimensions. This limitation is due to the complexity of maintaining a tree in a high-dimensional space and the network …


A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose Jan 2023

A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose

Theses and Dissertations--Electrical and Computer Engineering

As deep neural network (DNN) models increase significantly in complexity and size, it has become important to increase the computing capability of specialized hardware architectures typically used for DNN processing. The major linear operations of DNNs, which comprise the fully connected and convolution layers, are commonly converted into general matrix-matrix multiplication (GEMM) operations for acceleration. Specialized GEMM accelerators are typically employed to implement these GEMM operations, where a GEMM operation is decomposed into multiple vector-dot-product operations that run in parallel. A common challenge that arises in modern DNNs is the mismatch between the matrices used for GEMM operations and the …


Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina Jan 2023

Deep Learning-Based Intrusion Detection Methods For Computer Networks And Privacy-Preserving Authentication Method For Vehicular Ad Hoc Networks, Ayesha Dina

Theses and Dissertations--Computer Science

The incidence of computer network intrusions has significantly increased over the last decade, partially attributed to a thriving underground cyber-crime economy and the widespread availability of advanced tools for launching such attacks. To counter these attacks, researchers in both academia and industry have turned to machine learning (ML) techniques to develop Intrusion Detection Systems (IDSes) for computer networks. However, many of the datasets use to train ML classifiers for detecting intrusions are not balanced, with some classes having fewer samples than others. This can result in ML classifiers producing suboptimal results. In this dissertation, we address this issue and present …


Application Of Conventional Feedforward And Deep Neural Networks To Power Distribution System State Estimation And State Forecasting, James Paul Carmichael Jan 2023

Application Of Conventional Feedforward And Deep Neural Networks To Power Distribution System State Estimation And State Forecasting, James Paul Carmichael

Theses and Dissertations--Electrical and Computer Engineering

Classical neural networks such as feedforward multilayer perceptron models (MLPs) are well established as universal approximators and as such, show promise in applications such as static state estimation in power transmission systems. This research investigates the application of conventional neural networks (MLPs) and deep learning based models such as convolutional neural networks (CNNs) and long short-term memory networks (LSTMs) to mitigate challenges in power distribution system state estimation and forecasting based upon conventional analytic methods. The ability of MLPs to perform regression to perform power system state estimation will be investigated. MLPs are considered based upon their promise to learn …


Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons Jan 2023

Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons

Theses and Dissertations--Computer Science

The Herculaneum scrolls were buried and carbonized by the eruption of Mount Vesuvius in A.D. 79 and represent the only classical library discovered in situ. Charred by the heat of the eruption, the scrolls are extremely fragile. Since their discovery two centuries ago, some scrolls have been physically opened, leading to some textual recovery but also widespread damage. Many other scrolls remain in rolled form, with unknown contents. More recently, various noninvasive methods have been attempted to reveal the hidden contents of these scrolls using advanced imaging. Unfortunately, their complex internal structure and lack of clear ink contrast has prevented …


A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi Jan 2023

A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi

Theses and Dissertations--Computer Science

Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …


Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade Jan 2023

Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade

Theses and Dissertations--Computer Science

Multi-agent systems are prevalent in the real world in various domains. In many multi-agent systems, interaction among agents is inevitable, and cooperation in some form is needed among agents to deal with the task at hand. We model the type of multi-agent systems where autonomous agents inhabit an environment with no global control or global knowledge, decentralized in the true sense. In particular, we consider game-theoretical problems such as the hedonic coalition formation games, matching problems, and Cournot games. We propose novel decentralized learning and multi-agent reinforcement learning approaches to train agents in learning behaviors and adapting to the environments. …


Machine-Learning-Powered Cyber-Physical Systems, Enrico Casella Jan 2023

Machine-Learning-Powered Cyber-Physical Systems, Enrico Casella

Theses and Dissertations--Computer Science

In the last few years, we witnessed the revolution of the Internet of Things (IoT) paradigm and the consequent growth of Cyber-Physical Systems (CPSs). IoT devices, which include a plethora of smart interconnected sensors, actuators, and microcontrollers, have the ability to sense physical phenomena occurring in an environment and provide copious amounts of heterogeneous data about the functioning of a system. As a consequence, the large amounts of generated data represent an opportunity to adopt artificial intelligence and machine learning techniques that can be used to make informed decisions aimed at the optimization of such systems, thus enabling a variety …


Personalized Point Of Interest Recommendations With Privacy-Preserving Techniques, Longyin Cui Jan 2023

Personalized Point Of Interest Recommendations With Privacy-Preserving Techniques, Longyin Cui

Theses and Dissertations--Computer Science

Location-based services (LBS) have become increasingly popular, with millions of people using mobile devices to access information about nearby points of interest (POIs). Personalized POI recommender systems have been developed to assist users in discovering and navigating these POIs. However, these systems typically require large amounts of user data, including location history and preferences, to provide personalized recommendations.

The collection and use of such data can pose significant privacy concerns. This dissertation proposes a privacy-preserving approach to POI recommendations that address these privacy concerns. The proposed approach uses clustering, tabular generative adversarial networks, and differential privacy to generate synthetic user …


An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman Jan 2022

An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman

Theses and Dissertations--Computer Science

The ever-increasing parallelism in computer systems has made software more prone to concurrency failures, causing problems during both pre- and post-development. Debugging concurrent programs is difficult because of the non-deterministic behavior and the specific sequences of interleaving in the execution flow. Debugging is a technique where programmers reproduce the bug, identify the root cause, and then take necessary steps to remove the bug from the system. The failure information may come from the bug reports of the testing phase or the production runs. In both cases, there should be steps taken to reproduce and localize the failure. However, reproducing and …


Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay Jan 2022

Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay

Theses and Dissertations--Mechanical Engineering

This dissertation presents new results on multi-agent formation control and applies the new control algorithms to quadrotor unmanned air vehicles. First, this dissertation presents a formation control algorithm for double-integrator agents, where the formation is time varying and the agents’ controls satisfy a priori bounds (e.g., the controls accommodate actuator saturation). The main analytic results provide sufficient conditions such that all agents converge to the desired time-varying relative positions with one another and the leader, and have a priori bounded controls (if applicable). We also present results from rotorcraft experiments that demonstrate the algorithm with time-varying formations and bounded controls. …


Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour Jan 2022

Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour

Theses and Dissertations--Electrical and Computer Engineering

Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.

In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …


Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni Jan 2022

Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni

Theses and Dissertations--Computer Science

The rapid development in the automotive industry and wireless communication technologies have enhanced the popularity of Vehicular ad hoc networks (VANETs). Today, the automobile industry is developing sophisticated sensors that can provide a wide range of assistive features, including accident avoidance, automatic lane tracking, semi-autonomous driving, suggested lane changes, and more. VANETs can provide drivers a safer and more comfortable driving experience, as well as many other useful services by leveraging such technological advancements. Even though this networking technology enables smart and autonomous driving, it also introduces a plethora of attack vectors. However, the main issues to be sorted out …


Design, Development And Benchmarking Of Machine Learning Algorithms In Biomedical Applications, Qi Sun Jan 2022

Design, Development And Benchmarking Of Machine Learning Algorithms In Biomedical Applications, Qi Sun

Theses and Dissertations--Computer Science

Machine learning algorithms are becoming the most effective methods for knowledge discovery from high dimensional datasets. Machine learning seeks to construct predictive models through the analysis of large-scale heterogeneous data. While machine learning has been widely used in many domains including computer vision, natural language processing, product recommendation, its application in biomedical science for clinical diagnosis and treatment is only emerging. However, the wealthy amount of data in the biomedical domain offers not only challenges but also opportunities for machine learning. In this dissertation, we focus on three biomedical applications from vastly different domains to understand the opportunities and challenges …


Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi Jan 2022

Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi

Theses and Dissertations--Computer Science

Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …


Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping, Joshua Ashley Jan 2022

Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping, Joshua Ashley

Theses and Dissertations--Electrical and Computer Engineering

The focus of this research is to design a sensor data aggregation system and centralized sensor-driven trajectory planning algorithm for fixed-wing aircraft to optimally assist atmospheric simulators in mapping the local environment in real-time. The proposed application of this work is to be used in the event of a hazardous contaminant leak into the atmosphere as a fleet of sensing unmanned aerial vehicles (UAVs) could provide valuable information for evacuation measures. The data aggregation system was designed using a state-of-the-art networking protocol and radio with DigiMesh and a process/data management system in the ROS2 DDS. This system was tested to …


Data Management System For A Semiautonomous Shuttle Car For Underground Room And Pillar Coal Mines, Vasilis Androulakis, Steven Schafrik, Joseph Sottile, Zacharias Agioutantis Aug 2021

Data Management System For A Semiautonomous Shuttle Car For Underground Room And Pillar Coal Mines, Vasilis Androulakis, Steven Schafrik, Joseph Sottile, Zacharias Agioutantis

Mining Engineering Faculty Publications

In recent years, autonomous solutions in the multidisciplinary field of mining engineering have been an extremely popular applied research topic. This is a result of the increasing demands of society on mineral resources along with the accelerating exploitation of the currently economically viable resources, which lead the mining sector to turn to deeper, more-difficult-to-mine orebodies. An appropriate data management system comprises a crucial aspect of the designing and the engineering of a system that involves autonomous or semiautonomous vehicles. The vast volume of data collected from onboard sensors, as well as from a potential IoT network dispersed around a smart …


On The Impact Of Gravity Compensation On Reinforcement Learning In Goal-Reaching Tasks For Robotic Manipulators, Jonathan Fugal, Hasan A. Poonawala, Jihye Bae Mar 2021

On The Impact Of Gravity Compensation On Reinforcement Learning In Goal-Reaching Tasks For Robotic Manipulators, Jonathan Fugal, Hasan A. Poonawala, Jihye Bae

Electrical and Computer Engineering Faculty Publications

Advances in machine learning technologies in recent years have facilitated developments in autonomous robotic systems. Designing these autonomous systems typically requires manually specified models of the robotic system and world when using classical control-based strategies, or time consuming and computationally expensive data-driven training when using learning-based strategies. Combination of classical control and learning-based strategies may mitigate both requirements. However, the performance of the combined control system is not obvious given that there are two separate controllers. This paper focuses on one such combination, which uses gravity-compensation together with reinforcement learning (RL). We present a study of the effects of gravity …


Routing And Applications Of Vehicular Named Data Networking, Bassma G. Aldahlan Jan 2021

Routing And Applications Of Vehicular Named Data Networking, Bassma G. Aldahlan

Theses and Dissertations--Computer Science

Vehicular Ad hoc NETwork (VANET) allows vehicles to exchange important informationamong themselves and has become a critical component for enabling smart transportation.In VANET, vehicles are more interested in content itself than from which vehicle the contentis originated. Named Data Networking (NDN) is an Internet architecture that concentrateson what the content is rather than where the content is located. We adopt NDN as theunderlying communication paradigm for VANET because it can better address a plethora ofproblems in VANET, such as frequent disconnections and fast mobility of vehicles. However,vehicular named data networking faces the problem of how to efficiently route interestpackets and …


Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado Jan 2021

Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado

Theses and Dissertations--Electrical and Computer Engineering

The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Although cyber-physical systems can offer numerous advantages to society, their large scale adoption does not come without risks. Internet of Things (IoT) devices can be considered a significant component within cyber-physical systems. They can provide network communication in addition to controlling the various sensors and actuators that exist within the larger cyber-physical system. The adoption of IoT features can also provide attackers with new potential avenues to access and exploit a system's vulnerabilities. Previously, existing systems could more or less be considered a closed system …


Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang Jan 2021

Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang

Theses and Dissertations--Electrical and Computer Engineering

Over the past two decades, Dynamic Random-Access Memory (DRAM) has emerged as the dominant technology for implementing the main memory subsystems of all types of computing systems. However, inferring from several recent trends, computer architects in both the industry and academia have widely accepted that the density (memory capacity per chip area) and latency of DRAM based main memory subsystems cannot sufficiently scale in the future to meet the requirements of future data-centric workloads related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In fact, the achievable density and access latency in main memory subsystems presents a very fundamental …


Designing Novel Hardware Security Primitives For Smart Computing Devices, Amitkumar Degada Jan 2021

Designing Novel Hardware Security Primitives For Smart Computing Devices, Amitkumar Degada

Theses and Dissertations--Electrical and Computer Engineering

Smart computing devices are miniaturized electronics devices that can sense their surroundings, communicate, and share information autonomously with other devices to work cohesively. Smart devices have played a major role in improving quality of the life and boosting the global economy. They are ubiquitously present, smart home, smart city, smart girds, industry, healthcare, controlling the hazardous environment, and military, etc. However, we have witnessed an exponential rise in potential threat vectors and physical attacks in recent years. The conventional software-based security approaches are not suitable in the smart computing device, therefore, hardware-enabled security solutions have emerged as an attractive choice. …


Scalable Approaches For Auditing The Completeness Of Biomedical Ontologies, Fengbo Zheng Jan 2021

Scalable Approaches For Auditing The Completeness Of Biomedical Ontologies, Fengbo Zheng

Theses and Dissertations--Computer Science

An ontology provides a formalized representation of knowledge within a domain. In biomedicine, ontologies have been widely used in modern biomedical applications to enable semantic interoperability and facilitate data exchange. Given the important roles that biomedical ontologies play, quality issues such as incompleteness, if not addressed, can affect the quality of downstream ontology-driven applications. However, biomedical ontologies often have large sizes and complex structures. Thus, it is infeasible to uncover potential quality issues through manual effort. In this dissertation, we introduce automated and scalable approaches for auditing the completeness of biomedical ontologies. We mainly focus on two incompleteness issues -- …


Toward Intelligent Welding By Building Its Digital Twin, Qiyue Wang Jan 2021

Toward Intelligent Welding By Building Its Digital Twin, Qiyue Wang

Theses and Dissertations--Electrical and Computer Engineering

To meet the increasing requirements for production on individualization, efficiency and quality, traditional manufacturing processes are evolving to smart manufacturing with the support from the information technology advancements including cyber-physical systems (CPS), Internet of Things (IoT), big industrial data, and artificial intelligence (AI). The pre-requirement for integrating with these advanced information technologies is to digitalize manufacturing processes such that they can be analyzed, controlled, and interacted with other digitalized components. Digital twin is developed as a general framework to do that by building the digital replicas for the physical entities. This work takes welding manufacturing as the case study to …


Development Of An Autonomous Navigation System For The Shuttle Car In Underground Room & Pillar Coal Mines, Vasileios Androulakis Jan 2021

Development Of An Autonomous Navigation System For The Shuttle Car In Underground Room & Pillar Coal Mines, Vasileios Androulakis

Theses and Dissertations--Mining Engineering

In recent years, autonomous solutions in the multi-disciplinary field of the mining engineering have been an extremely popular applied research topic. The growing demand for mineral supplies combined with the steady decline in the available surface reserves has driven the mining industry to mine deeper underground deposits. These deposits are difficult to access, and the environment may be hazardous to mine personnel (e.g., increased heat, difficult ventilation conditions, etc.). Moreover, current mining methods expose the miners to numerous occupational hazards such as working in the proximity of heavy mining equipment, possible roof falls, as well as noise and dust. As …


Leveraging Chemical And Computational Biology To Probe The Cellulose Synthase Complex, B. Kirtley Amos Jan 2021

Leveraging Chemical And Computational Biology To Probe The Cellulose Synthase Complex, B. Kirtley Amos

Theses and Dissertations--Plant and Soil Sciences

Cellular expansion in plants is a complex process driven by the constraint of internal cellular turgor pressure by an expansible cell wall. The main structural element of the cell wall is cellulose. Cellulose is vital to plant fitness and the protein complex that creates it is an excellent target for small molecule inhibition to create herbicides. In the following thesis many small molecules (SMs) from a diverse library were screened in search of new cellulose biosynthesis inhibitors (CBI). Loss of cellular expansion was the primary phenotype used to search for putative CBIs. As such, this was approached in a forward …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud

Information Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …


Design And Analysis Of A Pavement Marker Detection System, Timothy L. Johnson Ii Jan 2020

Design And Analysis Of A Pavement Marker Detection System, Timothy L. Johnson Ii

Theses and Dissertations--Civil Engineering

Personal injuries and property damage due to the failure of snow-plowable pavement markers which detach from pavement surfaces has led to the development of new all-plastic pavement markers which are located entirely below the planar surface of the pavement. The new all-plastic design pushes existing solutions used to avoid striping over highway reflectors into obsolescence since current solutions operate using electromagnets to sense the metal housings of snow-plowable pavement markers. A replacement solution is currently sought by the highway maintenance industry and three different marker detection methods were developed and tested on real-world highways with both new and aging pavement …