Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic Theses and Dissertations

2018

Discipline
Institution
Keyword

Articles 1 - 30 of 38

Full-Text Articles in Computer Engineering

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage Dec 2018

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage

Electronic Theses and Dissertations

The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in …


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan Aug 2018

Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan

Electronic Theses and Dissertations

Free-Space-Optical (FSO) communication has the potential to play a significant role in future generation wireless networks. It is advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. FSO communication can provide optical-level wireless communication speeds and can also help solve the wireless capacity problem experienced by the traditional RF-based technologies. Despite these advantages, communications using FSO transceivers require establishment and maintenance of line-of-sight (LOS). We consider autonomous mobile nodes (Unmanned Ground Vehicles or Unmanned Aerial Vehicles), each with one FSO transceiver mounted on a movable head capable of scanning in …


Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu Aug 2018

Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu

Electronic Theses and Dissertations

Crowdsourcing is proposed as a powerful mechanism for accomplishing large scale tasks via anonymous workers online. It has been demonstrated as an effective and important approach for collecting labeled data in application domains which require human intelligence, such as image labeling, video annotation, natural language processing, etc. Despite the promises, one big challenge still exists in crowdsourcing systems: the difficulty of controlling the quality of crowds. The workers usually have diverse education levels, personal preferences, and motivations, leading to unknown work performance while completing a crowdsourced task. Among them, some are reliable, and some might provide noisy feedback. It is …


How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He May 2018

How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He

Electronic Theses and Dissertations

In this thesis, we explore the speed, power, and energy performance of the same data process on the central processing unit (CPU) with and without the acceleration of the Graphics Processing Unit (GPU) on the microcomputer Raspberry Pi (RPI). We tested on the RPI in two different fields. The first was comparing the speed, power, and energy usage with and without GPU acceleration in the image processing impacts on RPI model B+. The second was comparing speed, power, energy usage, and accuracy for scientific calculation with and without GPU acceleration on RPI model B+ and 3B.

We used a novel …


Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum May 2018

Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum

Electronic Theses and Dissertations

This thesis presents an applied horse racing prediction using graph based features on a set of horse races data. We used artificial neural network and logistic regression models to train then test to prediction without graph based features and with graph based features. This thesis can be explained in 4 main parts. Collect data from a horse racing website held from 2015 to 2017. Train data to using predictive models and make a prediction. Create a global directed graph of horses and extract graph-based features (Core Part) . Add graph based features to basic features and train to using same …


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman May 2018

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The …


End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane May 2018

End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane

Electronic Theses and Dissertations

Over the past two decades, a circular form of RNA (circular RNA) produced from splicing mechanism has become the focus of scientific studies due to its major role as a microRNA (miR) ac tivity modulator and its association with various diseases including cancer. Therefore, the detection of circular RNAs is a vital operation for continued comprehension of their biogenesis and purpose. Prediction of circular RNA can be achieved by first distinguishing non-coding RNAs from protein coding gene transcripts, separating short and long non-coding RNAs (lncRNAs), and finally pre dicting circular RNAs from other lncRNAs. However, available tools to distinguish circular …


Robust Fuzzy Clustering For Multiple Instance Regression., Mohamed Trabelsi May 2018

Robust Fuzzy Clustering For Multiple Instance Regression., Mohamed Trabelsi

Electronic Theses and Dissertations

Multiple instance regression (MIR) operates on a collection of bags, where each bag contains multiple instances sharing an identical real-valued label. Only few instances, called primary instances, contribute to the bag labels. The remaining instances are noise and outliers observations. The goal in MIR is to identify the primary instances within each bag and learn a regression model that can predict the label of a previously unseen bag. In this thesis, we introduce an algorithm that uses robust fuzzy clustering with an appropriate distance to learn multiple linear models from a noisy feature space simultaneously. We show that fuzzy memberships …


Network Science Algorithms For Mobile Networks., Heba Mohamed Elgazzar May 2018

Network Science Algorithms For Mobile Networks., Heba Mohamed Elgazzar

Electronic Theses and Dissertations

Network Science is one of the important and emerging fields in computer science and engineering that focuses on the study and analysis of different types of networks. The goal of this dissertation is to design and develop network science algorithms that can be used to study and analyze mobile networks. This can provide essential information and knowledge that can help mobile networks service providers to enhance the quality of the mobile services. We focus in this dissertation on the design and analysis of different network science techniques that can be used to analyze the dynamics of mobile networks. These techniques …


Machine Learning For Omics Data Analysis., Ameni Trabelsi May 2018

Machine Learning For Omics Data Analysis., Ameni Trabelsi

Electronic Theses and Dissertations

In proteomics and metabolomics, to quantify the changes of abundance levels of biomolecules in a biological system, multiple sample analysis steps are involved. The steps include mass spectrum deconvolution and peak list alignment. Each analysis step introduces a certain degree of technical variation in the abundance levels (i.e. peak areas) of those molecules. Some analysis steps introduce technical variations that affect the peak areas of all molecules equally while others affect the peak areas of a subset of molecules with varying degrees. To correct these technical variations, some existing normalization methods simply scale the peak areas of all molecules detected …


A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik May 2018

A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik

Electronic Theses and Dissertations

In this thesis, we propose a framework to detect and retrieve CPR activity scenes from medical simulation videos. Medical simulation is a modern training method for medical students, where an emergency patient condition is simulated on human-like mannequins and the students act upon. These simulation sessions are recorded by the physician, for later debriefing. With the increasing number of simulation videos, automatic detection and retrieval of specific scenes became necessary. The proposed framework for CPR scene retrieval, would eliminate the conventional approach of using shot detection and frame segmentation techniques. Firstly, our work explores the application of Histogram of Oriented …


Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao Apr 2018

Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao

Electronic Theses and Dissertations

Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.

In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project is …


Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra Jan 2018

Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra

Electronic Theses and Dissertations

The research involved optimizing the space and bounding the output time by the output size in categorical range reporting of points within the given rectangle query Q in two dimension using wavelet trees and range counting. The time taken to report those points and space to tore n points in set S can be done using wavelet tree and range counting. Consider set S consisting of n points in two-dimension. An orthogonal range reporting query rectangle Q = [a,b] x [c,d] on set S is sent to report the set of points in S which interacts with the query rectangle[Q]. …


Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang Jan 2018

Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang

Electronic Theses and Dissertations

Today Big Data computer platforms employ resource management systems such as Yarn, Torque, Mesos, and Google Borg to enable sharing the physical computing among many users or applications. Given virtualization and resource management systems, users are able to launch their applications on the same node with low mutual interference and management overhead on CPU and memory. However, there are still challenges to be addressed before these systems can be fully adopted to manage the IO resources in Big Data File Systems (BDFS) and shared network facilities. In this study, we mainly study on three IO management problems systematically, in terms …


Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique Jan 2018

Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique

Electronic Theses and Dissertations

Because of the ever increasing demand wireless data in the modern era, the Radio Frequency (RF) spectrum is becoming more congested. The remaining RF spectrum is being shrunk at a very heavy rate, and spectral management is becoming more difficult. Mobile data is estimated to grow more than 10 times between 2013 and 2019, and due to this explosion in data usage, mobile operators are having serious concerns focusing on public Wireless Fidelity (Wi-Fi) and other alternative technologies. Visible Light Communication (VLC) is a recent promising technology complementary to RF spectrum which operates at the visible light spectrum band (roughly …


A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman Jan 2018

A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman

Electronic Theses and Dissertations

Cellular spectrum is a limited natural resource becoming scarcer at a worrisome rate. To satisfy users' expectation from wireless data services, researchers and practitioners recognized the necessity of more utilization and pervasive sharing of the spectrum. Though scarce, spectrum is underutilized in some areas or within certain operating hours due to the lack of appropriate regulatory policies, static allocation and emerging business challenges. Thus, finding ways to improve the utilization of this resource to make sharing more pervasive is of great importance. There already exists a number of solutions to increase spectrum utilization via increased sharing. Dynamic Spectrum Access (DSA) …


Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah Jan 2018

Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah

Electronic Theses and Dissertations

Wireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense, process, communicate, and transmit information to a destination, and they are expected to have significant impact on the efficiency of many applications in various fields. The resource constraint such as limited battery power, is the greatest challenge in WSNs design as it affects the lifetime and performance of the network. An energy efficient, secure, and trustworthy system is vital when a WSN involves highly sensitive information. Thus, it is critical to design mechanisms that are energy efficient and secure while at the same time maintaining the desired …


Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila Jan 2018

Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila

Electronic Theses and Dissertations

The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the …


Service Integration Design Patterns In Microservices, Meng Wang Jan 2018

Service Integration Design Patterns In Microservices, Meng Wang

Electronic Theses and Dissertations

“Microservices” is a new term in software architecture that was defined in 2014 [1]. It is a method to build a software application with a set of small services. Each service has its process to serve a single purpose and communicates with other services through lightweight mechanisms. Because of a great deal of independently distributed services, it is a challenge to integrate the loose services fully. Too many trivial relationships can be messed up easily during deployment. Also, it is hard to modify the relationships if the services are updated as the source codes need to be re-edited and tested. …


An Approach To Finding Parking Space Using The Csi-Based Wifi Technology, Yunfan Zhang Jan 2018

An Approach To Finding Parking Space Using The Csi-Based Wifi Technology, Yunfan Zhang

Electronic Theses and Dissertations

With ever-increasing number of vehicles and shortages of parking spaces, parking has always been a very important issue in transportation. It is necessary to use advanced intelligent technologies to help drivers find parking spaces, quickly. In this thesis, an approach to finding empty spaces in parking lots using the CSI-based WiFi technology is presented. First, the channel state information (CSI) of received WiFi signals is analyzed. The features of CSI data that are strongly correlated with the number of empty slots in parking lots are identified and extracted. A machine learning technique to perform multi-class classification that categorizes the input …


Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha Jan 2018

Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha

Electronic Theses and Dissertations

Individuals with chronic conditions are the ones who use health care most frequently and more than 50% of top ten causes of death are chronic diseases in United States and these members always have health high risk scores. In the field of population health management, identifying high risk members is very important in terms of patient health care, disease management and cost management. Disease management program is very effective way of monitoring and preventing chronic disease and health related complications and risk management allows physicians and healthcare companies to reduce patient’s health risk, help identifying members for care/disease management along …


Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel Jan 2018

Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel

Electronic Theses and Dissertations

In the past decade, we have witnessed explosive growth in the number of low-power embedded and Internet-connected devices, reinforcing the new paradigm, Internet of Things (IoT). IoT devices like smartphones, home security systems, smart electric meters, garage parking indicators, etc., have penetrated deeply into our daily lives. These IoT devices are increasingly attached and operated in mobile objects like unmanned vehicles, trains, airplanes, etc. The low power wide area network (LPWAN), due to its long-range, low-power and low-cost communication capability, is actively considered by academia and industry as the future wireless communication standard for IoT. However, despite the increasing popularity …


Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha Jan 2018

Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha

Electronic Theses and Dissertations

Pedestrian distraction from smartphones is a serious social problem that caused an ever increasing number of fatalities especially as virtual reality (VR) games have gained popularity recently. In this thesis, we present the design, implementation, and a pilot study of WiPedCross, a WiFi direct-based pedestrian safety system that senses and evaluates a risk, and alerts accordingly the user to prevent traffic accidents. In order to develop a non-intrusive, accurate, and energy-efficient pedestrian safety system, a number of technical challenges are addressed: to enhance the positioning accuracy of the user for precise risk assessment, a map-matching algorithm based on a Hidden …


Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri Jan 2018

Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri

Electronic Theses and Dissertations

Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …


Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta Jan 2018

Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta

Electronic Theses and Dissertations

This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test …


Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero Jan 2018

Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero

Electronic Theses and Dissertations

This research proposes to enhance some Evolutionary Algorithms in order to obtain optimal and adaptive network configurations. Due to the richness in technologies, low cost, and application usages, we consider Heterogeneous Wireless Mesh Networks. In particular, we evaluate the domains of Network Deployment, Smart Grids/Homes, and Intrusion Detection Systems. Having an adaptive network as one of the goals, we consider a robust noise tolerant methodology that can quickly react to changes in the environment. Furthermore, the diversity of the performance objectives considered (e.g., power, coverage, anonymity, etc.) makes the objective function non-continuous and therefore not have a derivative. For these …


Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou Jan 2018

Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou

Electronic Theses and Dissertations

Data storage is one of the important and often critical parts of the computing system in terms of performance, cost, reliability, and energy. Numerous new memory technologies, such as NAND flash, phase change memory (PCM), magnetic RAM (STT-RAM) and Memristor, have emerged recently. Many of them have already entered the production system. Traditional storage optimization and caching algorithms are far from optimal because storage I/Os do not show simple locality. To provide optimal storage we need accurate predictions of I/O behavior. However, the workloads are increasingly dynamic and diverse, making the long and short time I/O prediction challenge. Because of …


Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta Jan 2018

Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta

Electronic Theses and Dissertations

The drive to achieve trustworthy autonomous cyber-physical systems (CPS), which can attain goals independently in the presence of significant uncertainties and for long periods of time without any human intervention, has always been enticing. Significant progress has been made in the avenues of both software and hardware for fulfilling these objectives. However, technological challenges still exist and particularly in terms of decision making under uncertainty. In an autonomous system, uncertainties can arise from the operating environment, adversarial attacks, and from within the system. As a result of these concerns, human-beings lack trust in these systems and hesitate to use them …


Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu Jan 2018

Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu

Electronic Theses and Dissertations

A traffic monitoring system (TMS) is an integral part of Intelligent Transportation Systems (ITS) for traffic analysis and planning. However, covering huge miles of rural highways (119,247 miles in U.S.) with a large number of TMSs is a very challenging problem due to the cost issue. This paper aims to address the problem by developing a low-cost and portable TMS called DeepWiTraffic based on COTs WiFi devices. The proposed system enables accurate vehicle detection (counting) and classification by exploiting the unique WiFi Channel State Information (CSI) of passing vehicles. Spatial and temporal correlations of CSI amplitude and phase data are …