Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (58)
- Physical Sciences and Mathematics (53)
- Computer Sciences (50)
- Robotics (39)
- Other Computer Engineering (38)
-
- Computer and Systems Architecture (24)
- Artificial Intelligence and Robotics (20)
- Digital Communications and Networking (16)
- Data Storage Systems (15)
- Systems and Communications (12)
- Hardware Systems (10)
- Mechanical Engineering (10)
- Biomedical Engineering and Bioengineering (8)
- Electrical and Electronics (8)
- Medicine and Health Sciences (8)
- Controls and Control Theory (7)
- Biomedical (6)
- Data Science (6)
- Databases and Information Systems (6)
- Power and Energy (6)
- Theory and Algorithms (6)
- Aerospace Engineering (5)
- Other Computer Sciences (5)
- Social and Behavioral Sciences (5)
- Automotive Engineering (4)
- Computational Engineering (4)
- Electro-Mechanical Systems (4)
- Health Information Technology (4)
- Institution
- Keyword
-
- Daniel Felix Ritchie School of Engineering and Computer Science (48)
- Machine learning (26)
- Electrical and Computer Engineering (17)
- Computer vision (11)
- Artificial intelligence (10)
-
- Classification (9)
- Computer Science (9)
- Robotics (9)
- Deep learning (7)
- ETD (6)
- Machine Learning (6)
- Simulation (6)
- Artificial Intelligence (5)
- Data mining (5)
- Computer networks--Security measures (4)
- Diagnostic imaging (4)
- Facial expression recognition (4)
- Image processing (4)
- Intelligent vehicles (4)
- Mapping (4)
- Mechanical and Materials Engineering (4)
- Security (4)
- UAV (4)
- CUDA (3)
- Clustering (3)
- Concept drift (3)
- Data Mining (3)
- Evolvable hardware (3)
- Explainability (3)
- Genetic Algorithms (3)
Articles 121 - 150 of 347
Full-Text Articles in Computer Engineering
Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang
Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang
Electronic Theses and Dissertations
Today Big Data computer platforms employ resource management systems such as Yarn, Torque, Mesos, and Google Borg to enable sharing the physical computing among many users or applications. Given virtualization and resource management systems, users are able to launch their applications on the same node with low mutual interference and management overhead on CPU and memory. However, there are still challenges to be addressed before these systems can be fully adopted to manage the IO resources in Big Data File Systems (BDFS) and shared network facilities. In this study, we mainly study on three IO management problems systematically, in terms …
Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique
Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique
Electronic Theses and Dissertations
Because of the ever increasing demand wireless data in the modern era, the Radio Frequency (RF) spectrum is becoming more congested. The remaining RF spectrum is being shrunk at a very heavy rate, and spectral management is becoming more difficult. Mobile data is estimated to grow more than 10 times between 2013 and 2019, and due to this explosion in data usage, mobile operators are having serious concerns focusing on public Wireless Fidelity (Wi-Fi) and other alternative technologies. Visible Light Communication (VLC) is a recent promising technology complementary to RF spectrum which operates at the visible light spectrum band (roughly …
A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman
A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman
Electronic Theses and Dissertations
Cellular spectrum is a limited natural resource becoming scarcer at a worrisome rate. To satisfy users' expectation from wireless data services, researchers and practitioners recognized the necessity of more utilization and pervasive sharing of the spectrum. Though scarce, spectrum is underutilized in some areas or within certain operating hours due to the lack of appropriate regulatory policies, static allocation and emerging business challenges. Thus, finding ways to improve the utilization of this resource to make sharing more pervasive is of great importance. There already exists a number of solutions to increase spectrum utilization via increased sharing. Dynamic Spectrum Access (DSA) …
Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah
Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah
Electronic Theses and Dissertations
Wireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense, process, communicate, and transmit information to a destination, and they are expected to have significant impact on the efficiency of many applications in various fields. The resource constraint such as limited battery power, is the greatest challenge in WSNs design as it affects the lifetime and performance of the network. An energy efficient, secure, and trustworthy system is vital when a WSN involves highly sensitive information. Thus, it is critical to design mechanisms that are energy efficient and secure while at the same time maintaining the desired …
Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila
Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila
Electronic Theses and Dissertations
The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the …
Service Integration Design Patterns In Microservices, Meng Wang
Service Integration Design Patterns In Microservices, Meng Wang
Electronic Theses and Dissertations
“Microservices” is a new term in software architecture that was defined in 2014 [1]. It is a method to build a software application with a set of small services. Each service has its process to serve a single purpose and communicates with other services through lightweight mechanisms. Because of a great deal of independently distributed services, it is a challenge to integrate the loose services fully. Too many trivial relationships can be messed up easily during deployment. Also, it is hard to modify the relationships if the services are updated as the source codes need to be re-edited and tested. …
An Approach To Finding Parking Space Using The Csi-Based Wifi Technology, Yunfan Zhang
An Approach To Finding Parking Space Using The Csi-Based Wifi Technology, Yunfan Zhang
Electronic Theses and Dissertations
With ever-increasing number of vehicles and shortages of parking spaces, parking has always been a very important issue in transportation. It is necessary to use advanced intelligent technologies to help drivers find parking spaces, quickly. In this thesis, an approach to finding empty spaces in parking lots using the CSI-based WiFi technology is presented. First, the channel state information (CSI) of received WiFi signals is analyzed. The features of CSI data that are strongly correlated with the number of empty slots in parking lots are identified and extracted. A machine learning technique to perform multi-class classification that categorizes the input …
Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha
Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha
Electronic Theses and Dissertations
Individuals with chronic conditions are the ones who use health care most frequently and more than 50% of top ten causes of death are chronic diseases in United States and these members always have health high risk scores. In the field of population health management, identifying high risk members is very important in terms of patient health care, disease management and cost management. Disease management program is very effective way of monitoring and preventing chronic disease and health related complications and risk management allows physicians and healthcare companies to reduce patient’s health risk, help identifying members for care/disease management along …
Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel
Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel
Electronic Theses and Dissertations
In the past decade, we have witnessed explosive growth in the number of low-power embedded and Internet-connected devices, reinforcing the new paradigm, Internet of Things (IoT). IoT devices like smartphones, home security systems, smart electric meters, garage parking indicators, etc., have penetrated deeply into our daily lives. These IoT devices are increasingly attached and operated in mobile objects like unmanned vehicles, trains, airplanes, etc. The low power wide area network (LPWAN), due to its long-range, low-power and low-cost communication capability, is actively considered by academia and industry as the future wireless communication standard for IoT. However, despite the increasing popularity …
Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha
Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha
Electronic Theses and Dissertations
Pedestrian distraction from smartphones is a serious social problem that caused an ever increasing number of fatalities especially as virtual reality (VR) games have gained popularity recently. In this thesis, we present the design, implementation, and a pilot study of WiPedCross, a WiFi direct-based pedestrian safety system that senses and evaluates a risk, and alerts accordingly the user to prevent traffic accidents. In order to develop a non-intrusive, accurate, and energy-efficient pedestrian safety system, a number of technical challenges are addressed: to enhance the positioning accuracy of the user for precise risk assessment, a map-matching algorithm based on a Hidden …
Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri
Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri
Electronic Theses and Dissertations
Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …
Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta
Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta
Electronic Theses and Dissertations
This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test …
Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero
Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero
Electronic Theses and Dissertations
This research proposes to enhance some Evolutionary Algorithms in order to obtain optimal and adaptive network configurations. Due to the richness in technologies, low cost, and application usages, we consider Heterogeneous Wireless Mesh Networks. In particular, we evaluate the domains of Network Deployment, Smart Grids/Homes, and Intrusion Detection Systems. Having an adaptive network as one of the goals, we consider a robust noise tolerant methodology that can quickly react to changes in the environment. Furthermore, the diversity of the performance objectives considered (e.g., power, coverage, anonymity, etc.) makes the objective function non-continuous and therefore not have a derivative. For these …
Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou
Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou
Electronic Theses and Dissertations
Data storage is one of the important and often critical parts of the computing system in terms of performance, cost, reliability, and energy. Numerous new memory technologies, such as NAND flash, phase change memory (PCM), magnetic RAM (STT-RAM) and Memristor, have emerged recently. Many of them have already entered the production system. Traditional storage optimization and caching algorithms are far from optimal because storage I/Os do not show simple locality. To provide optimal storage we need accurate predictions of I/O behavior. However, the workloads are increasingly dynamic and diverse, making the long and short time I/O prediction challenge. Because of …
Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta
Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta
Electronic Theses and Dissertations
The drive to achieve trustworthy autonomous cyber-physical systems (CPS), which can attain goals independently in the presence of significant uncertainties and for long periods of time without any human intervention, has always been enticing. Significant progress has been made in the avenues of both software and hardware for fulfilling these objectives. However, technological challenges still exist and particularly in terms of decision making under uncertainty. In an autonomous system, uncertainties can arise from the operating environment, adversarial attacks, and from within the system. As a result of these concerns, human-beings lack trust in these systems and hesitate to use them …
Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu
Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu
Electronic Theses and Dissertations
A traffic monitoring system (TMS) is an integral part of Intelligent Transportation Systems (ITS) for traffic analysis and planning. However, covering huge miles of rural highways (119,247 miles in U.S.) with a large number of TMSs is a very challenging problem due to the cost issue. This paper aims to address the problem by developing a low-cost and portable TMS called DeepWiTraffic based on COTs WiFi devices. The proposed system enables accurate vehicle detection (counting) and classification by exploiting the unique WiFi Channel State Information (CSI) of passing vehicles. Spatial and temporal correlations of CSI amplitude and phase data are …
Force-Canceling Mixer Algorithm For Vehicles With Fully-Articulated Radially Symmetric Thruster Arrays, Joseph Nicholas Casabona
Force-Canceling Mixer Algorithm For Vehicles With Fully-Articulated Radially Symmetric Thruster Arrays, Joseph Nicholas Casabona
Electronic Theses and Dissertations
A new type of fully-holonomic aerial vehicle is identified and developed that can optionally utilize automatic cancellation of excessive thruster forces to maintain precise control despite little or no throttle authority. After defining the physical attributes of the new vehicle, a flight control mixer algorithm is defined and presented. This mixer is an input/output abstraction that grants a flight control system (or pilot) full authority of the vehicle's position and orientation by means of an input translation vector and input torque vector. The mixer is shown to be general with respect to the number of thrusters in the system provided …
Developing An Affect-Aware Rear-Projected Robotic Agent, Ali Mollahosseini
Developing An Affect-Aware Rear-Projected Robotic Agent, Ali Mollahosseini
Electronic Theses and Dissertations
Social (or Sociable) robots are designed to interact with people in a natural and interpersonal manner. They are becoming an integrated part of our daily lives and have achieved positive outcomes in several applications such as education, health care, quality of life, entertainment, etc. Despite significant progress towards the development of realistic social robotic agents, a number of problems remain to be solved. First, current social robots either lack enough ability to have deep social interaction with human, or they are very expensive to build and maintain. Second, current social robots have yet to reach the full emotional and social …
Studying Facial Expression Recognition And Imitation Ability Of Children With Autism Spectrum Disorder In Interaction With A Social Robot, Farzaneh Askari
Studying Facial Expression Recognition And Imitation Ability Of Children With Autism Spectrum Disorder In Interaction With A Social Robot, Farzaneh Askari
Electronic Theses and Dissertations
Children with Autism Spectrum Disorder (ASD) experience limited abilities in recognizing non-verbal elements of social interactions such as facial expressions [1]. They also show deficiencies in imitating facial expressions in social situations. In this Master thesis, we focus on studying the ability of children with ASD in recognizing facial expressions and imitating the expressions using a rear-projected expressive humanoid robot, called Ryan. Recent studies show that social robots such as Ryan have great potential for autism therapy. We designed and developed three studies, first to evaluate the ability of children with ASD in recognizing facial expressions that are presented to …
A Scale Space Local Binary Pattern (Sslbp) – Based Feature Extraction Framework To Detect Bones From Knee Mri Scans, Jinyeong Mun
A Scale Space Local Binary Pattern (Sslbp) – Based Feature Extraction Framework To Detect Bones From Knee Mri Scans, Jinyeong Mun
Electronic Theses and Dissertations
The medical industry is currently working on a fully autonomous surgical system, which is considered a novel modality to go beyond technical limitations of conventional surgery. In order to apply an autonomous surgical system to knees, one of the primarily responsible areas for supporting the total weight of human body, accurate segmentation of bones from knee Magnetic Resonance Imaging (MRI) scans plays a crucial role. In this paper, we propose employing the Scale Space Local Binary Pattern (SSLBP) feature extraction, a variant of local binary pattern extractions, for detecting bones from knee images. The proposed methods consist of two phases. …
Localization Of Microcalcification On The Mammogram Using Deep Convolutional Neural Network, Jieun Jhang
Localization Of Microcalcification On The Mammogram Using Deep Convolutional Neural Network, Jieun Jhang
Electronic Theses and Dissertations
Breast cancer is the most common cancer in women worldwide, and the mammogram is the most widely used screening technique for breast cancer. To make a diagnosis in the early stage of breast cancer, the appearance of masses and microcalcifications on the mammogram are two crucial indicators. Notably, the early detection of malignant microcalcifications can facilitate the diagnosis and the treatment of breast cancer at the appropriate time. Making an accurate evaluation on microcalcifications is a timeconsuming and challenging task for the radiologists due to the small size and the low contrast of microcalcification. Compared to the background and mammogram …
Development Of A Locomotion And Balancing Strategy For Humanoid Robots, Emile Bahdi
Development Of A Locomotion And Balancing Strategy For Humanoid Robots, Emile Bahdi
Electronic Theses and Dissertations
The locomotion ability and high mobility are the most distinguished features of humanoid robots. Due to the non-linear dynamics of walking, developing and controlling the locomotion of humanoid robots is a challenging task. In this thesis, we study and develop a walking engine for the humanoid robot, NAO, which is the official robotic platform used in the RoboCup Spl. Aldebaran Robotics, the manufacturing company of NAO provides a walking module that has disadvantages, such as being a black box that does not provide control of the gait as well as the robot walk with a bent knee. The latter disadvantage, …
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Electronic Theses and Dissertations
The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.
Mazetec: A Scenario-Based Learning Platform, Daniel Bietz
Mazetec: A Scenario-Based Learning Platform, Daniel Bietz
Electronic Theses and Dissertations
This work presents Mazetec, a scenario-based learning platform for delivering non-linear scenarios format asynchronously. It enables subject matter experts to create interactive, state-dependent case studies or courses with branching logic for online learning and knowledge testing. Mazetec is a complex web application designed to deliver decision-based or case-based educational scenarios and simulations in a time-limited, non-linear format. There are many e-learning systems in the open source and commercial markets, but while these systems may have similar functions, we have found none that are both domain independent and able to deliver state-dependent content asynchronous and non-linearly. Mazetec can serve as …
A Framework For Clustering And Adaptive Topic Tracking On Evolving Text And Social Media Data Streams., Gopi Chand Nutakki
A Framework For Clustering And Adaptive Topic Tracking On Evolving Text And Social Media Data Streams., Gopi Chand Nutakki
Electronic Theses and Dissertations
Recent advances and widespread usage of online web services and social media platforms, coupled with ubiquitous low cost devices, mobile technologies, and increasing capacity of lower cost storage, has led to a proliferation of Big data, ranging from, news, e-commerce clickstreams, and online business transactions to continuous event logs and social media expressions. These large amounts of online data, often referred to as data streams, because they get generated at extremely high throughputs or velocity, can make conventional and classical data analytics methodologies obsolete. For these reasons, the issues of management and analysis of data streams have been researched extensively …
Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett
Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett
Electronic Theses and Dissertations
As Unmanned Aerial Vehicle (UAV), or “drone” applications expand, new methods for sensing, navigating and avoiding obstacles need to be developed. The project applies an Extended Kalman Filter (EKF) to a simulated quadcopter vehicle though Matlab in order to estimate not only the vehicle state but the world state around the vehicle. The EKF integrates multiple sensor readings from range sensors, IMU sensors, and radiation sensors and combines this information to optimize state estimates. The result is an estimated world map to be used in vehicle navigation and obstacle avoidance.
The simulation handles the physics behind the vehicle flight. As …
A Data Science Pipeline For Educational Data : A Case Study Using Learning Catalytics In The Active Learning Classroom., Asuman Cagla Acun Sener
A Data Science Pipeline For Educational Data : A Case Study Using Learning Catalytics In The Active Learning Classroom., Asuman Cagla Acun Sener
Electronic Theses and Dissertations
This thesis presents an applied data science methodology on a set of University of Louisville, Speed School of Engineering student data. We used data mining and classic statistical techniques to help educational researchers quickly see the data trends and peculiarities. Our data includes scores and information about two Engineering Fundamental Class. The format of these classes is called an inverted classroom model or flipped class. The purpose of this study is to analyze the data in order to uncover potentially hidden information, tell interesting stories about the data, examine student learning behavior and learning performance in an active learning environment, …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
An Interactive Interface For Nursing Robots., Ankita Sahu
An Interactive Interface For Nursing Robots., Ankita Sahu
Electronic Theses and Dissertations
Physical Human-Robot Interaction (pHRI) is inevitable for a human user while working with assistive robots. There are various aspects of pHRI, such as choosing the interface, type of control schemes implemented and the modes of interaction. The research work presented in this thesis concentrates on a health-care assistive robot called Adaptive Robot Nursing Assistant (ARNA). An assistive robot in a health-care environment has to be able to perform routine tasks and be aware of the surrounding environment at the same time. In order to operate the robot, a teleoperation based interaction would be tedious for some patients as it would …
Spatial Relations And Natural-Language Semantics For Indoor Scenes, Stacy A. Doore
Spatial Relations And Natural-Language Semantics For Indoor Scenes, Stacy A. Doore
Electronic Theses and Dissertations
Over the past 15 years, there have been increased efforts to represent and communicate spatial information about entities within indoor environments. Automated annotation of information about indoor environments is needed for natural-language processing tasks, such as spatially anchoring events, tracking objects in motion, scene descriptions, and interpretation of thematic places in relationship to confirmed locations. Descriptions of indoor scenes often require a fine granularity of spatial information about the meaning of natural-language spatial utterances to improve human-computer interactions and applications for the retrieval of spatial information. The development needs of these systems provide a rationale as to why—despite an extensive …