Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Computer Engineering

Cyberinet: Integrated Semi-Modular Sensors For The Computer-Augmented Clarinet, Matthew Bardin Aug 2023

Cyberinet: Integrated Semi-Modular Sensors For The Computer-Augmented Clarinet, Matthew Bardin

LSU Doctoral Dissertations

The Cyberinet is a new Augmented instrument designed to easily and intuitively provide a method of computer-enhanced performance to the Clarinetist to allow for greater control and expressiveness in a performance. A performer utilizing the Cyberinet is able to seamlessly switch between a traditional performance setting and an augmented one. Towards this, the Cyberinet is a hardware replacement for a portion of a Clarinet containing a variety of sensors embedded within the unit. These sensors collect various real time data motion data of the performer and air fow within the instrument. Additional sensors can be connected to the Cyberinet to …


Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya May 2023

Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya

LSU Doctoral Dissertations

Software-Defined Networking (SDN) is an efficient networking design that decouples the network's control plane from the data plane. When compared to the traditional network architecture, the SDN architecture shares many of the same security issues. The centralized SDN controller makes it easier to control, easier to program in real-time, and more flexible, but this comes at the cost of more security risks. An attack on the control plane layer of the SDN controller is a major security concern.

First, centralized design and the existence of a single point of failure in the control plane compromise the accessibility and availability of …


Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand Apr 2023

Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand

LSU Doctoral Dissertations

Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …


Machine-Learning Approaches For Developing An Autograder For High School-Level Cs-For-All Initiatives, Sirazum Munira Tisha Apr 2023

Machine-Learning Approaches For Developing An Autograder For High School-Level Cs-For-All Initiatives, Sirazum Munira Tisha

LSU Doctoral Dissertations

Most existing autograders used for grading programming assignments are based on unit testing, which is tedious to implement for programs with graphical output and does not allow testing for other code aspects, such as programming style or structure. We present a novel autograding approach based on machine learning that can successfully check the quality of coding assignments from a high school-level CS-for-all computational thinking course. For evaluating our autograder, we graded 2,675 samples from five different assignments from the past three years, including open-ended problems from different units of the course curriculum. Our autograder uses features based on lexical analysis …


Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte Nov 2022

Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte

LSU Doctoral Dissertations

Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …


A Deep Reinforcement Learning Approach With Prioritized Experience Replay And Importance Factor For Makespan Minimization In Manufacturing, Jose Napoleon Martinez Apr 2022

A Deep Reinforcement Learning Approach With Prioritized Experience Replay And Importance Factor For Makespan Minimization In Manufacturing, Jose Napoleon Martinez

LSU Doctoral Dissertations

In this research, we investigated the application of deep reinforcement learning (DRL) to a common manufacturing scheduling optimization problem, max makespan minimization. In this application, tasks are scheduled to undergo processing in identical processing units (for instance, identical machines, machining centers, or cells). The optimization goal is to assign the jobs to be scheduled to units to minimize the maximum processing time (i.e., makespan) on any unit.

Machine learning methods have the potential to "learn" structures in the distribution of job times that could lead to improved optimization performance and time over traditional optimization methods, as well as to adapt …


Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector Apr 2022

Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector

LSU Doctoral Dissertations

In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical …


Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan Apr 2022

Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan

LSU Doctoral Dissertations

As a new class of smart materials, shape memory polymer (SMP) is gaining great attention in both academia and industry. One challenge is that the chemical space is huge, while the human intelligence is limited, so that discovery of new SMPs becomes more and more difficult. In this dissertation, by adopting a series of machine learning (ML) methods, two frameworks are established for discovering new thermoset shape memory polymers (TSMPs). Specifically, one of them is performed by a combination of four methods, i.e., the most recently proposed linear notation BigSMILES, supplementing existing dataset by reasonable approximation, a mixed dimension (1D …


Efficient Information Retrieval For Software Bug Localization, Saket Khatiwada Mar 2022

Efficient Information Retrieval For Software Bug Localization, Saket Khatiwada

LSU Doctoral Dissertations

Software systems are often shipped with defects. When a bug is reported, developers use the information available in the associated report to locate source code fragments that need to be modified to fix the bug. However, as software systems evolve in size and complexity, bug localization can become a tedious and time-consuming process. Contemporary bug localization tools utilize Information Retrieval (IR) methods for automated support to minimize the manual effort. IR methods exploit the textual content of bug reports to capture and rank relevant buggy source files. However, for an IR-based bug localization tool to be useful, it must achieve …


Interpretable And Anti-Bias Machine Learning Models For Human Event Sequence Data, Zihan Zhou Jan 2022

Interpretable And Anti-Bias Machine Learning Models For Human Event Sequence Data, Zihan Zhou

LSU Doctoral Dissertations

Growing volumes and varieties of human event sequence data are available in many applications such as recommender systems, social network, medical diagnosis, and predictive policing. Human event sequence data is usually clustered and exhibits self-exciting properties. Machine learning models especially deep neural network models have shown great potential in improving the prediction accuracy of future events. However, current approaches still suffer from several drawbacks such as model transparency, unfair prediction and the poor prediction accuracy due to data sparsity and bias. Another issue in modeling human event data is that data collected from real word is usually incomplete, and even …


Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour Nov 2021

Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour

LSU Doctoral Dissertations

Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …


Reinforcement Learning Approach For Inspect/Correct Tasks, Hoda Nasereddin Dec 2020

Reinforcement Learning Approach For Inspect/Correct Tasks, Hoda Nasereddin

LSU Doctoral Dissertations

In this research, we focus on the application of reinforcement learning (RL) in automated agent tasks involving considerable target variability (i.e., characterized by stochastic distributions); in particular, learning of inspect/correct tasks. Examples include automated identification & correction of rivet failures in airplane maintenance procedures, and automated cleaning of surgical instruments in a hospital sterilization processing department. The location of defects and the corrective action to be taken for each varies from task episode. What needs to be learned are optimal stochastic strategies rather than optimization of any one single defect type and location. RL has been widely applied in robotics …


Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad Oct 2020

Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad

LSU Doctoral Dissertations

Linear algebra libraries play a very important role in many HPC applications. As larger datasets are created everyday, it also becomes crucial for the multi-threaded linear algebra libraries to utilize the compute resources properly. Moving toward exascale computing, the current programming models would not be able to fully take advantage of the advances in memory hierarchies, computer architectures, and networks. Asynchronous Many-Task(AMT) Runtime systems would be the solution to help the developers to manage the available parallelism. In this Dissertation we propose an adaptive solution to improve the performance of a linear algebra library based on a set of compile-time …


A Study On The Improvement Of Data Collection In Data Centers And Its Analysis On Deep Learning-Based Applications, Dipak Kumar Singh Jun 2020

A Study On The Improvement Of Data Collection In Data Centers And Its Analysis On Deep Learning-Based Applications, Dipak Kumar Singh

LSU Doctoral Dissertations

Big data are usually stored in data center networks for processing and analysis through various cloud applications. Such applications are a collection of data-intensive jobs which often involve many parallel flows and are network bound in the distributed environment. The recent networking abstraction, coflow, for data parallel programming paradigm to express the communication requirements has opened new opportunities to network scheduling for such applications. Therefore, I propose coflow based network scheduling algorithm, Coflourish, to enhance the job completion time for such data-parallel applications, in the presence of the increased background traffic to mimic the cloud environment infrastructure. It outperforms …


Understanding And Optimizing Flash-Based Key-Value Systems In Data Centers, Yichen Jia Mar 2020

Understanding And Optimizing Flash-Based Key-Value Systems In Data Centers, Yichen Jia

LSU Doctoral Dissertations

Flash-based key-value systems are widely deployed in today’s data centers for providing high-speed data processing services. These systems deploy flash-friendly data structures, such as slab and Log Structured Merge(LSM) tree, on flash-based Solid State Drives(SSDs) and provide efficient solutions in caching and storage scenarios. With the rapid evolution of data centers, there appear plenty of challenges and opportunities for future optimizations.

In this dissertation, we focus on understanding and optimizing flash-based key-value systems from the perspective of workloads, software, and hardware as data centers evolve. We first propose an on-line compression scheme, called SlimCache, considering the unique characteristics of key-value …


Shortest Path Calculation Using Contraction Hierarchy Graph Algorithms On Nvidia Gpus, Roozbeh Karimi Nov 2019

Shortest Path Calculation Using Contraction Hierarchy Graph Algorithms On Nvidia Gpus, Roozbeh Karimi

LSU Doctoral Dissertations

PHAST is to date one of the fastest algorithms for performing single source shortest path (SSSP) queries on road-network graphs. PHAST operates on graphs produced in part using Geisberger's contraction hierarchy (CH) algorithm. Producing these graphs is time consuming, limiting PHAST's usefulness when graphs are not available in advance. CH iteratively assigns scores to nodes, contracts (removes) the highest-scoring node, and adds shortcut edges to preserve distances. Iteration stops when only one node remains. Scoring and contraction rely on a witness path search (WPS) of nearby nodes. Little work has been reported on parallel and especially GPU CH algorithms. This …


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the I/O performance behaviors …


Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania Jun 2019

Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania

LSU Doctoral Dissertations

Data in many research fields continues to grow in both size and complexity. For instance, recent technological advances have caused an increased throughput in data in various biological-related endeavors, such as DNA sequencing, molecular simulations, and medical imaging. In addition, the variance in the types of data (textual, signal, image, etc.) adds an additional complexity in analyzing the data. As such, there is a need for uniquely developed applications that cater towards the type of data. Several considerations must be made when attempting to create a tool for a particular dataset. First, we must consider the type of algorithm required …


Distributed Wireless Algorithms For Rfid Systems: Grouping Proofs And Cardinality Estimation, Vanya D. Cherneva Mar 2019

Distributed Wireless Algorithms For Rfid Systems: Grouping Proofs And Cardinality Estimation, Vanya D. Cherneva

LSU Doctoral Dissertations

The breadth and depth of the use of Radio Frequency Identification (RFID) are becoming more substantial. RFID is a technology useful for identifying unique items through radio waves. We design algorithms on RFID-based systems for the Grouping Proof and Cardinality Estimation problems.

A grouping-proof protocol is evidence that a reader simultaneously scanned the RFID tags in a group. In many practical scenarios, grouping-proofs greatly expand the potential of RFID-based systems such as supply chain applications, simultaneous scanning of multiple forms of IDs in banks or airports, and government paperwork. The design of RFID grouping-proofs that provide optimal security, privacy, and …


Reinforcement Learning In Robotic Task Domains With Deictic Descriptor Representation, Harry Paul Moore Oct 2018

Reinforcement Learning In Robotic Task Domains With Deictic Descriptor Representation, Harry Paul Moore

LSU Doctoral Dissertations

In the field of reinforcement learning, robot task learning in a specific environment with a Markov decision process backdrop has seen much success. But, extending these results to learning a task for an environment domain has not been as fruitful, even for advanced methodologies such as relational reinforcement learning. In our research into robot learning in environment domains, we utilize a form of deictic representation for the robot’s description of the task environment. However, the non-Markovian nature of the deictic representation leads to perceptual aliasing and conflicting actions, invalidating standard reinforcement learning algorithms. To circumvent this difficulty, several past research …


Effective Methods And Tools For Mining App Store Reviews, Nishant Jha Oct 2018

Effective Methods And Tools For Mining App Store Reviews, Nishant Jha

LSU Doctoral Dissertations

Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these major …


Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das Oct 2018

Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das

LSU Doctoral Dissertations

The aim of this thesis is to advance the theory behind quantum information processing tasks, by deriving fundamental limits on bipartite quantum interactions and dynamics. A bipartite quantum interaction corresponds to an underlying Hamiltonian that governs the physical transformation of a two-body open quantum system. Under such an interaction, the physical transformation of a bipartite quantum system is considered in the presence of a bath, which may be inaccessible to an observer. The goal is to determine entangling abilities of such arbitrary bipartite quantum interactions. Doing so provides fundamental limitations on information processing tasks, including entanglement distillation and secret key …


Heuristics For Client Assignment And Load Balancing Problems In Online Games, Shawn Michael Farlow Jun 2018

Heuristics For Client Assignment And Load Balancing Problems In Online Games, Shawn Michael Farlow

LSU Doctoral Dissertations

Massively multiplayer online games (MMOGs) have been very popular over the past decade. The infrastructure necessary to support a large number of players simultaneously playing these games raises interesting problems to solve. Since the computations involved in solving those problems need to be done while the game is being played, they should not be so expensive that they cause any noticeable slowdown, as this would lead to a poor player perception of the game. Many of the problems in MMOGs are NP-Hard or NP-Complete, therefore we must develop heuristics for those problems without negatively affecting the player experience as a …


A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das Jun 2018

A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das

LSU Doctoral Dissertations

Recent advances in large-scale experimental facilities ushered in an era of data-driven science. These large-scale data increase the opportunity to answer many fundamental questions in basic science. However, these data pose new challenges to the scientific community in terms of their optimal processing and transfer. Consequently, scientists are in dire need of robust high performance computing (HPC) solutions that can scale with terabytes of data.

In this thesis, I address the challenges in three major aspects of scientific big data processing as follows: 1) Developing scalable software and algorithms for data- and compute-intensive scientific applications. 2) Proposing new cluster architectures …


Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani Apr 2018

Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani

LSU Doctoral Dissertations

In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.

In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the …


A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan Nov 2017

A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan

LSU Doctoral Dissertations

Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.

In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …


A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu Nov 2017

A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu

LSU Doctoral Dissertations

A data center (DC) has been a fundamental infrastructure for academia and industry for many years. Applications in DC have diverse requirements on communication. There are huge demands on data center network (DCN) control frameworks (CFs) for coordinating communication traffic. Simultaneously satisfying all demands is difficult and inefficient using existing traditional network devices and protocols. Recently, the agile software-defined Networking (SDN) is introduced to DCN for speeding up the development of the DCNCF. Application-awareness preserves the application semantics including the collective goals of communications. Previous works have illustrated that application-aware DCNCFs can much more efficiently allocate network resources by explicitly …


Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami Aug 2017

Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami

LSU Doctoral Dissertations

The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't guarantee …