Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

LSU Master's Theses

Theses/Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 23 of 23

Full-Text Articles in Computer Engineering

Cyber Attacks Against Industrial Control Systems, Adam Kardorff Apr 2024

Cyber Attacks Against Industrial Control Systems, Adam Kardorff

LSU Master's Theses

Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …


Autonomous Shipwreck Detection & Mapping, William Ard Aug 2023

Autonomous Shipwreck Detection & Mapping, William Ard

LSU Master's Theses

This thesis presents the development and testing of Bruce, a low-cost hybrid Remote Operated Vehicle (ROV) / Autonomous Underwater Vehicle (AUV) system for the optical survey of marine archaeological sites, as well as a novel sonar image augmentation strategy for semantic segmentation of shipwrecks. This approach takes side-scan sonar and bathymetry data collected using an EdgeTech 2205 AUV sensor integrated with an Harris Iver3, and generates augmented image data to be used for the semantic segmentation of shipwrecks. It is shown that, due to the feature enhancement capabilities of the proposed shipwreck detection strategy, correctly identified areas have a 15% …


An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez May 2023

An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez

LSU Master's Theses

In a world of continuously advancing technology, the reliance on these technologies continues to increase. Recently, transformer networks [22] have been implemented through various projects such as ChatGPT. These networks are extremely computationally demanding and require cutting-edge hardware to explore. However, with the growing increase and popularity of these neural networks, a question of reliability and resilience comes about, especially as the dependency and research on these networks grow. Given the computational demand of transformer networks, we investigate the resilience of the weights and biases of the predecessor of these networks, i.e. the Long Short-Term (LSTM) neural network, through four …


A Machine Learning Approach To Robotic Additive Manufacturing Of Uv-Curable Polymers Using Direct Ink Writing, Luis A. Velazquez Nov 2022

A Machine Learning Approach To Robotic Additive Manufacturing Of Uv-Curable Polymers Using Direct Ink Writing, Luis A. Velazquez

LSU Master's Theses

This thesis presents the design and implementation of a robotic additive manufacturing system that uses ultraviolet (UV)-curable thermoset polymers. Its design considers future applications involving free-standing 3D printing by means of partial UV curing and the fabrication of samples that are reinforced with fillers or fibers to manufacture complex-shape objects.

The proposed setup integrates a custom-built extruder with a UR5e collaborative manipulator. The capabilities of the system were demonstrated using Anycubic resin formulations containing fumed silica (FS) at varying weight fractions from 2.8 to 8 wt%. To fully cure the specimens after fabrication, a UV chamber was used. Then, measurements …


Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha Nov 2022

Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha

LSU Master's Theses

In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …


Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane Oct 2022

Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane

LSU Master's Theses

Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …


Evaluating Serverless Computing, Charitra Maharjan Aug 2022

Evaluating Serverless Computing, Charitra Maharjan

LSU Master's Theses

Function as a Service (FaaS) is gaining admiration because of its way of deploying the computations to serverless backends in the different clouds. It transfers the complexity of provisioning and allocating the necessary resources for an application to the cloud providers. The cloud providers also give an illusion of always availability of resources to the users. Among the cloud providers, AWS serverless platform offers a new paradigm for developing cloud applications without worrying about the underlying hardware infrastructure. It manages not only the resource provisioning and scaling of an application but also provides an opportunity to reimagine the cloud infrastructure …


Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun Jul 2021

Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun

LSU Master's Theses

ABSTRACT

Traceability link recovery (TLR) is a software engineering activity that helps to ensure software quality and assists with keeping track of changes by establishing links between software artifacts that are a part of the software engineering process, such as requirements, use cases, source code, test cases, and documentation. Software requirement artifacts are typically written in natural language. An Information Retrieval process is frequently used in many software activities, including the TLR activity. Recently, Word Embedding (WE) techniques have been used in many natural language processing tasks as well as in TLR tasks. We investigate the effectiveness of WE techniques …


Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams Mar 2021

Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams

LSU Master's Theses

This study presents an onboard sensor system for determining the relative positions of mobile robots, which is used in decentralized distance-based formation controllers for multi-agent systems. This sensor system uses infrared photodiodes and LEDs; its effective use requires coordination between the emitting and detecting robots. A technique is introduced for calculating the relative positions based on photodiode readings, and an automated calibration system is designed for future maintenance. By measuring the relative positions of their neighbors, each robot is capable of running an onboard formation controller, which is independent of both a centralized controller and a global positioning-like system (e.g., …


Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala Mar 2021

Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala

LSU Master's Theses

Hardware-In-the-Loop (HIL) simulation is an approach that is used for embedded systems testing which was popular in the early days of embedded systems. This technology was wrapped and was stored away for a long time. One of the main reasons is that the less use of embedded systems in society. Recent developments in embedded systems, data science, and control systems lead to a focus on testing these systems. The earliest method of testing these systems was by doing destructive testing which is a waste of money, resources, and time. The HIL provided a safe and economical way of testing the …


Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal Nov 2020

Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal

LSU Master's Theses

Remote monitoring of hydrocarbon wells is a tedious and meticulously thought out task performed to create a cyber-physical bridge between the asset and the owner. There are many systems and techniques on the market that offer this solution but due to their lack of interoperability and/or decentralized architecture they begin to fall apart when remote assets become farther away from the client. This results in extreme latency and thus poor decision making. Microsoft's Azure IoT Edge was the focus of this writing. Coupled with off-the-shelf hardware, Azure's IoT Edge services were integrated with an existing unit simulating a remote hydrocarbon …


An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder Nov 2020

An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder

LSU Master's Theses

One of the fundamental sources of data for traffic analysis is vehicle counts, which can be conducted either by the traditional manual method or by automated means. Different agencies have guidelines for manual counting, but they are typically prepared for particular conditions. In the case of automated counting, different methods have been applied, but You Only Look Once (YOLO), a recently developed object detection model, presents new potential in automated vehicle counting. The first objective of this study was to formulate general guidelines for manual counting based on experience gained in the field. Another goal of this study was to …


Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati Sep 2020

Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati

LSU Master's Theses

The security posture of critical network appliances, such as routers, switches, and firewalls, is crucial as these devices provide the first line of defense against malicious actors. As there is typically no endpoint security software, such as anti-virus available for these devices, it is crucial that vendors release timely updates for vulnerabilities and that customers apply them quickly. The research effort documented in this thesis describes a developed methodology for triaging known vulnerabilities in network devices, assessing the security posture of device vendors, and locating likely weak points in released firmware images. To highlight this methodology, the Anonabox security appliance …


Why Do You Take That Route?, Alimire Nabijiang Apr 2020

Why Do You Take That Route?, Alimire Nabijiang

LSU Master's Theses

We conducted this study to investigate causal factors which affects the route-choice behavior of drivers. Due to the insufficiency of measured variables and the lack of high-fidelity properties obtained by conventional data, we carried out Stated Choice Experiment (SCE) using Immersive Virtual Environments (IVE) tool to collect data. IVE tool can provide realistic virtual experiences to participants, and give advantage of flexible environment for exploring causal factors of drivers’ decision on route choice. Based on reviewing literatures, we believe that there is limited studies that has tried to comprehend the route choice behavior of drivers using causal inference. The study …


Retrospective Study Of Fmol Health System Utilization Using Geospatial Information, Deekshith Mandala Jan 2020

Retrospective Study Of Fmol Health System Utilization Using Geospatial Information, Deekshith Mandala

LSU Master's Theses

Medicaid Expansion and closing of Emergency Departments (ED) like Earl K. Long, Baton Rouge General Mid-City ED, and Champion Medical Center changed the health care landscape in East Baton Rouge Parish (EBRP). In this research study, a Geographical Information System (GIS) is used to analyze the impact of the expansion of Medicaid and the inauguration of Our Lady of the Lake North Baton Rouge ED (OLOL NBR ED) over the utilization of Franciscan Missionaries of our Lady Health System (FMOLHS) for both emergency and non-emergency health care services. This study is performed across the 58 neighborhoods of EBRP. Overutilization of …


Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman Nov 2019

Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman

LSU Master's Theses

The purpose of this research was to investigate how effective item-level Radio Frequency Identification (RFID) tagging would be using current RFID technology as a replacement for barcodes in a supermarket/grocery store environment.

To accomplish this, an experiment was be performed that utilized commercially available RFID technology. Passive Ultra High Frequency (UHF) RFID Tags were affixed to various grocery store items of different material categories (Food, Metal, Plastic, Liquid, and Glass), and placed in a metal shopping cart. Eight (8) antenna arrangements were created, comprised of different combinations of four (4) antennas in different locations around the cart.

The experiment was …


Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri Nov 2019

Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri

LSU Master's Theses

The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …


Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha Nov 2019

Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha

LSU Master's Theses

In today's interactive world 3D body scanning is necessary in the field of making virtual avatar, apparel industry, physical health assessment and so on. 3D scanners that are used in this process are very costly and also requires subject to be nearly naked or wear a special tight fitting cloths. A cost effective 3D body scanning system which can estimate body parameters under clothing will be the best solution in this regard. In our experiment we build such a body scanning system by fusing Kinect depth sensor and a Thermal camera. Kinect can sense the depth of the subject and …


A Low-Cost Experimental Testbed For Multi-Agent System Coordination Control, Victor Fernandez-Kim Jun 2019

A Low-Cost Experimental Testbed For Multi-Agent System Coordination Control, Victor Fernandez-Kim

LSU Master's Theses

A multi-agent system can be defined as a coordinated network of mobile, physical agents that execute complex tasks beyond their individual capabilities. Observations of biological multi-agent systems in nature reveal that these ``super-organisms” accomplish large scale tasks by leveraging the inherent advantages of a coordinated group. With this in mind, such systems have the potential to positively impact a wide variety of engineering applications (e.g. surveillance, self-driving cars, and mobile sensor networks). The current state of research in the area of multi-agent systems is quickly evolving from the theoretical development of coordination control algorithms and their computer simulations to experimental …


Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel Apr 2018

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel

LSU Master's Theses

A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …


Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving Apr 2018

Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving

LSU Master's Theses

Performance variability, stemming from non-deterministic hardware and software behaviors or deterministic behaviors such as measurement bias, is a well-known phenomenon of computer systems which increases the difficulty of comparing computer performance metrics and is slated to become even more of a concern as interest in Big Data Analytics increases. Conventional methods use various measures (such as geometric mean) to quantify the performance of different benchmarks to compare computers without considering this variability which may lead to wrong conclusions. In this paper, we propose three resampling methods for performance evaluation and comparison: a randomization test for a general performance comparison between …


Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar Mar 2018

Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar

LSU Master's Theses

We believe that using the classification accuracy is not enough to evaluate the performances of classification algorithms. It can be misleading due to overlooking an important element which is the cost if classification is inaccurate. Furthermore, the Receiver Operational Characteristic (ROC) is one of the most popular graphs used to evaluate classifiers performances. However, one of the biggest ROC’s shortcomings is the assumption of equal costs for all misclassified data. Therefore, our goal is to reduce the total cost of decision making by selecting the classifier that has the least total misclassification cost. Nevertheless, the exact misclassification cost is usually …


Data-Driven Abstraction, Vivian Mankau Ho Aug 2017

Data-Driven Abstraction, Vivian Mankau Ho

LSU Master's Theses

Given a program analysis problem that consists of a program and a property of interest, we use a data-driven approach to automatically construct a sequence of abstractions that approach an ideal abstraction suitable for solving that problem. This process begins with an infinite concrete domain that maps to a finite abstract domain defined by statistical procedures resulting in a clustering mixture model. Given a set of properties expressed as formulas in a restricted and bounded variant of CTL, we can test the success of the abstraction with respect to a predefined performance level. In addition, we can perform iterative abstraction-refinement …