Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Other Computer Engineering (11)
- Robotics (6)
- Digital Communications and Networking (5)
- Electrical and Computer Engineering (4)
- Computer Sciences (3)
-
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Physical Sciences and Mathematics (3)
- Artificial Intelligence and Robotics (2)
- Computer and Systems Architecture (2)
- Controls and Control Theory (2)
- Data Storage Systems (2)
- Mechanical Engineering (2)
- Signal Processing (2)
- Systems and Communications (2)
- Cardiovascular Diseases (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Diseases (1)
- Electrical and Electronics (1)
- Electro-Mechanical Systems (1)
- Graphics and Human Computer Interfaces (1)
- Hardware Systems (1)
- Health Information Technology (1)
- Industrial Engineering (1)
- Industrial Technology (1)
- Manufacturing (1)
- Materials Science and Engineering (1)
- Medicine and Health Sciences (1)
- Keyword
-
- Robotics (4)
- 3D Body scanning (1)
- 3D Printing (1)
- ARM (1)
- AUC (1)
-
- AWS (1)
- Accuracy (1)
- Additive Manufacturing (1)
- Automated traffic counts (1)
- B/C analysis (1)
- Big Data (1)
- CIP (1)
- Casual Inference (1)
- Cold start (1)
- Computer vision (1)
- Cost Ratio (1)
- Cost Sensitive Classification (1)
- Cybersecurity (1)
- Decentralized (1)
- Deep Neural Networks (1)
- Device free (1)
- Digital forensics (1)
- Distributed computing (1)
- East Baton Rouge Parish (1)
- Embedded Systems (1)
- Emergency Department (1)
- Error in counts (1)
- Evaluation (1)
- Experimental testbed (1)
- Face Detection (1)
Articles 1 - 23 of 23
Full-Text Articles in Computer Engineering
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Autonomous Shipwreck Detection & Mapping, William Ard
Autonomous Shipwreck Detection & Mapping, William Ard
LSU Master's Theses
This thesis presents the development and testing of Bruce, a low-cost hybrid Remote Operated Vehicle (ROV) / Autonomous Underwater Vehicle (AUV) system for the optical survey of marine archaeological sites, as well as a novel sonar image augmentation strategy for semantic segmentation of shipwrecks. This approach takes side-scan sonar and bathymetry data collected using an EdgeTech 2205 AUV sensor integrated with an Harris Iver3, and generates augmented image data to be used for the semantic segmentation of shipwrecks. It is shown that, due to the feature enhancement capabilities of the proposed shipwreck detection strategy, correctly identified areas have a 15% …
An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez
An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez
LSU Master's Theses
In a world of continuously advancing technology, the reliance on these technologies continues to increase. Recently, transformer networks [22] have been implemented through various projects such as ChatGPT. These networks are extremely computationally demanding and require cutting-edge hardware to explore. However, with the growing increase and popularity of these neural networks, a question of reliability and resilience comes about, especially as the dependency and research on these networks grow. Given the computational demand of transformer networks, we investigate the resilience of the weights and biases of the predecessor of these networks, i.e. the Long Short-Term (LSTM) neural network, through four …
A Machine Learning Approach To Robotic Additive Manufacturing Of Uv-Curable Polymers Using Direct Ink Writing, Luis A. Velazquez
A Machine Learning Approach To Robotic Additive Manufacturing Of Uv-Curable Polymers Using Direct Ink Writing, Luis A. Velazquez
LSU Master's Theses
This thesis presents the design and implementation of a robotic additive manufacturing system that uses ultraviolet (UV)-curable thermoset polymers. Its design considers future applications involving free-standing 3D printing by means of partial UV curing and the fabrication of samples that are reinforced with fillers or fibers to manufacture complex-shape objects.
The proposed setup integrates a custom-built extruder with a UR5e collaborative manipulator. The capabilities of the system were demonstrated using Anycubic resin formulations containing fumed silica (FS) at varying weight fractions from 2.8 to 8 wt%. To fully cure the specimens after fabrication, a UV chamber was used. Then, measurements …
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
LSU Master's Theses
In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Evaluating Serverless Computing, Charitra Maharjan
Evaluating Serverless Computing, Charitra Maharjan
LSU Master's Theses
Function as a Service (FaaS) is gaining admiration because of its way of deploying the computations to serverless backends in the different clouds. It transfers the complexity of provisioning and allocating the necessary resources for an application to the cloud providers. The cloud providers also give an illusion of always availability of resources to the users. Among the cloud providers, AWS serverless platform offers a new paradigm for developing cloud applications without worrying about the underlying hardware infrastructure. It manages not only the resource provisioning and scaling of an application but also provides an opportunity to reimagine the cloud infrastructure …
Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun
Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun
LSU Master's Theses
ABSTRACT
Traceability link recovery (TLR) is a software engineering activity that helps to ensure software quality and assists with keeping track of changes by establishing links between software artifacts that are a part of the software engineering process, such as requirements, use cases, source code, test cases, and documentation. Software requirement artifacts are typically written in natural language. An Information Retrieval process is frequently used in many software activities, including the TLR activity. Recently, Word Embedding (WE) techniques have been used in many natural language processing tasks as well as in TLR tasks. We investigate the effectiveness of WE techniques …
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
LSU Master's Theses
This study presents an onboard sensor system for determining the relative positions of mobile robots, which is used in decentralized distance-based formation controllers for multi-agent systems. This sensor system uses infrared photodiodes and LEDs; its effective use requires coordination between the emitting and detecting robots. A technique is introduced for calculating the relative positions based on photodiode readings, and an automated calibration system is designed for future maintenance. By measuring the relative positions of their neighbors, each robot is capable of running an onboard formation controller, which is independent of both a centralized controller and a global positioning-like system (e.g., …
Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala
Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala
LSU Master's Theses
Hardware-In-the-Loop (HIL) simulation is an approach that is used for embedded systems testing which was popular in the early days of embedded systems. This technology was wrapped and was stored away for a long time. One of the main reasons is that the less use of embedded systems in society. Recent developments in embedded systems, data science, and control systems lead to a focus on testing these systems. The earliest method of testing these systems was by doing destructive testing which is a waste of money, resources, and time. The HIL provided a safe and economical way of testing the …
Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal
Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal
LSU Master's Theses
Remote monitoring of hydrocarbon wells is a tedious and meticulously thought out task performed to create a cyber-physical bridge between the asset and the owner. There are many systems and techniques on the market that offer this solution but due to their lack of interoperability and/or decentralized architecture they begin to fall apart when remote assets become farther away from the client. This results in extreme latency and thus poor decision making. Microsoft's Azure IoT Edge was the focus of this writing. Coupled with off-the-shelf hardware, Azure's IoT Edge services were integrated with an existing unit simulating a remote hydrocarbon …
An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder
An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder
LSU Master's Theses
One of the fundamental sources of data for traffic analysis is vehicle counts, which can be conducted either by the traditional manual method or by automated means. Different agencies have guidelines for manual counting, but they are typically prepared for particular conditions. In the case of automated counting, different methods have been applied, but You Only Look Once (YOLO), a recently developed object detection model, presents new potential in automated vehicle counting. The first objective of this study was to formulate general guidelines for manual counting based on experience gained in the field. Another goal of this study was to …
Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati
Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati
LSU Master's Theses
The security posture of critical network appliances, such as routers, switches, and firewalls, is crucial as these devices provide the first line of defense against malicious actors. As there is typically no endpoint security software, such as anti-virus available for these devices, it is crucial that vendors release timely updates for vulnerabilities and that customers apply them quickly. The research effort documented in this thesis describes a developed methodology for triaging known vulnerabilities in network devices, assessing the security posture of device vendors, and locating likely weak points in released firmware images. To highlight this methodology, the Anonabox security appliance …
Why Do You Take That Route?, Alimire Nabijiang
Why Do You Take That Route?, Alimire Nabijiang
LSU Master's Theses
We conducted this study to investigate causal factors which affects the route-choice behavior of drivers. Due to the insufficiency of measured variables and the lack of high-fidelity properties obtained by conventional data, we carried out Stated Choice Experiment (SCE) using Immersive Virtual Environments (IVE) tool to collect data. IVE tool can provide realistic virtual experiences to participants, and give advantage of flexible environment for exploring causal factors of drivers’ decision on route choice. Based on reviewing literatures, we believe that there is limited studies that has tried to comprehend the route choice behavior of drivers using causal inference. The study …
Retrospective Study Of Fmol Health System Utilization Using Geospatial Information, Deekshith Mandala
Retrospective Study Of Fmol Health System Utilization Using Geospatial Information, Deekshith Mandala
LSU Master's Theses
Medicaid Expansion and closing of Emergency Departments (ED) like Earl K. Long, Baton Rouge General Mid-City ED, and Champion Medical Center changed the health care landscape in East Baton Rouge Parish (EBRP). In this research study, a Geographical Information System (GIS) is used to analyze the impact of the expansion of Medicaid and the inauguration of Our Lady of the Lake North Baton Rouge ED (OLOL NBR ED) over the utilization of Franciscan Missionaries of our Lady Health System (FMOLHS) for both emergency and non-emergency health care services. This study is performed across the 58 neighborhoods of EBRP. Overutilization of …
Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman
Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman
LSU Master's Theses
The purpose of this research was to investigate how effective item-level Radio Frequency Identification (RFID) tagging would be using current RFID technology as a replacement for barcodes in a supermarket/grocery store environment.
To accomplish this, an experiment was be performed that utilized commercially available RFID technology. Passive Ultra High Frequency (UHF) RFID Tags were affixed to various grocery store items of different material categories (Food, Metal, Plastic, Liquid, and Glass), and placed in a metal shopping cart. Eight (8) antenna arrangements were created, comprised of different combinations of four (4) antennas in different locations around the cart.
The experiment was …
Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri
Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri
LSU Master's Theses
The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …
Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha
Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha
LSU Master's Theses
In today's interactive world 3D body scanning is necessary in the field of making virtual avatar, apparel industry, physical health assessment and so on. 3D scanners that are used in this process are very costly and also requires subject to be nearly naked or wear a special tight fitting cloths. A cost effective 3D body scanning system which can estimate body parameters under clothing will be the best solution in this regard. In our experiment we build such a body scanning system by fusing Kinect depth sensor and a Thermal camera. Kinect can sense the depth of the subject and …
A Low-Cost Experimental Testbed For Multi-Agent System Coordination Control, Victor Fernandez-Kim
A Low-Cost Experimental Testbed For Multi-Agent System Coordination Control, Victor Fernandez-Kim
LSU Master's Theses
A multi-agent system can be defined as a coordinated network of mobile, physical agents that execute complex tasks beyond their individual capabilities. Observations of biological multi-agent systems in nature reveal that these ``super-organisms” accomplish large scale tasks by leveraging the inherent advantages of a coordinated group. With this in mind, such systems have the potential to positively impact a wide variety of engineering applications (e.g. surveillance, self-driving cars, and mobile sensor networks). The current state of research in the area of multi-agent systems is quickly evolving from the theoretical development of coordination control algorithms and their computer simulations to experimental …
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
LSU Master's Theses
A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …
Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving
Resampling Methods And Visualization Tools For Computer Performance Comparisons In The Presence Of Performance Variation, Samuel Oridge Irving
LSU Master's Theses
Performance variability, stemming from non-deterministic hardware and software behaviors or deterministic behaviors such as measurement bias, is a well-known phenomenon of computer systems which increases the difficulty of comparing computer performance metrics and is slated to become even more of a concern as interest in Big Data Analytics increases. Conventional methods use various measures (such as geometric mean) to quantify the performance of different benchmarks to compare computers without considering this variability which may lead to wrong conclusions. In this paper, we propose three resampling methods for performance evaluation and comparison: a randomization test for a general performance comparison between …
Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar
Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar
LSU Master's Theses
We believe that using the classification accuracy is not enough to evaluate the performances of classification algorithms. It can be misleading due to overlooking an important element which is the cost if classification is inaccurate. Furthermore, the Receiver Operational Characteristic (ROC) is one of the most popular graphs used to evaluate classifiers performances. However, one of the biggest ROC’s shortcomings is the assumption of equal costs for all misclassified data. Therefore, our goal is to reduce the total cost of decision making by selecting the classifier that has the least total misclassification cost. Nevertheless, the exact misclassification cost is usually …
Data-Driven Abstraction, Vivian Mankau Ho
Data-Driven Abstraction, Vivian Mankau Ho
LSU Master's Theses
Given a program analysis problem that consists of a program and a property of interest, we use a data-driven approach to automatically construct a sequence of abstractions that approach an ideal abstraction suitable for solving that problem. This process begins with an infinite concrete domain that maps to a finite abstract domain defined by statistical procedures resulting in a clustering mixture model. Given a set of properties expressed as formulas in a restricted and bounded variant of CTL, we can test the success of the abstraction with respect to a predefined performance level. In addition, we can perform iterative abstraction-refinement …