Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Computer Engineering

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim Dec 2016

Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim

Open Access Theses

Sport-related Traumatic Brain Injury (TBI) is one of the major concerns for collision based sports athletes and their families. The ability to measure impacts on the head is imperative to monitor brain injury and prevent serious TBI. Recent research by the Purdue Neurotrauma Group (PNG) indicates that accumulation of subconcussive impacts may cause permanent neurological damage. Currently available commercial impact monitoring systems are designed as an event-based models which collect impact data above pre-determined acceleration thresholds. To track long-term effects of sub-concussive impacts, event-based modeling is inadequate. The PNG developed a biomechanical sports telemetry system that is capable of storing …


Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon Dec 2016

Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon

Open Access Theses

Traumatic brain injuries (TBI) while playing sports are a major concern for the general public today. Recently, studies have shown that repetitive subconcussive hits can lead to neurological disorders. In order to prevent the athletes from suffering traumatic brain injuries, many organizations related to contact based sports and the military employ commercialized head impact telemetry systems. However, a majority of the commercialized systems is event based which only collects the linear acceleration that exceeds a certain threshold. To accurately record and utilize the data from the impact telemetry system, it is necessary to record all the linear and angular acceleration …


A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan Dec 2016

A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan

Open Access Theses

Preserving transaction atomicity and ensuring its commitment is key to the maintenance of data integrity in a distributed database. The distributed consensus protocol is a prominent example of a mechanism used to accomplish safe commitment of a distributed transaction. These protocols are based primarily on repeated message exchange among all sites/nodes and their performance is characterized not only by the number of these messages but also by the underlying communication topology. This thesis proposes a measure of performance known as average message complexity and proposes a communication structure based on folded even graphs called the Folded Even Network (FEN). Performance …


Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat Dec 2016

Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat

Open Access Theses

Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.

This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …


Liquid Metal Particle Popping: Nanoscale To Macroscale, Trevor R. Lear Dec 2016

Liquid Metal Particle Popping: Nanoscale To Macroscale, Trevor R. Lear

Open Access Theses

Liquid metal nanoparticles can be used to produce stretchable electronic devices. Understanding the mechanical properties of liquid metal nanoparticles is crucial to optimizing their use in various applications, especially printing of flexible, stretchable electronics. Smaller nanoparticles are desired for high-resolution printing and compatibility with existing scalable manufacturing methods; however, they contain less liquid metal and are more difficult to rupture than larger particles, making them less desirable for post-processing functionality. This study investigates the mechanics of liquid metal particle rupture as a function of particle size. We employ compression of particle films to characterize the composition of the particle core …


Algorithms For Lidar Based Traffic Tracking: Development And Demonstration, Vamsi K. Bandaru Aug 2016

Algorithms For Lidar Based Traffic Tracking: Development And Demonstration, Vamsi K. Bandaru

Open Access Theses

The current state of the art of traffic tracking is based on the use of video, and requires extensive manual intervention for it to work, including hours of painstaking human examination of videos frame by frame which also make the acquisition of data extremely expensive. Fundamentally, this is because we do not have observability of the actual scene from a camera which captures a 2D projection of the 3D world. Even if video were to be automated, it would involve such algorithms as RANSACK for outlier elimination while matching features across frames or across multiple cameras. This results in algorithms …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


A Study Of Applications Of 3d Animation For Emergency Medicine Pedagogy, Huilong Zheng Aug 2016

A Study Of Applications Of 3d Animation For Emergency Medicine Pedagogy, Huilong Zheng

Open Access Theses

There is ample precedent for the use of 3D animation in education, though little research on specific applications in the field of medicine. An experiment was carried out to assess the suitability of 3D animation for educational purposes in emergency medicine courses. Two groups of experimental participants were assessed on their ability to respond to three emergency medical situations in simulated test scenarios. Both groups received equivalent information on how to treat the three different medical emergencies. The control group received the information in traditional lecture format. The experimental group instead received the information from a set of 3D animations. …


Command Shaping With Constrained Peak Input Acceleration To Minimize Residual Vibration In A Flexible-Joint Robot, Yumeng Wu Aug 2016

Command Shaping With Constrained Peak Input Acceleration To Minimize Residual Vibration In A Flexible-Joint Robot, Yumeng Wu

Open Access Theses

Rapid point-to-point motion is limited when flexibilities exist in the system. In order to minimize the vibrations related to joint flexibilities, much work has been done, including modifying the system so that vibrations can be damped out more quickly, calculating the inverse dynamics of the system and constructing shaped input profiles that avoid system natural frequencies. In this work, the earlier fixed-time command shaping method has been extended to a peak-acceleration-constrained approach with two basis functions, the ramped sinusoid function and the versine function, such that the maximum acceleration is guaranteed without overconstraining the input profiles. The approach is developed …


Analysis Of Feedback Control Applied With Command Shaping To Minimize Residual Vibration, Nicholas L. Jacobs Aug 2016

Analysis Of Feedback Control Applied With Command Shaping To Minimize Residual Vibration, Nicholas L. Jacobs

Open Access Theses

Joint flexibility is a physical trait that affects all robotic systems to some degree. This characteristic has been shown to be very detrimental to the performance of these robotic systems when implementing fast point-to-point motion. During such motion, the robot will induce vibrations in its structure that will extend past the completion of the move. Many techniques have been applied over the years in order to minimize these residual vibrations. One such method is known as command shaping, which will construct the input profile so as to avoid exciting the natural frequencies of the system. This work seeks to extend …


Stochastic Modeling And Dem Simulation Of Granular Media Subsidence Due To Underground Activity, Rodrigo Borela Valente Aug 2016

Stochastic Modeling And Dem Simulation Of Granular Media Subsidence Due To Underground Activity, Rodrigo Borela Valente

Open Access Theses

Many communities around the world have been established in areas of ongoing, as well as ceased, underground mining activity. Ground movements induced by ore extraction methods and the collapse of abandoned cavities have long been recognized as a hazard to surface structures. A number of approaches have been proposed for the prediction of subsidence in underground mining regions, and their integration to Geographic Information Systems (GIS) can produce a powerful risk management tool. Nevertheless, this application is often limited by either a lack of generality or excessive computational cost of the methods available.

In this work, the stochastic subsidence model …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


Fast Voxel Line Update For Time-Space Image Reconstruction, Xiao Wang Aug 2016

Fast Voxel Line Update For Time-Space Image Reconstruction, Xiao Wang

Open Access Theses

Recent applications of model-based iterative reconstruction(MBIR) algorithm to time-space Computed Tomography (CT) have shown that MBIR can greatly improve image quality by increasing resolution as well as reducing noise and some artifacts. Among the various iterative methods that have been studied for MBIR, iterative coordinate descent(ICD) has been found to have relatively low overall computational requirements due to its fast convergence. However, high computational cost and long reconstruction times remain as a barrier to the use of MBIR in practical applications. This disadvantage is especially prominent in time-space reconstruction because of the large volume of data. This thesis presents a …


User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal Apr 2016

User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal

Open Access Theses

Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …


A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq Apr 2016

A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq

Open Access Theses

Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …


An Empirical Approach To The Re-Creation Of Vehicle Drive Cycles, Andrew J. Larson Apr 2015

An Empirical Approach To The Re-Creation Of Vehicle Drive Cycles, Andrew J. Larson

Open Access Theses

Vehicles such as buses, delivery trucks, mining equipment, and motorsport vehicles often repeat a highly defined pattern, route, or track during normal use. For these vehicles, standard dynamometer drive cycles are of little use. It was proposed that deriving a vehicle drive cycle from empirical data collected from on-board vehicle sensors would produce more accurate vehicle characteristic predictions for special purpose vehicles. This study answers the question "Is it possible to use recorded vehicle data to replicate a real world driving scenario for the purpose of vehicle diagnostics?" To reduce the complexity of the project, an electric go-kart was used …


Hybrid Power System For Micro Air Vehicles, Bakytgul Khaday Apr 2015

Hybrid Power System For Micro Air Vehicles, Bakytgul Khaday

Open Access Theses

Today Micro Air Vehicles are in need of a good power source that would enable them longer flight time and various functionalities. This work is focused on to this problem. A possible solution that is offered in this study is implementing a hybrid power system consisting of battery and supercapacitor (SCAP). The proposed hybrid power system was tested on an existing MAV platform (Cheerson CX-10). A separate hybrid power printed circuit board (PCB) was designed and manufactured. For experimental and system verification purposes, the PCB was not sized for on-board flight. The hybrid power PCB was connected to MAV through …


Hubcheck: Check The Hub, Derrick S. Kearney Apr 2015

Hubcheck: Check The Hub, Derrick S. Kearney

Open Access Theses

The HUBzero Platform is a framework for building websites, referred to as "hubs," that promote research communities through online simulation, data management, and collaboration. With each software release, the HUBzero Team dedicates weeks of team members' time toward manually testing, fixing, and retesting hub components. The unique mixture of environments that make up a hub makes using existing automated testing solutions hard and shifts the burden of testing to humans, promoting variation, spot checking of fixes, and other shortcuts to avoid the high cost of completely retesting the system. With over twenty hubs being actively managed by the HUBzero Team, …


Diagnosis Of Systematic Defects Based On Design-For-Manufacturability Guidelines, Dhawal Krishana Gupta Apr 2015

Diagnosis Of Systematic Defects Based On Design-For-Manufacturability Guidelines, Dhawal Krishana Gupta

Open Access Theses

All products in the Very-Large-Scale-Integrated-Circuit (VLSIC) industry go through three major stages of production - Design, Verification and Manufacturing. Unfortunately, neither of these stages are truly perfect, hence we need two more sub-stages of manufacturing, namely Testing and Defect Diagnosis to prevent imperfections in ICs. Testing is used to generate test vectors to validate the functionality of the Device-under-Test (DUT), and Defect Diagnosis is the process of identifying the root-cause of a failing chip, i.e., the location and nature of defect. Systematic defects are unintended structural and material changes at specific locations with a higher probability of failure due to …


Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami Apr 2015

Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami

Open Access Theses

Lane-change maneuver is one of the most thoroughly investigated automatic driving operations that can be used by an autonomous self-driving vehicle as a primitive for performing more complex operations like merging, entering/exiting highways or overtaking another vehicle. This thesis focuses on two coherent problems that are associated with the trajectory generation for lane-change maneuvers of autonomous vehicles in a highway scenario: (i) an effective velocity estimation of neighboring vehicles under different road scenarios involving linear and curvilinear motion of the vehicles, and (ii) trajectory generation based on the estimated velocities of neighboring vehicles for safe operation of self-driving cars during …


Characterization Of Vectorization Strategies For Recursive Algorithms, Shruthi Balakrishna Apr 2015

Characterization Of Vectorization Strategies For Recursive Algorithms, Shruthi Balakrishna

Open Access Theses

A successful architectural trend in parallelism is the emphasis on data parallelism with SIMD hardware. Since SIMD extensions on commodity processors tend to require relatively little extra hardware, executing a SIMD instruction is essentially free from a power perspective, making vector computation an attractive target for parallelism. SIMD instructions are designed to accelerate the performance of applications such as motion video, real-time physics and graphics. Such applications perform repetitive operations on large arrays of numbers. While the key idea is to parallelize significant portions of data that get operated by several sequential instructions into a single instruction, not every application …


Exploiting Intra-Warp Address Monotonicity For Fast Memory Coalescing In Gpus, Hector Rodriguez-Simmonds Apr 2015

Exploiting Intra-Warp Address Monotonicity For Fast Memory Coalescing In Gpus, Hector Rodriguez-Simmonds

Open Access Theses

Graphics Processing Units (GPUs) are growing increasingly popular as general purpose compute accelerators. GPUs are best suited for applications which have abundant data parallelism wherein the computation expressed as a single thread can be applied over a large set of data items. One key constraint that affects application performance on GPUs is that the underlying hardware is single-instruction, multiple data (SIMD) hardware which requires parallel instructions from the multiple threads to execute in a lock-step manner. The benefits of lock-step execution can be seriously degraded if the threads diverge (because of memory or branches). Specifically in the case of memory, …


Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang Apr 2015

Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang

Open Access Theses

While there has been much work done on analyzing and transforming regular programs that operate over linear arrays and dense matrices, comparatively little has been done to try to carry these optimizations over to programs that operate over heap-based data structures using pointers. Previous work has shown that point blocking, a technique similar to loop tiling in regular programs, can help increase the temporal locality of repeated tree traversals. Point blocking, however, has only been shown to work on tree traversals where each traversal is fully independent and would allow parallelization, greatly limiting the types of applications that this transformation …


Linear Matrix Inequality-Based Nonlinear Adaptive Robust Control With Application To Unmanned Aircraft Systems, David William Kun Apr 2015

Linear Matrix Inequality-Based Nonlinear Adaptive Robust Control With Application To Unmanned Aircraft Systems, David William Kun

Open Access Theses

Unmanned aircraft systems (UASs) are gaining popularity in civil and commercial applications as their lightweight on-board computers become more powerful and affordable, their power storage devices improve, and the Federal Aviation Administration addresses the legal and safety concerns of integrating UASs in the national airspace. Consequently, many researchers are pursuing novel methods to control UASs in order to improve their capabilities, dependability, and safety assurance. The nonlinear control approach is a common choice as it offers several benefits for these highly nonlinear aerospace systems (e.g., the quadrotor). First, the controller design is physically intuitive and is derived from well known …


Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King Oct 2014

Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King

Open Access Theses

As sport-related concussions become more prevalent, the ability to quickly and reliably assess brain injury risk is increasingly essential. Commercially-available systems exist with the goal of assessing the risk of traumatic brain injury in athletes in real-time. These systems utilize a pre-determined acceleration threshold, discarding all captured information below this arbitrary threshold. The use of an event-based model to assess the risk of traumatic brain injury has been shown to be inadequate. Therefore, these systems falsely promote "accurate" real-time communication of risk. Research conducted by the Purdue Neurotrauma Group (PNG) seeks to advance the field by developing a biomechanical sports …


Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson Oct 2014

Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson

Open Access Theses

The lionfish is an invasive species that out-competes and overcrowds native sh species along the eastern seaboard of the United States and down into the Caribbean. Lionfish populations are growing rapidly. Current methods of monitoring lionfish populations are costly and time intensive. A bio-inspired robotic fish was built to use as an autonomous lionfish tracking platform. Lionfish are tracked visually using an onboard processor. Five different computer vision methods for identification and tracking are proposed and discussed. These include: background subtraction, color tracking, mixture of Gaussian background subtraction, speeded up robust feature (SURF), and CamShift based tracking. Each of these …


Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony Oct 2014

Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony

Open Access Theses

Trajectory optimization is a field which can benefit greatly from the advantages offered by parallel computing. The current state-of-the-art in trajectory optimization focuses on the use of direct optimization methods, such as the pseudo-spectral method. These methods are favored due to their ease of implementation and large convergence regions while indirect methods have largely been ignored in the literature in the past decade except for specific applications in astrodynamics. It has been shown that the shortcomings conventionally associated with indirect methods can be overcome by the use of a continuation method in which complex trajectory solutions are obtained by solving …


Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton Oct 2014

Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton

Open Access Theses

Open source software plays an important part in the modern world, powering businesses large and small. However, little work has been done to evaluate the quality of open source software. Two different license paradigms exist within the open source world, and this study examines the difference in software quality between them. In this thesis, the author uses technical debt as a measure of software quality. Eighty open source projects (40 from each paradigm) were downloaded from the popular open source hosting website SourceForge. Using complexity, code duplication, comments, and unit test coverage as inputs to the SonarQube technical debt model, …


Wi-Fi Real Time Location Systems, Benjamin A. Doll Oct 2014

Wi-Fi Real Time Location Systems, Benjamin A. Doll

Open Access Theses

This thesis objective was to determine the viability of utilizing an untrained Wi-Fi real time location system as a GPS alternative for indoor environments. Background research showed that GPS is rarely able to penetrate buildings to provide reliable location data. The benefit of having location information in a facility and how they might be used for disaster or emergency relief personnel and their resources motivated this research. A building was selected with a well-deployed Wi-Fi infrastructure and its untrained location feature was used to determine the distance between the specified test points and the system identified location. It was found …