Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 13 of 13
Full-Text Articles in Computer Engineering
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Theses and Dissertations
Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
Theses and Dissertations
With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …
Real-Time Facial Expression Recognition Using Edge Ai Accelerators, Mark Heath Smith
Real-Time Facial Expression Recognition Using Edge Ai Accelerators, Mark Heath Smith
Theses and Dissertations
Facial expression recognition is a popular and challenging area of research in machine learning applications. Facial expressions are critical to human communication and allow us to convey complex thoughts and emotions beyond spoken language. The complexity of facial expressions creates a difficult problem for computer vision systems, especially edge computing systems. Current Deep Learning (DL) methods rely on large-scale Convolutional Neural Networks (CNN) which require millions of floating point operations (FLOPS) to accomplish similar image classification tasks. However, on edge and IoT devices, large-scale convolutional models can cause problems due to memory and power limitations. The intent of this work …
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Theses and Dissertations
Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.
This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Theses and Dissertations
Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …
Off-Chain Transaction Routing In Payment Channel Networks: A Machine Learning Approach, Heba Kadry
Off-Chain Transaction Routing In Payment Channel Networks: A Machine Learning Approach, Heba Kadry
Theses and Dissertations
Blockchain is a foundational technology that has the potential to create new prospects for our economic and social systems. However, the scalability problem limits the capability to deliver a target throughput and latency, compared to the traditional financial systems, with increasing workload. Layer-two is a collective term for solutions designed to help solve the scalability by handling transactions off the main chain, also known as layer one. These solutions have the capability to achieve high throughput, fast settlement, and cost efficiency without sacrificing network security. For example, bidirectional payment channels are utilized to allow the execution of fast transactions between …
Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel
Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel
Theses and Dissertations
The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …
Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat
Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat
Theses and Dissertations
With the rapid development of the Internet of Things (IoT) and Big data infrastructure, crowdsourcing techniques have emerged to facilitate data processing and problem solving particularly for flood emergences purposes. A Flood Analytics Information System (FAIS) has been developed as a Python Web application to gather Big data from multiple servers and analyze flooding impacts during historical and real-time events. The application is smartly designed to integrate crowd intelligence, machine learning (ML), and natural language processing of tweets to provide flood warning with the aim to improve situational awareness for flood risk management and decision making. FAIS allows the user …
Machine Learning Models Of C-17 Specific Range Using Flight Recorder Data, Marcus Catchpole
Machine Learning Models Of C-17 Specific Range Using Flight Recorder Data, Marcus Catchpole
Theses and Dissertations
Fuel is a significant expense for the Air Force. The C-17 Globemaster eet accounts for a significant portion. Estimating the range of an aircraft based on its fuel consumption is nearly as old as flight itself. Consideration of operational energy and the related consideration of fuel efficiency is increasing. Meanwhile machine learning and data-mining techniques are on the rise. The old question, "How far can my aircraft y with a given load cargo and fuel?" has given way to "How little fuel can I load into an aircraft and safely arrive at the destination?" Specific range is a measure of …
Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano
Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano
Theses and Dissertations
Cyber defense analysts face the challenge of validating machine generated alerts regarding network-based security threats. Operations tempo and systematic manpower issues have increased the importance of these individual analyst decisions, since they typically are not reviewed or changed. Analysts may not always be confident in their decisions. If confidence can be accurately assessed, then analyst decisions made under low confidence can be independently reviewed and analysts can be offered decision assistance or additional training. This work investigates the utility of using neurophysiological and behavioral correlates of decision confidence to train machine learning models to infer confidence in analyst decisions. Electroencephalography …
Direct L2 Support Vector Machine, Ljiljana Zigic
Direct L2 Support Vector Machine, Ljiljana Zigic
Theses and Dissertations
This dissertation introduces a novel model for solving the L2 support vector machine dubbed Direct L2 Support Vector Machine (DL2 SVM). DL2 SVM represents a new classification model that transforms the SVM's underlying quadratic programming problem into a system of linear equations with nonnegativity constraints. The devised system of linear equations has a symmetric positive definite matrix and a solution vector has to be nonnegative.
Furthermore, this dissertation introduces a novel algorithm dubbed Non-Negative Iterative Single Data Algorithm (NN ISDA) which solves the underlying DL2 SVM's constrained system of equations. This solver shows significant speedup compared to several other state-of-the-art …
Data-Driven Process Discovery: A Discrete Time Algebra For Relational Signal Analysis, David M. Conrad
Data-Driven Process Discovery: A Discrete Time Algebra For Relational Signal Analysis, David M. Conrad
Theses and Dissertations
This research presents an autonomous and computationally tractable method for scientific process analysis, combining an iterative algorithmic search and a recognition technique to discover multivariate linear and non-linear relations within experimental data series. These resultant data-driven relations provide researchers with a potentially real-time insight into experimental process phenomena and behavior. This method enables the efficient search of a potentially infinite space of relations within large data series to identify relations that accurately represent process phenomena. Proposed is a time series transformation that encodes and compresses real-valued data into a well-defined, discrete-space of 13 primitive elements where comparative evaluation between variables …
Using Discovery-Based Learning To Prove The Behavior Of An Autonomous Agent, David N. Mezera
Using Discovery-Based Learning To Prove The Behavior Of An Autonomous Agent, David N. Mezera
Theses and Dissertations
Computer-generated autonomous agents in simulation often behave predictably and unrealistically. These characteristics make them easy to spot and exploit by human participants in the simulation, when we would prefer the behavior of the agent to be indistinguishable from human behavior. An improvement in behavior might be possible by enlarging the library of responses, giving the agent a richer assortment of tactics to employ during a combat scenario. Machine learning offers an exciting alternative to constructing additional responses by hand by instead allowing the system to improve its own performance with experience. This thesis presents NOSTRUM, a discovery-based learning DBL system …