Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Computer Engineering

Data-Driven Approaches For Enhancing Power Grid Reliability, Behrouz Sohrabi Mar 2024

Data-Driven Approaches For Enhancing Power Grid Reliability, Behrouz Sohrabi

Electronic Theses and Dissertations

This thesis explores the transformative potential of data-driven approaches in addressing key operational and reliability issues in power systems. The first part of this thesis addresses a prevalent problem in power distribution networks: the accurate identification of load phases. This study develops a data-driven model leveraging consumption measurements from smart meters and corresponding substation data to reconstruct topology information in low-voltage distribution networks. The proposed model is extensively tested using a dataset with more than 5,000 real load profiles, demonstrating satisfactory performance for large-scale networks. The second part of the thesis pivots to a crucial safety concern: the risk and …


Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman Jan 2024

Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman

Electronic Theses and Dissertations

Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani Jan 2021

Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani

Electronic Theses and Dissertations

Outdoor positioning systems based on the Global Navigation Satellite System have several shortcomings that have deemed their use for indoor positioning impractical. Location fingerprinting, which utilizes machine learning, has emerged as a viable method and solution for indoor positioning due to its simple concept and accurate performance. In the past, shallow learning algorithms were traditionally used in location fingerprinting. Recently, the research community started utilizing deep learning methods for fingerprinting after witnessing the great success and superiority these methods have over traditional/shallow machine learning algorithms. The contribution of this dissertation is fourfold:

First, a Convolutional Neural Network (CNN)-based method for …


Cognitive Satellite Communications And Representation Learning For Streaming And Complex Graphs., Wenqi Liu Aug 2019

Cognitive Satellite Communications And Representation Learning For Streaming And Complex Graphs., Wenqi Liu

Electronic Theses and Dissertations

This dissertation includes two topics. The first topic studies a promising dynamic spectrum access algorithm (DSA) that improves the throughput of satellite communication (SATCOM) under the uncertainty. The other topic investigates distributed representation learning for streaming and complex networks. DSA allows a secondary user to access the spectrum that are not occupied by primary users. However, uncertainty in SATCOM causes more spectrum sensing errors. In this dissertation, the uncertainty has been addressed by formulating a DSA decision-making process as a Partially Observable Markov Decision Process (POMDP) model to optimally determine which channels to sense and access. Large-scale networks have attracted …


Improvements Of And Extensions To Fsmweb: Testing Mobile Apps, Ahmed Fawzi Al Haddad Jan 2019

Improvements Of And Extensions To Fsmweb: Testing Mobile Apps, Ahmed Fawzi Al Haddad

Electronic Theses and Dissertations

A mobile application is a software program that runs on mobile device. In 2017, 178.1 billion mobile apps downloaded and the number is expected to grow to 258.2 billion app downloads in 2022 [19]. The number of app downloads poses a challenge for mobile application testers to find the right approach to test apps. This dissertation extends the FSMWeb approach for testing web applications [50] to test mobile applications (FSMApp). During the process of analyzing FSMWeb how it could be extended to test Mobile Apps, a number of shortcomings were detected which we improved upon. We discuss these first. We …


Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel Jan 2018

Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel

Electronic Theses and Dissertations

In the past decade, we have witnessed explosive growth in the number of low-power embedded and Internet-connected devices, reinforcing the new paradigm, Internet of Things (IoT). IoT devices like smartphones, home security systems, smart electric meters, garage parking indicators, etc., have penetrated deeply into our daily lives. These IoT devices are increasingly attached and operated in mobile objects like unmanned vehicles, trains, airplanes, etc. The low power wide area network (LPWAN), due to its long-range, low-power and low-cost communication capability, is actively considered by academia and industry as the future wireless communication standard for IoT. However, despite the increasing popularity …


Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri Jan 2018

Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri

Electronic Theses and Dissertations

Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …


Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha Jan 2018

Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha

Electronic Theses and Dissertations

Pedestrian distraction from smartphones is a serious social problem that caused an ever increasing number of fatalities especially as virtual reality (VR) games have gained popularity recently. In this thesis, we present the design, implementation, and a pilot study of WiPedCross, a WiFi direct-based pedestrian safety system that senses and evaluates a risk, and alerts accordingly the user to prevent traffic accidents. In order to develop a non-intrusive, accurate, and energy-efficient pedestrian safety system, a number of technical challenges are addressed: to enhance the positioning accuracy of the user for precise risk assessment, a map-matching algorithm based on a Hidden …


Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu Jan 2018

Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu

Electronic Theses and Dissertations

A traffic monitoring system (TMS) is an integral part of Intelligent Transportation Systems (ITS) for traffic analysis and planning. However, covering huge miles of rural highways (119,247 miles in U.S.) with a large number of TMSs is a very challenging problem due to the cost issue. This paper aims to address the problem by developing a low-cost and portable TMS called DeepWiTraffic based on COTs WiFi devices. The proposed system enables accurate vehicle detection (counting) and classification by exploiting the unique WiFi Channel State Information (CSI) of passing vehicles. Spatial and temporal correlations of CSI amplitude and phase data are …


A Dynamic Scaling Methodology For Improving Performance Of Big Data Systems, Nashmiah Alhamdawi Jan 2017

A Dynamic Scaling Methodology For Improving Performance Of Big Data Systems, Nashmiah Alhamdawi

Electronic Theses and Dissertations

The continuous growth of data volume in various fields such as, healthcare, sciences, economics, and business has caused an overwhelming flow of data in the last decade. The overwhelming flow of data has raised challenges in processing, analyzing, and storing data, which lead many systems to face an issue in performance. Poor performance of systems creates negative impact such as delays, unprocessed data, and increasing response time. Processing huge amounts of data demands a powerful computational infrastructure to ensure that data processing and analysis success [7]. However, the architectures of these systems are not suitable to process that quantity of …


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr. May 2015

Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.

Electronic Theses and Dissertations

The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad Jan 2014

Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad

Electronic Theses and Dissertations

In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- and …