Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2019

Other Computer Engineering

Institution
Keyword
Publication

Articles 1 - 30 of 60

Full-Text Articles in Computer Engineering

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian Dec 2019

Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian

Electronic Thesis and Dissertation Repository

Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building/group to predict future consumption for that same building/group. With hundreds of thousands of smart meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Cluster-Based Chained Transfer Learning (CBCTL), an approach for building neural network-based models for many meters by taking advantage of already trained models through …


Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval Dec 2019

Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval

Computer Science and Computer Engineering Undergraduate Honors Theses

Deep learning has advanced progressively in the last years and now demonstrates state-of-the-art performance in various fields. In the era of big data, transformation of data into valuable knowledge has become one of the most important challenges in computing. Therefore, we will review multiple algorithms for face recognition that have been researched for a long time and are maturely developed, and analyze deep learning, presenting examples of current research.

To provide a useful and comprehensive perspective, in this paper we categorize research by deep learning architecture, including neural networks, convolutional neural networks, depthwise Separable Convolutions, densely connected convolutional networks, and …


Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz Dec 2019

Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz

Computer Science and Computer Engineering Undergraduate Honors Theses

The increasing complexity and demand of software systems and the greater availability of test automation software is quickly rendering manual end-to-end (E2E) testing techniques for mobile platforms obsolete. This research seeks to explore the potential increase in automated test efficacy and maintainability through the use of computer vision algorithms when applied with Appium, a leading cross-platform mobile test automation framework. A testing framework written in a Node.js environment was created to support the development of E2E test scripts that examine and report the functional capabilities of a mobile test app. The test framework provides a suite of functions that connect …


Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury Dec 2019

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury

Boise State University Theses and Dissertations

Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.

In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):

RQ1: Is it …


Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman Nov 2019

Rfid Item-Level Tagging In A Grocery Store Environment, Brian Truman

LSU Master's Theses

The purpose of this research was to investigate how effective item-level Radio Frequency Identification (RFID) tagging would be using current RFID technology as a replacement for barcodes in a supermarket/grocery store environment.

To accomplish this, an experiment was be performed that utilized commercially available RFID technology. Passive Ultra High Frequency (UHF) RFID Tags were affixed to various grocery store items of different material categories (Food, Metal, Plastic, Liquid, and Glass), and placed in a metal shopping cart. Eight (8) antenna arrangements were created, comprised of different combinations of four (4) antennas in different locations around the cart.

The experiment was …


Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri Nov 2019

Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri

LSU Master's Theses

The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …


Document Layout Analysis And Recognition Systems, Sai Kosaraju Nov 2019

Document Layout Analysis And Recognition Systems, Sai Kosaraju

Master of Science in Computer Science Theses

Automatic extraction of relevant knowledge to domain-specific questions from Optical Character Recognition (OCR) documents is critical for developing intelligent systems, such as document search engines, sentiment analysis, and information retrieval, since hands-on knowledge extraction by a domain expert with a large volume of documents is intensive, unscalable, and time-consuming. There have been a number of studies that have automatically extracted relevant knowledge from OCR documents, such as ABBY and Sandford Natural Language Processing (NLP). Despite the progress, there are still limitations yet-to-be solved. For instance, NLP often fails to analyze a large document. In this thesis, we propose a knowledge …


Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha Nov 2019

Thermal-Kinect Fusion Scanning System For Bodyshape Inpainting And Estimation Under Clothing, Sirazum Munira Tisha

LSU Master's Theses

In today's interactive world 3D body scanning is necessary in the field of making virtual avatar, apparel industry, physical health assessment and so on. 3D scanners that are used in this process are very costly and also requires subject to be nearly naked or wear a special tight fitting cloths. A cost effective 3D body scanning system which can estimate body parameters under clothing will be the best solution in this regard. In our experiment we build such a body scanning system by fusing Kinect depth sensor and a Thermal camera. Kinect can sense the depth of the subject and …


Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling Nov 2019

Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling

Electrical and Computer Engineering ETDs

Traditionally, machine learning models are assessed using methods that estimate an average performance against samples drawn from a particular distribution. Examples include the use of cross-validation or hold0out to estimate classification error, F-score, precision, and recall.

While these measures provide valuable information, they do not tell us a model's certainty relative to particular regions of the input space. Typically there are regions where the model can differentiate the classes with certainty, and regions where the model is much less certain about its predictions.

In this dissertation we explore numerous approaches for quantifying uncertainty in the individual predictions made by supervised …


Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh Oct 2019

Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh

Doctoral Dissertations

Society has benefited from the technological revolution and the tremendous growth in computing powered by Moore's law. However, we are fast approaching the ultimate physical limits in terms of both device sizes and the associated energy dissipation. It is important to characterize these limits in a physically grounded and implementation-agnostic manner, in order to capture the fundamental energy dissipation costs associated with performing computing operations with classical information in nano-scale quantum systems. It is also necessary to identify and understand the effect of quantum in-distinguishability, noise, and device variability on these dissipation limits. Identifying these parameters is crucial to designing …


Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat Aug 2019

Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat

Electronic Thesis and Dissertation Repository

In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to user's disaggregated power consumption data. This system encourages the users to apply DR by changing their behaviour of using heavier operation modes to lighter modes, and by encouraging users to shift their usages to off-peak hours. First, we apply Cross Correlation to detect times of the occurrences when an appliance …


Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim Aug 2019

Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim

Electronic Thesis and Dissertation Repository

Neck pain is a major global public health concern and adds a significant financial burden to both the healthcare system as well as people suffering from it. Additionally, it presents measurement and evaluation challenges for clinicians as well as adherence challenges and treatment barriers for the patients. We have developed a virtual reality (VR)-based video game that can be used to capture outcomes that may aid in the assessment and treatment of neck pain. We investigated: (i) performance metrics of overall accuracy, accuracy based on movement difficulty, duration, and total envelope of movement; (ii) stability across sessions; (iii) accuracy across …


Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick Aug 2019

Minos: Unsupervised Netflow-Based Detection Of Infected And Attacked Hosts, And Attack Time In Large Networks, Mousume Bhowmick

Boise State University Theses and Dissertations

Monitoring large-scale networks for malicious activities is increasingly challenging: the amount and heterogeneity of traffic hinder the manual definition of IDS signatures and deep packet inspection. In this thesis, we propose MINOS, a novel fully unsupervised approach that generates an anomaly score for each host allowing us to classify with high accuracy each host as either infected (generating malicious activities), attacked (under attack), or clean (without any infection). The generated score of each hour is able to detect the time frame of being attacked for an infected or attacked host without any prior knowledge. MINOS automatically creates a personalized traffic …


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better understanding …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari Aug 2019

An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari

Electronic Theses and Dissertations

Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less …


Fake Review Detection Using Data Mining, Md Forhad Hossain Aug 2019

Fake Review Detection Using Data Mining, Md Forhad Hossain

MSU Graduate Theses

Online spam reviews are deceptive evaluations of products and services. They are often carried out as a deliberate manipulation strategy to deceive the readers. Recognizing such reviews is an important but challenging problem. In this work, I try to solve this problem by using different data mining techniques. I explore the strength and weakness of those data mining techniques in detecting fake review. I start with different supervised techniques such as Support Vector Ma- chine (SVM), Multinomial Naive Bayes (MNB), and Multilayer Perceptron. The results attest that all the above mentioned supervised techniques can successfully detect fake review with more …


Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez Jul 2019

Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez

Electronic Thesis and Dissertation Repository

Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make …


Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng Jul 2019

Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng

Doctoral Dissertations

Today we are living in a world awash with data. Large volumes of data are acquired, analyzed and applied to tasks through machine learning algorithms in nearly every area of science, business, and industry. For example, medical scientists analyze the gene expression data from a single specimen to learn the underlying causes of disease (e.g. cancer) and choose the best treatment; retailers can know more about customers' shopping habits from retail data to adjust their business strategies to better appeal to customers; suppliers can enhance supply chain success through supply chain systems built on knowledge sharing. However, it is also …


Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania Jun 2019

Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania

LSU Doctoral Dissertations

Data in many research fields continues to grow in both size and complexity. For instance, recent technological advances have caused an increased throughput in data in various biological-related endeavors, such as DNA sequencing, molecular simulations, and medical imaging. In addition, the variance in the types of data (textual, signal, image, etc.) adds an additional complexity in analyzing the data. As such, there is a need for uniquely developed applications that cater towards the type of data. Several considerations must be made when attempting to create a tool for a particular dataset. First, we must consider the type of algorithm required …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Computer Vision Machine Learning And Future-Oriented Ethics, Abagayle Lee Blank Jun 2019

Computer Vision Machine Learning And Future-Oriented Ethics, Abagayle Lee Blank

Honors Projects

Computer Vision Machine Learning (CVML) in the application of facial recognition is currently being researched, developed, and deployed across the world. It is of interest to governments, technology companies, and consumers. However, fundamental issues remain related to human rights, error rates, and bias. These issues have the potential to create societal backlash towards the technology which could limit its benefits as well as harm people in the process. To develop facial recognition technology that will be beneficial to society in and beyond the next decade, society must put ethics at the forefront. Drawing on AI4People’s adaption of bioethics for AI, …


Reach - A Community Service Application, Samuel Noel Magana Jun 2019

Reach - A Community Service Application, Samuel Noel Magana

Computer Engineering

Communities are familiar threads that unite people through several shared attributes and interests. These commonalities are the core elements that link and bond us together. Many of us are part of multiple communities, moving in and out of them depending on our needs. These common threads allow us to support and advocate for each other when facing a common threat or difficult situation. Healthy and vibrant communities are fundamental to the operation of our society. These interactions within our communities define the way we as individuals interact with each other, and society at large. Being part of a community helps …


Digital Forensics Challenge, Zoe Lie, Sydney Marie Mendoza Jun 2019

Digital Forensics Challenge, Zoe Lie, Sydney Marie Mendoza

Computer Engineering

No abstract provided.


Bpm: Blz Package Manager, Kenneth Huang Jun 2019

Bpm: Blz Package Manager, Kenneth Huang

Computer Engineering

bpm (BLZ Package Manager) is a package manager for the open-source programming language BLZ, built in Java. It allows users of the BLZ programming language to create and upload their own packages, as well as downloading necessary dependency packages for their packages. To do this, the program communicates with the “cardiovascular”, a web server designed for users to upload and download BLZ packages.

The program has three primary functions. The first one, “init”, initializes a package directory for use with the package manager. Part of this initialization is creating a “heartbeat” meta file, which holds information about the package’s name, …


Keylime, Joshua Michael Magera Jun 2019

Keylime, Joshua Michael Magera

Computer Engineering

New freshmen arrive at Cal Poly every year, experience Week of Welcome, and, if they haven’t been to Firestone Grill within the first week, they can consider themselves an anomaly. But how long until those freshmen find the amazing sandwiches and breakfast burritos served at Gus’s Grocery or hear about the free burger promo at Sylvester’s? The goal of this senior project was to create an app, KeyLime, that makes it easy for college students to find new eateries and fresh deals that are local, affordable, and tasty. KeyLime aims to target college students and create a space for restaurants …


Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch Jun 2019

Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch

Computer Engineering

With the increasing development of autonomous vehicles, being able to detect driveable paths in arbitrary environments has become a prevalent problem in multiple industries. This project explores a technique which utilizes a discretized output map that is used to color an image based on the confidence that each block is a driveable path. This was done using a generalized convolutional neural network that was trained on a set of 3000 images taken from the perspective of a robot along with matching masks marking which portion of the image was a driveable path. The techniques used allowed for a labeling accuracy …


Keylime, Matthew Orgill Jun 2019

Keylime, Matthew Orgill

Computer Engineering

This project creates an iOS mobile app geared specifically toward the students of California Polytechnic State University. The app aims to provide the ability for users to discover new restaurants to checkout in the central coast area. These restaurants can be filtered to the user’s choosing based on the price of food, rating the restaurant has received, distance away from the user, and type of food. In addition, featured deals that local restaurants currently offer can be found on the app. Each restaurant can be favorited by the user to allow for better filtering of discovering new restaurants and to …


Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves Jun 2019

Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves

Computer Engineering

This project is a 3D village generator tool for Unity. It consists of three components: a building, mountain, and river generator. All of these generators use grammar-based procedural generation in order to create a unique and logical village and landscape each time the program is run.