Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Engineering

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 30

Full-Text Articles in Computer Engineering

Improved Portable Back Pain Relief Device With User Interface, Zachary Bobango, Samuel J. Dauterman, Benjamin Bowman Jan 2024

Improved Portable Back Pain Relief Device With User Interface, Zachary Bobango, Samuel J. Dauterman, Benjamin Bowman

Williams Honors College, Honors Research Projects

The objective of this project is to design and create a massage system that is user interactive, portable, safe, efficient, and comfortable. The system should allow for user feedback from an outside peripheral such as a phone to be able to modify the system. Some challenges facing the implementation of such a system include: ensuring the product can withstand substantial force without breaking or malfunctioning while simultaneously being light enough for a consumer to carry without difficulty, engineering the massage heads to be able to move in multiple different motion types, creating the software that can control the device, and …


Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte Jan 2023

Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte

Browse all Theses and Dissertations

Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …


Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula Jan 2023

Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula

Browse all Theses and Dissertations

Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …


Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams Jan 2023

Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams

Browse all Theses and Dissertations

Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …


Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula Jan 2023

Unsupervised-Based Distributed Machine Learning For Efficient Data Clustering And Prediction, Vishnu Vardhan Baligodugula

Browse all Theses and Dissertations

Machine learning techniques utilize training data samples to help understand, predict, classify, and make valuable decisions for different applications such as medicine, email filtering, speech recognition, agriculture, and computer vision, where it is challenging or unfeasible to produce traditional algorithms to accomplish the needed tasks. Unsupervised ML-based approaches have emerged for building groups of data samples known as data clusters for driving necessary decisions about these data samples and helping solve challenges in critical applications. Data clustering is used in multiple fields, including health, finance, social networks, education, and science. Sequential processing of clustering algorithms, like the K-Means, Minibatch K-Means, …


Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal Jan 2023

Data-Driven Strategies For Disease Management In Patients Admitted For Heart Failure, Ankita Agarwal

Browse all Theses and Dissertations

Heart failure is a syndrome which effects a patient’s quality of life adversely. It can be caused by different underlying conditions or abnormalities and involves both cardiovascular and non-cardiovascular comorbidities. Heart failure cannot be cured but a patient’s quality of life can be improved by effective treatment through medicines and surgery, and lifestyle management. As effective treatment of heart failure incurs cost for the patients and resource allocation for the hospitals, predicting length of stay of these patients during each hospitalization becomes important. Heart failure can be classified into two types: left sided heart failure and right sided heart failure. …


Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani Jan 2023

Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani

Browse all Theses and Dissertations

Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …


Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha Jan 2023

Efficient Cloud-Based Ml-Approach For Safe Smart Cities, Niveshitha Niveshitha

Browse all Theses and Dissertations

Smart cities have emerged to tackle many critical problems that can thwart the overwhelming urbanization process, such as traffic jams, environmental pollution, expensive health care, and increasing energy demand. This Master thesis proposes efficient and high-quality cloud-based machine-learning solutions for efficient and sustainable smart cities environment. Different supervised machine-learning models for air quality predication (AQP) in efficient and sustainable smart cities environment is developed. For that, ML-based techniques are implemented using cloud-based solutions. For example, regression and classification methods are implemented using distributed cloud computing to forecast air execution time and accuracy of the implemented ML solution. These models are …


Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan Jan 2023

Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan

Browse all Theses and Dissertations

Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …


The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii Jan 2023

The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii

Browse all Theses and Dissertations

The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …


Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee Jan 2023

Data-Driven Strategies For Pain Management In Patients With Sickle Cell Disease, Swati Padhee

Browse all Theses and Dissertations

This research explores data-driven AI techniques to extract insights from relevant medical data for pain management in patients with Sickle Cell Disease (SCD). SCD is an inherited red blood cell disorder that can cause a multitude of complications throughout an individual’s life. Most patients with SCD experience repeated, unpredictable episodes of severe pain. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting the patient’s pain intensity level due to the subjective nature of pain. In this study, we leverage multiple data-driven AI techniques to improve pain management in patients with SCD. The proposed approaches …


Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers Jan 2023

Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers

Browse all Theses and Dissertations

Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman Jan 2023

Effective Systems For Insider Threat Detection, Muhanned Qasim Jabbar Alslaiman

Browse all Theses and Dissertations

Insider threats to information security have become a burden for organizations. Understanding insider activities leads to an effective improvement in identifying insider attacks and limits their threats. This dissertation presents three systems to detect insider threats effectively. The aim is to reduce the false negative rate (FNR), provide better dataset use, and reduce dimensionality and zero padding effects. The systems developed utilize deep learning techniques and are evaluated using the CERT 4.2 dataset. The dataset is analyzed and reformed so that each row represents a variable length sample of user activities. Two data representations are implemented to model extracted features …


A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham Jan 2023

A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham

Browse all Theses and Dissertations

The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …


Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson Jan 2023

Accelerating Precision Station Keeping For Automated Aircraft, James D. Anderson

Browse all Theses and Dissertations

Automated vehicles pose challenges in various research domains, including robotics, machine learning, computer vision, public safety, system certification, and beyond. These vehicles autonomously handle navigation and locomotion, often requiring minimal user interaction, and can operate on land, in water, or in the air. In the context of aircraft, one specific application is Automated Aerial Refueling (AAR). Traditional aerial refueling involves a "tanker" aircraft using a mechanism, such as a rigid boom arm or a flexible hose, to transfer fuel to another aircraft designated as the "receiver". For AAR, the boom arm may be maneuvered automatically, or in certain instances the …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar Jan 2022

Computer Enabled Interventions To Communication And Behavioral Problems In Collaborative Work Environments, Ashutosh Shivakumar

Browse all Theses and Dissertations

Task success in co-located and distributed collaborative work settings is characterized by clear and efficient communication between participating members. Communication issues like 1) Unwanted interruptions and 2) Delayed feedback in collaborative work based distributed scenarios have the potential to impede task coordination and significantly decrease the probability of accomplishing task objective. Research shows that 1) Interrupting tasks at random moments can cause users to take up to 30% longer to resume tasks, commit up to twice the errors, and experience up to twice the negative effect than when interrupted at boundaries 2) Skill retention in collaborative learning tasks improves with …


Bioimpedance Sensor, Ryan Byo, Kevin Libertowski Jan 2020

Bioimpedance Sensor, Ryan Byo, Kevin Libertowski

Williams Honors College, Honors Research Projects

A bioimpdance senor to measure the impedance of a human body. Completed as part of the engineering Senior Design Project


Tabletop Mechanical Tester, Jamie Dombroski, Brian English, Richard Leffler, Andrew Shirk Jan 2020

Tabletop Mechanical Tester, Jamie Dombroski, Brian English, Richard Leffler, Andrew Shirk

Williams Honors College, Honors Research Projects

The need for hands-on and face-to-face experiences in the engineering classroom is very great. The equations, principles, and concepts can all be learned, but without the visual and tactile application, these don’t always sink in or become concrete. A small-scale tensile test machine was designed, sourced, manufactured, and tested for the purpose of being applied in classroom settings to provide this experience to engineering students. Extensive research was performed concerning tensile machines on the market, the essential elements of which are the load cell, grips, crosshead, extensometer, motor, and frame. The raw materials for the frame were purchased and drawings …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Cyber-Physical Embedded Systems With Transient Supervisory Command And Control: A Framework For Validating Safety Response In Automated Collision Avoidance Systems, Daniel K. Trembley Jan 2018

Cyber-Physical Embedded Systems With Transient Supervisory Command And Control: A Framework For Validating Safety Response In Automated Collision Avoidance Systems, Daniel K. Trembley

Graduate Dissertations and Theses

The ability to design and engineer complex and dynamical Cyber-Physical Systems (CPS) requires a systematic view that requires a definition of level of automation intent for the system. Since CPS covers a diverse range of systemized implementations of smart and intelligent technologies networked within a system of systems (SoS), the terms “smart” and “intelligent” is frequently used in describing systems that perform complex operations with a reduced need of a human-agent. The difference between this research and most papers in publication on CPS is that most other research focuses on the performance of the CPS rather than on the correctness …


System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg Jan 2017

System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg

Williams Honors College, Honors Research Projects

Power racks are a weight machine used by swimmers to provide resistance while they swim away from a wall toward the center of the pool. The objective of this project is to build a modular data system that can be added to these machines to record and log quantitative information during their use. This information will be stored on a web server, and made available to the user for analysis and visualization through a web application. Workout data can also be downloaded and interpreted at a later time, independent of the web application. The data system should be water resistant, …


The Development Of Project Grade-Up, Dalin Glenn Williams Jan 2016

The Development Of Project Grade-Up, Dalin Glenn Williams

MS in Computer Science Theses

The university classroom has greatly evolved from a simple syllabus and in class discussion to the modern online documentation and virtual classrooms. These developments have changed the way students review their grades and balance their workloads. With the plethora of new technologies, students are often burdened with a full school schedule, work, and social events, with few tools to help them effectively understand their grades or manage their time. Current solutions addressing this issue do not present data in an organized way that allows the student to easily comprehend their past performance or up coming work load. Our solution builds …


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe Dec 2013

Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe

Dissertations

The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …


Automated Foosball Table Year 1: Final Project Report, Juan David Gutierrez-Franco, John Inlow, Jesse Graham, Larry Huang Dec 2013

Automated Foosball Table Year 1: Final Project Report, Juan David Gutierrez-Franco, John Inlow, Jesse Graham, Larry Huang

Mechanical Engineering

This project is a first iteration of an automated foosball table designed and created using servomotors provided by Yaskawa to create an interactive tradeshow display where guests can play against the algorithms developed in the PLC (programmable logic controller) controlling the servomotors. There will be a second iteration of the project done by a different team directly following this one. The motion components were selected with the intent to be able to surpass the reaction times and speeds of expert human players. There are a total of eight servomotors, four controlling linear actuators for translation of rods, and four controlling …


Automation Of Orthodontic Wire Tester For Performing Three Point Bending Tests, Adithya Venkatesan Aug 2011

Automation Of Orthodontic Wire Tester For Performing Three Point Bending Tests, Adithya Venkatesan

Master's Theses

Abstract

Understanding the biomechanical factors in orthodontics is important in order to improve the overall effectiveness of actual clinical treatment. An accurate method to study the threedimensional (3D) force systems and the resulting movements of teeth during orthodontic treatment is needed along with the understanding of the material properties of any orthodontic wire. Until recently, most of the orthodontic biomechanics literature was limited to twodimensional experimental studies. Recent advances in threedimensional computer modeling have also been developed but have been limited to the manual control of tooth movement. Overall, there is very little published evidence in the literature on the …


Patterns Of Motion: Discovery And Generalized Representation, Imran Saleemi Jan 2011

Patterns Of Motion: Discovery And Generalized Representation, Imran Saleemi

Electronic Theses and Dissertations

In this dissertation, we address the problem of discovery and representation of motion patterns in a variety of scenarios, commonly encountered in vision applications. The overarching goal is to devise a generic representation, that captures any kind of object motion observable in video sequences. Such motion is a significant source of information typically employed for diverse applications such as tracking, anomaly detection, and action and event recognition. We present statistical frameworks for representation of motion characteristics of objects, learned from tracks or optical flow, for static as well as moving cameras, and propose algorithms for their application to a variety …


Analysis Of System Reliability As A Capital Investment, Albert J. Williams Jan 1978

Analysis Of System Reliability As A Capital Investment, Albert J. Williams

Retrospective Theses and Dissertations

This report, "Analysis of System Reliability as a Capital Investment", is an analysis of radar system reliability of two similar tracking radar systems as a capital investment. It describes the two tracking radar systems and calculates the mission failures rates based upon field failure data. Additionally, an analysis of a simulation program written in FORTRAN is performed which treats system reliability as a capital investment based on 335 electronic systems that were fabricated with a reliability program versus 564 electronic systems fabricated without a reliability program. The data from the two tracking radar systems, one with reliability program and the …