Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Other Computer Engineering

Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons Jan 2023

Hard-Hearted Scrolls: A Noninvasive Method For Reading The Herculaneum Papyri, Stephen Parsons

Theses and Dissertations--Computer Science

The Herculaneum scrolls were buried and carbonized by the eruption of Mount Vesuvius in A.D. 79 and represent the only classical library discovered in situ. Charred by the heat of the eruption, the scrolls are extremely fragile. Since their discovery two centuries ago, some scrolls have been physically opened, leading to some textual recovery but also widespread damage. Many other scrolls remain in rolled form, with unknown contents. More recently, various noninvasive methods have been attempted to reveal the hidden contents of these scrolls using advanced imaging. Unfortunately, their complex internal structure and lack of clear ink contrast has prevented …


Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade Jan 2023

Multi-Agent Learning For Game-Theoretical Problems, Kshitija Taywade

Theses and Dissertations--Computer Science

Multi-agent systems are prevalent in the real world in various domains. In many multi-agent systems, interaction among agents is inevitable, and cooperation in some form is needed among agents to deal with the task at hand. We model the type of multi-agent systems where autonomous agents inhabit an environment with no global control or global knowledge, decentralized in the true sense. In particular, we consider game-theoretical problems such as the hedonic coalition formation games, matching problems, and Cournot games. We propose novel decentralized learning and multi-agent reinforcement learning approaches to train agents in learning behaviors and adapting to the environments. …


An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman Jan 2022

An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman

Theses and Dissertations--Computer Science

The ever-increasing parallelism in computer systems has made software more prone to concurrency failures, causing problems during both pre- and post-development. Debugging concurrent programs is difficult because of the non-deterministic behavior and the specific sequences of interleaving in the execution flow. Debugging is a technique where programmers reproduce the bug, identify the root cause, and then take necessary steps to remove the bug from the system. The failure information may come from the bug reports of the testing phase or the production runs. In both cases, there should be steps taken to reproduce and localize the failure. However, reproducing and …


Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour Jan 2022

Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour

Theses and Dissertations--Electrical and Computer Engineering

Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.

In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …


Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin Jan 2015

Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin

Theses and Dissertations--Computer Science

In this dissertation, we focus on solving forest transportation planning related problems, including constraints that consider negative environmental impacts and multi-objective optimizations that provide forest managers and road planers alternatives for making informed decisions. Along this line of study, several multilevel techniques and mataheuristic algorithms have been developed and investigated. The forest transportation planning problem is a fixed-charge problem and known to be NP-hard. The general idea of utilizing multilevel approach is to solve the original problem of which the computational cost maybe prohibitive by using a set of increasingly smaller problems of which the computational cost is cheaper.

The …


Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu Jan 2015

Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu

Theses and Dissertations--Computer Science

Many manual biomedical annotation tasks can be categorized as instances of the typical multi-label classification problem where several categories or labels from a fixed set need to assigned to an input instance. MeSH term assignment to biomedical articles and diagnosis code extraction from medical records are two such tasks. To address this problem automatically, in this thesis, we present a way to utilize latent associations between labels based on output label sets. We used random indexing as a method to determine latent associations and use the associations as a novel feature in a learning-to-rank algorithm that reranks candidate labels selected …


Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang Jan 2015

Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang

Theses and Dissertations--Electrical and Computer Engineering

Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high …


Automatic Performance Level Assessment In Minimally Invasive Surgery Using Coordinated Sensors And Composite Metrics, Sami Taha Abu Snaineh Jan 2013

Automatic Performance Level Assessment In Minimally Invasive Surgery Using Coordinated Sensors And Composite Metrics, Sami Taha Abu Snaineh

Theses and Dissertations--Computer Science

Skills assessment in Minimally Invasive Surgery (MIS) has been a challenge for training centers for a long time. The emerging maturity of camera-based systems has the potential to transform problems into solutions in many different areas, including MIS. The current evaluation techniques for assessing the performance of surgeons and trainees are direct observation, global assessments, and checklists. These techniques are mostly subjective and can, therefore, involve a margin of bias.

The current automated approaches are all implemented using mechanical or electromagnetic sensors, which suffer limitations and influence the surgeon’s motion. Thus, evaluating the skills of the MIS surgeons and trainees …


Privacy Preserving Distributed Data Mining, Zhenmin Lin Jan 2012

Privacy Preserving Distributed Data Mining, Zhenmin Lin

Theses and Dissertations--Computer Science

Privacy preserving distributed data mining aims to design secure protocols which allow multiple parties to conduct collaborative data mining while protecting the data privacy. My research focuses on the design and implementation of privacy preserving two-party protocols based on homomorphic encryption. I present new results in this area, including new secure protocols for basic operations and two fundamental privacy preserving data mining protocols.

I propose a number of secure protocols for basic operations in the additive secret-sharing scheme based on homomorphic encryption. I derive a basic relationship between a secret number and its shares, with which we develop efficient secure …