Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic Theses and Dissertations

Discipline
Institution
Keyword
Publication Year

Articles 1 - 15 of 15

Full-Text Articles in Other Computer Engineering

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order ...


Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage Dec 2018

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage

Electronic Theses and Dissertations

The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in ...


Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu Aug 2018

Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu

Electronic Theses and Dissertations

Crowdsourcing is proposed as a powerful mechanism for accomplishing large scale tasks via anonymous workers online. It has been demonstrated as an effective and important approach for collecting labeled data in application domains which require human intelligence, such as image labeling, video annotation, natural language processing, etc. Despite the promises, one big challenge still exists in crowdsourcing systems: the difficulty of controlling the quality of crowds. The workers usually have diverse education levels, personal preferences, and motivations, leading to unknown work performance while completing a crowdsourced task. Among them, some are reliable, and some might provide noisy feedback. It is ...


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman May 2018

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The ...


Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao Apr 2018

Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao

Electronic Theses and Dissertations

Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.

In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project ...


Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett Aug 2017

Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett

Electronic Theses and Dissertations

As Unmanned Aerial Vehicle (UAV), or “drone” applications expand, new methods for sensing, navigating and avoiding obstacles need to be developed. The project applies an Extended Kalman Filter (EKF) to a simulated quadcopter vehicle though Matlab in order to estimate not only the vehicle state but the world state around the vehicle. The EKF integrates multiple sensor readings from range sensors, IMU sensors, and radiation sensors and combines this information to optimize state estimates. The result is an estimated world map to be used in vehicle navigation and obstacle avoidance.

The simulation handles the physics behind the vehicle flight. As ...


Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi Aug 2017

Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi

Electronic Theses and Dissertations

While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race ...


Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour May 2017

Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour

Electronic Theses and Dissertations

Nowadays, algorithmic systems for making decisions are widely used to facilitate decisions in a variety of fields such as medicine, banking, applying for universities or network security. However, many machine learning algorithms are well-known for their complex mathematical internal workings which turn them into black boxes and makes their decision-making process usually difficult to understand even for experts. In this thesis, we try to develop a methodology to explain why a certain exceptional machine learned decision was made incorrectly by using the interpretability of the decision tree classifier. Our approach can provide insights about potential flaws in feature definition or ...


Data Driven Discovery Of Materials Properties., Fadoua Khmaissia May 2017

Data Driven Discovery Of Materials Properties., Fadoua Khmaissia

Electronic Theses and Dissertations

The high pace of nowadays industrial evolution is creating an urgent need to design new cost efficient materials that can satisfy both current and future demands. However, with the increase of structural and functional complexity of materials, the ability to rationally design new materials with a precise set of properties has become increasingly challenging. This basic observation has triggered the idea of applying machine learning techniques in the field, which was further encouraged by the launch of the Materials Genome Initiative (MGI) by the US government since 2011. In this work, we present a novel approach to apply machine learning ...


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.


Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper Dec 2015

Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper

Electronic Theses and Dissertations

The field of lossless image compression studies the various ways to represent image data in the most compact and efficient manner possible that also allows the image to be reproduced without any loss. One of the most efficient strategies used in lossless compression is to introduce entropy reduction through decorrelation. This study focuses on using the exclusive-or logic operator in a decorrelation filter as the preprocessing phase of lossless image compression of continuous-tone images. The exclusive-or logic operator is simply and reversibly applied to continuous-tone images for the purpose of extracting differences between neighboring pixels. Implementation of the exclusive-or operator ...


Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii Aug 2015

Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii

Electronic Theses and Dissertations

GPGPUs offer significant computational power for programmers to leverage. This computational power is especially useful when utilized for accelerating scientific models. This thesis analyzes the utilization of GPGPU programming to accelerate scientific computing models.

First the construction of hardware for visualization and computation of scientific models is discussed. Several factors in the construction of the machines focus on the performance impacts related to scientific modeling.

Image processing is an embarrassingly parallel problem well suited for GPGPU acceleration. An image processing library was developed to show the processes of recognizing embarrassingly parallel problems and serves as an excellent example of converting ...


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of ...


Categorization Of Security Design Patterns, Jeremiah Y. Dangler May 2013

Categorization Of Security Design Patterns, Jeremiah Y. Dangler

Electronic Theses and Dissertations

Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access ...


Application Of Self-Monitoring For Situational Awareness, Christopher Trickler Jan 2013

Application Of Self-Monitoring For Situational Awareness, Christopher Trickler

Electronic Theses and Dissertations

Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute ...