Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (15)
- Physical Sciences and Mathematics (9)
- Hardware Systems (6)
- Other Electrical and Computer Engineering (6)
- Robotics (6)
-
- Signal Processing (6)
- Computational Engineering (5)
- Computer Sciences (5)
- Data Storage Systems (5)
- Computer and Systems Architecture (4)
- Digital Communications and Networking (4)
- Aerospace Engineering (3)
- Mechanical Engineering (3)
- Other Computer Sciences (3)
- Social and Behavioral Sciences (3)
- Applied Statistics (2)
- Artificial Intelligence and Robotics (2)
- Biomedical (2)
- Business (2)
- Civil and Environmental Engineering (2)
- Industrial Engineering (2)
- Navigation, Guidance, Control and Dynamics (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Other Aerospace Engineering (2)
- Other Mechanical Engineering (2)
- Physics (2)
- Psychology (2)
- Institution
-
- California Polytechnic State University, San Luis Obispo (20)
- University of Massachusetts Amherst (6)
- Michigan Technological University (4)
- University of Tennessee, Knoxville (4)
- City University of New York (CUNY) (3)
-
- University of Louisville (3)
- California State University, San Bernardino (2)
- Kennesaw State University (2)
- Louisiana State University (2)
- University of New Mexico (2)
- University of North Florida (2)
- Western University (2)
- Air Force Institute of Technology (1)
- Bard College (1)
- Boise State University (1)
- Cal Poly Humboldt (1)
- The Texas Medical Center Library (1)
- The University of Akron (1)
- The University of Maine (1)
- University of Arkansas, Fayetteville (1)
- University of New Hampshire (1)
- University of New Orleans (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- World Maritime University (1)
- Keyword
-
- Machine Learning (6)
- Machine learning (4)
- App (3)
- Artificial Intelligence (3)
- Computer Vision (3)
-
- Deep Learning (3)
- Drone (3)
- Software (3)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (2)
- Android (2)
- Data Mining (2)
- IOS (2)
- Mobile (2)
- Prediction (2)
- Thesis; University of North Florida; UNF; Dissertations (2)
- Virtualization (2)
- Web (2)
- #antcenter (1)
- 3-D printer (1)
- 3-D recontruction (1)
- ADT (1)
- AWS (1)
- Absolute Position (1)
- Academic -- UNF -- Computing; Web search tools; Query behavior (1)
- Academic -- UNF -- Computing; class normalization; database normalization; code-first approach; database normalization using class normalization; object-relational mapping (1)
- Addictive (1)
- Adversarial learning (1)
- Aerospace Engineering (1)
- Analytics (1)
- Application (1)
- Publication
-
- Computer Engineering (11)
- Computer Science and Software Engineering (6)
- Doctoral Dissertations (5)
- Masters Theses (5)
- Dissertations, Master's Theses and Master's Reports (4)
-
- Electronic Theses and Dissertations (4)
- Electronic Theses, Projects, and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Master of Science in Computer Science Theses (2)
- Master's Theses (2)
- Theses and Dissertations (2)
- UNF Graduate Theses and Dissertations (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Boise State University Theses and Dissertations (1)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations & Theses (Open Access) (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electrical and Computer Engineering ETDs (1)
- Honors Theses and Capstones (1)
- LSU Doctoral Dissertations (1)
- LSU Master's Theses (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Mechanical Engineering (1)
- Projects (1)
- Senior Projects Spring 2017 (1)
- Student Theses (1)
- University of New Orleans Theses and Dissertations (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 30 of 65
Full-Text Articles in Other Computer Engineering
Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang
Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang
Electronic Thesis and Dissertation Repository
An ordered labeled tree is a tree where the left-to-right order among siblings is significant. Given two ordered labeled trees, the edit distance between them is the minimum cost edit operations that convert one tree to the other.
In this thesis, we present an algorithm for the tree edit distance problem by using the optimal tree decomposition strategy. By combining the vertical compression of trees with optimal decomposition we can significantly reduce the running time of the algorithm. We compare our method with other methods both theoretically and experimentally. The test results show that our strategies on compressed trees are …
Streaming Mysql Database Activity To Aws Kinesis, Chris I. Voncina
Streaming Mysql Database Activity To Aws Kinesis, Chris I. Voncina
Computer Engineering
Connecting Amazon RDS MySQL engine with AWS Kinesis is a feature that RDS customers have often requested. A good example indicating customer demand is demonstrated on AWS’ forum post at https://forums.aws.amazon.com/thread.jspa?messageID=697516.
Upon completion, my project will enable Amazon RDS to pick up the MySQL open source project, integrate the MySQL plugin with Amazon RDS MySQL and deliver this feature to Amazon RDS MySQL customers. Other open source engine projects can follow and build upon my project.
Amazon Aurora delivered similar capability to the project. See details at https://aws.amazon.com/about-aws/whats-new/2016/10/amazon-aurora-new-features-aws-lambda-integration-and-data-load-from-amazon-s3-to-aurora-tables/
Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall
Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall
Computer Engineering
This project was conceived as a desired to have an affordable, flexible and physically compact tracking system for high accuracy spatial and orientation tracking. Specifically, this implementation is focused on providing a low cost motion capture system for future research. It is a tool to enable the further creation of systems that would require the use of accurate placement of landing pads, payload acquires and delivery. This system will provide the quadcopter platform a coordinate system that can be used in addition to GPS.
Field research with quadcopter manufacturers, photographers, agriculture and research organizations were contact and interviewed for information …
Pubwc Bathroom Review App, Clay Jacobs
Pubwc Bathroom Review App, Clay Jacobs
Computer Science and Software Engineering
For my senior project, I developed an iOS application to allow users to find, rate, and review nearby public restrooms. The app takes advantage of crowdsourced data to collect bathroom and review information. I also created a REST API to interface with the backend database that could be used to port the application to other platforms.
Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee
Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
Smart Grids are the next generation electrical grid system that utilizes smart meter-ing devices and sensors to manage the grid operations. Grid management includes the prediction of load and and classification of the load patterns and consumer usage behav-iors. These predictions can be performed using machine learning methods which are often supervised. Supervised machine learning signifies that the algorithm trains the model to efficiently predict decisions based on the previously available data.
Smart grids are employed with numerous smart meters that send user statistics to a central server. The data can be accumulated and processed using data mining and machine …
Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly
Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly
Boise State University Theses and Dissertations
Virtualized cloud computing services are a crucial facet in the software industry today, with clear evidence of its usage quickly accelerating. Market research forecasts an increase in cloud workloads by more than triple, 3.3-fold, from 2014 to 2019 [33]. Integrating system security is then an intrinsic concern of cloud platform system administrators that with the growth of cloud usage, is becoming increasingly relevant. People working in the cloud demand security more than ever. In this paper, we take an offensive, malicious approach at targeting such cloud environments as we hope both cloud platform system administrators and software developers of these …
Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding
Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding
Masters Theses
According to World Health Survey, there are 785 million (15.6%) people in the world that live with a disability. It is a well-known fact that lack of access to public transportation is a barrier for people with disabilities in seeking work or accessing health care. In this research, we seek to increase access to public transportation by introducing a virtual pre-travel training system that enables people with disabilities to get familiar with a public transportation venue prior to arriving at the venue. Using this system, users establish a mental map of the target environment prior to their arrival to the …
Efficient Scaling Of A Web Proxy Cluster, Hao Zhang
Efficient Scaling Of A Web Proxy Cluster, Hao Zhang
Masters Theses
With the continuing growth in network traffic and increasing diversity in web content, web caching, together with various network functions (NFs), has been introduced to enhance security, optimize network performance, and save expenses. In a large enterprise network with more than tens of thousands of users, a single proxy server is not enough to handle a large number of requests and turns to group processing. When multiple web cache proxies are working as a cluster, they talk with each other and share cached objects by using internet cache protocol (ICP). This leads to poor scalability.
This thesis describes the development …
Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu
Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu
Masters Theses
The dramatic popularity of graph database has resulted in a growing interest in graph queries. Two major topics are included in graph queries. One is based on structural relationship to find meaningful results, such as subgraph pattern match and shortest-path query. The other one focuses on semantic-based query to find question answering from knowledge bases. However, most of these queries take knowledge graphs as flat forms and use only normal relationship to mine these graphs, which may lead to mistakes in the query results. In this thesis, we find hierarchical relationship in the knowledge on their semantic relations and make …
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Electronic Theses, Projects, and Dissertations
Natural Language Processing (NLP) is the field of study that focuses on the interactions between human language and computers. By “natural language” we mean a language that is used for everyday communication by humans. Different from programming languages, natural languages are hard to be defined with accurate rules. NLP is developing rapidly and it has been widely used in different industries. Technologies based on NLP are becoming increasingly widespread, for example, Siri or Alexa are intelligent personal assistants using NLP build in an algorithm to communicate with people. “Natural Language Processing Based Generator of Testing Instruments” is a stand-alone program …
In Search Of Homo Sociologicus, Yunqi Xue
In Search Of Homo Sociologicus, Yunqi Xue
Dissertations, Theses, and Capstone Projects
The subject of this dissertation is to build an epistemic logic system that is able to show the spreading of knowledge and beliefs in a social network that contains multiple subgroups. Epistemic logic is the study of logical systems that express mathematical properties of knowledge and belief. In recent years, there have been increasing number of new epistemic logic systems that are focused on community properties such as knowledge and belief adoption among friends.
We are interested in revisable and actionable social knowledge/belief that leads to a large group action. Instead of centralized coordination, bottom-up approach is our focus. We …
Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett
Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett
Electronic Theses and Dissertations
As Unmanned Aerial Vehicle (UAV), or “drone” applications expand, new methods for sensing, navigating and avoiding obstacles need to be developed. The project applies an Extended Kalman Filter (EKF) to a simulated quadcopter vehicle though Matlab in order to estimate not only the vehicle state but the world state around the vehicle. The EKF integrates multiple sensor readings from range sensors, IMU sensors, and radiation sensors and combines this information to optimize state estimates. The result is an estimated world map to be used in vehicle navigation and obstacle avoidance.
The simulation handles the physics behind the vehicle flight. As …
Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Data-Driven Abstraction, Vivian Mankau Ho
Data-Driven Abstraction, Vivian Mankau Ho
LSU Master's Theses
Given a program analysis problem that consists of a program and a property of interest, we use a data-driven approach to automatically construct a sequence of abstractions that approach an ideal abstraction suitable for solving that problem. This process begins with an infinite concrete domain that maps to a finite abstract domain defined by statistical procedures resulting in a clustering mixture model. Given a set of properties expressed as formulas in a restricted and bounded variant of CTL, we can test the success of the abstraction with respect to a predefined performance level. In addition, we can perform iterative abstraction-refinement …
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
LSU Doctoral Dissertations
The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't guarantee …
Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song
Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song
Doctoral Dissertations
This study uses the Computers Are Social Actors (CASA) and domestication theories as the underlying framework of an acceptance model of retail service robots (RSRs). The model illustrates the relationships among facilitators, attitudes toward Human-Robot Interaction (HRI), anxiety toward robots, anticipated service quality, and the acceptance of RSRs. Specifically, the researcher investigates the extent to which the facilitators of usefulness, social capability, the appearance of RSRs, and the attitudes toward HRI affect acceptance and increase the anticipation of service quality. The researcher also tests the inhibiting role of pre-existing anxiety toward robots on the relationship between these facilitators and attitudes …
Computational Imaging Approach To Recovery Of Target Coordinates Using Orbital Sensor Data, Michael D. Vaughan
Computational Imaging Approach To Recovery Of Target Coordinates Using Orbital Sensor Data, Michael D. Vaughan
Doctoral Dissertations
This dissertation addresses the components necessary for simulation of an image-based recovery of the position of a target using orbital image sensors. Each component is considered in detail, focusing on the effect that design choices and system parameters have on the accuracy of the position estimate. Changes in sensor resolution, varying amounts of blur, differences in image noise level, selection of algorithms used for each component, and lag introduced by excessive processing time all contribute to the accuracy of the result regarding recovery of target coordinates using orbital sensor data.
Using physical targets and sensors in this scenario would be …
Wide-Area Measurement-Driven Approaches For Power System Modeling And Analytics, Hesen Liu
Wide-Area Measurement-Driven Approaches For Power System Modeling And Analytics, Hesen Liu
Doctoral Dissertations
This dissertation presents wide-area measurement-driven approaches for power system modeling and analytics. Accurate power system dynamic models are the very basis of power system analysis, control, and operation. Meanwhile, phasor measurement data provide first-hand knowledge of power system dynamic behaviors. The idea of building out innovative applications with synchrophasor data is promising.
Taking advantage of the real-time wide-area measurements, one of phasor measurements’ novel applications is to develop a synchrophasor-based auto-regressive with exogenous inputs (ARX) model that can be updated online to estimate or predict system dynamic responses.
Furthermore, since auto-regressive models are in a big family, the ARX model …
A Probabilistic Software Framework For Scalable Data Storage And Integrity Check, Sisi Xiong
A Probabilistic Software Framework For Scalable Data Storage And Integrity Check, Sisi Xiong
Doctoral Dissertations
Data has overwhelmed the digital world in terms of volume, variety and velocity. Data- intensive applications are facing unprecedented challenges. On the other hand, computation resources, such as memory, suffer from shortage comparing to data scale. However, in certain applications, it is a must to process large amount of data in a time efficient manner. Probabilistic approaches are compromises between these three perspectives: large amount of data, limited computation resources and high time efficiency, in the sense that those approaches cannot guarantee 100% correctness, their error rates, however, are predictable and adjustable depending on available computation resources and time constraints. …
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang
Dissertations & Theses (Open Access)
The mortality rate of cervical cancer is approximately 266,000 people each year, and 70% of the burden occurs in Low- and Middle- Income Countries (LMICs). Radiation therapy is the primary modality for treatment of locally advanced cervical cancer cases. In the absence of high quality diagnostic imaging needed to identify nodal metastasis, many LMIC sites treat standard pelvic fields, failing to include node metastasis outside of the field and/or to boost lymph nodes in the abdomen and pelvis. The first goal of this project was to create a program which automatically identifies positive cervical cancer lymph nodes on non-contrast daily …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha
Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha
Electrical and Computer Engineering ETDs
A college student's success depends on many factors including pre-university characteristics and university student support services. Student graduation rates are often used as an objective metric to measure institutional effectiveness. This work studies the impact of such factors on graduation rates, with a particular focus on delay in graduation. In this work, we used feature selection methods to identify a subset of the pre-institutional features with the highest discriminative power. In particular, Forward Selection with Linear Regression, Backward Elimination with Linear Regression, and Lasso Regression were applied. The feature sets were selected in a multivariate fashion. High school GPA, ACT …
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
Virtualization Of Closed-Loop Sensor Networks, Priyanka Dattatri Kedalagudde
Virtualization Of Closed-Loop Sensor Networks, Priyanka Dattatri Kedalagudde
Masters Theses
The existing closed-loop sensor networks are based on architectures that are designed and implemented for one specific application and require dedicated sensing and computational resources. This prevents the sharing of these networks. In this work, we propose an architecture of virtualization to allow sharing of closed-loop sensor networks. We also propose a scheduling approach that will manage requests from competing applications and evaluate their impact on system utilization against utilization achieved by more traditional, dedicated sensor networks. These algorithms are evaluated through trace-driven simulations, where the trace data is taken from CASA’s closed-loop weather radar sensor network. Results from this …
Farmbot Rfid Integration, Laura R. Swart
Farmbot Rfid Integration, Laura R. Swart
Computer Engineering
The purpose of this project is to assist the company FarmBot improve their product by adding RFID tracking to the FarmBot robot. RFID tracking will allow the robot to select and pick up tool heads without any user interference.
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Computer Engineering
The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.
Multispectral Identification Array, Zachary D. Eagan
Multispectral Identification Array, Zachary D. Eagan
Computer Engineering
The Multispectral Identification Array is a device for taking full image spectroscopy data via the illumination of a subject with sixty-four unique spectra. The array combines images under the illumination spectra to produce an approximate reflectance graph for every pixel in a scene. Acquisition of an entire spectrum allows the array to differentiate objects based on surface material. Spectral graphs produced are highly approximate and should not be used to determine material properties, however the output is sufficiently consistent to allow differentiation and identification of previously sampled subjects. While not sufficiently advanced for use as a replacement to spectroscopy the …
A Survey Of Addictive Software Design, Chauncey J. Neyman
A Survey Of Addictive Software Design, Chauncey J. Neyman
Computer Science and Software Engineering
The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases …
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Computer Science and Software Engineering
I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …
Diy Grip Tape Website, Jason E. Krein
Diy Grip Tape Website, Jason E. Krein
Computer Science and Software Engineering
The goal of this senior project was to create an easy to use website that will allow people to design and order their own custom skateboard grip tape. Custom skateboard decks are a large business, however the top, more visible, part of the board is largely ignored by custom shops. With the help of a local entrepreneur, I aim to enable skateboarders the ability to get custom grip tape shapes that they can stick on their board to spice it up from the normal black tape that everyone uses. The website was completed over the course of 4 months, in …