Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Engineering
Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li
Point Cloud Processing With Neural Networks, Stephanie Miller, Jiahao Li
All Computer Science and Engineering Research
In this project, we explore new techniques and architectures for applying deep neural networks when the input is point cloud data. We first consider applying convolutions on regular pixel and voxel grids, using polynomials of point coordinates and Fourier transforms to get a rich feature representation for all points mapped to the same pixel or voxel. We also apply these ideas to generalize the recently proposed "interpolated convolution", by learning continuous-space kernels as a combination of polynomial and Fourier basis kernels. Experiments on the ModelNet40 dataset demonstrate that our methods have superior performance over the baselines in 3D object recognition.
Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole
Static Taint Analysis Of Binary Executables Using Architecture-Neutral Intermediate Representation, Elaine Cole
All Computer Science and Engineering Research
Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key sinks or parts of the system without needing access to …
Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly
Pipelined Parallelism In A Work-Stealing Scheduler, Thomas Kelly
All Computer Science and Engineering Research
A pipeline is a particular type of parallel program structure, often used to represent loops with cross-iteration dependencies. Pipelines cannot be expressed with the typical parallel language constructs offered by most environments. Therefore, in order to run pipelines, it is necessary to write a parallel language and scheduler with specialized support for them. Some such schedulers are written exclusively for pipelines and unable to run any other type of program, which allows for certain optimizations that take advantage of the pipeline structure. Other schedulers implement support for pipelines on top of a general-purpose scheduling algorithm. One example of such an …
Polarization Division Multiplexing For Optical Data Communications, Darko Ivanovich
Polarization Division Multiplexing For Optical Data Communications, Darko Ivanovich
McKelvey School of Engineering Theses & Dissertations
Multiple parallel channels are ubiquitous in optical communications, with spatial division multiplexing (separate physical paths) and wavelength division multiplexing (separate optical wavelengths) being the most common forms. In this research work, we investigate the viability of polarization division multiplexing, the separation of distinct parallel optical communication channels through the polarization properties of light. We investigate polarization division multiplexing based optical communication systems in five distinct parts. In the first part of the work, we define a simulation model of two or more linearly polarized optical signals (at different polarization angles) that are transmitted through a common medium (e.g., air), filtered …
Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham
Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham
McKelvey School of Engineering Theses & Dissertations
The power of Information-Centric Networking architectures (ICNs) lies in their abstraction for communication --- the request for named data. This abstraction was popularized by the HyperText Transfer Protocol (HTTP) as an application-layer abstraction, and was extended by ICNs to also serve as their network-layer abstraction. In recent years, network mechanisms for ICNs, such as scalable name-based forwarding, named-data routing and in-network caching, have been widely explored and researched. However, to the best of our knowledge, the impact of this network abstraction on ICN applications has not been explored or well understood. The motivation of this dissertation is to address this …
Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang
Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang
McKelvey School of Engineering Theses & Dissertations
Reconstructing surface from a set of spatial curves is a fundamental problem in computer graphics and computational geometry. It often arises in many applications across various disciplines, such as industrial prototyping, artistic design and biomedical imaging. While the problem has been widely studied for years, challenges remain for handling different type of curve inputs while satisfying various constraints. We study studied three related computational tasks in this thesis. First, we propose an algorithm for reconstructing multi-labeled material interfaces from cross-sectional curves that allows for explicit topology control. Second, we addressed the consistency restoration, a critical but overlooked problem in applying …
Management And Security Of Multi-Cloud Applications, Lav Gupta
Management And Security Of Multi-Cloud Applications, Lav Gupta
McKelvey School of Engineering Theses & Dissertations
Single cloud management platform technology has reached maturity and is quite successful in information technology applications. Enterprises and application service providers are increasingly adopting a multi-cloud strategy to reduce the risk of cloud service provider lock-in and cloud blackouts and, at the same time, get the benefits like competitive pricing, the flexibility of resource provisioning and better points of presence. Another class of applications that are getting cloud service providers increasingly interested in is the carriers' virtualized network services. However, virtualized carrier services require high levels of availability and performance and impose stringent requirements on cloud services. They necessitate the …
Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang
Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang
McKelvey School of Engineering Theses & Dissertations
This dissertation contributes to the area of adaptive real-time and fault-tolerant systems research, applied to Industrial Internet-of-Things (IIoT) systems. Heterogeneous timing and reliability requirements arising from IIoT applications have posed challenges for IIoT services to efficiently differentiate and meet such requirements. Specifically, IIoT services must both differentiate processing according to applications' timing requirements (including latency, event freshness, and relative consistency of each other) and enforce the needed levels of assurance for data delivery (even as far as ensuring zero data loss). It is nontrivial for an IIoT service to efficiently differentiate such heterogeneous IIoT timing/reliability requirements to fit each application, …
Smart Home Audio Assistant, Xipeng Wang
Smart Home Audio Assistant, Xipeng Wang
All Computer Science and Engineering Research
This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.
A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley
A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley
All Computer Science and Engineering Research
There is ample evidence in the visualization commu- nity that individual differences matter. These prior works high- light various traits and cognitive abilities that can modulate the use of the visualization systems and demonstrate a measurable influence on speed, accuracy, process, and attention. Perhaps the most important implication of this body of work is that we can use individual differences as a mechanism for estimating people’s potential to effectively leverage visual interfaces or to identify those people who may struggle. As visual literacy and data fluency continue to become essential skills for our everyday lives, we must embrace the growing …
Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu
Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu
All Computer Science and Engineering Research
Wireless devices have become a major part in Smart Home industry. Almost every smart home company has its own wireless solutions and cloud services. Normally, customers can only monitor and control smart devices through applications or platforms companies provided. It causes inconveniences and problems when we have lots of smart devices. In my master project, I did two projects to implement smart home IoT applications. From a single functionality IoT application to a more complicated smart home system, there are lots of challenges and problems appeared. This article will mainly focus on challenges in integrating IoT in a smart home.
Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li
Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li
All Computer Science and Engineering Research
Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.
Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju
Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju
All Computer Science and Engineering Research
When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool. This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree. First, this tool is developed by using JavaScript so that users don't need to install any software …