Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Purdue University (17)
- Wright State University (17)
- University of South Carolina (9)
- Old Dominion University (5)
- University of Arkansas, Fayetteville (5)
-
- University of Texas at El Paso (5)
- Western University (5)
- California Polytechnic State University, San Luis Obispo (4)
- University of Central Florida (4)
- University of Massachusetts Amherst (4)
- University of Nevada, Las Vegas (4)
- University of South Florida (4)
- University of Wisconsin Milwaukee (4)
- Washington University in St. Louis (4)
- University of Tennessee, Knoxville (3)
- Air Force Institute of Technology (2)
- Marquette University (2)
- Missouri University of Science and Technology (2)
- Nova Southeastern University (2)
- Portland State University (2)
- South Dakota State University (2)
- University of Vermont (2)
- Valparaiso University (2)
- Walden University (2)
- Edith Cowan University (1)
- Kennesaw State University (1)
- La Salle University (1)
- Louisiana State University (1)
- Louisiana Tech University (1)
- Loyola Marymount University and Loyola Law School (1)
- Keyword
-
- Applied sciences (20)
- Department of Computer Science and Engineering (17)
- Engineering, Computer Science and Engineering (6)
- Computer Science (4)
- Computer vision (4)
-
- Information Technology (4)
- Machine learning (4)
- Security (4)
- Education (3)
- IoT (3)
- Semantic Web (3)
- Visualization (3)
- Additive Manufacturing (2)
- Analysis (2)
- Android (2)
- Autonomous (2)
- Classification (2)
- Cloud Computing (2)
- Clustering (2)
- Control (2)
- Data mining (2)
- Deep learning (2)
- Energy efficiency (2)
- Engineering, Computer Sciences (2)
- Framework (2)
- Image processing (2)
- Internet of Things (2)
- Machine Learning (2)
- Neural networks (2)
- PHP (2)
- Publication
-
- Browse all Theses and Dissertations (17)
- Theses and Dissertations (15)
- Open Access Dissertations (10)
- Electronic Theses and Dissertations (9)
- Doctoral Dissertations (7)
-
- Open Access Theses (7)
- Electronic Thesis and Dissertation Repository (5)
- Open Access Theses & Dissertations (5)
- McKelvey School of Engineering Theses & Dissertations (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Computer Engineering (3)
- CCE Theses and Dissertations (2)
- Dissertations and Theses (2)
- Graduate College Dissertations and Theses (2)
- Graduate Theses and Dissertations (2)
- Honors Theses (2)
- Masters Theses (2)
- Walden Dissertations and Doctoral Studies (2)
- Architectural Engineering (1)
- Chancellor’s Honors Program Projects (1)
- Chemical Engineering Undergraduate Honors Theses (1)
- Computer Science Theses & Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations (1934 -) (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- HON499 projects (1)
- Honors Thesis (1)
Articles 1 - 30 of 128
Full-Text Articles in Engineering
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Information Technology Capstone Research Project Reports
The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Electronic Thesis and Dissertation Repository
Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …
Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly
Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly
Dissertations and Theses
Cardiac arrhythmias occur when the normal pattern of electrical signals in the heart breaks down. A premature ventricular contraction (PVC) is a common type of arrhythmia that occurs when a heartbeat originates from an ectopic focus within the ventricles rather than from the sinus node in the right atrium. This and other arrhythmias are often diagnosed with the help of an electrocardiogram, or ECG, which records the electrical activity of the heart using electrodes placed on the skin. In an ECG signal, a PVC is characterized by both timing and morphological differences from a normal sinus beat.
An implantable cardiac …
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Computer Engineering
The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …
Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook
Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook
Electronic Theses and Dissertations
This dissertation is concerned with the development of robust numerical solution procedures for the generalized micromechanical analysis of linear and nonlinear constitutive behavior in heterogeneous materials. Although the methods developed are applicable in many engineering, geological, and materials science fields, three main areas are explored in this work. First, a numerical methodology is presented for the thermomechanical analysis of heterogeneous materials with a special focus on real polycrystalline microstructures obtained using electron backscatter diffraction techniques. Asymptotic expansion homogenization and finite element analysis are employed for micromechanical analysis of polycrystalline materials. Effective thermoelastic properties of polycrystalline materials are determined and compared …
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
Open Access Dissertations
Detection, diagnosis and mitigation of performance problems in today's large-scale distributed and parallel systems is a difficult task. These large distributed and parallel systems are composed of various complex software and hardware components. When the system experiences some performance or correctness problem, developers struggle to understand the root cause of the problem and fix in a timely manner. In my thesis, I address these three components of the performance problems in computer systems. First, we focus on diagnosing performance problems in large-scale parallel applications running on supercomputers. We developed techniques to localize the performance problem for root-cause analysis. Parallel applications, …
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Open Access Theses
This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …
Students' Explanations In Complex Learning Of Disciplinary Programming, Camilo Vieira
Students' Explanations In Complex Learning Of Disciplinary Programming, Camilo Vieira
Open Access Dissertations
Computational Science and Engineering (CSE) has been denominated as the third pillar of science and as a set of important skills to solve the problems of a global society. Along with the theoretical and the experimental approaches, computation offers a third alternative to solve complex problems that require processing large amounts of data, or representing complex phenomena that are not easy to experiment with. Despite the relevance of CSE, current professionals and scientists are not well prepared to take advantage of this set of tools and methods. Computation is usually taught in an isolated way from engineering disciplines, and therefore, …
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Open Access Theses
Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.
This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …
Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma
Graduate Theses and Dissertations
The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined …
Design And Basic Verification Of A Discrete Event Simulator For Glucose Metabolism In Human Beings, Elizabeth Andrews
Design And Basic Verification Of A Discrete Event Simulator For Glucose Metabolism In Human Beings, Elizabeth Andrews
Theses and Dissertations
This thesis describes the design and basic verification of a discrete event simulator for glucose metabolism in human beings. The simulator implements the glucose metabolism related behavior of various organs in the human body and tracks the blood plasma glucose level as the human body goes through a sequence of diet and exercise events. The simulator can mimic insulin resistance in various organs as well as the loss of insulin production in the pancreas and the adverse impact of these changes on the metabolic behavior of various organs. Thus, the simulator can serve as a model for people with diabetes. …
Investigation Of Sparsifying Transforms In Compressed Sensing For Magnetic Resonance Imaging With Fasttestcs, Christopher Adams Baker
Investigation Of Sparsifying Transforms In Compressed Sensing For Magnetic Resonance Imaging With Fasttestcs, Christopher Adams Baker
Theses and Dissertations
The goal of this contribution is to achieve higher reduction factors for faster Magnetic Resonance Imaging (MRI) scans with better Image Quality (IQ) by using Compressed Sensing (CS). This can be accomplished by adopting and understanding better sparsifying transforms for CS in MRI. There is a tremendous number of transforms and optional settings potentially available. Additionally, the amount of research in CS is growing, with possible duplication and difficult practical evaluation and comparison. However, no in-depth analysis of the effectiveness of different redundant sparsifying transforms on MRI images with CS has been undertaken until this work. New theoretical sparsity bounds …
A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki
A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki
Electronic Theses and Dissertations
Stream processing frameworks are designed to process the streaming data that arrives in time. An example of such data is stream of emails that a user receives every day. Most of the real world data streams are also imbalanced as is in the stream of emails, which contains few spam emails compared to a lot of legitimate emails. The classification of the imbalanced data stream is challenging due to the several reasons: First of all, data streams are huge and they can not be stored in the memory for one time processing. Second, if the data is imbalanced, the accuracy …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Acoustic Detection, Source Separation, And Classification Algorithms For Unmanned Aerial Vehicles In Wildlife Monitoring And Poaching, Carlo Lopez-Tello
Acoustic Detection, Source Separation, And Classification Algorithms For Unmanned Aerial Vehicles In Wildlife Monitoring And Poaching, Carlo Lopez-Tello
UNLV Theses, Dissertations, Professional Papers, and Capstones
This work focuses on the problem of acoustic detection, source separation, and classification under noisy conditions. The goal of this work is to develop a system that is able to detect poachers and animals in the wild by using microphones mounted on unmanned aerial vehicles (UAVs). The classes of signals used to detect wildlife and poachers include: mammals, birds, vehicles and firearms. The noise signals under consideration include: colored noises, UAV propeller and wind noises.
The system consists of three sub-systems: source separation (SS), signal detection, and signal classification. Non-negative Matrix Factorization (NMF) is used for source separation, and random …
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Chancellor’s Honors Program Projects
No abstract provided.
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
McKelvey School of Engineering Theses & Dissertations
Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
An Application Programming Interface For Parliamentary Procedure, Grant David Bourque
An Application Programming Interface For Parliamentary Procedure, Grant David Bourque
Honors Theses
No abstract provided.
Towards Computational Human Behavior Modeling For Just-In-Time Adaptive Interventions, Tylar Murray
Towards Computational Human Behavior Modeling For Just-In-Time Adaptive Interventions, Tylar Murray
USF Tampa Graduate Theses and Dissertations
The advent of powerful wearable devices and smartphones has enabled a new generation of “in-the-wild” user studies, adaptive behavioral intervention strategies, and context measurement. Though numerous proof-of-concept studies continue to push the limitations of what a behavioral scientist can do with these technologies, there remains a major methodological roadblock separating behavioral theory and application. Avatar-user interaction theory, for example, is not well defined in its formulation, and thus guidelines for intervention designers depend on heuristic methods and designer intuition. Computational modeling has been slow to move into behavioral science in general, but a growing population of behavioral scientists recognize this …
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Doctoral Dissertations
A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Doctoral Dissertations
Many natural and social phenomena occur in networks. Examples include the spread of information, ideas, and opinions through a social network, the propagation of an infectious disease among people, and the spread of species within an interconnected habitat network. The ability to modify a phenomenon towards some desired outcomes has widely recognized benefits to our society and the economy. The outcome of a phenomenon is largely determined by the topology or properties of its underlying network. A decision maker can take management actions to modify a network and, therefore, change the outcome of the phenomenon. A management action is an …
Automatic Fracture Orientation Extraction From Sfm Point Clouds, Jon Kissi
Automatic Fracture Orientation Extraction From Sfm Point Clouds, Jon Kissi
Electronic Thesis and Dissertation Repository
Geology seeks to understand the history of the Earth and its surface processes through charac- terisation of surface formations and rock units. Chief among the geologists’ tools are rock unit orientation measurements, such as Strike, Dip and Dip Direction. These allow an understanding of both surface and sub-structure on both the local and macro scale.
Although the way these techniques can be used to characterise geology are well understood, the need to collect these measurements by hand adds time and expense to the work of the geologist, precludes spontaneity in field work, and coverage is limited to where the geologist …
Neurosurgical Ultrasound Pose Estimation Using Image-Based Registration And Sensor Fusion - A Feasibility Study, Utsav Pardasani
Neurosurgical Ultrasound Pose Estimation Using Image-Based Registration And Sensor Fusion - A Feasibility Study, Utsav Pardasani
Electronic Thesis and Dissertation Repository
Modern neurosurgical procedures often rely on computer-assisted real-time guidance using multiple medical imaging modalities. State-of-the-art commercial products enable the fusion of pre-operative with intra-operative images (e.g., magnetic resonance [MR] with ultrasound [US] images), as well as the on-screen visualization of procedures in progress. In so doing, US images can be employed as a template to which pre-operative images can be registered, to correct for anatomical changes, to provide live-image feedback, and consequently to improve confidence when making resection margin decisions near eloquent regions during tumour surgery.
In spite of the potential for tracked ultrasound to improve many neurosurgical procedures, it …
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Doctoral Dissertations
The prevention of social anxiety, performance anxiety, and social phobia via the combination of two generic drugs, diphenoxylate HC1 (opioid) plus atropine sulfate (anticholinergic) and propranolol HCl (beta blocker) was evaluated in mice through behavioral studies. A patent published on a September 8, 2011 by Benjamin D. Holly, US 2011/0218215 Al, prompted the research. The drug combination of diphenoxylate and atropine plus propranolol could be an immediate treatment for patients suffering from acute phobic and social anxiety disorders. Demonstrating the anxiolytic effects of the treatment on mice would validate a mouse model for neuroscientist to be used to detect the …
Physical Layer Defenses Against Primary User Emulation Attacks, Joan A. Betances
Physical Layer Defenses Against Primary User Emulation Attacks, Joan A. Betances
Theses and Dissertations
Cognitive Radio (CR) is a promising technology that works by detecting unused parts of the spectrum and automatically reconfiguring the communication system's parameters in order to operate in the available communication channels while minimizing interference. CR enables efficient use of the Radio Frequency (RF) spectrum by generating waveforms that can coexist with existing users in licensed spectrum bands. Spectrum sensing is one of the most important components of CR systems because it provides awareness of its operating environment, as well as detecting the presence of primary (licensed) users of the spectrum.
Collective Contextual Anomaly Detection For Building Energy Consumption, Daniel Berhane Araya
Collective Contextual Anomaly Detection For Building Energy Consumption, Daniel Berhane Araya
Electronic Thesis and Dissertation Repository
Commercial and residential buildings are responsible for a substantial portion of total global energy consumption and as a result make a significant contribution to global carbon emissions. Hence, energy-saving goals that target buildings can have a major impact in reducing environmental damage. During building operation, a significant amount of energy is wasted due to equipment and human-related faults. To reduce waste, today's smart buildings monitor energy usage with the aim of identifying abnormal consumption behaviour and notifying the building manager to implement appropriate energy-saving procedures. To this end, this research proposes the \textit{ensemble anomaly detection} (EAD) framework. The EAD is …
Bayesian Networks To Assess The Newborn Stool Microbiome, William E. Bennett Jr.
Bayesian Networks To Assess The Newborn Stool Microbiome, William E. Bennett Jr.
McKelvey School of Engineering Theses & Dissertations
In human stool, a large population of bacterial genes and transcripts from hundreds of genera coexist with host genes and transcripts. Assessments of the metagenome and transcriptome are particularly challenging, since there is a great deal of sequence overlap among related species and related genes. We sequenced the total RNA content from stool samples in a neonate using previously-described methods. We then performed stepwise alignment of different populations of RNA sequence reads to different indices, including ribosomal databases, the human genome, and all sequenced bacterial genomes. Each pool of RNA at each alignment step was subjected to compression to assess …
Lattice Boltzmann Methods For Wind Energy Analysis, Stephen Lloyd Wood
Lattice Boltzmann Methods For Wind Energy Analysis, Stephen Lloyd Wood
Doctoral Dissertations
An estimate of the United States wind potential conducted in 2011 found that the energy available at an altitude of 80 meters is approximately triple the wind energy available 50 meters above ground. In 2012, 43% of all new electricity generation installed in the U.S. (13.1 GW) came from wind power. The majority of this power, 79%, comes from large utility scale turbines that are being manufactured at unprecedented sizes. Existing wind plants operate with a capacity factor of only approximately 30%. Measurements have shown that the turbulent wake of a turbine persists for many rotor diameters, inducing increased vibration …
Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan
Doctoral Dissertations
With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.
First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience …