Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Engineering

Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera Dec 2020

Suffix Tree, Minwise Hashing And Streaming Algorithms For Big Data Analysis In Bioinformatics, Sairam Behera

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this dissertation, we worked on several algorithmic problems in bioinformatics using mainly three approaches: (a) a streaming model, (b) sux-tree based indexing, and (c) minwise-hashing (minhash) and locality-sensitive hashing (LSH). The streaming models are useful for large data problems where a good approximation needs to be achieved with limited space usage. We developed an approximation algorithm (Kmer-Estimate) using the streaming approach to obtain a better estimation of the frequency of k-mer counts. A k-mer, a subsequence of length k, plays an important role in many bioinformatics analyses such as genome distance estimation. We also developed new methods that use …


A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai Dec 2020

A Novel Spatiotemporal Prediction Method Of Cumulative Covid-19 Cases, Junzhe Cai

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Prediction methods are important for many applications. In particular, an accurate prediction for the total number of cases for pandemics such as the Covid-19 pandemic could help medical preparedness by providing in time a sufficient supply of testing kits, hospital beds and medical personnel. This thesis experimentally compares the accuracy of ten prediction methods for the cumulative number of Covid-19 pandemic cases. These ten methods include two types of neural networks and extrapolation methods based on best fit linear, best fit quadratic, best fit cubic and Lagrange interpolation, as well as an extrapolation method from Revesz. We also consider the …


Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan Dec 2020

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …


Machine Learning Augmentation Micro-Sensors For Smart Device Applications, Mohammad H. Hasan Nov 2020

Machine Learning Augmentation Micro-Sensors For Smart Device Applications, Mohammad H. Hasan

Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research

Novel smart technologies such as wearable devices and unconventional robotics have been enabled by advancements in semiconductor technologies, which have miniaturized the sizes of transistors and sensors. These technologies promise great improvements to public health. However, current computational paradigms are ill-suited for use in novel smart technologies as they fail to meet their strict power and size requirements. In this dissertation, we present two bio-inspired colocalized sensing-and-computing schemes performed at the sensor level: continuous-time recurrent neural networks (CTRNNs) and reservoir computers (RCs). These schemes arise from the nonlinear dynamics of micro-electro-mechanical systems (MEMS), which facilitates computing, and the inherent ability …


Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe Nov 2020

Formal Concept Analysis Applications In Bioinformatics, Sarah Roscoe

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bioinformatics is an important field that seeks to solve biological problems with the help of computation. One specific field in bioinformatics is that of genomics, the study of genes and their functions. Genomics can provide valuable analysis as to the interaction between how genes interact with their environment. One such way to measure the interaction is through gene expression data, which determines whether (and how much) a certain gene activates in a situation. Analyzing this data can be critical for predicting diseases or other biological reactions. One method used for analysis is Formal Concept Analysis (FCA), a computing technique based …


Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow Oct 2020

Investigating Factors Predicting Effective Learning In A Cs Professional Development Program For K-12 Teachers, Patrick Morrow

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The demand for K-12 Computer Science (CS) education is growing and there is not an adequate number of educators to match the demand. Comprehensive research was carried out to investigate and understand the influence of a summer two-week professional development (PD) program on teachers’ CS content and pedagogical knowledge, their confidence in such knowledge, their interest in and perceived value of CS, and the factors influencing such impacts. Two courses designed to train K-12 teachers to teach CS, focusing on both concepts and pedagogy skills were taught over two separate summers to two separate cohorts of teachers. Statistical and SWOT …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


Formal Language Constraints In Deep Reinforcement Learning For Self-Driving Vehicles, Tyler Bienhoff Jul 2020

Formal Language Constraints In Deep Reinforcement Learning For Self-Driving Vehicles, Tyler Bienhoff

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In recent years, self-driving vehicles have become a holy grail technology that, once fully developed, could radically change the daily behaviors of people and enhance safety. The complexities of controlling a car in a constantly changing environment are too immense to directly program how the vehicle should behave in each specific scenario. Thus, a common technique when developing autonomous vehicles is to use reinforcement learning, where vehicles can be trained in simulated and real-world environments to make proper decisions in a wide variety of scenarios. Reinforcement learning models, however, have uncertainties in how the vehicle acts, especially in a previously …


Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola Jul 2020

Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Use of unmanned aerial systems (UASs) in agriculture has risen in the past decade. These systems are key to modernizing agriculture. UASs collect and elucidate data previously difficult to obtain and used to help increase agricultural efficiency and production. Typical commercial off-the-shelf (COTS) UASs are limited by small payloads and short flight times. Such limits inhibit their ability to provide abundant data at multiple spatiotemporal scales. In this paper, we describe the design and construction of the tethered aircraft unmanned system (TAUS), which is a novel power-over-tether UAS leveraging the physical presence of the tether to launch multiple sensors along …


Reducing Run-Time Adaptation Space Via Analysis Of Possible Utility Bounds, Clay Stevens, Hamid Bagheri May 2020

Reducing Run-Time Adaptation Space Via Analysis Of Possible Utility Bounds, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Self-adaptive systems often employ dynamic programming or similar techniques to select optimal adaptations at run-time. These techniques suffer from the “curse of dimensionality", increasing the cost of run-time adaptation decisions. We propose a novel approach that improves upon the state-of-the-art proactive self-adaptation techniques to reduce the number of possible adaptations that need be considered for each run-time adaptation decision. The approach, realized in a tool called Thallium, employs a combination of automated formal modeling techniques to (i) analyze a structural model of the system showing which configurations are reachable from other configurations and (ii) compute the utility that can be …


Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler May 2020

Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Program comprehension is a sub-field of software engineering that seeks to understand how developers understand programs. Comprehension acts as a starting point for many software engineering tasks such as bug fixing, refactoring, and feature creation. The dissertation presents a series of empirical studies to understand how developers comprehend software in realistic settings. The unique aspect of this work is the use of eye tracking equipment to gather fine-grained detailed information of what developers look at in software artifacts while they perform realistic tasks in an environment familiar to them, namely a context including both the Integrated Development Environment (Eclipse or …


Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Apr 2020

Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.


An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson Apr 2020

An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The use of multiple programming languages (polyglot programming) during software development is common practice in modern software development. However, not much is known about how the use of these different languages affects developer productivity. The study presented in this thesis replicates a randomized controlled trial that investigates the use of multiple languages in the context of database programming tasks. Participants in our study were given coding tasks written in Java and one of three SQL-like embedded languages: plain SQL in strings, Java methods only, a hybrid embedded language that was more similar to Java. In addition to recording the online …


A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu Apr 2020

A Memory Usage Comparison Between Jitana And Soot, Yuanjiu Hu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

There are several factors that make analyzing Android apps to address dependability and security concerns challenging. These factors include (i) resource efficiency as analysts need to be able to analyze large code-bases to look for issues that can exist in the application code and underlying platform code; (ii) scalability as today’s cybercriminals deploy attacks that may involve many participating apps; and (iii) in many cases, security analysts often rely on dynamic or hybrid analysis techniques to detect and identify the sources of issues.

The underlying principle governing the design of existing program analysis engines is the main cause that prevents …


An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi Apr 2020

An Algorithm For Building Language Superfamilies Using Swadesh Lists, Bill Mutabazi

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The main contributions of this thesis are the following: i. Developing an algorithm to generate language families and superfamilies given for each input language a Swadesh list represented using the international phonetic alphabet (IPA) notation. ii. The algorithm is novel in using the Levenshtein distance metric on the IPA representation and in the way it measures overall distance between pairs of Swadesh lists. iii. Building a Swadesh list for the author's native Kinyarwanda language because a Swadesh list could not be found even after an extensive search for it.

Adviser: Peter Revesz


Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li Apr 2020

Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Android is currently the most popular operating system for mobile devices in the world. However, its openness is the main reason for the majority of malware to be targeting Android devices. Various approaches have been developed to detect malware.

Unfortunately, new breeds of malware utilize sophisticated techniques to defeat malware detectors. For example, to defeat signature-based detectors, malware authors change the malware’s signatures to avoid detection. As such, a more effective approach to detect malware is by leveraging malware’s behavioral characteristics. However, if a behavior-based detector is based on static analysis, its reported results may contain a large number of …


Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras Apr 2020

Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The study of social networks is central to advancing our understanding of a wide range of phenomena in human societies. Social networks co-evolve concurrently alongside the individuals within them. Selection processes cause network structure to change in response to emerging similarities/differences between individuals. At the same time, diffusion processes occur as individuals influence one another when they interact across network links. Indeed, each network link is a logical abstraction that aggregates many short-lived pairwise interactions of interest that are being studied. Traditionally, network co-evolution is studied by periodically taking static snapshots of social networks using surveys. Unfortunately, participation incentives …


An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr Apr 2020

An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Network reachability is an important factor of an optical telecommunication network. In a wavelength-division-muliplexing (WDM) optical network, any failure can cause a large amount of loss and disruptions in network. Failures can occur in network elements, link, and component inside a node or etc. Since major network disruptions can caused network performance degradations, it is necessary that operators have solutions to prevent such those failures. This work examines a prediction model in optical networks and propose a protection plan using a Machine Learning (ML) algorithm called Artificial Neural Networks (ANN) using Mininet emulator. ANN is one of the best method …


Communicating Computing Limitations Through Kinesthetic Pedagogy, Michael Mason Mar 2020

Communicating Computing Limitations Through Kinesthetic Pedagogy, Michael Mason

Honors Theses

Abstract concepts, such as those in advanced Computer Science and Mathematics, can be extremely difficult to understand fundamentally without an existing background in a similar subject. Recent research has shown that raw visualizations without learner interaction are not particularly effective at communicating complex information because they allow the learner to ignore the example (Lauer 2006, Naps 2002). Forcing somebody to interact with an example ensures that they can grasp the visualization. This paper describes a six step technique to demonstrate the limitations of computing through kinesthetic pedagogy, then offers an example exercise utilizing the method. The six proposed steps are: …


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Power-Over-Tether Uas Leveraged For Nearly Indefinite Meteorological Data Acquisition In The Platte River Basin, Daniel Rico, Carrick Detweiler, Francisco Munoz-Arriola Jan 2020

Power-Over-Tether Uas Leveraged For Nearly Indefinite Meteorological Data Acquisition In The Platte River Basin, Daniel Rico, Carrick Detweiler, Francisco Munoz-Arriola

CSE Conference and Workshop Papers

The integration of unmanned aerial systems (UASs) has increased in the field of agriculture. These systems can provide data that was previously difficult to obtain to help increase efficiency and production. Typical commercial off the shelf (COTS) UASs have significant limitations in the form of small payloads, and short flight times which inhibit their ability to provide significant quantities of useful data. We present the development of a novel power-over-tether UAS that leverages the physical presence of the tether to integrate sensors at multiple altitudes along the tether. The UAS can acquire data nearly indefinitely to sense atmospheric conditions and …


Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham Jan 2020

Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Accounting for variance in human behavior is an integral part of interacting with robotic systems that share control between users and robots in order to reduce errors, improve performance, and maintain safety. In this work we focus on the shared control of a telepresence robot and how individual user traits may affect a person's performance while navigating the robot. This requires understanding which user qualities impact performance and cause conflicts -- with the ultimate goal of building shared controllers that adapt to those qualities. Toward this goal, we develop novel adaptive shared controllers and integrate the study of intrinsic user …


Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi Jan 2020

Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi

Biological Systems Engineering: Papers and Publications

Mid- to late-season weeds that escape from the routine early-season weed management threaten agricultural production by creating a large number of seeds for several future growing seasons. Rapid and accurate detection of weed patches in field is the first step of site-specific weed management. In this study, object detection-based convolutional neural network models were trained and evaluated over low-altitude unmanned aerial vehicle (UAV) imagery for mid- to late-season weed detection in soybean fields. The performance of two object detection models, Faster RCNN and the Single Shot Detector (SSD), were evaluated and compared in terms of weed detection performance using mean …