Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 720

Full-Text Articles in Engineering

Management And Security Of Multi-Cloud Applications, Lav Gupta May 2019

Management And Security Of Multi-Cloud Applications, Lav Gupta

McKelvey School of Engineering Theses & Dissertations

Single cloud management platform technology has reached maturity and is quite successful in information technology applications. Enterprises and application service providers are increasingly adopting a multi-cloud strategy to reduce the risk of cloud service provider lock-in and cloud blackouts and, at the same time, get the benefits like competitive pricing, the flexibility of resource provisioning and better points of presence. Another class of applications that are getting cloud service providers increasingly interested in is the carriers' virtualized network services. However, virtualized carrier services require high levels of availability and performance and impose stringent requirements on cloud services. They necessitate the …


Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang May 2019

Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang

McKelvey School of Engineering Theses & Dissertations

Reconstructing surface from a set of spatial curves is a fundamental problem in computer graphics and computational geometry. It often arises in many applications across various disciplines, such as industrial prototyping, artistic design and biomedical imaging. While the problem has been widely studied for years, challenges remain for handling different type of curve inputs while satisfying various constraints. We study studied three related computational tasks in this thesis. First, we propose an algorithm for reconstructing multi-labeled material interfaces from cross-sectional curves that allows for explicit topology control. Second, we addressed the consistency restoration, a critical but overlooked problem in applying …


Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang May 2019

Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang

McKelvey School of Engineering Theses & Dissertations

This dissertation contributes to the area of adaptive real-time and fault-tolerant systems research, applied to Industrial Internet-of-Things (IIoT) systems. Heterogeneous timing and reliability requirements arising from IIoT applications have posed challenges for IIoT services to efficiently differentiate and meet such requirements. Specifically, IIoT services must both differentiate processing according to applications' timing requirements (including latency, event freshness, and relative consistency of each other) and enforce the needed levels of assurance for data delivery (even as far as ensuring zero data loss). It is nontrivial for an IIoT service to efficiently differentiate such heterogeneous IIoT timing/reliability requirements to fit each application, …


Differential Estimation Of Audiograms Using Gaussian Process Active Model Selection, Trevor Larsen May 2019

Differential Estimation Of Audiograms Using Gaussian Process Active Model Selection, Trevor Larsen

McKelvey School of Engineering Theses & Dissertations

Classical methods for psychometric function estimation either require excessive resources to perform, as in the method of constants, or produce only a low resolution approximation of the target psychometric function, as in adaptive staircase or up-down procedures. This thesis makes two primary contributions to the estimation of the audiogram, a clinically relevant psychometric function estimated by querying a patient’s for audibility of a collection of tones. First, it covers the implementation of a Gaussian process model for learning an audiogram using another audiogram as a prior belief to speed up the learning procedure. Second, it implements a use case of …


Smart Home Audio Assistant, Xipeng Wang May 2019

Smart Home Audio Assistant, Xipeng Wang

All Computer Science and Engineering Research

This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.


A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley May 2019

A Survey On The Role Of Individual Differences On Visual Analytics Interactions: Masters Project Report, Jesse Huang, Alvitta Ottley

All Computer Science and Engineering Research

There is ample evidence in the visualization commu- nity that individual differences matter. These prior works high- light various traits and cognitive abilities that can modulate the use of the visualization systems and demonstrate a measurable influence on speed, accuracy, process, and attention. Perhaps the most important implication of this body of work is that we can use individual differences as a mechanism for estimating people’s potential to effectively leverage visual interfaces or to identify those people who may struggle. As visual literacy and data fluency continue to become essential skills for our everyday lives, we must embrace the growing …


Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu Apr 2019

Challenges In Integrating Iot In Smart Home, Leiquan Pan, Chenyang Lu

All Computer Science and Engineering Research

Wireless devices have become a major part in Smart Home industry. Almost every smart home company has its own wireless solutions and cloud services. Normally, customers can only monitor and control smart devices through applications or platforms companies provided. It causes inconveniences and problems when we have lots of smart devices. In my master project, I did two projects to implement smart home IoT applications. From a single functionality IoT application to a more complicated smart home system, there are lots of challenges and problems appeared. This article will mainly focus on challenges in integrating IoT in a smart home.


Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li Apr 2019

Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li

All Computer Science and Engineering Research

Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.


Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju Apr 2019

Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju

All Computer Science and Engineering Research

When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool. This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree. First, this tool is developed by using JavaScript so that users don't need to install any software …


Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono Dec 2018

Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono

McKelvey School of Engineering Theses & Dissertations

In a world that is increasingly dominated by advances made in digital systems, this work will explore the exploiting of naturally occurring physical phenomena to pave the way towards a self-powered sensor for Cyber-Physical Systems (CPS). In general, a sensor frontend can be broken up into a handful of basic stages: transduction, filtering, energy conversion, measurement, and interfacing. One analog artifact that was investigated for filtering was the physical phenomenon of hysteresis induced in current-mode biquads driven near or at their saturation limit. Known as jump resonance, this analog construct facilitates a higher quality factor to be brought about without …


Concurrency Platforms For Real-Time And Cyber-Physical Systems, David Ferry Aug 2018

Concurrency Platforms For Real-Time And Cyber-Physical Systems, David Ferry

McKelvey School of Engineering Theses & Dissertations

Parallel processing is an important way to satisfy the increasingly demanding computational needs of modern real-time and cyber-physical systems, but existing parallel computing technologies primarily emphasize high-throughput and average-case performance metrics, which are largely unsuitable for direct application to real-time, safety-critical contexts. This work contrasts two concurrency platforms designed to achieve predictable worst case parallel performance for soft real-time workloads with millisecond periods and higher. One of these is then the basis for the CyberMech platform, which enables parallel real-time computing for a novel yet representative application called Real-Time Hybrid Simulation (RTHS). RTHS combines demanding parallel real-time computation with real-time …


Self-Powered Time-Keeping And Time-Of-Occurrence Sensing, Liang Zhou Aug 2018

Self-Powered Time-Keeping And Time-Of-Occurrence Sensing, Liang Zhou

McKelvey School of Engineering Theses & Dissertations

Self-powered and passive Internet-of-Things (IoT) devices (e.g. RFID tags, financial assets, wireless sensors and surface-mount devices) have been widely deployed in our everyday and industrial applications. While diverse functionalities have been implemented in passive systems, the lack of a reference clock limits the design space of such devices used for applications such as time-stamping sensing, recording and dynamic authentication. Self-powered time-keeping in passive systems has been challenging because they do not have access to continuous power sources. While energy transducers can harvest power from ambient environment, the intermittent power cannot support continuous operation for reference clocks. The thesis of this …


Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka Aug 2018

Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka

All Computer Science and Engineering Research

This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing. Authentication ensures that the user is who he/she claims to be. Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data. Provenance allows an efficient tracking of the data and resources …


Improving Pure-Tone Audiometry Using Probabilistic Machine Learning Classification, Xinyu Song Aug 2017

Improving Pure-Tone Audiometry Using Probabilistic Machine Learning Classification, Xinyu Song

McKelvey School of Engineering Theses & Dissertations

Hearing loss is a critical public health concern, affecting hundreds millions of people worldwide and dramatically impacting quality of life for affected individuals. While treatment techniques have evolved in recent years, methods for assessing hearing ability have remained relatively unchanged for decades. The standard clinical procedure is the modified Hughson-Westlake procedure, an adaptive pure-tone detection task that is typically performed manually by audiologists, costing millions of collective hours annually among healthcare professionals. In addition to the high burden of labor, the technique provides limited detail about an individual’s hearing ability, estimating only detection thresholds at a handful of pre-defined pure-tone …


Decoupling Information And Connectivity In Information-Centric Networking, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley Jul 2017

Decoupling Information And Connectivity In Information-Centric Networking, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley

All Computer Science and Engineering Research

This paper introduces and demonstrates the concept of Information-Centric Transport as a mechanism for cleanly decoupling the information plane from the connectivity plane in Information-Centric Networking (ICN) architectures, such as NDN and CICN. These are coupled in today's incarnations of NDN and CICN through the use of forwarding strategy, which is the architectural component for deciding how to forward packets in the presence of either multiple next-hop options or dynamic feedback. As presently designed, forwarding strategy is not sustainable: application developers can only confidently specify strategy if they understand connectivity details, while network node operators can only confidently assign strategies …


An Improved Algorithm For Learning To Perform Exception-Tolerant Abduction, Mengxue Zhang May 2017

An Improved Algorithm For Learning To Perform Exception-Tolerant Abduction, Mengxue Zhang

McKelvey School of Engineering Theses & Dissertations

Abstract

Inference from an observed or hypothesized condition to a plausible cause or explanation for this condition is known as abduction. For many tasks, the acquisition of the necessary knowledge by machine learning has been widely found to be highly effective. However, the semantics of learned knowledge are weaker than the usual classical semantics, and this necessitates new formulations of many tasks. We focus on a recently introduced formulation of the abductive inference task that is thus adapted to the semantics of machine learning. A key problem is that we cannot expect that our causes or explanations will be perfect, …


Multipath And Rate Stability, Junjie Liu, Roch A. Guérin Dec 2016

Multipath And Rate Stability, Junjie Liu, Roch A. Guérin

All Computer Science and Engineering Research

Originally Published In Proc. IEEE Globecom Conference - CQRM: Communication QoS, Reliability & Modeling Symposium


Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou Dec 2016

Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou

McKelvey School of Engineering Theses & Dissertations

Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …


Bayesian Networks To Assess The Newborn Stool Microbiome, William E. Bennett Jr. Aug 2016

Bayesian Networks To Assess The Newborn Stool Microbiome, William E. Bennett Jr.

McKelvey School of Engineering Theses & Dissertations

In human stool, a large population of bacterial genes and transcripts from hundreds of genera coexist with host genes and transcripts. Assessments of the metagenome and transcriptome are particularly challenging, since there is a great deal of sequence overlap among related species and related genes. We sequenced the total RNA content from stool samples in a neonate using previously-described methods. We then performed stepwise alignment of different populations of RNA sequence reads to different indices, including ribosomal databases, the human genome, and all sequenced bacterial genomes. Each pool of RNA at each alignment step was subjected to compression to assess …


In-Network Retransmissions In Named Data Networking, Hila Ben Abraham, Patrick Crowley Jul 2016

In-Network Retransmissions In Named Data Networking, Hila Ben Abraham, Patrick Crowley

All Computer Science and Engineering Research

The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy. A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it …


Mercator (Mapping Enumerator For Cuda) User's Manual, Stephen V. Cole, Jeremy Buhler Jul 2016

Mercator (Mapping Enumerator For Cuda) User's Manual, Stephen V. Cole, Jeremy Buhler

All Computer Science and Engineering Research

Welcome to the MERCATOR user's manual! MERCATOR is a CUDA/C++ system designed to assist you in writing efficient CUDA applications by automatically generating significant portions of the GPU-side application code. We hope you find it helpful; please feel free to contact the authors with any questions or feedback.


Revelation Of Yin-Yang Balance In Microbial Cell Factories By Data Mining, Flux Modeling, And Metabolic Engineering, Gang Wu May 2016

Revelation Of Yin-Yang Balance In Microbial Cell Factories By Data Mining, Flux Modeling, And Metabolic Engineering, Gang Wu

McKelvey School of Engineering Theses & Dissertations

The long-held assumption of never-ending rapid growth in biotechnology and especially in synthetic biology has been recently questioned, due to lack of substantial return of investment. One of the main reasons for failures in synthetic biology and metabolic engineering is the metabolic burdens that result in resource losses. Metabolic burden is defined as the portion of a host cells resources either energy molecules (e.g., NADH, NADPH and ATP) or carbon building blocks (e.g., amino acids) that is used to maintain the engineered components (e.g., pathways). As a result, the effectiveness of synthetic biology tools heavily dependents on cell capability to …


Visualization Of Deep Convolutional Neural Networks, Dingwen Li May 2016

Visualization Of Deep Convolutional Neural Networks, Dingwen Li

McKelvey School of Engineering Theses & Dissertations

Deep learning has achieved great accuracy in large scale image classification and scene recognition tasks, especially after the Convolutional Neural Network (CNN) model was introduced. Although a CNN often demonstrates very good classification results, it is usually unclear how or why a classification result is achieved. The objective of this thesis is to explore several existing visualization approaches which offer intuitive visual results. The thesis focuses on three visualization approaches: (1) image masking which highlights the region of image with high influence on the classification, (2) Taylor decomposition back-propagation which generates a per pixel heat map that describes each pixel's …


Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures (Revised), Jonathan Turner Jan 2016

Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures (Revised), Jonathan Turner

All Computer Science and Engineering Research

This report provides an (updated) overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11. The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/. Source code documentation is at www.arl.wustl.edu/~jst/doc/grafalgo.


Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal Jan 2016

Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal

All Computer Science and Engineering Research

Dynamic task graph schedulers automatically balance work across processor cores by scheduling tasks among available threads while preserving dependences. In this paper, we design NabbitC, a provably efficient dynamic task graph scheduler that accounts for data locality on NUMA systems. NabbitC allows users to assign a color to each task representing the location (e.g., a processor core) that has the most efficient access to data needed during that node’s execution. NabbitC then automatically adjusts the scheduling so as to preferentially execute each node at the location that matches its color—leading to better locality because the node is likely to make …


Applying Bayesian Machine Learning Methods To Theoretical Surface Science, Shane Carr Dec 2015

Applying Bayesian Machine Learning Methods To Theoretical Surface Science, Shane Carr

McKelvey School of Engineering Theses & Dissertations

Machine learning is a rapidly evolving field in computer science with increasingly many applications to other domains. In this thesis, I present a Bayesian machine learning approach to solving a problem in theoretical surface science: calculating the preferred active site on a catalyst surface for a given adsorbate molecule. I formulate the problem as a low-dimensional objective function. I show how the objective function can be approximated into a certain confidence interval using just one iteration of the self-consistent field (SCF) loop in density functional theory (DFT). I then use Bayesian optimization to perform a global search for the solution. …


Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner Dec 2015

Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner

All Computer Science and Engineering Research

A maximum priority matching is a matching in an undirected graph that maximizes a priority score defined with respect to given vertex priorities. An earlier paper showed how to find maximum priority matchings in unweighted graphs. This paper describes an algorithm for bipartite graphs that is faster when the number of distinct priority classes is limited. For graphs with k distinct priority classes it runs in O(kmn1/2) time, where n is the number of vertices in the graph and m is the number of edges.


The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner Dec 2015

The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner

All Computer Science and Engineering Research

This paper introduces a variant of the classical edge coloring problem in graphs that can be applied to an offline scheduling problem for crossbar switches. We show that the problem is NP-complete, develop three lower bounds bounds on the optimal solution value and evaluate the performance of several approximation algorithms, both analytically and experimentally. We show how to approximate an optimal solution with a worst-case performance ratio of 3/2 and our experimental results demonstrate that the best algorithms produce results that very closely track a lower bound.


Maximum Priority Matchings, Jonathan Turner Nov 2015

Maximum Priority Matchings, Jonathan Turner

All Computer Science and Engineering Research

Let G=(V,E) be an undirected graph with n vertices and m edges, in which each vertex u is assigned an integer priority in [1,n], with 1 being the ``highest'' priority. Let M be a matching of G. We define the priority score of M to be an n-ary integer in which the i-th most-significant digit is the number of vertices with priority i that are incident to an edge in M. We describe a variation of the augmenting path method (Edmonds' algorithm) that finds a matching with maximum priority score in O(mn) time.


Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, Chengjie Wu, Dolvara Gunatilaka, Mo Sha, Chenyang Lu Sep 2015

Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, Chengjie Wu, Dolvara Gunatilaka, Mo Sha, Chenyang Lu

All Computer Science and Engineering Research

Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. Real-time scheduling and delay analysis have been studied for WSAN extensively. End-to-end delay in WSANs highly depends on routing, which is still open problem. This paper presents the first real-time routing design for WSAN. We first discuss end-to-end delays of WSANs, then present our real-time routing design. We have implemented and experimented our routing designs on a wireless testbed of 69 nodes. Both experimental results and simulations show that our routing design can improve the …