Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Engineering

Investigation Of Sparsifying Transforms In Compressed Sensing For Magnetic Resonance Imaging With Fasttestcs, Christopher Adams Baker Dec 2016

Investigation Of Sparsifying Transforms In Compressed Sensing For Magnetic Resonance Imaging With Fasttestcs, Christopher Adams Baker

Theses and Dissertations

The goal of this contribution is to achieve higher reduction factors for faster Magnetic Resonance Imaging (MRI) scans with better Image Quality (IQ) by using Compressed Sensing (CS). This can be accomplished by adopting and understanding better sparsifying transforms for CS in MRI. There is a tremendous number of transforms and optional settings potentially available. Additionally, the amount of research in CS is growing, with possible duplication and difficult practical evaluation and comparison. However, no in-depth analysis of the effectiveness of different redundant sparsifying transforms on MRI images with CS has been undertaken until this work. New theoretical sparsity bounds …


Design And Basic Verification Of A Discrete Event Simulator For Glucose Metabolism In Human Beings, Elizabeth Andrews Dec 2016

Design And Basic Verification Of A Discrete Event Simulator For Glucose Metabolism In Human Beings, Elizabeth Andrews

Theses and Dissertations

This thesis describes the design and basic verification of a discrete event simulator for glucose metabolism in human beings. The simulator implements the glucose metabolism related behavior of various organs in the human body and tracks the blood plasma glucose level as the human body goes through a sequence of diet and exercise events. The simulator can mimic insulin resistance in various organs as well as the loss of insulin production in the pancreas and the adverse impact of these changes on the metabolic behavior of various organs. Thus, the simulator can serve as a model for people with diabetes. …


Physical Layer Defenses Against Primary User Emulation Attacks, Joan A. Betances Sep 2016

Physical Layer Defenses Against Primary User Emulation Attacks, Joan A. Betances

Theses and Dissertations

Cognitive Radio (CR) is a promising technology that works by detecting unused parts of the spectrum and automatically reconfiguring the communication system's parameters in order to operate in the available communication channels while minimizing interference. CR enables efficient use of the Radio Frequency (RF) spectrum by generating waveforms that can coexist with existing users in licensed spectrum bands. Spectrum sensing is one of the most important components of CR systems because it provides awareness of its operating environment, as well as detecting the presence of primary (licensed) users of the spectrum.


An Energy Efficient, Load Balancing, And Reliable Routing Protocol For Wireless Sensor Networks, Kamil Samara Aug 2016

An Energy Efficient, Load Balancing, And Reliable Routing Protocol For Wireless Sensor Networks, Kamil Samara

Theses and Dissertations

AN ENERGY EFFICIENT, LOAD BALANCING, AND RELIABLE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

by

Kamil Samara

The University of Wisconsin-Milwaukee, 2016

Under the Supervision of Professor Hossein Hosseini

The Internet of Things (IoT) is shaping the future of Computer Networks and Computing in general, and it is gaining ground very rapidly. The whole idea has originated from the pervasive presence of a variety of things or objects equipped with the internet connectivity. These devices are becoming cheap and ubiquitous, at the same time more powerful and smaller with a variety of onboard sensors. All these factors with the availability of …


Mhealth Technology: Towards A New Persuasive Mobile Application For Caregivers That Addresses Motivation And Usability, Suboh M. Alkhushayni Aug 2016

Mhealth Technology: Towards A New Persuasive Mobile Application For Caregivers That Addresses Motivation And Usability, Suboh M. Alkhushayni

Theses and Dissertations

With the increasing use of mobile technologies and smartphones, new methods of promoting personal health have been developed. For example, there is now software for recording and tracking one's exercise activity or blood pressure. Even though there are already many of these services, the mobile health field still presents many opportunities for new research.

One apparent area of need would be software to support the efforts of caregivers for the elderly, especially those who suffer from multiple chronic conditions, such as cognitive impairment, chronic heart failure or diabetes. Very few mobile applications (apps) have been created that target caregivers of …


Pointing Analysis And Design Drivers For Low Earth Orbit Satellite Quantum Key Distribution, Jeremiah A. Specht Mar 2016

Pointing Analysis And Design Drivers For Low Earth Orbit Satellite Quantum Key Distribution, Jeremiah A. Specht

Theses and Dissertations

The world relies on encryption to perform critical and sensitive tasks every day. If quantum computing matures, the capability to decode keys and decrypt messages becomes possible. Quantum key distribution (QKD) is a method of distributing secure cryptographic keys which relies on the laws of quantum mechanics. Current implementations of QKD use fiber-based channels which limit the number of users and the distance between users. Satellite-based QKD using free-space channels is proposed as a feasible secure global communication solution. Since a free-space link does not use a waveguide, pointing a transmitter to receiver is required to ensure signal arrival. In …


Learning Human Poses From Monocular Images, Xiaochuan Fan Jan 2016

Learning Human Poses From Monocular Images, Xiaochuan Fan

Theses and Dissertations

In this research, we mainly focus on the problem of estimating the 2D human pose from a monocular image and reconstructing the 3D human pose based on the 2D human pose. Here a 3D pose is the locations of the human joints in the 3D space and a 2D pose is the projection of a 3D pose on an image. Unlike many previous works that explicitly use hand-crafted physiological models, both our 2D pose estimation and 3D pose reconstruction approaches implicitly learn the structure of human body from human pose data.

This 3D pose reconstruction is an ill-posed problem without …


Interest Detection In Image, Video And Multiple Videos: Model And Applications, Yuewei Lin Jan 2016

Interest Detection In Image, Video And Multiple Videos: Model And Applications, Yuewei Lin

Theses and Dissertations

Interest detection is detecting an object, event, or process that draws attention. In this dissertation, we focus on interest detection in images, video and multiple videos. Interest detection in an image or a video is closely related to visual attention. However, the interest detection in multiple videos needs to consider all the videos as a whole rather than considering the attention in each single video independently.

Visual attention is an important mechanism of human vision. The computational model of visual attention has recently attracted a lot of interest in the computer vision community mainly because it helps find the objects …


Computational Doping For Fuel Cell Material Design Based On Genetic Algorithms And Genetic Programming, Emrah Atilgan Jan 2016

Computational Doping For Fuel Cell Material Design Based On Genetic Algorithms And Genetic Programming, Emrah Atilgan

Theses and Dissertations

Developing new materials have historically been time-consuming. Computational material discovery can search large design space to identify promising candidates for experimental verification. Recently, Density Functional Theory (DFT) based first principle calculation has been able to calculate many electrical and physical properties of materials, making them suitable for computational doping based material discovery. In material doping, given a base material, one can change its properties by substituting some elements with new ones or adding additional elements. In computational doping, we have a grid of atoms in a supercell, some of which can be substituted with dopant atoms. There are many possible …


A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou Jan 2016

A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou

Theses and Dissertations

Gene order gets evolved under events such as rearrangements, duplications, and losses, which can change both the order and content along the genome, through the long history of genome evolution. Recently, the accumulation of genomic sequences provides researchers with the chance to handle long-standing problems about the phylogenies, or evolutionary histories, of sets of species, and ancestral genomic content and orders. Over the past few years, such problems have been proven so interesting that a large number of algorithms have been proposed in the attempt to resolve them, following different standards. The work presented in this dissertation focuses on algorithms …


Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram Jan 2016

Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram

Theses and Dissertations

Hidden Markov Models a class of statistical models used in various disciplines for understanding speech, finding different types of genes responsible for cancer and much more. In this thesis, Hidden Markov Models are used to obtain hidden states that can correlate the flow changes in the Wakulla Spring Cave. Sensors installed in the tunnels of Wakulla Spring Cave have recorded huge correlated changes in the water flows at numerous tunnels. Assuming the correlated flow changes are a consequence of system being in a set of discrete states, a Hidden Markov Model is calculated. This model comprising all the sensors installed …


Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib Jan 2016

Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib

Theses and Dissertations

In this age of ubiquitous communication in which we can stay constantly connected with the rest of the world, for most of the part, we have to be grateful for one particular invention - the Internet. But as the popularity of Internet connectivity grows, it has become a very dangerous place where objects of malicious content and intent can be hidden in plain sight. In this dissertation, we investigate different ways to detect and capture these malicious contents hidden in the Internet. First, we propose an automated system that mimics high-risk browsing activities such as clicking on suspicious online ads, …


Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw Jan 2016

Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw

Theses and Dissertations

Genomic databases are exhibiting a growth rate that is outpacing Moore's Law, which has made database search algorithms a popular application for use on emerging processor technologies. NCBI BLAST is the standard tool for performing searches against these databases, which operates by transforming each database query into a filter that is subsequently applied to the database. This requires a database scan for every query, fundamentally limiting its performance by I/O bandwidth. In this dissertation we present a functionally-equivalent variation on the NCBI BLAST algorithm that maps more suitably to an FPGA implementation. This variation of the algorithm attempts to reduce …


Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish Jan 2016

Efficient Partitioning And Allocation Of Data For Workflow Compositions, Annamaria Victoria Kish

Theses and Dissertations

Our aim is to provide efficient partitioning and allocation of data for web service compositions. Web service compositions are represented as partial order database transactions. We accommodate a variety of transaction types, such as read-only and write-oriented transactions, to support workloads in cloud environments. We introduce an approach that partitions and allocates small units of data, called micropartitions, to multiple database nodes. Each database node stores only the data needed to support a specific workload. Transactions are routed directly to the appropriate data nodes. Our approach guarantees serializability and efficient execution.

In Phase 1, we cluster transactions based on data …


Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng Jan 2016

Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng

Theses and Dissertations

Positioning is a basic and important need in many scenarios of human daily activities. With position information, multifarious services could be vitalized to benefit all kinds of users, from individuals to organizations. Through positioning, people are able to obtain not only geo-location but also time related information. By aggregating position information from individuals, organizations could derive statistical knowledge about group behaviors, such as traffic, business, event, etc.

Although enormous effort has been invested in positioning related academic and industrial work, there are still many holes to be filled. This dissertation proposes solutions to address the need of positioning in people’s …