Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (28)
- Computer Sciences (23)
- Physical Sciences and Mathematics (23)
- Computational Engineering (3)
- Civil and Environmental Engineering (2)
-
- Digital Communications and Networking (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Other Computer Engineering (2)
- Transportation Engineering (2)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Business Analytics (1)
- Computer and Systems Architecture (1)
- Controls and Control Theory (1)
- Electrical and Computer Engineering (1)
- Engineering Education (1)
- Industrial Engineering (1)
- Industrial Technology (1)
- Other Operations Research, Systems Engineering and Industrial Engineering (1)
- Robotics (1)
- Systems Engineering (1)
- Institution
- Publication
- Publication Type
Articles 1 - 30 of 34
Full-Text Articles in Engineering
Robot Simulation Analysis, Jacob Miller, Jeremy Evert
Robot Simulation Analysis, Jacob Miller, Jeremy Evert
Student Research
• Simulate virtual robot for test and analysis
• Analyze SLAM solutions using ROS
• Assemble a functional Turtlebot
• Emphasize projects related to current research trajectories for NASA, and general robotics applications
Debugging: The Key To Unlocking The Mind Of A Novice Programmer?, Anthony A. Lowe
Debugging: The Key To Unlocking The Mind Of A Novice Programmer?, Anthony A. Lowe
School of Engineering Education Graduate Student Series
Novice programmers must master two skills to show lasting success: writing code and, when that fails, the ability to debug it. Instructors spend much time teaching the details of writing code but debugging gets significantly less attention. But what if teaching debugging could implicitly teach other aspects of coding better than teaching a language teaching debugging? This paper explores a new theoretical framework, the Theory of Applied Mind for Programming (TAMP), which merges dual process theory with Jerome Bruner’s theory of representations to model the mind of a programmer. TAMP looks to provide greater explanatory power in why novices struggle …
Generalized Relay Network Design And Collaborative Dispatching In Truckload Transportation, Amin Ziaeifar
Generalized Relay Network Design And Collaborative Dispatching In Truckload Transportation, Amin Ziaeifar
Operations Research and Engineering Management Theses and Dissertations
The truckload industry faces a serious problem of high driver shortage and turnover rate which is typically around 100\%. Among the major causes of this problem are extended on-the-road times where drivers handle several truckload pickup and deliveries successively; non-regular schedules and get-home rates; and low utilization of drivers dedicated time. These are by-and-large consequences of the driver-to-load dispatching method, which is based on point-to-point dispatching or direct shipment from origin-to-destination, commonly employed in the industry. In this dissertation, we consider an alternative dispatching method that necessitates careful design of an underlying network. In this scheme, a truckload on its …
An Efficient Framework For The Stochastic Verification Of Computation And Communication Systems Using Emerging Technologies, Zhen Zhang
Funded Research Records
No abstract provided.
Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta
Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta
Computer Science and Engineering Theses and Dissertations
Demonstrating software reliability across multiple software releases has become essential in making informed decisions of upgrading software releases without impacting significantly end users' characterized processes and software quality standards. Standard defect and workload data normally collected in a typical small software development organization can be used for this purpose. Objective of this study was to demonstrate how to measure software reliability in multiple releases and whether continuous defect fixes and code upgrades increased software reliability. This study looked at techniques such as trend test that evaluated software system's overall trend and stability, input domain reliability models (IDRM) that assessed system's …
Equilibrium-Based Workload Balancing For Robust Emergency Response Operations In Metropolitan Areas, Parya Roustaee
Equilibrium-Based Workload Balancing For Robust Emergency Response Operations In Metropolitan Areas, Parya Roustaee
Civil and Environmental Engineering Theses and Dissertations
This thesis presents an equilibrium-based modeling framework for emergency response (ER) workload balancing to achieve robust operation in large-scale metropolitan areas. The problem is formulated as a non-linear mathematical program (NLP), which determines the optimal workload cutoff for each ER station such that the weighted sum of the area-wide expected response time and its variation are minimized. The concept of Marginal Cost of Uncertainty (MCU) is introduced to measure the impact of a station’s workload increase on the area-wide service performance. The solution of the NLP is proved to be equivalent to a state of equilibrium in which all stations …
A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka
A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka
Computer Science and Engineering Theses and Dissertations
Diagnosing and correcting failures in complex, distributed systems is difficult. In a network of perhaps dozens of nodes, each of which is executing dozens of interacting applications, sometimes from different suppliers or vendors, finding the source of a system failure is a confusing, tedious piece of detective work. The person assigned this task must trace the failing command, event, or operation through the network components and find a deviation from the correct, desired interaction sequence. After a deviation is identified, the failing applications must be found, and the fault or faults traced to the incorrect source code.
Often the primary …
Space Defense: Creating A 2d Game With 3d Assets Using Unity Game Engine, Jeevan Vase
Space Defense: Creating A 2d Game With 3d Assets Using Unity Game Engine, Jeevan Vase
Computer Science and Software Engineering
The goal of this senior project was to learn and use the skills necessary for one person to make a complete game. The 3D assets that were used were downloaded from the Unity Store. I used Unity Game Engine to create the logic for the game. This document explains the technologies that I used, design choices I made, feedback from player-testing, and work that I want to complete for the project in the future. The final game demo features three levels, a start screen, and a combat system that allows players to gain additional ships to help defend their planet.
Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja
Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja
Browse all Theses and Dissertations
Educating people about vaccination tends to target vaccine acceptance and reduction of hesitancy. Social media provides a promising platform for studying public perception regarding vaccination. In this study, we harvested tweets over a year related to vaccines from February 2018 to January 2019. We present a two-stage classifier to: (1) classify the tweets as relevant or non-relevant and (2) categorize them in terms of pro-vaccination, anti-vaccination, or neutral outlook. We found that the classifier was able to distinguish clearly between anti-vaccination and pro-vaccination tweets, but also misclassified many of these as neutral. Using Latent Dirichlet Allocation, we found that two …
A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay
A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay
Electronic Theses and Dissertations
The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …
Protection Of High-Voltage Transformer Bushings And Other Brittle Structures Against Impact, Christine Nichole Henderson
Protection Of High-Voltage Transformer Bushings And Other Brittle Structures Against Impact, Christine Nichole Henderson
Electronic Theses and Dissertations
This dissertation contributes unique approaches to improve the fundamental understanding of the impact behavior of porcelain high-voltage (HV) transformer bushings under high-velocity impact, with a focus on their protection with feasible methods which could be quickly applied in service to prevent vandalism and other undesirable impact situations. The bushings are brittle and pressurized; prone to explosive damage when hit by a high-velocity projectile. Damaged bushings can destroy transformers and entire substations in complex fashions. This can put the power grid at risk for cascading failures and electrical blackouts, affecting consumers. Therefore, suggesting practical approaches which could be used to protect …
Safe And Efficient Intelligent Intersection Control Of Autonomous Vehicles, Qiang Lu
Safe And Efficient Intelligent Intersection Control Of Autonomous Vehicles, Qiang Lu
Electronic Theses and Dissertations
In this dissertation, we address a problem of safe and efficient intersection crossing traffic management of autonomous and connected ground traffic. Toward this objective, we propose several algorithms to handle different traffic environments. First, an algorithm that is called the Discrete-time occupancies trajectory (DTOT) based Intersection traffic Coordination Algorithm (DICA) is proposed. All vehicles in the system are Connected and Autonomous Vehicles (CAVs) and capable of wireless Vehicle-to-Intersection communication. The main advantage of DICA is that it enables us to utilize the intersection space more efficiently resulting in less delay for vehicles to cross the intersection. In the proposed framework, …
Application Of Microgrids In Supporting The Utility Grid, Alireza Majzoobi
Application Of Microgrids In Supporting The Utility Grid, Alireza Majzoobi
Electronic Theses and Dissertations
Distributed renewable energy resources have attracted significant attention in recent years due to the falling cost of the renewable energy technology, extensive federal and state incentives, and the application in improving load-point reliability. This growing proliferation, however, is changing the traditional consumption load curves by adding considerable levels of variability and further challenging the electricity supply-demand balance. In this dissertation, the application of microgrids in effectively capturing the distribution network net load variability, caused primarily by the prosumers, is investigated. Microgrids provide a viable and localized solution to this challenge while removing the need for costly investments by the electric …
Improvements Of And Extensions To Fsmweb: Testing Mobile Apps, Ahmed Fawzi Al Haddad
Improvements Of And Extensions To Fsmweb: Testing Mobile Apps, Ahmed Fawzi Al Haddad
Electronic Theses and Dissertations
A mobile application is a software program that runs on mobile device. In 2017, 178.1 billion mobile apps downloaded and the number is expected to grow to 258.2 billion app downloads in 2022 [19]. The number of app downloads poses a challenge for mobile application testers to find the right approach to test apps. This dissertation extends the FSMWeb approach for testing web applications [50] to test mobile applications (FSMApp). During the process of analyzing FSMWeb how it could be extended to test Mobile Apps, a number of shortcomings were detected which we improved upon. We discuss these first. We …
Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang
Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang
Computer Science Faculty Publications
Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.
Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu
Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu
Browse all Theses and Dissertations
According to a Pew Research study, 41% of Americans have personally experienced online harassment and two-thirds of Americans have witnessed harassment in 2017. Hence, online harassment detection is vital for securing and sustaining the popularity and viability of online social networks. Machine learning techniques play a crucial role in automatic harassment detection. One of the challenges of using supervised approaches is training data imbalance. Existing text generation techniques can help augment the training data, but they are still inadequate and ineffective. This research explores the role of domain-specific knowledge to complement the limited training data available for training a text …
Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma
Towards Data And Model Confidentiality In Outsourced Machine Learning, Sagar Sharma
Browse all Theses and Dissertations
With massive data collections and needs for building powerful predictive models, data owners may choose to outsource storage and expensive machine learning computations to public cloud providers (Cloud). Data owners may choose cloud outsourcing due to the lack of in-house storage and computation resources or the expertise of building models. Similarly, users, who subscribe to specialized services such as movie streaming and social networking, voluntarily upload their data to the service providers' site for storage, analytics, and better services. The service provider, in turn, may also choose to benefit from ubiquitous cloud computing. However, outsourcing to a public cloud provider …
Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar
Speech Enabled Navigation In Virtual Environments, Raksha Rajashekar
Browse all Theses and Dissertations
Navigating in a Virtual Environment with traditional input devices such as mouse, joysticks and keyboards provide limited maneuverability and is also time consuming. While working in a virtual environment, changing parameters to obtain the desired visualization requires time to achieve by manually entering parameter values in an algorithm to test outcomes. The following thesis presents an alternate user interface to reduce user efforts, while navigating within the Virtual Environment. The user interface is an Android application which is designed to accommodate spoken commands. This Speech Enabled User Interface termed as the Speech Navigation Application (SNA), provides the user with an …
Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya
Kbot: Knowledge-Enabled Personalized Chatbot For Self-Management Of Asthma In Pediatric Population, Dipesh Kadariya
Browse all Theses and Dissertations
Asthma, chronic pulmonary disease, is one of the major health issues in the United States. Given its chronic nature, the demand for continuous monitoring of patient’s adherence to the medication care plan, assessment of their environment triggers, and management of asthma control level can be challenging in traditional clinical settings and taxing on clinical professionals. A shift from a reactive to a proactive asthma care can improve health outcomes and reduce expenses. On the technology spectrum, smart conversational systems and Internet-of-Things (IoTs) are rapidly gaining popularity in the healthcare industry. By leveraging such technological prevalence, it is feasible to design …
Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat
Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat
Browse all Theses and Dissertations
Information Extraction (IE) techniques are developed to extract entities, relationships, and other detailed information from unstructured text. The majority of the methods in the literature focus on designing supervised machine learning techniques, which are not very practical due to the high cost of obtaining annotations and the difficulty in creating high quality (in terms of reliability and coverage) gold standard. Therefore, semi-supervised and distantly-supervised techniques are getting more traction lately to overcome some of the challenges, such as bootstrapping the learning quickly. This dissertation focuses on information extraction, and in particular entities, i.e., Named Entity Recognition (NER), from multiple domains, …
Design And Development Of An Immersive Simulation For Social Determinants Of Health Training, Lahari Surapaneni
Design And Development Of An Immersive Simulation For Social Determinants Of Health Training, Lahari Surapaneni
Browse all Theses and Dissertations
This thesis research project focuses on design and development of an immersion simulation-based training tool that help raise the social determinants of health (SDOH) awareness among the health care providers. Compared to existing classroom lecture and/or role-play based SDOH education approach, our immersion-simulation based approach provides an easy access and highly realistic experience to such training curriculum at anytime and anywhere with an Internet connection. Such an interactive and immersive exposure is critical to raise SDOH awareness and maintain long-lasting empathy towards actual patients in practice, and thus help providers to be better prepared when encountering with those patients. Particularly, …
Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku
Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku
Browse all Theses and Dissertations
System on Chip (SoC) is the backbone component of the electronics industry nowadays. ASIC and FPGA-based SoCs are the two most popular methods of manufacturing SoCs. However, both ASIC and FPGA industries are plagued with risks of counterfeits due to the limitations in Security, Accountability, Complexity, and Governance of their supply chain management. As a result, the current practices of these microelectronics supply chain suffer from performance and efficiency bottlenecks. In this research, we are incorporating blockchain technology into the FPGA and ASIC microelectronic supply chain to help mitigate the risk of counterfeit microelectronics through a secure and decentralized solution …
Data-Driven And Knowledge-Based Strategies For Realizing Crowd Wisdom On Social Media, Shreyansh Bhatt
Data-Driven And Knowledge-Based Strategies For Realizing Crowd Wisdom On Social Media, Shreyansh Bhatt
Browse all Theses and Dissertations
The wisdom of the crowd is a well-known example of collective intelligence wherein an aggregated judgment of a group of individuals is superior to that of an individual. The aggregated judgment is surprisingly accurate for predicting the outcome of a range of tasks from geopolitical forecasting to the stock price prediction. Recent research has shown that participants' previous performance data contributes to the identification of a subset of participants that can collectively predict an accurate outcome. In the absence of such performance data, researchers have explored the role of human-perceived diversity, i.e., whether a human considers a crowd as a …
Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander
Conditional Dilated Attention Tracking Model - C-Datm, Tyler Clayton Highlander
Browse all Theses and Dissertations
Current commercial tracking systems do not process images fast enough to perform target-tracking in real- time. State-of-the-art methods use entire scenes to locate objects frame-by-frame and are commonly computationally expensive because they use image convolutions. Alternatively, attention mechanisms track more efficiently by mimicking human optical cognitive interaction to only process small portions of an image. Thus, in this work we use an attention-based approach to create a model called C-DATM (Conditional Dilated Attention tracking Model) that learns to compare target features in a sequence of image-frames using dilated convolutions. The C-DATM is tested using the Modified National Institute of Standards …
Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella
Leveraging Schema Information For Improved Knowledge Graph Navigation, Rama Someswar Chittella
Browse all Theses and Dissertations
Over the years, the semantic web has emerged as a new generation of the world wide web featuring advanced technologies and research contributions. It has revolutionized the usage of information by allowing users to capture and publish machine-understandable data and expedite methods such as ontologies to perform the same. These ontologies help in the formal representation of a specified domain and foster comprehensive machine understanding. Although, the engineering of ontologies and usage of logic have been an integral part of the web semantics, new areas of research such as the semantic web search, linking and usage of open data on …
Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter
Detecting Malicious Behavior In Openwrt With Qemu Tracing, Jeremy Porter
Browse all Theses and Dissertations
In recent years embedded devices have become more ubiquitous than ever before and are expected to continue this trend. Embedded devices typically have a singular or more focused purpose, a smaller footprint, and often interact with the physical world. Some examples include routers, wearable heart rate monitors, and thermometers. These devices are excellent at providing real time data or completing a specific task quickly, but they lack many features that make security issues more obvious. Generally, Embedded devices are not easily secured. Malware or rootkits in the firmware of an embedded system are difficult to detect because embedded devices do …
Virtual Reality And Analysis Framework For Studying Different Layout Designs, Madison Glines
Virtual Reality And Analysis Framework For Studying Different Layout Designs, Madison Glines
Browse all Theses and Dissertations
This thesis describes the tools for studying different design prototypes. The goal was to develop effective tools to study these designs using a data-driven approach. “Proof of concept” experiments were conducted, in which participants were allowed to interact with a virtual environment depicting different designs as data pertaining to their virtual location and orientation was recorded for later analysis. The designs included “flat” store racks, as opposed to racks with more varied shapes, as well as “curved” racks. Focus of the design studies was to assist in identifying optimal locations for different product types. The automated data collection mechanisms required …
Llvm-Ir Based Decompilation, Ilsoo Jeon
Llvm-Ir Based Decompilation, Ilsoo Jeon
Browse all Theses and Dissertations
Decompilation is a process of transforming an executable program into a source-like high-level language code, which plays an important role in malware analysis, and vulnerability detection. In this thesis, we design and implement the middle end of a decompiler framework, focusing on Low Level Language properties reduction using the optimization techniques, propagation and elimination. An open-source software tool, dagger, is used to translate binary code to LLVM (Low Level Virtual Machine) Intermediate Representation code. We perform data flow analysis and control flow analysis on the LLVM format code to generate high-level code using a Functional Programming Langauge (FPL), Haskell. The …
Anticipation In Dynamic Environments: Deciding What To Monitor, Zohreh A. Dannenhauer
Anticipation In Dynamic Environments: Deciding What To Monitor, Zohreh A. Dannenhauer
Browse all Theses and Dissertations
In dynamic environments, external changes may occur that may affect planning decisions and goal choices. We claim that an intelligent agent should actively watch for what can go wrong and anticipate changes in the environment that allows the changing of its plan or changing of a given goal. In this thesis, we focus on the relationship between perception, act, interpretation, and planning. We claim that these components are not independent and need to interact with each other to help the agent succeed in achieving its goals and plans. If newly encountered world information affects the plan, the agent adapts to …
Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov
Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov
Browse all Theses and Dissertations
Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The …