Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (60)
- Chulalongkorn University (34)
- Santa Clara University (34)
- Wright State University (31)
- University of Arkansas, Fayetteville (19)
-
- Air Force Institute of Technology (14)
- Florida Institute of Technology (13)
- University of Massachusetts Amherst (12)
- University of Central Florida (11)
- Western University (11)
- University of Louisville (10)
- California State University, San Bernardino (9)
- Louisiana State University (9)
- Old Dominion University (9)
- South Dakota State University (9)
- University of South Carolina (9)
- University of New Mexico (8)
- Michigan Technological University (7)
- Universidad de La Salle (7)
- University of Texas at El Paso (7)
- Missouri University of Science and Technology (6)
- Singapore Management University (6)
- University of South Florida (6)
- University of Kentucky (5)
- University of North Florida (5)
- Utah State University (5)
- Virginia Commonwealth University (5)
- City University of New York (CUNY) (4)
- Cleveland State University (4)
- Edith Cowan University (4)
- Keyword
-
- Department of Computer Science and Engineering (29)
- Computer Science (18)
- Computer Engineering (17)
- Machine Learning (12)
- Machine learning (11)
-
- Robotics (11)
- Computer Vision (10)
- Arduino (7)
- Electrical Engineering (7)
- Neural network (7)
- Twitter (7)
- Android (6)
- Computer vision (6)
- Cybersecurity (6)
- Deep Learning (6)
- Engineering, Computer Science and Engineering (6)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (5)
- Cloud Computing (5)
- Internet of Things (5)
- Thesis; University of North Florida; UNF; Dissertations (5)
- UAV (5)
- Artificial intelligence (4)
- Daniel Felix Ritchie School of Engineering and Computer Science (4)
- Deep learning (4)
- IoT (4)
- JavaScript (4)
- Roborodentia (4)
- Simulation (4)
- Virtual reality (4)
- Asynchronous (3)
- Publication
-
- Theses and Dissertations (44)
- Electronic Theses and Dissertations (38)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (34)
- Browse all Theses and Dissertations (31)
- Computer Engineering (26)
-
- Computer Science and Engineering Senior Theses (20)
- Master's Theses (18)
- Doctoral Dissertations (13)
- Computer Science and Software Engineering (11)
- Electronic Thesis and Dissertation Repository (11)
- Computer Science and Computer Engineering Undergraduate Honors Theses (10)
- Electronic Theses, Projects, and Dissertations (9)
- Interdisciplinary Design Senior Theses (9)
- Graduate Theses and Dissertations (8)
- Dissertations, Master's Theses and Master's Reports (7)
- Ingeniería en Automatización (7)
- Open Access Theses & Dissertations (7)
- Dissertations and Theses Collection (Open Access) (6)
- Electrical and Computer Engineering ETDs (6)
- Honors Theses (6)
- LSU Doctoral Dissertations (6)
- Masters Theses (6)
- USF Tampa Graduate Theses and Dissertations (6)
- UNF Graduate Theses and Dissertations (5)
- Dissertations, Theses, and Capstone Projects (4)
- ETD Archive (4)
- Theses: Doctorates and Masters (4)
- Computer Science and Engineering Master's Theses (3)
- Dissertations (3)
- Electrical & Computer Engineering Theses & Dissertations (3)
Articles 1 - 30 of 440
Full-Text Articles in Engineering
High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak
High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak
Dissertations
The demand for high-speed Internet access for vehicles, such as high-speed trains (HSTs) and cars, is on the rise. Several Internet access technologies that use radio frequency are being considered for vehicular networking. Radio-frequency communications technologies cannot provide high data rates due to interference, bandwidth limitations, and the inherent limited data rates of radio technology. Free-space optical communications (FSOC) is an alternative approach and a line-of-sight (LOS) technology that uses modulated light to transfer data between two free-space optical (FSO) transceivers. FSOC systems for vehicular networks are expected to provide data rates in the range of Gbps for stationary and …
Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong
Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong
Dissertations
Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …
A Distributed Real-Time Short-Term Solar Irradiation Forecasting Network For Photovoltaic Systems, Michael Adelbert Gacusan
A Distributed Real-Time Short-Term Solar Irradiation Forecasting Network For Photovoltaic Systems, Michael Adelbert Gacusan
UNLV Theses, Dissertations, Professional Papers, and Capstones
Solar irradiation forecasting is essential for PV connected electrical grids to maintain reliability, stability, and effective matching of real-time demand to power distribution. This research paper develops and evaluates proposed forecasting methods using wireless sensor networks. Each node of the network is capable of monitoring illuminance data and communicate it through RF and/or WiFi. The nodes are calibrated with respect to irradiance data from an industry-standard pyranometer. Power consumption of each node type is also collected at different operating states. The proposed sensor network can estimate a cloud motion vector or a cloud shadow’s speed and direction from the data …
Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono
Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono
McKelvey School of Engineering Theses & Dissertations
In a world that is increasingly dominated by advances made in digital systems, this work will explore the exploiting of naturally occurring physical phenomena to pave the way towards a self-powered sensor for Cyber-Physical Systems (CPS). In general, a sensor frontend can be broken up into a handful of basic stages: transduction, filtering, energy conversion, measurement, and interfacing. One analog artifact that was investigated for filtering was the physical phenomenon of hysteresis induced in current-mode biquads driven near or at their saturation limit. Known as jump resonance, this analog construct facilitates a higher quality factor to be brought about without …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Virtual Reality Simulation Of Glenoid Reaming Procedure, Mohammadreza Faieghi
Virtual Reality Simulation Of Glenoid Reaming Procedure, Mohammadreza Faieghi
Electronic Thesis and Dissertation Repository
Glenoid reaming is a bone machining operation in Total Shoulder Arthroplasty (TSA) in which the glenoid bone is resurfaced to make intimate contact with implant undersurface. While this step is crucial for the longevity of TSA, many surgeons find it technically challenging. With the recent advances in Virtual Reality (VR) simulations, it has become possible to realistically replicate complicated operations without any need for patients or cadavers, and at the same time, provide quantitative feedback to improve surgeons' psycho-motor skills. In light of these advantages, the current thesis intends to develop tools and methods required for construction of a VR …
Localization Using Convolutional Neural Networks, Shannon D. Fong
Localization Using Convolutional Neural Networks, Shannon D. Fong
Computer Engineering
With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These …
A Survey Of Virtual Network Architectures, Lenoy Avidan
A Survey Of Virtual Network Architectures, Lenoy Avidan
Computer Science and Software Engineering
With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures, …
An Assessment Tool To Analyze Code Written In App Inventor, Rohit Gopalan
An Assessment Tool To Analyze Code Written In App Inventor, Rohit Gopalan
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
Assessment plays a significant role in today’s educational field. When creating an assessment tool, we should keep in mind that the tool measures learning, supports learning and encourages learning. Many assessment tools are available in the educational market such as Dr. Scratch, FCS1 Assessment Instrument, and Beyond the rubric. These tools help teachers to evaluate students’ performance in programming activities, but they do not completely measure the creativity shown by students in programming. For example, Dr. Scratch measures abstraction, problem decomposition, and parallelism. FCS1 Assessment Instrument measures a set of foundational computer science concepts like variables, loops, and arrays. It …
Exploring Photo Privacy Protection On Smartphones, David Darling
Exploring Photo Privacy Protection On Smartphones, David Darling
Computer Science and Computer Engineering Undergraduate Honors Theses
The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence …
Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour
Injecting Control Commands Through Sensory Channel: Attack And Defense, Farhad Rasapour
Boise State University Theses and Dissertations
Industrial Control System (ICS) is responsible for controlling and managing critical infrastructures like nuclear plants and power plants. ICS is equipped with various devices like communication media, Programmable Logic Controller (PLC), actuators, and sensors. Sensors are used to measure a physical phenomenon and send these measurements through the sensory channel to the control devices so they can make decisions on the movements of the actuators in the systems. While tampering with the sensor measurements has been the focus of many studies, there is some research that has concentrated on misusing a sensor and sensory channel as an axillary attack device …
Assessing Risk In Iot Devices, David Levitsky
Assessing Risk In Iot Devices, David Levitsky
Master's Theses
The explosive growth of the Internet of Things ecosystem has thrust these devices into the center of our lives. Unfortunately, the desire to create these devices has been stronger than the one to secure them. Recent attacks have shown us ignoring security in Internet of Things devices can cause severe harm in both a digital and physical sense. This thesis outlines a framework for developers and managers to assess the risk of IoT devices using a weighted scoring system across five different categories. Our case studies suggest that devices with higher security considerations have a better security posture and lower …
Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen
Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen
Master's Theses
There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.
To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on a shared power …
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Architectural Engineering
Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic event. …
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Graduate Theses and Dissertations
Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing between …
Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade
Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade
Graduate Theses and Dissertations
Surge Irrigation is a type of furrow irrigation and one of many efficient irrigation techniques. It is one of the economical techniques and requires minimum labor for monitoring it. In surge irrigation, water is applied intermittently to a field to achieve uniform distribution of water along the furrows, which is important while irrigating, as it ensures that there is enough water near the root zone of the crop. The uneven distribution can cause a loss in crop productivity.
Surge irrigation uses a surge valve, which is an electro-mechanical device that irrigates a field. The commercial surge valves available on the …
An Rs-485 Transceiver In A Silicon Carbide Cmos Process, Maria Raquel Benavides Herrera
An Rs-485 Transceiver In A Silicon Carbide Cmos Process, Maria Raquel Benavides Herrera
Graduate Theses and Dissertations
This thesis presents the design, simulation and test results of a silicon carbide (SiC) RS-485 transceiver for high temperature applications. This circuit is a building block in the design and fabrication of a digital data processing and control system. Automation processes for extreme environments, remote connection to high temperature locations, deep earth drilling, and high temperature data acquisition are some of the potential applications for such a system. The transceiver was designed and developed in a 1.2 µm SiC-CMOS process by Raytheon Systems, Ltd. (UK). It has been tested with a supply voltage of 12 V and 15 V, temperatures …
Audio To Architecture: House Music As A Form Generator, Polina Timchenko
Audio To Architecture: House Music As A Form Generator, Polina Timchenko
Architecture Undergraduate Honors Theses
Contemporary music undergoes similar process of creation to that of the design process through computation and variation. House music as a representation of contemporary culture has a layered structure that allows specific characteristics to identify it as house music. Song components can vary and mix in different orders that form new dynamic compositions. I am going to explore the idea that every house music component can be translated into geometry with the use of parametric design techniques.
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla
Electronic Theses, Projects, and Dissertations
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to …
Study On The Pattern Recognition Enhancement For Matrix Factorizations With Automatic Relevance Determination, Hau Tao
Electronic Theses, Projects, and Dissertations
Learning the parts of objects have drawn more attentions in computer science recently, and they have been playing the important role in computer applications such as object recognition, self-driving cars, and image processing, etc… However, the existing research such as traditional non-negative matrix factorization (NMF), principal component analysis (PCA), and vector quantitation (VQ) has not been discovering the ground-truth bases which are basic components representing objects. On this thesis, I am proposed to study on pattern recognition enhancement combined non-negative matrix factorization (NMF) with automatic relevance determination (ARD). The main point of this research is to propose a new technique …
California State University, San Bernardino Chatbot, Krutarth Desai
California State University, San Bernardino Chatbot, Krutarth Desai
Electronic Theses, Projects, and Dissertations
Now-a-days the chatbot development has been moving from the field of Artificial-Intelligence labs to the desktops and mobile domain experts. In the fastest growing technology world, most smartphone users spend major time in the messaging apps such as Facebook messenger. A chatbot is a computer program that uses messaging channels to interact with users using natural Languages. Chatbot uses appropriate mapping techniques to transform user inputs into a relational database and fetch the data by calling an existing API and then sends an appropriate response to the user to drive its chats. Drawbacks include the need to learn and use …
Social Network For Software Developers, Sanket Prabhakar Jadhav
Social Network For Software Developers, Sanket Prabhakar Jadhav
Electronic Theses, Projects, and Dissertations
This project is the design and implementation of a web-based message board for software developers. The purpose of “Social Network for Software Developers” is to connect inexperienced software developers with experienced software developers.
Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris
Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris
Master's Theses
Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to …
Low-Precision Linear Algebra For Neural Networks, Frost Bennion Mitchell
Low-Precision Linear Algebra For Neural Networks, Frost Bennion Mitchell
Undergraduate Honors Capstone Projects
Neural networks have been widely responsible for recent advances in machine learning, powering technologies such as digital assistants and AR photography. LPLANN (Low-Precision Linear Algebra for Neural Networks) is a cross-platform library written in C++ used for implementing neural networks. The software allows users to set specific levels of precision for calculations. Low-precision calculations use advanced parallelization techniques (SIMD, SWAR) to run neural networks at faster rates than full-precision calculations. This library is lightweight enough to run on embedded systems, only relies on OpenMP as a dependency, and is portable to any operating system. LPLANN also includes optimizations to provide …
Increasing Engineering Retention With Mobile Technology: Using Ux/Ui For Us, James H. Cate Jr., Andrey Karnauch, Dakota Sanders, Matt Matto
Increasing Engineering Retention With Mobile Technology: Using Ux/Ui For Us, James H. Cate Jr., Andrey Karnauch, Dakota Sanders, Matt Matto
Chancellor’s Honors Program Projects
No abstract provided.
Autonomous Collision Avoidance In Small Scale Vehicles, Justin T. Sharpe
Autonomous Collision Avoidance In Small Scale Vehicles, Justin T. Sharpe
Honors Theses
The undergraduate research performed in this study focused on autonomous collision avoidance in small scale vehicles. The goal of this study was to find equipment to build a fully autonomous small scale vehicle for use in different applications. Radio frequency communication, ultrasonic sensors, and single board computers were used to create an autonomous vehicle for multiple applications. Different communication protocols and sensors were investigated, and an explanation was specified concerning the hardware choice. The main communication protocol tested was Long Range Wide Area Network, and the main electronics tested and used were ultrasonic sensors, First Person View cameras, and the …
Mindful: A Novel Virtual System Migration Decision-Making Framework For Automated Cyber-Resiliency, Nicholas James Lowing
Mindful: A Novel Virtual System Migration Decision-Making Framework For Automated Cyber-Resiliency, Nicholas James Lowing
Theses and Dissertations
Virtual system migration has revolutionized modern computing. As an advantageous byproduct of virtualization, virtual system migration has allowed for cheaper, more robust cloud management. The selection of a destination host during migration is a key component of migration management. However, there is currently no state-of-the-art, standardized framework for making this decision. Previous work related to automated load balancing is plentiful, but when load balancing is not the primary focus of the cloud management strategy there is a lack of research. We focus on this case, where virtual systems are no longer moved based on some predefined optimization pattern, but rather …
Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu
Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu
Dissertations and Theses Collection (Open Access)
In the past few decades, supervised machine learning approach is one of the most important methodologies in the Natural Language Processing (NLP) community. Although various kinds of supervised learning methods have been proposed to obtain the state-of-the-art performance across most NLP tasks, the bottleneck of them lies in the heavy reliance on the large amount of manually annotated data, which is not always available in our desired target domain/task. To alleviate the data sparsity issue in the target domain/task, an attractive solution is to find sufficient labeled data from a related source domain/task. However, for most NLP applications, due to …
Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie
Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie
Dissertations and Theses Collection (Open Access)
In this dissertation, we address the subject of modeling and simulation of agents and their movement decision in a network environment. We emphasize the development of high quality agent-based simulation models as a prerequisite before utilization of the model as an evaluation tool for various recommender systems and policies. To achieve this, we propose a methodological framework for development of agent-based models, combining approaches such as discrete choice models and data-driven modeling.
The discrete choice model is widely used in the field of transportation, with a distinct utility function (e.g., demand or revenue-driven). Through discrete choice models, the movement decision …
Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei
Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei
Dissertations and Theses Collection (Open Access)
The explosive growth of the ecosystem of personal and ambient computing de- vices coupled with the proliferation of high-speed connectivity has enabled ex- tremely powerful and varied mobile computing applications that are used every- where. While such applications have tremendous potential to improve the lives of impaired users, most mobile applications have impoverished designs to be inclusive– lacking support for users with specific disabilities. Mobile app designers today haveinadequate support to design existing classes of apps to support users with specific disabilities, and more so, lack the support to design apps that specifically target these users. One way to resolve …