Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2018

Computer Sciences

Institution
Keyword
Publication

Articles 1 - 30 of 186

Full-Text Articles in Engineering

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …


Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch Dec 2018

Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch

University of New Orleans Theses and Dissertations

This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It …


Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono Dec 2018

Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono

McKelvey School of Engineering Theses & Dissertations

In a world that is increasingly dominated by advances made in digital systems, this work will explore the exploiting of naturally occurring physical phenomena to pave the way towards a self-powered sensor for Cyber-Physical Systems (CPS). In general, a sensor frontend can be broken up into a handful of basic stages: transduction, filtering, energy conversion, measurement, and interfacing. One analog artifact that was investigated for filtering was the physical phenomenon of hysteresis induced in current-mode biquads driven near or at their saturation limit. Known as jump resonance, this analog construct facilitates a higher quality factor to be brought about without …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …


A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan Dec 2018

A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan

Theses and Dissertations

The parking industry produces an enormous amount of data every day that, properly analyzed, will change the way the industry operates. The collected data form patterns that, in most cases, would allow parking operators and property owners to better understand how to maximize revenue and decrease operating expenses and support the decisions such as how to set specific parking policies (e.g. electrical charging only parking space) to achieve the sustainable and eco-friendly parking.

However, there lacks an intelligent tool to assess the layout design and operational performance of parking lots to reduce the externalities and increase the revenue. To address …


The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley Dec 2018

The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley

Graduate Theses and Dissertations

In the realm of additive manufacturing there is an increasing trend among makers to create designs that allow for end-users to alter them prior to printing an artifact. Online design repositories have tools that facilitate the creation of such artifacts. There are currently no rules for how to create a good customizable design or a way to measure the degree of customization within a design. This work defines three types of customizations found in additive manufacturing and presents three metrics to measure the degree of customization within designs based on the three types of customization. The goal of this work …


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai Dec 2018

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Graduate Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing between …


Three-Dimensional Bedrock Channel Evolution With Smoothed Particle Hydrodynamics, Nick Richmond Dec 2018

Three-Dimensional Bedrock Channel Evolution With Smoothed Particle Hydrodynamics, Nick Richmond

Electronic Theses and Dissertations

Bedrock channels are responsible for balancing and communicating tectonic and climatic signals across landscapes, but it is difficult and dangerous to observe and measure the flows responsible for removing weakly-attached blocks of bedrock from the channel boundary. Consequently, quantitative descriptions of the dynamics of bedrock removal are scarce. Detailed numerical simulation of violent flows in three dimensions has been historically challenging due to technological limitations, but advances in computational fluid dynamics aided by high-performance computing have made it practical to generate approximate solutions to the governing equations of fluid dynamics. From these numerical solutions we gain detailed knowledge of the …


Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu Dec 2018

Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu

Dissertations and Theses Collection (Open Access)

In the past few decades, supervised machine learning approach is one of the most important methodologies in the Natural Language Processing (NLP) community. Although various kinds of supervised learning methods have been proposed to obtain the state-of-the-art performance across most NLP tasks, the bottleneck of them lies in the heavy reliance on the large amount of manually annotated data, which is not always available in our desired target domain/task. To alleviate the data sparsity issue in the target domain/task, an attractive solution is to find sufficient labeled data from a related source domain/task. However, for most NLP applications, due to …


Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie Dec 2018

Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie

Dissertations and Theses Collection (Open Access)

In this dissertation, we address the subject of modeling and simulation of agents and their movement decision in a network environment. We emphasize the development of high quality agent-based simulation models as a prerequisite before utilization of the model as an evaluation tool for various recommender systems and policies. To achieve this, we propose a methodological framework for development of agent-based models, combining approaches such as discrete choice models and data-driven modeling.

The discrete choice model is widely used in the field of transportation, with a distinct utility function (e.g., demand or revenue-driven). Through discrete choice models, the movement decision …


Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei Dec 2018

Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei

Dissertations and Theses Collection (Open Access)

The explosive growth of the ecosystem of personal and ambient computing de- vices coupled with the proliferation of high-speed connectivity has enabled ex- tremely powerful and varied mobile computing applications that are used every- where. While such applications have tremendous potential to improve the lives of impaired users, most mobile applications have impoverished designs to be inclusive– lacking support for users with specific disabilities. Mobile app designers today haveinadequate support to design existing classes of apps to support users with specific disabilities, and more so, lack the support to design apps that specifically target these users. One way to resolve …


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai Dec 2018

Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai

Electronic Theses, Projects, and Dissertations

Recognizing human activities using deep learning methods has significance in many fields such as sports, motion tracking, surveillance, healthcare and robotics. Inertial sensors comprising of accelerometers and gyroscopes are commonly used for sensor based HAR. In this study, a Bidirectional Long Short-Term Memory (BLSTM) approach is explored for human activity recognition and classification for closely related activities on a body worn inertial sensor data that is provided by the UTD-MHAD dataset. The BLSTM model of this study could achieve an overall accuracy of 98.05% for 15 different activities and 90.87% for 27 different activities performed by 8 persons with 4 …


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie Nov 2018

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …


Big Data And Sensor Network For Construction Material Testing, Yao Shi Nov 2018

Big Data And Sensor Network For Construction Material Testing, Yao Shi

Theses and Dissertations

Engineers and contractors need to have a precise understanding of the development progress of concrete strength in the natural environment, which helps to save project time and cost. However, current practice of concrete construction depends on published data, charts and curves from laboratory tests. The data would not show frequently changing environmental conditions in the real world, which can affect concrete quality significantly. The objective of this research is to design a reliable and accurate method to validate test data of the strength developments of concrete specimens in early stages. The approach includes the following tasks: (1) arrange sensors to …


Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr. Nov 2018

Multidimensional Feature Engineering For Post-Translational Modification Prediction Problems, Norman Mapes Jr.

Doctoral Dissertations

Protein sequence data has been produced at an astounding speed. This creates an opportunity to characterize these proteins for the treatment of illness. A crucial characterization of proteins is their post translational modifications (PTM). There are 20 amino acids coded by DNA after coding (translation) nearly every protein is modified at an amino acid level. We focus on three specific PTMs. First is the bonding formed between two cysteine amino acids, thus introducing a loop to the straight chain of a protein. Second, we predict which cysteines can generally be modified (oxidized). Finally, we predict which lysine amino acids are …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li Nov 2018

Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li

Doctoral Dissertations

In the past decades, the computing capability has shown an exponential growth trend, which is observed as Moore’s law. However, this growth speed is slowing down in recent years mostly because the down-scaled size of transistors is approaching their physical limit. On the other hand, recent advances in software, especially in big data analysis and artificial intelligence, call for a break-through in computing hardware. The memristor, or the resistive switching device, is believed to be a potential building block of the future generation of integrated circuits. The underlying mechanism of this device is different from that of complementary metal-oxide-semiconductor (CMOS) …


On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi Nov 2018

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi

USF Tampa Graduate Theses and Dissertations

Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via …


Analyzing And Modeling Users In Multiple Online Social Platforms, Roy Lee Ka Wei Nov 2018

Analyzing And Modeling Users In Multiple Online Social Platforms, Roy Lee Ka Wei

Dissertations and Theses Collection (Open Access)

This dissertation addresses the empirical analysis on user-generated data from multiple online social platforms (OSPs) and modeling of latent user factors in multiple OSPs setting.

In the first part of this dissertation, we conducted cross-platform empirical studies to better understand user's social and work activities in multiple OSPs. In particular, we proposed new methodologies to analyze users' friendship maintenance and collaborative activities in multiple OSPs. We also apply the proposed methodologies on real-world OSP datasets, and the findings from our empirical studies have provided us with a better understanding on users' social and work activities which are previously not uncovered …


Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry Oct 2018

Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry

Doctoral Dissertations

Clinical studies have shown that features of a person's eyes can function as an effective proxy for cognitive state and neurological function. Technological advances in recent decades have allowed us to deepen this understanding and discover that the actions of the eyes are in fact very tightly coupled to the operation of the brain. Researchers have used camera-based eye monitoring technology to exploit this connection and analyze mental state across across many different metrics of interest. These range from simple things like attention and scene processing, to impairments such as a fatigue or substance use, and even significant mental disorders …


Integration Of Robotic Perception, Action, And Memory, Li Yang Ku Oct 2018

Integration Of Robotic Perception, Action, And Memory, Li Yang Ku

Doctoral Dissertations

In the book "On Intelligence", Hawkins states that intelligence should be measured by the capacity to memorize and predict patterns. I further suggest that the ability to predict action consequences based on perception and memory is essential for robots to demonstrate intelligent behaviors in unstructured environments. However, traditional approaches generally represent action and perception separately---as computer vision modules that recognize objects and as planners that execute actions based on labels and poses. I propose here a more integrated approach where action and perception are combined in a memory model, in which a sequence of actions can be planned based on …


Parallel Algorithms For Time Dependent Density Functional Theory In Real-Space And Real-Time, James Kestyn Oct 2018

Parallel Algorithms For Time Dependent Density Functional Theory In Real-Space And Real-Time, James Kestyn

Doctoral Dissertations

Density functional theory (DFT) and time dependent density functional theory (TDDFT) have had great success solving for ground state and excited states properties of molecules, solids and nanostructures. However, these problems are particularly hard to scale. Both the size of the discrete system and the number of needed eigenstates increase with the number of electrons. A complete parallel framework for DFT and TDDFT calculations applied to molecules and nanostructures is presented in this dissertation. This includes the development of custom numerical algorithms for eigenvalue problems and linear systems. New functionality in the FEAST eigenvalue solver presents an additional level of …


Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen Oct 2018

Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen

Doctoral Dissertations

The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …


Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das Oct 2018

Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das

LSU Doctoral Dissertations

The aim of this thesis is to advance the theory behind quantum information processing tasks, by deriving fundamental limits on bipartite quantum interactions and dynamics. A bipartite quantum interaction corresponds to an underlying Hamiltonian that governs the physical transformation of a two-body open quantum system. Under such an interaction, the physical transformation of a bipartite quantum system is considered in the presence of a bath, which may be inaccessible to an observer. The goal is to determine entangling abilities of such arbitrary bipartite quantum interactions. Doing so provides fundamental limitations on information processing tasks, including entanglement distillation and secret key …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo Sep 2018

Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo

Dissertations, Theses, and Capstone Projects

We explore low-cost solutions for efficiently improving the 3D pose estimation problem of a single camera moving in an unfamiliar environment. The visual odometry (VO) task -- as it is called when using computer vision to estimate egomotion -- is of particular interest to mobile robots as well as humans with visual impairments. The payload capacity of small robots like micro-aerial vehicles (drones) requires the use of portable perception equipment, which is constrained by size, weight, energy consumption, and processing power. Using a single camera as the passive sensor for the VO task satisfies these requirements, and it motivates the …


Concurrency Platforms For Real-Time And Cyber-Physical Systems, David Ferry Aug 2018

Concurrency Platforms For Real-Time And Cyber-Physical Systems, David Ferry

McKelvey School of Engineering Theses & Dissertations

Parallel processing is an important way to satisfy the increasingly demanding computational needs of modern real-time and cyber-physical systems, but existing parallel computing technologies primarily emphasize high-throughput and average-case performance metrics, which are largely unsuitable for direct application to real-time, safety-critical contexts. This work contrasts two concurrency platforms designed to achieve predictable worst case parallel performance for soft real-time workloads with millisecond periods and higher. One of these is then the basis for the CyberMech platform, which enables parallel real-time computing for a novel yet representative application called Real-Time Hybrid Simulation (RTHS). RTHS combines demanding parallel real-time computation with real-time …