Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson Oct 2019

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson

Electrical & Computer Engineering Theses & Dissertations

Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …


Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin Oct 2019

Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin

Electrical & Computer Engineering Theses & Dissertations

The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are three known computational approaches to calculating this antipode: the left coproduct method, the right coproduct method, and the derivation method. Each of these algorithms is defined recursively, and thus becomes computationally expensive quite quickly. This motivates the need for a more complete understanding of the algorithmic complexity of these methods, as well as the development of new approaches for determining the Hopf algebra antipode. The main goals of this …


Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti Oct 2019

Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti

Computational Modeling & Simulation Engineering Theses & Dissertations

The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …


Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu Jul 2019

Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu

Electrical & Computer Engineering Theses & Dissertations

This dissertation presents a computer-aided diagnosis (CAD) system using deep learning approaches for lesion detection and classification on whole-slide images (WSIs) with breast cancer. The deep features being distinguishing in classification from the convolutional neural networks (CNN) are demonstrated in this study to provide comprehensive interpretability for the proposed CAD system using the domain knowledge in pathology. In the experiment, a total of 186 slides of WSIs were collected and classified into three categories: Non-Carcinoma, Ductal Carcinoma in Situ (DCIS), and Invasive Ductal Carcinoma (IDC). Instead of conducting pixel-wise classification (segmentation) into three classes directly, a hierarchical framework with the …


Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari Jul 2019

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari

Civil & Environmental Engineering Theses & Dissertations

A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …


Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat Apr 2019

Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat

Civil & Environmental Engineering Theses & Dissertations

Connected vehicles (CVs) will enable new applications to improve traffic flow. This study’s focus is to investigate how potential implementation of variable speed limit (VSL) through different types of communication and sensing technologies on CVs may improve traffic flow at a sag curve. At sag curves, the gradient changes from negative to positive values which causes a reduction in the roadway capacity and congestion. A VSL algorithm is developed and implemented in a simulation environment for controlling the inflow of vehicles to a sag curve on a freeway to minimize delays and increase throughput. Both vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) …


Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Dissertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …


Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar Apr 2019

Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar

Engineering Management & Systems Engineering Theses & Dissertations

Ensuring the security of cyberspace is one of the most significant challenges of the modern world because of its complexity. As the cyber environment is getting more integrated with the real world, the direct impact of cybersecurity problems on actual business frequently occur. Therefore, operational and strategic decision makers in particular need to understand the cyber environment and its potential impact on business. Cyber risk has become a top agenda item for businesses all over the world and is listed as one of the most serious global risks with significant financial implications for businesses.

Risk analysis is one of the …


Development And Initial Evaluation Of A Reinforced Cue Detection Model To Assess Situation Awareness In Commercial Aircraft Cockpits, Aysen K. Taylor Apr 2019

Development And Initial Evaluation Of A Reinforced Cue Detection Model To Assess Situation Awareness In Commercial Aircraft Cockpits, Aysen K. Taylor

Engineering Management & Systems Engineering Theses & Dissertations

Commercial transport aircraft of today vary greatly from early aircraft with regards to how the aircraft are controlled and the feedback provided from the machine to the human operator. Over time, as avionics systems became more automated, pilots had less direct control over their aircraft. Much research exists in the literature about automation issues, and several major accidents over the last twenty years spurred interest about how to maintain the benefits of automation while improving the overall human-machine interaction as the pilot is considered the last line of defense.

An important reason for maintaining or even improving overall pilot situation …


A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda Apr 2019

A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda

Computational Modeling & Simulation Engineering Theses & Dissertations

Test & Evaluation of autonomous vehicles presents a challenge as the vehicles may have emergent behavior and it is frequently difficult to ascertain the reason for software decisions. Current Test & Evaluation approaches for autonomous systems place the vehicles in various operating scenarios to observe their behavior. However, this introduces dependencies between design and development lifecycle of the autonomous software and physical vehicle hardware. Simulation-based testing can alleviate the necessity to have physical hardware; however, it can be costly when transitioning the autonomous software to and from a simulation testing environment. The objective of this thesis is to develop a …


A Data-Driven Approach For Modeling Agents, Hamdi Kavak Apr 2019

A Data-Driven Approach For Modeling Agents, Hamdi Kavak

Computational Modeling & Simulation Engineering Theses & Dissertations

Agents are commonly created on a set of simple rules driven by theories, hypotheses, and assumptions. Such modeling premise has limited use of real-world data and is challenged when modeling real-world systems due to the lack of empirical grounding. Simultaneously, the last decade has witnessed the production and availability of large-scale data from various sensors that carry behavioral signals. These data sources have the potential to change the way we create agent-based models; from simple rules to driven by data. Despite this opportunity, the literature has neglected to offer a modeling approach to generate granular agent behaviors from data, creating …