Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Theses/Dissertations

Computer Sciences

Institution
Keyword
Publication

Articles 31 - 60 of 160

Full-Text Articles in Engineering

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari Jul 2019

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari

Civil & Environmental Engineering Theses & Dissertations

A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …


Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin Jun 2019

Authentication And Sql-Injection Prevention Techniques In Web Applications, Cagri Cetin

USF Tampa Graduate Theses and Dissertations

This dissertation addresses the top two “most critical web-application security risks” by combining two high-level contributions.

The first high-level contribution introduces and evaluates collaborative authentication, or coauthentication, a single-factor technique in which multiple registered devices work together to authenticate a user. Coauthentication provides security benefits similar to those of multi-factor techniques, such as mitigating theft of any one authentication secret, without some of the inconveniences of multi-factor techniques, such as having to enter passwords or biometrics. Coauthentication provides additional security benefits, including: preventing phishing, replay, and man-in-the-middle attacks; basing authentications on high-entropy secrets that can be generated and updated automatically; …


The Trust-Based Interactive Partially Observable Markov Decision Process, Richard S. Seymour Jun 2019

The Trust-Based Interactive Partially Observable Markov Decision Process, Richard S. Seymour

Theses and Dissertations

Cooperative agent and robot systems are designed so that each is working toward the same common good. The problem is that the software systems are extremely complex and can be subverted by an adversary to either break the system or potentially worse, create sneaky agents who are willing to cooperate when the stakes are low and take selfish, greedy actions when the rewards rise. This research focuses on the ability of a group of agents to reason about the trustworthiness of each other and make decisions about whether to cooperate. A trust-based interactive partially observable Markov decision process (TI-POMDP) is …


Field Drilling Data Cleaning And Preparation For Data Analytics Applications, Daniel Cardoso Braga Jun 2019

Field Drilling Data Cleaning And Preparation For Data Analytics Applications, Daniel Cardoso Braga

LSU Master's Theses

Throughout the history of oil well drilling, service providers have been continuously striving to improve performance and reduce total drilling costs to operating companies. Despite constant improvement in tools, products, and processes, data science has not played a large part in oil well drilling. With the implementation of data science in the energy sector, companies have come to see significant value in efficiently processing the massive amounts of data produced by the multitude of internet of thing (IOT) sensors at the rig. The scope of this project is to combine academia and industry experience to analyze data from 13 different …


Reach - A Community Service Application, Samuel Noel Magana Jun 2019

Reach - A Community Service Application, Samuel Noel Magana

Computer Engineering

Communities are familiar threads that unite people through several shared attributes and interests. These commonalities are the core elements that link and bond us together. Many of us are part of multiple communities, moving in and out of them depending on our needs. These common threads allow us to support and advocate for each other when facing a common threat or difficult situation. Healthy and vibrant communities are fundamental to the operation of our society. These interactions within our communities define the way we as individuals interact with each other, and society at large. Being part of a community helps …


Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch Jun 2019

Labeling Paths With Convolutional Neural Networks, Sean Wallace, Kyle Wuerch

Computer Engineering

With the increasing development of autonomous vehicles, being able to detect driveable paths in arbitrary environments has become a prevalent problem in multiple industries. This project explores a technique which utilizes a discretized output map that is used to color an image based on the confidence that each block is a driveable path. This was done using a generalized convolutional neural network that was trained on a set of 3000 images taken from the perspective of a robot along with matching masks marking which portion of the image was a driveable path. The techniques used allowed for a labeling accuracy …


Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves Jun 2019

Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves

Computer Engineering

This project is a 3D village generator tool for Unity. It consists of three components: a building, mountain, and river generator. All of these generators use grammar-based procedural generation in order to create a unique and logical village and landscape each time the program is run.


Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt Jun 2019

Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt

Computer Engineering

This project was designed to explore and analyze the potential abilities and usefulness of applying machine learning models to data collected by parking sensors at a major metro shopping mall. By examining patterns in rates at which customer enter and exit parking garages on the campus of the Bellevue Collection shopping mall in Bellevue, Washington, a recurrent neural network will use data points from the previous hours will be trained to forecast future trends.


Implementation Of Multivariate Artificial Neural Networks Coupled With Genetic Algorithms For The Multi-Objective Property Prediction And Optimization Of Emulsion Polymers, David Chisholm Jun 2019

Implementation Of Multivariate Artificial Neural Networks Coupled With Genetic Algorithms For The Multi-Objective Property Prediction And Optimization Of Emulsion Polymers, David Chisholm

Master's Theses

Machine learning has been gaining popularity over the past few decades as computers have become more advanced. On a fundamental level, machine learning consists of the use of computerized statistical methods to analyze data and discover trends that may not have been obvious or otherwise observable previously. These trends can then be used to make predictions on new data and explore entirely new design spaces. Methods vary from simple linear regression to highly complex neural networks, but the end goal is similar. The application of these methods to material property prediction and new material discovery has been of high interest …


The Performance Cost Of Security, Lucy R. Bowen Jun 2019

The Performance Cost Of Security, Lucy R. Bowen

Master's Theses

Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchitectural attacks, e.g. Meltdown and Spectre. Microarchitectural attacks exploit the effects of microarchitectural components or optimizations in order to leak data to an attacker. These attacks have caused processor manufacturers to introduce performance impacting mitigations in both software and silicon.

To investigate the performance impact of the various mitigations, a test suite of forty-seven different tests was created. …


Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji Jun 2019

Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji

Honors Theses

Soft robotics is an emerging field of research due to its potential to explore and operate in unstructured, rugged, and dynamic environments. However, the properties that make soft robots compelling also make them difficult to robustly control. Here at Union, we developed the world’s first wireless soft tensegrity robot. The goal of my thesis is to explore effective and efficient methods to explore the diverse behavior our tensegrity robot. We will achieve that by applying state-of-art machine learning technique and a novelty search algorithm.


Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong May 2019

Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong

Dissertations

Radio frequency sources are observed at a fusion center via sensor measurements made over slow flat-fading channels. The number of sources may be larger than the number of sensors, but their activity is sparse and intermittent with bursty transmission patterns. To account for this, sources are modeled as hidden Markov models with known or unknown parameters. The problem of blind source estimation in the absence of channel state information is tackled via a novel algorithm, consisting of a dictionary learning (DL) stage and a per-source stochastic filtering (PSF) stage. The two stages work in tandem, with the latter operating on …


Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri May 2019

Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri

Dissertations

Spiking Neural Networks (SNNs), or third-generation neural networks, are networks of computation units, called neurons, in which each neuron with internal analogue dynamics receives as input and produces as output spiking, that is, binary sparse, signals. In contrast, second-generation neural networks, termed as Artificial Neural Networks (ANNs), rely on simple static non-linear neurons that are known to be energy-intensive, hindering their implementations on energy-limited processors such as mobile devices. The sparse event-based characteristics of SNNs for information transmission and encoding have made them more feasible for highly energy-efficient neuromorphic computing architectures. The most existing training algorithms for SNNs are based …


Workload Allocation In Mobile Edge Computing Empowered Internet Of Things, Qiang Fan May 2019

Workload Allocation In Mobile Edge Computing Empowered Internet Of Things, Qiang Fan

Dissertations

In the past few years, a tremendous number of smart devices and objects, such as smart phones, wearable devices, industrial and utility components, are equipped with sensors to sense the real-time physical information from the environment. Hence, Internet of Things (IoT) is introduced, where various smart devices are connected with each other via the internet and empowered with data analytics. Owing to the high volume and fast velocity of data streams generated by IoT devices, the cloud that can provision flexible and efficient computing resources is employed as a smart "brain" to process and store the big data generated from …


Scalable Community Detection Using Distributed Louvain Algorithm, Naw Safrin Sattar May 2019

Scalable Community Detection Using Distributed Louvain Algorithm, Naw Safrin Sattar

University of New Orleans Theses and Dissertations

Community detection (or clustering) in large-scale graph is an important problem in graph mining. Communities reveal interesting characteristics of a network. Louvain is an efficient sequential algorithm but fails to scale emerging large-scale data. Developing distributed-memory parallel algorithms is challenging because of inter-process communication and load-balancing issues. In this work, we design a shared memory-based algorithm using OpenMP, which shows a 4-fold speedup but is limited to available physical cores. Our second algorithm is an MPI-based parallel algorithm that scales to a moderate number of processors. We also implement a hybrid algorithm combining both. Finally, we incorporate dynamic load-balancing in …


Detection Of Sand Boils From Images Using Machine Learning Approaches, Aditi S. Kuchi May 2019

Detection Of Sand Boils From Images Using Machine Learning Approaches, Aditi S. Kuchi

University of New Orleans Theses and Dissertations

Levees provide protection for vast amounts of commercial and residential properties. However, these structures degrade over time, due to the impact of severe weather, sand boils, subsidence of land, seepage, etc. In this research, we focus on detecting sand boils. Sand boils occur when water under pressure wells up to the surface through a bed of sand. These make levees especially vulnerable. Object detection is a good approach to confirm the presence of sand boils from satellite or drone imagery, which can be utilized to assist in the automated levee monitoring methodology. Since sand boils have distinct features, applying object …


Management And Security Of Multi-Cloud Applications, Lav Gupta May 2019

Management And Security Of Multi-Cloud Applications, Lav Gupta

McKelvey School of Engineering Theses & Dissertations

Single cloud management platform technology has reached maturity and is quite successful in information technology applications. Enterprises and application service providers are increasingly adopting a multi-cloud strategy to reduce the risk of cloud service provider lock-in and cloud blackouts and, at the same time, get the benefits like competitive pricing, the flexibility of resource provisioning and better points of presence. Another class of applications that are getting cloud service providers increasingly interested in is the carriers' virtualized network services. However, virtualized carrier services require high levels of availability and performance and impose stringent requirements on cloud services. They necessitate the …


Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang May 2019

Toward Controllable And Robust Surface Reconstruction From Spatial Curves, Zhiyang Huang

McKelvey School of Engineering Theses & Dissertations

Reconstructing surface from a set of spatial curves is a fundamental problem in computer graphics and computational geometry. It often arises in many applications across various disciplines, such as industrial prototyping, artistic design and biomedical imaging. While the problem has been widely studied for years, challenges remain for handling different type of curve inputs while satisfying various constraints. We study studied three related computational tasks in this thesis. First, we propose an algorithm for reconstructing multi-labeled material interfaces from cross-sectional curves that allows for explicit topology control. Second, we addressed the consistency restoration, a critical but overlooked problem in applying …


Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang May 2019

Real-Time Reliable Middleware For Industrial Internet-Of-Things, Chao Wang

McKelvey School of Engineering Theses & Dissertations

This dissertation contributes to the area of adaptive real-time and fault-tolerant systems research, applied to Industrial Internet-of-Things (IIoT) systems. Heterogeneous timing and reliability requirements arising from IIoT applications have posed challenges for IIoT services to efficiently differentiate and meet such requirements. Specifically, IIoT services must both differentiate processing according to applications' timing requirements (including latency, event freshness, and relative consistency of each other) and enforce the needed levels of assurance for data delivery (even as far as ensuring zero data loss). It is nontrivial for an IIoT service to efficiently differentiate such heterogeneous IIoT timing/reliability requirements to fit each application, …


Fluid Transport In Porous Media For Engineering Applications, Eric M. Benner May 2019

Fluid Transport In Porous Media For Engineering Applications, Eric M. Benner

Chemical and Biological Engineering ETDs

This doctoral dissertation presents three topics in modeling fluid transport through porous media used in engineering applications. The results provide insights into the design of fuel cell components, catalyst and drug delivery particles, and aluminum- based materials. Analytical and computational methods are utilized for the modeling of the systems of interest. Theoretical analysis of capillary-driven transport in porous media show that both geometric and evaporation effects significantly change the time dependent behavior of liquid imbibition and give a steady state flux into the medium. The evaporation–capillary number is significant in determining the time-dependent behavior of capillary flows in porous media. …


Differential Estimation Of Audiograms Using Gaussian Process Active Model Selection, Trevor Larsen May 2019

Differential Estimation Of Audiograms Using Gaussian Process Active Model Selection, Trevor Larsen

McKelvey School of Engineering Theses & Dissertations

Classical methods for psychometric function estimation either require excessive resources to perform, as in the method of constants, or produce only a low resolution approximation of the target psychometric function, as in adaptive staircase or up-down procedures. This thesis makes two primary contributions to the estimation of the audiogram, a clinically relevant psychometric function estimated by querying a patient’s for audibility of a collection of tones. First, it covers the implementation of a Gaussian process model for learning an audiogram using another audiogram as a prior belief to speed up the learning procedure. Second, it implements a use case of …


The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild May 2019

The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild

Senior Honors Projects, 2010-2019

We use mathematics to study physical problems because abstracting the information allows us to better analyze what could happen given any range and combination of parameters. The problem is that for complicated systems mathematical analysis becomes extremely cumbersome. The only effective and reasonable way to study the behavior of such systems is to simulate the event on a computer. However, the fact that the set of floating-point numbers is finite and the fact that they are unevenly distributed over the real number line raises a number of concerns when trying to simulate systems with chaotic behavior. In this research we …


Autonomous Watercraft Simulation And Programming, Nicholas J. Savino May 2019

Autonomous Watercraft Simulation And Programming, Nicholas J. Savino

Undergraduate Theses and Capstone Projects

Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats and an increasing popularity of self-driving cars. We simulated the motion of an autonomous vehicle using computational models. The simulation models the motion of a small-scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as various biases …


Fault Adaptive Workload Allocation For Complex Manufacturing Systems, Charlie B. Destefano May 2019

Fault Adaptive Workload Allocation For Complex Manufacturing Systems, Charlie B. Destefano

Graduate Theses and Dissertations

This research proposes novel fault adaptive workload allocation (FAWA) strategies for the health management of complex manufacturing systems. The primary goal of these strategies is to minimize maintenance costs and maximize production by strategically controlling when and where failures occur through condition-based workload allocation.

For complex systems that are capable of performing tasks a variety of different ways, such as an industrial robot arm that can move between locations using different joint angle configurations and path trajectories, each option, i.e. mission plan, will result in different degradation rates and life-expectancies. Consequently, this can make it difficult to predict when a …


Motor Control Systems Analysis, Design, And Optimization Strategies For A Lightweight Excavation Robot, Austin Jerold Crawford May 2019

Motor Control Systems Analysis, Design, And Optimization Strategies For A Lightweight Excavation Robot, Austin Jerold Crawford

Graduate Theses and Dissertations

This thesis entails motor control system analysis, design, and optimization for the University of Arkansas NASA Robotic Mining Competition robot. The open-loop system is to be modeled and simulated in order to achieve a desired rapid, yet smooth response to a change in input. The initial goal of this work is to find a repeatable, generalized step-by-step process that can be used to tune the gains of a PID controller for multiple different operating points. Then, sensors are to be modeled onto the robot within a feedback loop to develop an error signal and to make the control system self-corrective …


Applications Of Fog Computing In Video Streaming, Kyle Smith May 2019

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …


Classification Of Vegetation In Aerial Imagery Via Neural Network, Gevand Balayan May 2019

Classification Of Vegetation In Aerial Imagery Via Neural Network, Gevand Balayan

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis focuses on the task of trying to find a Neural Network that is best suited for identifying vegetation from aerial imagery. The goal is to find a way to quickly classify items in an image as highly likely to be vegetation(trees, grass, bushes and shrubs) and then interpolate that data and use it to mark sections of an image as vegetation. This has practical applications as well. The main motivation of this work came from the effort that our town takes in conserving water. By creating an AI that can easily recognize plants, we can better monitor the …


Multi-Resolution Spatio-Temporal Change Analyses Of Hydro-Climatological Variables In Association With Large-Scale Oceanic-Atmospheric Climate Signals, Kazi Ali Tamaddun May 2019

Multi-Resolution Spatio-Temporal Change Analyses Of Hydro-Climatological Variables In Association With Large-Scale Oceanic-Atmospheric Climate Signals, Kazi Ali Tamaddun

UNLV Theses, Dissertations, Professional Papers, and Capstones

The primary objective of the work presented in this dissertation was to evaluate the change patterns, i.e., a gradual change known as the trend, and an abrupt change known as the shift, of multiple hydro-climatological variables, namely, streamflow, snow water equivalent (SWE), temperature, precipitation, and potential evapotranspiration (PET), in association with the large-scale oceanic-atmospheric climate signals. Moreover, both observed datasets and modeled simulations were used to evaluate such change patterns to assess the efficacy of the modeled datasets in emulating the observed trends and shifts under the influence of uncertainties and inconsistencies. A secondary objective of this study was to …


The Affective Perceptual Model: Enhancing Communication Quality For Persons With Pimd, Jadin Tredup May 2019

The Affective Perceptual Model: Enhancing Communication Quality For Persons With Pimd, Jadin Tredup

UNLV Theses, Dissertations, Professional Papers, and Capstones

Methods for prolonged compassionate care for persons with Profound Intellectual and Multiple Disabilities (PIMD) require a rotating cast of import people in the subjects life in order to facilitate interaction with the external environment. As subjects continue to age, dependency on these people increases with complexity of communications while the quality of communication decreases. It is theorized that a machine learning (ML) system could replicate the attuning process and replace these people to promote independence. This thesis extends this idea to develop a conceptual and formal model and system prototype.

The main contributions of this thesis are: (1) proposal of …


Hardware Ip Classification Through Weighted Characteristics, Brendan Mcgeehan May 2019

Hardware Ip Classification Through Weighted Characteristics, Brendan Mcgeehan

Graduate Theses and Dissertations

Today’s business model for hardware designs frequently incorporates third-party Intellectual Property (IP) due to the many benefits it can bring to a company. For instance, outsourcing certain components of an overall design can reduce time-to-market by allowing each party to specialize and perfect a specific part of the overall design. However, allowing third-party involvement also increases the possibility of malicious attacks, such as hardware Trojan insertion. Trojan insertion is a particularly dangerous security threat because testing the functionality of an IP can often leave the Trojan undetected. Therefore, this thesis work provides an improvement on a Trojan detection method known …