Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Computer Engineering

Theses/Dissertations

Institution
Keyword
Publication

Articles 1 - 30 of 374

Full-Text Articles in Engineering

Human-Robot Interaction For Assistive Robotics, Jiawei Li Dec 2020

Human-Robot Interaction For Assistive Robotics, Jiawei Li

Dissertations

This dissertation presents an in-depth study of human-robot interaction (HRI) withapplication to assistive robotics. In various studies, dexterous in-hand manipulation is included, assistive robots for Sit-To-stand (STS) assistance along with the human intention estimation. In Chapter 1, the background and issues of HRI are explicitly discussed. In Chapter 2, the literature review introduces the recent state-of-the-art research on HRI, such as physical Human-Robot Interaction (HRI), robot STS assistance, dexterous in hand manipulation and human intention estimation. In Chapter 3, various models and control algorithms are described in detail. Chapter 4 introduces the research equipment. Chapter 5 presents innovative theories and …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel Dec 2020

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel

Theses

The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention …


Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu Dec 2020

Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu

Dissertations

Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …


Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue Dec 2020

Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue

Theses

In the past decades, Human Activity Recognition (HAR) grabbed considerable research attentions from a wide range of pattern recognition and human–computer interaction researchers due to its prominent applications such as smart home health care. The wealth of information requires efficient classification and analysis methods. Deep learning represents a promising technique for large-scale data analytics. There are various ways of using different sensors for human activity recognition in a smartly controlled environment. Among them, physical human activity recognition through wearable sensors provides valuable information about an individual’s degree of functional ability and lifestyle. There is abundant research that works upon real …


Evaluating Tlb (Translation Lookaside Buffer) Performance Overhead For Nvm (Non-Volatile Memory) Hybrid System, Xiang Guo Dec 2020

Evaluating Tlb (Translation Lookaside Buffer) Performance Overhead For Nvm (Non-Volatile Memory) Hybrid System, Xiang Guo

Electronic Theses and Dissertations

As the non-volatile memory (NVM) technology offers near-DRAM performance and near-disk capacity, NVM has emerged as a new storage class. Conventional file systems, designed for hard disk drives or solid-state drives, need to be re-examined or even re-designed for NVM storage. For example, new file systems such as NOVA, HMFS, HMVFS and Ext4-DAX, have been developed and implemented to fully leverage NVM’s characteristics, such as fast fine-grained access. This thesis research uses a variety of I/O workloads to evaluate the performance overhead of the TLB (translation lookaside buffer) in various file systems on emulated NVM storage systems, in which NVM …


Efficient End-To-End Autonomous Driving, Hesham Eraqi Dec 2020

Efficient End-To-End Autonomous Driving, Hesham Eraqi

Theses and Dissertations

Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to train artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, most existing solutions consider only the visual camera frames as input, thus ignoring the temporal relationship between frames. In this work, we propose a Convolution Long Short-Term Memory Recurrent Neural Network (C-LSTM), which is end-to-end trainable, to learn both visual and dynamic temporal dependencies of driving. Additionally, We introduce posing the steering angle regression problem as classification while imposing a spatial relationship between the …


Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu Dec 2020

Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu

Masters Theses

With the advent of virtualization and artificial intelligence, research on networked systems has progressed substantially. As the technology progresses, we expect a boom in not only the systems research but also in the network of systems domain. It is paramount that we understand and develop methodologies to connect and communicate among the plethora of devices and systems that exist today. One such area is mobile ad-hoc and space communication, which further complicates the task of networking due to myriad of environmental and physical conditions. Developing and testing such systems is an important step considering the large investment required to build …


Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan Dec 2020

Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan

Doctoral Dissertations

The Transmission Control Protocol (TCP) is a robust and reliable method used to transport data across a network. Many variants of TCP exist, e.g., Scalable TCP, CUBIC, and H-TCP. While some of them have been studied from empirical and theoretical perspectives, others have been less amenable to a thorough mathematical analysis. Moreover, some of the more popular variants had not been analyzed in the context of the high-speed environments for which they were designed. To address this issue, we develop a generalized modeling technique for TCP congestion control under the assumption of high bandwidth-delay product. In a separate contribution, we …


Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi Dec 2020

Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi

Master of Science in Computer Science Theses

While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …


Intelligent Networks For High Performance Computing, William Whitney Schonbein Dec 2020

Intelligent Networks For High Performance Computing, William Whitney Schonbein

Computer Science ETDs

There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …


Reinforcement Learning Approach For Inspect/Correct Tasks, Hoda Nasereddin Dec 2020

Reinforcement Learning Approach For Inspect/Correct Tasks, Hoda Nasereddin

LSU Doctoral Dissertations

In this research, we focus on the application of reinforcement learning (RL) in automated agent tasks involving considerable target variability (i.e., characterized by stochastic distributions); in particular, learning of inspect/correct tasks. Examples include automated identification & correction of rivet failures in airplane maintenance procedures, and automated cleaning of surgical instruments in a hospital sterilization processing department. The location of defects and the corrective action to be taken for each varies from task episode. What needs to be learned are optimal stochastic strategies rather than optimization of any one single defect type and location. RL has been widely applied in robotics …


Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily Dec 2020

Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily

Doctoral Dissertations

mmWave frequencies ranging between (30-300GHz) have been considered the perfect solution to the scarcity of bandwidth in the traditional sub-6GHz band and to the ever increasing demand of many emerging applications in today's era. 5G and beyond standards are all considering the mmWave as an essential part of there networks. Beamforming is one of the most important enabling technologies for the mmWave to compensate for the huge propagation lose of these frequencies compared to the sub-6GHz frequencies and to ensure better spatial and spectral utilization of the mmWave channel space. In this work, we tried to develop different techniques to …


Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet Dec 2020

Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet

Graduate Theses and Dissertations

In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …


Authentication Based On Blockchain, Norah Alilwit Dec 2020

Authentication Based On Blockchain, Norah Alilwit

Doctoral Dissertations and Master's Theses

Across past decade online services have enabled individuals and organizations to perform different types of transactions such as banking, government transactions etc. The online services have also enabled more developments of applications, at cheap cost with elastic and scalable, fault tolerant system. These online services are offered by services providers which are use authentication, authorization and accounting framework based on client-server model. Though this model has been used over decades, study shows it is vulnerable to different hacks and it is also inconvenient to use for the end users. In addition, the services provider has total control over user data …


A Circle Hough Transform Implementation Using High-Level Synthesis, Carlos Lemus Dec 2020

A Circle Hough Transform Implementation Using High-Level Synthesis, Carlos Lemus

UNLV Theses, Dissertations, Professional Papers, and Capstones

Circle Hough Transform (CHT) has found applications in biometrics, robotics, and imageanalysis. In this work, the focus is the development of a Field Programmable Gate Array (FPGA) based accelerator that performs a series of procedures and results in circle detection. The design is performed using Vivado High-Level Synthesis (HLS) tools and targeted for a Zynq UltraScale+ ZCU106. The implementation includes the following procedures: Gaussian filter, Sobel edge operator, thresholding, and finally the CHT algorithm. The performance is evaluated based on the execution time as compared to the software (Python code) execution and the analysis tools provided by Vivado HLS tool. …


Towards Sensorimotor Coupling Of A Spiking Neural Network And Deep Reinforcement Learning For Robotics Application, Kashu Yamazaki Dec 2020

Towards Sensorimotor Coupling Of A Spiking Neural Network And Deep Reinforcement Learning For Robotics Application, Kashu Yamazaki

Mechanical Engineering Undergraduate Honors Theses

Deep reinforcement learning augments the reinforcement learning framework and utilizes the powerful representation of deep neural networks. Recent works have demonstrated the great achievements of deep reinforcement learning in various domains including finance,medicine, healthcare, video games, robotics and computer vision.Deep neural network was started with multi-layer perceptron (1stgeneration) and developed to deep neural networks (2ndgeneration)and it is moving forward to spiking neural networks which are knownas3rdgeneration of neural networks. Spiking neural networks aim to bridge the gap between neuroscience and machine learning, using biologically-realistic models of neurons to carry out computation. In this thesis, we first provide a comprehensive review …


A Multi-Channel Mcp-Pmt Based Readout Integrated Circuit For Lidar Applications, Sachin Purushothaman Namboodiri Dec 2020

A Multi-Channel Mcp-Pmt Based Readout Integrated Circuit For Lidar Applications, Sachin Purushothaman Namboodiri

UNLV Theses, Dissertations, Professional Papers, and Capstones

Photon counting techniques are becoming more critical in fields such as LiDAR, high energy physics (HEP), and positron emission tomography (PET). For space-based aerosol-cloud-ocean (ACO) LiDAR, the total aggregate photon flux signal has a very high dynamic range, from a single-photon up to giga-photons per second for a single channel. This dissertation focuses on the design of a multichannel, photon counting readout circuit that can interface with MCP-PMTs for high dynamic range, space-based LiDAR applications. Chapter 2 presents the conventional current mode approach that has been employed to realize a photon counting circuit. A transimpedance amplifier, a 6-bit delay line …


Imparting 3d Representations To Artificial Intelligence For A Full Assessment Of Pressure Injuries., Sofia Zahia Dec 2020

Imparting 3d Representations To Artificial Intelligence For A Full Assessment Of Pressure Injuries., Sofia Zahia

Electronic Theses and Dissertations

During recent decades, researches have shown great interest to machine learning techniques in order to extract meaningful information from the large amount of data being collected each day. Especially in the medical field, images play a significant role in the detection of several health issues. Hence, medical image analysis remarkably participates in the diagnosis process and it is considered a suitable environment to interact with the technology of intelligent systems. Deep Learning (DL) has recently captured the interest of researchers as it has proven to be efficient in detecting underlying features in the data and outperformed the classical machine learning …


Automatic Target Recognition With Convolutional Neural Networks., Nada Baili Dec 2020

Automatic Target Recognition With Convolutional Neural Networks., Nada Baili

Electronic Theses and Dissertations

Automatic Target Recognition (ATR) characterizes the ability for an algorithm or device to identify targets or other objects based on data obtained from sensors, being commonly thermal. ATR is an important technology for both civilian and military computer vision applications. However, the current level of performance that is available is largely deficient compared to the requirements. This is mainly due to the difficulty of acquiring targets in realistic environments, and also to limitations of the distribution of classified data to the academic community for research purposes. This thesis proposes to solve the ATR task using Convolutional Neural Networks (CNN). We …


Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed Dec 2020

Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed

Electronic Theses, Projects, and Dissertations

With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.

The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …


Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall Dec 2020

Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall

Mechanical & Aerospace Engineering Theses & Dissertations

Traditionally fixed-wing small Unmanned Arial Vehicles (sUAV) are flown while in direct line of sight with commands from a remote operator. However, this is changing with the increased popularity and ready availability of low-cost flight controllers. Flight controllers provide fixed-wing sUAVs with functions that either minimize or eliminate the need for a remote operator. Since the remote operator is no longer controlling the sUAV, it is impossible to determine if the fixed-wing sUAV has proper control authority. In this work, a controllability detection system was designed, built, and flight-tested using COTS hardware. The method features in-situ measurement and analysis of …


Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan Dec 2020

Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan

Computational Modeling & Simulation Engineering Theses & Dissertations

The integration of Information Technology (IT) and Operational Technology (OT) in Cyber-Physical Systems (CPS) has resulted in increased efficiency and facilitated real-time information acquisition, processing, and decision making. However, the increase in automation technology and the use of the internet for connecting, remote controlling, and supervising systems and facilities has also increased the likelihood of cybersecurity threats that can impact safety of humans and property. There is a need to assess cybersecurity risks in the power grid, nuclear plants, chemical factories, etc. to gain insight into the likelihood of safety hazards. Quantitative cybersecurity risk assessment will lead to informed cyber …


Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr. Dec 2020

Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.

Computer Science Theses & Dissertations

Preliminary results of a long-term project entailing the parallelization of an industrial strength sequential mesh generator, called Advancing Front Local Reconnection (AFLR), are presented. AFLR has been under development for the last 25 years at the NSF/ERC center at Mississippi State University. The parallel procedure that is presented is called Pseudo-constrained (PsC) Parallel Data Refinement (PDR) and consists of the following steps: (i) use an octree data-decomposition scheme to divide the original geometry into subdomains (octree leaves), (ii) refine each subdomain with the proper adjustments of its neighbors using the given refinement code, and (iii) combine all subdomain data into …


Framework For Reasoning With Speech Processing, Ahmed Laarfi Dec 2020

Framework For Reasoning With Speech Processing, Ahmed Laarfi

Theses and Dissertations

It is known that programming languages are textual. We try here to take the advantages of Speech Recognition (SR) and employ them in creating a verbal Language, which takes its instruction from the voice. Because this work is a novel approach in the programming world, we could not find any resources. This dissertation aims to make essential developments in Speech Recognition (SR)and Artificial Intelligence by constructing a new compiler that receives commands verbally and executes them. That means entering data into the Computer by voice commands. This method of input means that we link several major computer topics with several …


Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari Dec 2020

Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari

Theses and Dissertations

Arabic texts suffer from missing diacritics (short vowels) which become obstacles for new learners. Speech Recognition is the translation of words spoken to text through intelligent computer programs. As of today, it has been integrated into many computer systems. Arabic Speech Recognition has made progress over the years, but it is still not as good as English speech recognition due to the problem of short vowels not being recognized. This is mainly because the Arabic language is unlike the English language in the nature because it is a Semitic language. This is reflected in different characteristics such as grammar, morphology, …


Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih Dec 2020

Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih

Theses and Dissertations

Today’s market with a vast number of Cloud-computing providers creates a challenge for practical cooperation between the various provider cloud service platforms. Not only does Cloud interoperability provide this needed cooperation, but it also avoids vendor lock-in and, additionally, saves time and cost. Although there is no established definition for Cloud interoperability, most researchers agree on the purposes of Cloud interoperability. Research and literature have attempted to explain interoperability as transferring data, moving workloads, and migrating virtual machines between Cloud platforms. Transferring data between Clouds refers to objects migrating between provider-specific domains. In comparison, data migration is the most commonly …


Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook Dec 2020

Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook

Honors Theses

Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …


Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott Dec 2020

Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott

Theses and Dissertations

With the growth of the Internet of Things and the rise of Big Data, data processing and machine learning applications are being moved to cheap and low size, weight, and power (SWaP) devices at the edge, often in the form of mobile phones, embedded systems, or microcontrollers. The field of Cyber-Physical Measurements and Signature Intelligence (MASINT) makes use of these devices to analyze and exploit data in ways not otherwise possible, which results in increased data quality, increased security, and decreased bandwidth. However, methods to train and deploy models at the edge are limited, and models with sufficient accuracy are …