Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2021

Computer Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1385

Full-Text Articles in Engineering

Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee Dec 2021

Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee

Dissertations

People nowadays use the Internet to project their assessments, impressions, ideas, and observations about various subjects or products on numerous social networking sites. These sites serve as a great source of gathering information for data analytics, sentiment analysis, natural language processing, etc. The most critical challenge is interpreting this data and capturing the sentiment behind these expressions. Sentiment analysis is analyzing, processing, concluding, and inferencing subjective texts with the views. Companies use sentiment analysis to understand public opinions, perform market research, analyze brand reputation, recognize customer experiences, and study social media influence. According to the different needs for aspect granularity, …


Machine Learning Techniques For Network Analysis, Irfan Lateef Dec 2021

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu Dec 2021

On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu

Dissertations

Due to the rapid transition from traditional experiment-based approaches to large-scale, computational intensive simulations, next-generation scientific applications typically involve complex numerical modeling and extreme-scale simulations. Such model-based simulations oftentimes generate colossal amounts of data, which must be transferred over high-performance network (HPN) infrastructures to remote sites and analyzed against experimental or observation data on high-performance computing (HPC) facility. Optimizing the performance of both data transfer in HPN and simulation-based model development on HPC is critical to enabling and accelerating knowledge discovery and scientific innovation. However, such processes generally involve an enormous set of attributes including domain-specific model parameters, network transport …


A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko Dec 2021

A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko

Dissertations

To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …


The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh Dec 2021

Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh

Elinvo (Electronics, Informatics, and Vocational Education)

The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …


Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin Dec 2021

Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin

Elinvo (Electronics, Informatics, and Vocational Education)

Since 2006 Lapindo mudflow caused by natural gas drilling in Sidoarjo. Nowdays the mudflow still can't be stopped, and to prevent it from resident's houses, embankments were built. Eventough the embankments and guardrails has been built but sometimes the mud flowing into resident's houses while its raining or the embankments were subsidence or reep. Severity, the distance between the embankment and the residents' houses is about 500 m. So far, the handling action while embankments ware subsidence is residents report the accidents to related parties, namely PPLS. But the response is too late and take a long time to occur …


Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa Dec 2021

Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa

Elinvo (Electronics, Informatics, and Vocational Education)

The elevator has an important role in assisting transportation and logistics activities in a building. However, if the elevator is not used wisely, then the power consumption will be inefficient. A policy of elevator usage is necessary to ensure the effectiveness of elevator power consumption. Therefore, in this study, elevator power consumption monitoring is proposed. The power consumption behavior can be learned so a suitable policy can be made accordingly. Two elevators in Telkom Campus Surabaya are monitored to understand the daily electrical energy usage. Internet of Things (IoT) based real-time power monitoring system is used to monitor the electrical …


The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh Dec 2021

The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh

Elinvo (Electronics, Informatics, and Vocational Education)

The usefulness of monitoring systems in the electric power system supports the importance of people's work today. One of which is the monitoring system at the generator. The monitoring system for Wind Power Plant (WPP), Solar Power Plant (SPP), and electricity from State Electricity Company (PLN) use IoT (Internet of Things) in the form of Sonoff Pow R2. With the monitoring system on this tool, the parameter values for WPP, SPP, and PLN can be seen and monitored online via a smartphone. The purpose of this research is to design a monitoring system for WPP, SPP, and PLN based on …


Algorithm Hardware Codesign For High Performance Neuromorphic Computing, Haowen Fang Dec 2021

Algorithm Hardware Codesign For High Performance Neuromorphic Computing, Haowen Fang

Dissertations - ALL

Driven by the massive application of Internet of Things (IoT), embedded system and Cyber Physical System (CPS) etc., there is an increasing demand to apply machine intelligence on these power limited scenarios. Though deep learning has achieved impressive performance on various realistic and practical tasks such as anomaly detection, pattern recognition, machine vision etc., the ever-increasing computational complexity and model size of Deep Neural Networks (DNN) make it challenging to deploy them onto aforementioned scenarios where computation, memory and energy resource are all limited. Early studies show that biological systems' energy efficiency can be orders of magnitude higher than that …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay Dec 2021

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay

Posters-at-the-Capitol

The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …


Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam Dec 2021

Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam

Faculty & Staff Scholarship

Heavy-duty trucks contribute approximately 20% of fuel consumption in the United States of America (USA). The fuel economy of heavy-duty vehicles (HDV) is affected by several real-world parameters like road parameters, driver behavior, weather conditions, and vehicle parameters, etc. Although modern vehicles comply with emissions regulations, potential malfunction of the engine, regular wear and tear, or other factors could affect vehicle performance. Predicting fuel consumption per trip based on dynamic on-road data can help the automotive industry to reduce the cost and time for on-road testing. Data modeling can easily help to diagnose the reason behind fuel consumption with a …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Graph Based Management Of Temporal Data, Alex Fotso Dec 2021

Graph Based Management Of Temporal Data, Alex Fotso

Master of Science in Computer Science Theses

In recent decades, there has been a significant increase in the use of smart devices and sensors that led to high-volume temporal data generation. Temporal modeling and querying of this huge data have been essential for effective querying and retrieval. However, custom temporal models have the problem of generalizability, whereas the extended temporal models require users to adapt to new querying languages. In this thesis, we propose a method to improve the modeling and retrieval of temporal data using an existing graph database system (i.e., Neo4j) without extending with additional operators. Our work focuses on temporal data represented as intervals …


Development Of A Model For Control Of A Flexible Production Sewage System, Shalala Jafarova Dec 2021

Development Of A Model For Control Of A Flexible Production Sewage System, Shalala Jafarova

Scientific-technical journal

This article discusses the development of a production module management model for one area of the technological process. New modeling methods are used for this purpose. Mathematical modeling and research is one of the key issues in the early stages of designing automated and automated systems operating in uncertain or fuzzy environments. Efficient modeling devices are used to solve these problems, taking into account the specific features of the process. The article builds the management model of the production module and obtains the results.


Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo Dec 2021

Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo

Department of Information Systems & Computer Science Faculty Publications

This paper presents a novel method for automatic segmentation of dental X-ray images into single tooth sections and for placing every segmented tooth onto a precise corresponding position table. Moreover, the proposed method automatically determines the tooth’s position in a panoramic X-ray film. The image-processing step incorporates a variety of image-enhancement techniques, including sharpening, histogram equalization, and flat-field correction. Moreover, image processing was implemented iteratively to achieve higher pixel value contrast between the teeth and cavity. The next image-enhancement step is aimed at detecting the teeth cavity and involves determining the segment and points separating the upper and lower jaw, …


Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu Dec 2021

Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu

Publications

As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi

School of Information Systems and Technology Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi

Walden Faculty and Staff Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


Precision Grasp Planning For Integrated Arm-Hand Systems, Shuwei Qiu Dec 2021

Precision Grasp Planning For Integrated Arm-Hand Systems, Shuwei Qiu

Electronic Thesis and Dissertation Repository

The demographic shift has caused labor shortages across the world, and it seems inevitable to rely on robots more than ever to fill the widening gap in the workforce. The robotic replacement of human workers necessitates the ability of autonomous grasping as the most natural but rather a vital part of almost all activities. Among different types of grasping, fingertip grasping attracts much attention because of its superior performance for dexterous manipulation. This thesis contributes to autonomous fingertip grasping in four areas including hand-eye calibration, grasp quality evaluation, inverse kinematics (IK) solution of robotic arm-hand systems, and simultaneous achievement of …


3d Shape Estimation Of Negative Obstacles Using Lidar Point Cloud Data, Viswadeep Lebakula Dec 2021

3d Shape Estimation Of Negative Obstacles Using Lidar Point Cloud Data, Viswadeep Lebakula

Theses and Dissertations

Obstacle detection and avoidance plays a crucial role in the autonomous navigation of unmanned ground vehicles (UGV). Information about the obstacles decreases as the distance between the UGV and obstacles increases. However, this information decreases much more rapidly for negative obstacles than for positive obstacles. UGV navigation becomes more challenging in off-road environments due to the higher probability of finding negative obstacles (e.g., potholes, ditches, trenches, etc.) compared with on-road environments. One approach to solve this problem is to avoid the candidate path with a negative obstacle, but in off-road environments avoiding negative obstacles in all situations is not possible. …


Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr. Dec 2021

Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.

Theses and Dissertations

Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.

This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …


The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform, Aheeka Pattnaik Dec 2021

The Application Of Design Thinking On Evaluating A User Self-Service Data Analytics/Science Platform, Aheeka Pattnaik

Dissertations and Theses

This thesis is aimed at utilising design thinking and the first half of the double diamond framework to i) set-up a research and select the appropriate participants, ii) gather requirements and define user personas from those eligible participants, and then iii) define the framework for evaluating a user self-service data analytics/science platform. Derived from the author’s own experiences, both as a Business Analyst (BA) and Citizen Data Scientist, with no-, low-, and code-based data analytics and science platforms are being implemented for enabling user self-service analytics – for users who are completely new to the space of data analysis and …


Design Of Plastic Contaminant Eliminator In Seed Cotton, Joshua H. Tandio Dec 2021

Design Of Plastic Contaminant Eliminator In Seed Cotton, Joshua H. Tandio

Theses and Dissertations

Plastic contamination in cotton is a problem in cotton industry and researchers have worked on this problem with different approaches. This thesis documents the design of mechanical and electronic real-time systems for detecting and removing plastic contaminants. The mechanical system was designed to expose plastic embedded inside the seed cotton to the sensor and to separate plastic contaminated cotton from the process stream. The detection system consisted of an embedded computer interfaced with a USB camera and Neural Network (NN) software running in it. Two NN models were tested, a transfer learning model and a built-from-scratch original model. The original …


Autonomous Control And Signal Acquisition System, Rion Cadell Krampe Dec 2021

Autonomous Control And Signal Acquisition System, Rion Cadell Krampe

Honors College Theses

Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …


Iot Greenhouse Monitoring System, Raj Basnet Dec 2021

Iot Greenhouse Monitoring System, Raj Basnet

Honors Theses

Our project is a greenhouse monitoring system. The customer states that they need a complete monitoring system for their greenhouse. There are a lot of items within the greenhouse that need to be watered at the right time and kept at a certain temperature. The customer is not always around to check the status of these items due to their busy lifestyle. They would like a system to monitor all these items so they can check it on their smartphone no matter how far away they are from the greenhouse. The customer wants this to be a low-cost and energyefficient …


3d Bionic Arm, Anny Baez Silfa Dec 2021

3d Bionic Arm, Anny Baez Silfa

Publications and Research

Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic …


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …