Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Theses/Dissertations

2016

Institution
Keyword
Publication

Articles 61 - 76 of 76

Full-Text Articles in Physical Sciences and Mathematics

Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam Jan 2016

Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam

Browse all Theses and Dissertations

There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world constitute a Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects …


Knowledge Driven Search Intent Mining, Ashutosh Jadhav Jan 2016

Knowledge Driven Search Intent Mining, Ashutosh Jadhav

Browse all Theses and Dissertations

Understanding users' latent intents behind search queries is essential for satisfying a user's search needs. Search intent mining can help search engines to enhance its ranking of search results, enabling new search features like instant answers, personalization, search result diversification, and the recommendation of more relevant ads. Hence, there has been increasing attention on studying how to effectively mine search intents by analyzing search engine query logs. While state-of-the-art techniques can identify the domain of the queries (e.g. sports, movies, health), identifying domain-specific intent is still an open problem. Among all the topics available on the Internet, health is one …


Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen Jan 2016

Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen

Browse all Theses and Dissertations

Web 2.0 and social media enable people to create, share and discover information instantly anywhere, anytime. A great amount of this information is subjective information -- the information about people's subjective experiences, ranging from feelings of what is happening in our daily lives to opinions on a wide variety of topics. Subjective information is useful to individuals, businesses, and government agencies to support decision making in areas such as product purchase, marketing strategy, and policy making. However, much useful subjective information is buried in ever-growing user generated data on social media platforms, it is still difficult to extract high quality …


Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera Jan 2016

Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera

Browse all Theses and Dissertations

Natural language is a powerful tool developed by humans over hundreds of thousands of years. The extensive usage, flexibility of the language, creativity of the human beings, and social, cultural, and economic changes that have taken place in daily life have added new constructs, styles, and features to the language. One such feature of the language is its ability to express ideas, opinions, and facts in an implicit manner. This is a feature that is used extensively in day to day communications in situations such as: 1) expressing sarcasm, 2) when trying to recall forgotten things, 3) when required to …


Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel Jan 2016

Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel

Browse all Theses and Dissertations

In this thesis, we have designed and developed a motion tracking and visualization system using the latest motion tracking sensory technologies. It is one of the enabling technologies for our novel visual-inertial odometer and human anatomy based 3D Locating, Mapping and Navigation system for endoscopy and drug delivery capsules used inside GI tract. In particular, we have: i) designed and completed a cloud-based sensory data collecting, processing and storage system to provide the reliable computing and storage platform; ii) explored different data processing methods to obtain improved-quality motion results from extremely noisy raw data, e.g., by using a low pass …


Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman Jan 2016

Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman

Browse all Theses and Dissertations

New educational pedagogies are emerging in an effort to increase the number of new engineers available to enter the workforce in the coming years. One of the re-occurring themes in these pedagogies is variations of the flipped classroom. Often the additional classroom time gained from flipping is used to reinforce learning objectives. It is hypothesized that it might be more beneficial to students if a portion of that time is used to address common non-cognitive barriers that prevent students from succeeding in the major. In a freshman Introductory Computer Science course, three different pedagogies are compared: a hybrid lecture-active learning …


De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle Jan 2016

De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle

Browse all Theses and Dissertations

Data generalization (anonymization) is a widely misunderstood technique for preserving individual privacy in non-interactive data publishing. Easily avoidable anonymization failures are still occurring 14 years after the discovery of basic techniques to protect against them. Identities of individuals in anonymized datasets are at risk of being disclosed by cyber attackers who exploit these failures. To demonstrate the importance of proper data anonymization we present three perspectives on data anonymization. First, we examine several de-anonymization attacks to formalize the anatomy used to conduct attacks on anonymous data. Second, we examine the vulnerabilities of an anonymous nursing workforce survey to convey how …


A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva Jan 2016

A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva

Browse all Theses and Dissertations

Many video processing applications, such as motion detection and tracking, rely on accurate and robust alignment between consecutive video frames. Traditional approaches to video image registration, such as pyramidal Kanade-Lucas-Tomasi (KLT) feature detection and tracking are fast and subpixel accurate, but are not robust to large inter-frame displacements due to rotation, scale, or translation. This thesis presents an alternative hybrid approach using normalized gradient correlation (NGC) in the frequency domain and normalized cross-correlation (NCC) in the spatial domain that is fast, accurate, and robust to large displacements. A scale space search is incorporated into NGC to enable more consistent recovery …


Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude Jan 2016

Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude

Browse all Theses and Dissertations

With an ever increasing amount of data that is shared and posted on the Web, the desire and necessity to automatically glean this information has led to an increase in the sophistication and volume of software agents called web robots or crawlers. Recent measurements, including our own across the entire logs of Wright State University Web servers over the past two years, suggest that at least 60\% of all requests originate from robots rather than humans. Web robots display different statistical and behavioral patterns in their traffic compared to humans, yet present Web server optimizations presume that traffic exhibits predominantly …


Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla Jan 2016

Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla

Browse all Theses and Dissertations

Harassment on social media has become a critical problem and social media content depicting harassment is becoming common place. Video-sharing websites such as YouTube contain content that may be offensive to certain community, insulting to certain religion, race etc., or make fun of disabilities. These videos can also provoke and promote altercations leading to online harassment of individuals and groups. In this thesis, we present a system that identifies offensive videos on YouTube. Our goal is to determine features that can be used to detect offensive videos efficiently and reliably. We conducted experiments using content and metadata available for each …


Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus Jan 2016

Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus

Dissertations, Master's Theses and Master's Reports

The representation of nonuniform, multi-modal, time-limited time series data is complex and explored through the use of discrete representation, dimensionality reduction with segmentation based techniques, and with behavioral representation approaches. These explorations are done with a focus on an outpatient oncology setting with the classification and regression analysis being used for length of survival prognosis. Each decision of representation and analysis is not independent, with implications of each decision in method for how the data is represented and then which analysis technique is used. One unique aspect of the work is the use of outpatient clinical data for patients, which …


An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene Jan 2016

An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene

Theses: Doctorates and Masters

This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …


Interfacing Of Neuromorphic Vision, Auditory And Olfactory Sensors With Digital Neuromorphic Circuits, Anup Vanarse Jan 2016

Interfacing Of Neuromorphic Vision, Auditory And Olfactory Sensors With Digital Neuromorphic Circuits, Anup Vanarse

Theses: Doctorates and Masters

The conventional Von Neumann architecture imposes strict constraints on the development of intelligent adaptive systems. The requirements of substantial computing power to process and analyse complex data make such an approach impractical to be used in implementing smart systems.

Neuromorphic engineering has produced promising results in applications such as electronic sensing, networking architectures and complex data processing. This interdisciplinary field takes inspiration from neurobiological architecture and emulates these characteristics using analogue Very Large Scale Integration (VLSI). The unconventional approach of exploiting the non-linear current characteristics of transistors has aided in the development of low-power adaptive systems that can be implemented …


Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng Jan 2016

Positioning Commuters And Shoppers Through Sensing And Correlation, Rufeng Meng

Theses and Dissertations

Positioning is a basic and important need in many scenarios of human daily activities. With position information, multifarious services could be vitalized to benefit all kinds of users, from individuals to organizations. Through positioning, people are able to obtain not only geo-location but also time related information. By aggregating position information from individuals, organizations could derive statistical knowledge about group behaviors, such as traffic, business, event, etc.

Although enormous effort has been invested in positioning related academic and industrial work, there are still many holes to be filled. This dissertation proposes solutions to address the need of positioning in people’s …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


Numerical Analysis Of Flexural Slip During Viscoelastic Buckle Folding, Davi Rodrigues Damasceno Jan 2016

Numerical Analysis Of Flexural Slip During Viscoelastic Buckle Folding, Davi Rodrigues Damasceno

Masters Theses

"Flexural slip is considered to be an important folding mechanism contributing in the development of different folds such as chevron, and kink-band buckle folds. Various filed studies have provided a general conceptual and qualitative understanding of flexural slip. However, quantitative evidence of the importance of the flexural slip mechanism during fold evolution is sparse, as the actual amount of surface parallel displacement, and timing, is difficult to measure accurately, due to the lack of suitable strain markers.

In this study 2D finite element analysis is used to overcome these disadvantages and to simulate flexural slip during viscoelastic buckle folding. Variations …