Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2017

Institution
Keyword
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Other Computer Sciences

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad Dec 2017

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …


Comparing And Improving Facial Recognition Method, Brandon Luis Sierra Sep 2017

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra

Electronic Theses, Projects, and Dissertations

Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …


Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang Aug 2017

Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang Aug 2017

Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang

Department of Computer Science Faculty Scholarship and Creative Works

As the underlying infrastructure of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many applications. Network coding is a technique in WSNs to combine multiple channels of data in one transmission, wherever possible, to save node’s energy as well as increase the network throughput. So far most works on network coding are based on two assumptions to determine coding opportunities: (1) All the links in the network have the same transmission success rate; (2) Each link is bidirectional, and has the same transmission success rate on both ways. However, these assumptions may not be …


Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy Jul 2017

Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy

CSE Conference and Workshop Papers

We present a method based on header paths for efficient and complete extraction of labeled data from tables meant for humans. Although many table configurations yield to the proposed syntactic analysis, some require access to semantic knowledge. Clicking on one or two critical cells per table, through a simple interface, is sufficient to resolve most of these problem tables. Header paths, a purely syntactic representation of visual tables, can be transformed (“factored”) into existing representations of structured data such as category trees, relational tables, and RDF triples. From a random sample of 200 web tables from ten large statistical web …


End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth Jul 2017

End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth

CSE Conference and Workshop Papers

Automating the conversion of human-readable HTML tables into machine-readable relational tables will enable end-user query processing of the millions of data tables found on the web. Theoretically sound and experimentally successful methods for index-based segmentation, extraction of category hierarchies, and construction of a canonical table suitable for direct input to a relational database are demonstrated on 200 heterogeneous web tables. The methods are scalable: the program generates the 198 Access compatible CSV files in ~0.1s per table (two tables could not be indexed).


Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni Jul 2017

Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni

Computer Science ETDs

In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …


Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto Jun 2017

Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto

Computer Engineering

The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford May 2017

Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford

Chancellor’s Honors Program Projects

No abstract provided.


Iota Pi Application For Ios, Deborah Newberry Mar 2017

Iota Pi Application For Ios, Deborah Newberry

Computer Science and Software Engineering

Kappa Kappa Psi is a national honorary fraternity for college band members. They meet every Sunday night, and during these meetings they plan events (both internal and external) that aim to meet our goal of making sure that the Cal Poly band programs have their social, financial, material, and educational needs satisfied. This paper details the steps I took to create an application for them to use internally to help ease organizational processes.


Wireless Underground Channel Diversity Reception With Multiple Antennas For Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran Jan 2017

Wireless Underground Channel Diversity Reception With Multiple Antennas For Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran

CSE Conference and Workshop Papers

Internet of underground things (IOUT) is an emerging paradigm which consists of sensors and communication devices, partly or completely buried underground for real-time soil sensing and monitoring. In this paper, the performance of different modulation schemes in IOUT communications is studied through simulations and experiments. The spatial modularity of direct, lateral, and reflected components of the UG channel is exploited by using multiple antennas. First, it has been shown that bit error rates of $10^{-3}$ can be achieved with normalized delay spreads ($\tau_d$) lower than $0.05$. Evaluations are conducted through the first software-defined radio-based field experiments for UG channel. Moreover, …


Towards Internet Of Underground Things In Smart Lighting: A Statistical Model Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak Jan 2017

Towards Internet Of Underground Things In Smart Lighting: A Statistical Model Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

CSE Conference and Workshop Papers

The Internet of Underground Things (IOUT) has many applications in the area of smart lighting. IOUT enables communications in smart lighting through underground (UG) and aboveground (AG) communication channels. In IOUT communications, an in-depth analysis of the wireless underground channel is important to design smart lighting solutions. In this paper, based on the empirical and the statistical analysis, a statistical channel model for the UG channel has been developed. The parameters for the statistical tapped-delay-line model are extracted from the measured power delay profiles (PDP). The PDP of the UG channel is represented by the exponential decay of the lateral, …


Parsing Metamap Files In Hadoop, Amy Olex, Alberto Cano, Bridget T. Mcinnes Jan 2017

Parsing Metamap Files In Hadoop, Amy Olex, Alberto Cano, Bridget T. Mcinnes

Computer Science Publications

The UMLS::Association CUICollector module identifies UMLS Concept Unique Identifier bigrams and their frequencies in a biomedical text corpus. CUICollector was re-implemented in Hadoop MapReduce to improve algorithm speed, flexibility, and scalability. Evaluation of the Hadoop implementation compared to the serial module produced equivalent results and achieved a 28x speedup on a single-node Hadoop system.


Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran Jan 2017

Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran

CSE Conference and Workshop Papers

Current wireless underground (UG) communication techniques are limited by their achievable distance. In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented to extend communication distances for practical applications. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information to improve wireless underground communications performance. Array element in soil is analyzed empirically and impacts of soil type and soil moisture on return loss (RL) and resonant frequency are investigated. Accordingly, beam patterns are analyzed to communicate with underground and above ground devices. Depending on the …


Biosimp: Using Software Testing Techniques For Sampling And Inference In Biological Organisms, Mikaela Cashman, Jennie L. Catlett, Myra B. Cohen, Nicole R. Buan, Zahmeeth Sakkaff, Massimiliano Pierobon, Christine A. Kelley Jan 2017

Biosimp: Using Software Testing Techniques For Sampling And Inference In Biological Organisms, Mikaela Cashman, Jennie L. Catlett, Myra B. Cohen, Nicole R. Buan, Zahmeeth Sakkaff, Massimiliano Pierobon, Christine A. Kelley

CSE Conference and Workshop Papers

Years of research in software engineering have given us novel ways to reason about, test, and predict the behavior of complex software systems that contain hundreds of thousands of lines of code. Many of these techniques have been inspired by nature such as genetic algorithms, swarm intelligence, and ant colony optimization. In this paper we reverse the direction and present BioSIMP, a process that models and predicts the behavior of biological organisms to aid in the emerging field of systems biology. It utilizes techniques from testing and modeling of highly-configurable software systems. Using both experimental and simulation data we show …


Foreword: Special Issue On Coalgebraic Logic, Alexander Kurz Jan 2017

Foreword: Special Issue On Coalgebraic Logic, Alexander Kurz

Engineering Faculty Articles and Research

The second Dagstuhl seminar on coalgebraic logics took place from October 7-12, 2012, in the Leibniz Forschungszentrum Schloss Dagstuhl, following a successful earlier one in December 2009. From the 44 researchers who attended and the 30 talks presented, this collection highlights some of the progress that has been made in the field. We are grateful to Giuseppe Longo and his interest in a special issue in Mathematical Structures in Computer Science.


The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz Jan 2017

The Positivication Of Coalgebraic Logics, Fredrik Dahlqvist, Alexander Kurz

Engineering Faculty Articles and Research

We present positive coalgebraic logic in full generality, and show how to obtain a positive coalgebraic logic from a boolean one. On the model side this involves canonically computing a endofunctor T': Pos->Pos from an endofunctor T: Set->Set, in a procedure previously defined by the second author et alii called posetification. On the syntax side, it involves canonically computing a syntax-building functor L': DL->DL from a syntax-building functor L: BA->BA, in a dual procedure which we call positivication. These operations are interesting in their own right and we explicitly compute posetifications and positivications in the case …


Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz Jan 2017

Quasivarieties And Varieties Of Ordered Algebras: Regularity And Exactness, Alexander Kurz

Engineering Faculty Articles and Research

We characterise quasivarieties and varieties of ordered algebras categorically in terms of regularity, exactness and the existence of a suitable generator. The notions of regularity and exactness need to be understood in the sense of category theory enriched over posets.

We also prove that finitary varieties of ordered algebras are cocompletions of their theories under sifted colimits (again, in the enriched sense).


Features Of Agent-Based Models, Reiko Heckel, Alexander Kurz, Edmund Chattoe-Brown Jan 2017

Features Of Agent-Based Models, Reiko Heckel, Alexander Kurz, Edmund Chattoe-Brown

Engineering Faculty Articles and Research

The design of agent-based models (ABMs) is often ad-hoc when it comes to defining their scope. In order for the inclusion of features such as network structure, location, or dynamic change to be justified, their role in a model should be systematically analysed. We propose a mechanism to compare and assess the impact of such features. In particular we are using techniques from software engineering and semantics to support the development and assessment of ABMs, such as graph transformations as semantic representations for agent-based models, feature diagrams to identify ingredients under consideration, and extension relations between graph transformation systems to …