Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

829 Full-Text Articles 1,165 Authors 458,142 Downloads 90 Institutions

All Articles in Other Computer Engineering

Faceted Search

829 full-text articles. Page 4 of 36.

Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng 2019 Electrical and Computer Engineering

Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng

Doctoral Dissertations

Today we are living in a world awash with data. Large volumes of data are acquired, analyzed and applied to tasks through machine learning algorithms in nearly every area of science, business, and industry. For example, medical scientists analyze the gene expression data from a single specimen to learn the underlying causes of disease (e.g. cancer) and choose the best treatment; retailers can know more about customers' shopping habits from retail data to adjust their business strategies to better appeal to customers; suppliers can enhance supply chain success through supply chain systems built on knowledge sharing. However, it is ...


Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh 2019 West Virginia University

Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh

Graduate Theses, Dissertations, and Problem Reports

Lung cancer is the leading cause of cancer-related death in the world. Lung cancer can be categorized as non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). NSCLC makes up about 80% to 85% of lung cancer cases diagnosed, whereas SCLC is responsible for 10% to 15% of the cases. It remains a challenge for physicians to identify patients who shall benefit from chemotherapy. In such a scenario, identifying genes that can facilitate therapeutic target discoveries and better understanding disease mechanisms and their regulation in different stages of lung cancer, remains an important topic of research.

In this ...


Cyber Defense Competition Card Game, Ryan Luckinbill 2019 Iowa State University

Cyber Defense Competition Card Game, Ryan Luckinbill

Creative Components

Cyber Defense Competition Game is a JavaScript web application used to represent a card game version of a Cyber Defense Competition online. Cyber Defense Competitions have often been used to teach the concepts of information security and have participants compete against each other to protect their assets. This game attempts to create many of the same experiences that could be had during a Cyber Defense Competition but without much of the setup and taking much less time.

This project is the first step towards an easily playable card game between two players and a moderator. This version of the game ...


Abnormality Management In Spatial Crowdsourcing For Multi-Skilled Workers Assignment, Srinandan Kota 2019 Iowa State University

Abnormality Management In Spatial Crowdsourcing For Multi-Skilled Workers Assignment, Srinandan Kota

Creative Components

Crowdsourcing is dependent on a number of skilled workers who are needed to accomplish spatial tasks. This has been an active area of research and is gaining wide popularity now. Most of these tasks can be completed online due to convenience, but this method fails when there is a need of completing a task at actual physical locations. This has led to a new area called Spatial crowd sourcing that consists of location-specific tasks that require people who can accomplish them to physically arrive at specific locations. The tasks which require specific skillsets, completion times or other constraints are matched ...


Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin 2019 University of Houston-Clear Lake

Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin

Journal of International Technology and Information Management

Today, many critical information systems have safety-critical and non-safety-critical functions executed on the same platform in order to reduce design and implementation costs. The set of safety-critical functionality is subject to certification requirements and the rest of the functionality does not need to be certified, or is certified to a lower level. The resulting mixed-criticality systems bring challenges in designing such systems, especially when the critical tasks are required to complete with a timing constraint. This paper studies a problem of scheduling a mixed-criticality system with fault tolerance. A fault-recovery technique called checkpointing is used where a program can go ...


Car Image Classification Using Deep Neural Networks, Mingchen Li 2019 Colby College

Car Image Classification Using Deep Neural Networks, Mingchen Li

Honors Theses

Image classification is widely used in many fields of study. Deep neural networks are proven to be effective classifier structure due to its massive parameters and training capability. This paper outlines the development of Deep Neural Network in recent years and applied them on a Car image data set in order to compare their performances.


Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey 2019 Michigan Technological University

Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey

Dissertations, Master's Theses and Master's Reports

The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.

A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To ...


Geometric Correction For A Spherical Mirror Projection On A Nonplanar Surface, Methuen J. Bell-Isaac 2019 Bard College

Geometric Correction For A Spherical Mirror Projection On A Nonplanar Surface, Methuen J. Bell-Isaac

Senior Projects Spring 2019

This paper discusses an approach for removing distortion from an image projected on a non-planar surface. With a single projector setup in a spherical mirror projection system, it becomes possible to preserve image features. The approach takes advantage of the configuration of the surface, specifically, the geodesic dome in this project. The configuration acts as a mold so that a warp mesh can be designed to match the surface configuration. Points in an image are then mapped to their corresponding point on the destination multi-planar surface represented by the mesh. The removal of distortion brings us a step closer to ...


Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava 2019 Iowa State University

Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava

Creative Components

Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE protocol, which is the standard for vehicle to vehicle communication. Successful attacks on the device could be used to control the behavior of the connected vehicle. This creative component assesses the security of the device and discusses the vulnerabilities of the applications installed on the device. It reports about our results to exploit the known vulnerabilities of Dropbear ssh, Busybox telnet, and the Linux kernel, which are installed on the device and discusses how to obtain the private keys of the device to use them for attacks ...


A Cyber Focused Table Top Exercise For Iowa State University, Christopher Garrison 2019 Iowa State University

A Cyber Focused Table Top Exercise For Iowa State University, Christopher Garrison

Creative Components

No abstract provided.


Hirepro: Aiding “Aging In Place” Via Connecting Caregiver To Older Adults Through Web Application, Vikas Jyoty 2019 Iowa State University

Hirepro: Aiding “Aging In Place” Via Connecting Caregiver To Older Adults Through Web Application, Vikas Jyoty

Creative Components

Our innovation addresses three main problems. First, our innovation is addressing the concept of “aging in place”, or older adults living independently in their own home. Our innovation is focusing on this problem so that older adults will be able to live independently in their homes for a longer period and maintain autonomy, while ensuring a safe environment. Second, this product addresses the issues that service providers face in delivering high quality services and care to older adults, such as staffing and identifying care recipients in need. Third, family members often provide informal care for older adults. However, due to ...


Upgrades To Iseflow: Offloading Arp And Supporting Ipv6, Joel May 2019 Iowa State University

Upgrades To Iseflow: Offloading Arp And Supporting Ipv6, Joel May

Creative Components

No abstract provided.


Feature-Rich Models And Feature Reduction For Malicious Urls Classification And Prediction, Shivika Garg 2019 Iowa State University

Feature-Rich Models And Feature Reduction For Malicious Urls Classification And Prediction, Shivika Garg

Creative Components

Malicious web site is a foundation of criminal activities on Internet. This links enables partial or full machine control to the attackers. This results in victim systems, which get easily infected allowing attackers to utilize systems for quite a number of cyber-crimes such as stealing credentials, spamming, phishing, denial-of-service and many extra such attacks. Therefore, the methodology and technique to detect such crimes should be fast and precise with the additional capability to detect new malicious websites or content. This paper introduces an automatic tool to extract 110 significant features for a URL. Additionally, this paper also propose various aspects ...


Android Third-Party Library Detection, Brody Concannon 2019 Iowa State University

Android Third-Party Library Detection, Brody Concannon

Creative Components

Third-party library analysis research is important to many research fields like program analysis, clone-detection, security and privacy. There are many considerations taken when developing a third-party library analysis approach. The approach must be resilient to common obfuscation techniques and be able to determine similarity between two libraries with a high level of confidence. This paper explores this research and the problems that have been solved and reviews the improvements and shortcomings within the third-party library analysis field.


Eaglebot: A Chatbot Based Multi-Tier Question Answering System For Retrieving Answers From Heterogeneous Sources Using Bert, Muhammad Rana 2019 Georgia Southern University

Eaglebot: A Chatbot Based Multi-Tier Question Answering System For Retrieving Answers From Heterogeneous Sources Using Bert, Muhammad Rana

Electronic Theses and Dissertations

This paper proposes to tackle Question Answering on a specific domain by developing a multi-tier system using three different types of data storage for storing answers. For testing our system on University domain we have used extracted data from Georgia Southern University website. For the task of faster retrieval we have divided our answer data sources into three distinct types and utilized Dialogflow's Natural Language Understanding engine for route selection. We compared different word and sentence embedding techniques for making a semantic question search engine and BERT sentence embedding gave us the best result and for extracting answer from ...


The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi 2019 Virginia Commonwealth University

The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi

Theses and Dissertations

Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue ...


A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan 2018 Old Dominion University

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan

Distance Learning Faculty & Staff Books

The official Cisco DCICN book and practice exams are great resources, but this is not an easy exam. This study guide is a companion to those resources and summarizes the subject areas into additional review questions with an answer description for each item. This book is not a "braindump" and it is not bootleg screenshots of the actual exam. Instead, this book provides additional context and examples, serves to complement other study guides, and provides additional examples. If you are getting ready to take the exam for the first time, I hope that this guide provides the extra help to ...


Localization Using Convolutional Neural Networks, Shannon D. Fong 2018 California Polytechnic State University, San Luis Obispo

Localization Using Convolutional Neural Networks, Shannon D. Fong

Computer Engineering

With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These ...


Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen 2018 California Polytechnic State University, San Luis Obispo

Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen

Master's Theses and Project Reports

There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.

To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on ...


A Survey Of Virtual Network Architectures, Lenoy Avidan 2018 California Polytechnic State University, San Luis Obispo

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science and Software Engineering

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures ...


Digital Commons powered by bepress