Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

832 Full-Text Articles 1,168 Authors 458,142 Downloads 90 Institutions

All Articles in Other Computer Engineering

Faceted Search

832 full-text articles. Page 5 of 36.

Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen 2018 California Polytechnic State University, San Luis Obispo

Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen

Master's Theses and Project Reports

There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.

To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on ...


A Survey Of Virtual Network Architectures, Lenoy Avidan 2018 California Polytechnic State University, San Luis Obispo

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science and Software Engineering

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures ...


Exploring Photo Privacy Protection On Smartphones, David Darling 2018 University of Arkansas, Fayetteville

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla 2018 California State University, San Bernardino

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


Social Network For Software Developers, Sanket Prabhakar Jadhav 2018 California State University - San Bernardino

Social Network For Software Developers, Sanket Prabhakar Jadhav

Electronic Theses, Projects, and Dissertations

This project is the design and implementation of a web-based message board for software developers. The purpose of “Social Network for Software Developers” is to connect inexperienced software developers with experienced software developers.


Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage 2018 University of Louisville

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage

Electronic Theses and Dissertations

The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in ...


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab 2018 University of Louisville

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order ...


Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist 2018 California Polytechnic State University, San Luis Obispo

Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist

Architectural Engineering

Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic ...


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie 2018 Kennesaw State University

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 ...


Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone 2018 University of New Mexico - Main Campus

Frequency Domain Decomposition Of Digital Video Containing Multiple Moving Objects, Victor M. Stone

Electrical and Computer Engineering ETDs

Motion estimation has been dominated by time domain methods such as block matching and optical flow. However, these methods have problems with multiple moving objects in the video scene, moving backgrounds, noise, and fractional pixel/frame motion. This dissertation proposes a frequency domain method (FDM) that solves these problems. The methodology introduced here addresses multiple moving objects, with or without a moving background, 3-D frequency domain decomposition of digital video as the sum of locally translational (or, in the case of background, a globally translational motion), with high noise rejection. Additionally, via a version of the chirp-Z, fractional pixel/frame ...


A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert 2018 Southwestern Oklahoma State University

A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert

Student Research

Artificial Intelligence(AI) is a growing topic in Computer Science and has many uses in real world applications. One application is using Al, or more specifically Neural Networks to model data and predict outcomes. Neural Networks have been used in the past to predict weather changes, create facial recognition software , and to create self-driving cars. Our project is a validation study of, “Modeling Time Series Data With Deep Fourier Neural Networks” by Gashler and Ashmore, 2016. Here we show that a neural network can be trained to be an effective predictor of weather patterns in Alaska over several years. Our ...


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones 2018 University of New Mexico

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems ...


Search Rank Fraud Prevention In Online Systems, Md Mizanur Rahman 2018 Florida International University

Search Rank Fraud Prevention In Online Systems, Md Mizanur Rahman

FIU Electronic Theses and Dissertations

The survival of products in online services such as Google Play, Yelp, Facebook and Amazon, is contingent on their search rank. This, along with the social impact of such services, has also turned them into a lucrative medium for fraudulently influencing public opinion. Motivated by the need to aggressively promote products, communities that specialize in social network fraud (e.g., fake opinions and reviews, likes, followers, app installs) have emerged, to create a black market for fraudulent search optimization. Fraudulent product developers exploit these communities to hire teams of workers willing and able to commit fraud collectively, emulating realistic, spontaneous ...


Effective Methods And Tools For Mining App Store Reviews, Nishant Jha 2018 Louisiana State University and Agricultural and Mechanical College

Effective Methods And Tools For Mining App Store Reviews, Nishant Jha

LSU Doctoral Dissertations

Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these ...


A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani 2018 University of New Mexico

A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani

Electrical and Computer Engineering ETDs

Situational awareness and indoor positioning of firefighters are types of information of paramount importance to the success of search and rescue operations. GPS units are undependable for use in Indoor Positioning Systems due to their associated mar- gins of error in position and their reliance on satellite communication that can be interrupted inside large structures. There are few other techniques like dead reck- oning, Wifi and bluetooth based triangulation, Structure from Motion (SFM) based scene reconstruction for Indoor positioning system. However due to high temper- atures, the rapidly changing environment of fires, and low parallax in the thermal images, the ...


Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn 2018 HU University of Applied Science

Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn

Communications of the IIMA

In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.


Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear 2018 Embry-Riddle Aeronautical University

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia was ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley 2018 Embry-Riddle Aeronautical University

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee 2018 Embry-Riddle Aeronautical University

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online ...


Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan 2018 Southern Methodist University

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries ...


Digital Commons powered by bepress