Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

829 Full-Text Articles 1,165 Authors 458,142 Downloads 90 Institutions

All Articles in Other Computer Engineering

Faceted Search

829 full-text articles. Page 7 of 36.

Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science and Software Engineering

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang 2018 California Polytechnic State University, San Luis Obispo

Mastering The Game Of Gomoku Without Human Knowledge, Yuan Wang

Master's Theses and Project Reports

Gomoku, also called Five in a row, is one of the earliest checkerboard games invented by humans. For a long time, it has brought countless pleasures to us. We humans, as players, also created a lot of skills in playing it. Scientists normalize and enter these skills into the computer so that the computer knows how to play Gomoku. However, the computer just plays following the pre-entered skills, it doesn’t know how to develop these skills by itself. Inspired by Google’s AlphaGo Zero, in this thesis, by combining the technologies of Monte Carlo Tree Search, Deep Neural Networks ...


Leave The Features: Take The Cannoli, Jonathan Joseph Catanio 2018 California Polytechnic State University, San Luis Obispo

Leave The Features: Take The Cannoli, Jonathan Joseph Catanio

Master's Theses and Project Reports

Programming languages like Python, JavaScript, and Ruby are becoming increasingly popular due to their dynamic capabilities. These languages are often much easier to learn than other, statically type checked, languages such as C++ or Rust. Unfortunately, these dynamic languages come at the cost of losing compile-time optimizations. Python is arguably the most popular language for data scientists and researchers in the artificial intelligence and machine learning communities. As this research becomes increasingly popular, and the problems these researchers face become increasingly computationally expensive, questions are being raised about the performance of languages like Python. Language features found in Python, more ...


Polycommit: Building Better Habits Through Gamification, Elliot Fiske 2018 California Polytechnic State University, San Luis Obispo

Polycommit: Building Better Habits Through Gamification, Elliot Fiske

Master's Theses and Project Reports

Computer-assisted learning is older than Turing machines, and constantly evolves as technology improves. While some teachers are resistant to using technology in the classroom, “e-learning” techniques are becoming more common in almost every school, from K-12 to universities. As technology becomes more widespread, it becomes crucial to examine the various methodologies of computer-assisted learning and find the techniques that are most effective.

This paper explores the effectiveness of one such methodology, spaced repetition. This technique applies to homework assignments available to students online. We include an exploration of several existing apps that use this technique, and introduce our own novel ...


Vehicle Pseudonym Association Attack Model, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


Resource Brokering In Grid Computing, Adrian T. Bienkowski 2018 The University of Western Ontario

Resource Brokering In Grid Computing, Adrian T. Bienkowski

Electronic Thesis and Dissertation Repository

Grid Computing has emerged in the academia and evolved towards the bases of what is currently known as Cloud Computing and Internet of Things (IoT). The vast collection of resources that provide the nature for Grid Computing environment is very complex; multiple administrative domains control access and set policies to the shared computing resources. It is a decentralized environment with geographically distributed computing and storage resources, where each computing resource can be modeled as an autonomous computing entity, yet collectively can work together. This is a class of Cooperative Distributed Systems (CDS). We extend this by applying characteristic of open ...


Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta 2018 Southern Methodist University

Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta

Computer Science and Engineering Theses and Dissertations

Modern System-on-Chips (SoCs) provide benefits such as reduction in overall system cost, and size, increased performance, and lower power consumption. Increasing complexity of these Integrated Circuits (ICs) has resulted in a higher probability of manufacturing defects. Manufacturing defects can result in the faulty operation of a system. Thus, it is essential to test an IC after it is manufactured to detect any possible faults in it. These SoCs include on-chip embedded instruments that can be used for test, debug, diagnosis, validation, monitoring, characterization, configuration, or functional purposes. IEEE 1687 Std. (IJTAG) provides a standard interface for the reconfigurable access and ...


Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González 2018 Montemorelos University

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland 2018 Nova Southeastern University

The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland

Simon Cleveland, Ph.D.

This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample ...


Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, Cha-Seung Jun, Byung-Il Kwon, Ohbong Kwon 2018 LG Electronics Inc.

Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, Cha-Seung Jun, Byung-Il Kwon, Ohbong Kwon

Publications and Research

This paper presents a robust optimal design method using a hybrid response surface method (H-RSM) which directly finds an optimal point satisfying a target Z-value or a probability of failure. Through three steps, this paper achieves the goal that is to increase the open-circuit airgap flux (OCAF) in a surface-mounted permanent magnet motor and decrease its variation caused by variations of the airgap lengths including an additional one between permanent magnets and rotor back yoke. First, the OCAF equation is derived from the magnetic equivalent circuit (MEC) considering the additional airgap. Then, the equation is validated by comparing its results ...


Solar And Rain Catching Canopy. Urban Oasis, Afolabi Ibitoye, Langston Clark, Elena Zimareva, Evan Banks, Alexander Aptekar 2018 CUNY New York City College of Technology

Solar And Rain Catching Canopy. Urban Oasis, Afolabi Ibitoye, Langston Clark, Elena Zimareva, Evan Banks, Alexander Aptekar

Publications and Research

The Urban Oasis is designed to work within existing “pocket parks” in New York City as a combined rainwater collector, personal electronics charging station and resting designation for New Yorkers. Intended to not only lessen the demand on the city power grid by using renewable energy to charge devices, the urban oasis is also intended to mitigate grey water overfill in New York’s combined sewer system and, in general, serve as a model for responsible environmental stewardship in urban areas.

The important technical aspects of the canopy specifically analyzed were:

a) how much rainwater could the canopy be expected ...


Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab 2018 James Madison University

Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab

Masters Theses

Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on ...


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman 2018 University of Louisville

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The ...


Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, Michael J. Curcio 2018 College of William and Mary

Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, Michael J. Curcio

Undergraduate Honors Theses

Upon installing a mobile application, human beings are able, to a great extent, to know immediately what the subcomponents of the screen do. They know what buttons return them to the previous screen, which ones submit their log in information, and which brings up the menu. This is the result of a combination of intuitive design and cross-platform design standards which allow users to draw on previous experience. Regardless, the fact that humans are able to understand the functionality of screen components at a glance suggests that there is semantic information encode into a mobile application’s GUI. In this ...


The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz 2018 Iowa State University

The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we prove that the three-dimensional abstract Tile Assembly Model (3DaTAM) is intrinsically universal. This means that there is a universal tile set in the 3DaTAM which can be used to simulate any 3DaTAM system. This result adds to a body of work on the intrinsic universality of models of self-assembly, and is specifically motivated by a result in FOCS 2016 showing that any intrinsically universal tile set for the 2DaTAM requires nondeterminism (i.e. undirectedness) even when simulating directed systems. To prove our result we have not only designed, but also fully implemented what we believe to ...


Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith 2018 University of Arkansas, Fayetteville

Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we compare the results of ResNet image classification with the results of Google Image search. We created a collection of 1,000 images by performing ten Google Image searches with a variety of search terms. We classified each of these images using ResNet and inspected the results. The ResNet classifier predicted the category that matched the search term of the image 77.5% of the time. In our best case, with the search term “forklift”, the classifier categorized 92 of the 100 images as forklifts. In the worst case, for the category “hammer”, the classifier matched the ...


Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao 2018 University of Maine

Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao

Electronic Theses and Dissertations

Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.

In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project ...


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels 2018 Southern Methodist University

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short ...


Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel 2018 Louisiana State University and Agricultural and Mechanical College

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel

LSU Master's Theses

A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary ...


Gradel, Emily R. Wolf, Christopher D. Brauns II, Timothy G. Smith II, Emmett Z. Budd 2018 Cedarville University

Gradel, Emily R. Wolf, Christopher D. Brauns Ii, Timothy G. Smith Ii, Emmett Z. Budd

The Research and Scholarship Symposium (2013-2019)

A major problem facing Computer Science faculty members at Cedarville University is grading student assignments. Specifically, grading programming assignments can be a repetitive, time-consuming process which makes it prime for automation. Professors need a web application that takes student code, compiles it, and compares the output to what the professors provides as correct. Gradel, a senior design project, allows students to submit their code online and receive instant feedback based on professor-designed test cases. Furthermore, professors need to be able to keep track of what grades students earn on their projects, which is functionality Gradel provides. In addition to allowing ...


Digital Commons powered by bepress