Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

843 Full-Text Articles 1,180 Authors 458,142 Downloads 91 Institutions

All Articles in Other Computer Engineering

Faceted Search

843 full-text articles. Page 8 of 36.

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González 2018 Montemorelos University

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland 2018 Nova Southeastern University

The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland

Simon Cleveland, Ph.D.

This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample ...


Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, Cha-Seung Jun, Byung-Il Kwon, Ohbong Kwon 2018 LG Electronics Inc.

Tolerance Sensitivity Analysis And Robust Optimal Design Method Of A Surface-Mounted Permanent Magnet Motor By Using A Hybrid Response Surface Method Considering Manufacturing Tolerances, Cha-Seung Jun, Byung-Il Kwon, Ohbong Kwon

Publications and Research

This paper presents a robust optimal design method using a hybrid response surface method (H-RSM) which directly finds an optimal point satisfying a target Z-value or a probability of failure. Through three steps, this paper achieves the goal that is to increase the open-circuit airgap flux (OCAF) in a surface-mounted permanent magnet motor and decrease its variation caused by variations of the airgap lengths including an additional one between permanent magnets and rotor back yoke. First, the OCAF equation is derived from the magnetic equivalent circuit (MEC) considering the additional airgap. Then, the equation is validated by comparing its results ...


Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab 2018 James Madison University

Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab

Masters Theses

Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on ...


Solar And Rain Catching Canopy. Urban Oasis, Afolabi Ibitoye, Langston Clark, Elena Zimareva, Evan Banks, Alexander Aptekar 2018 CUNY New York City College of Technology

Solar And Rain Catching Canopy. Urban Oasis, Afolabi Ibitoye, Langston Clark, Elena Zimareva, Evan Banks, Alexander Aptekar

Publications and Research

The Urban Oasis is designed to work within existing “pocket parks” in New York City as a combined rainwater collector, personal electronics charging station and resting designation for New Yorkers. Intended to not only lessen the demand on the city power grid by using renewable energy to charge devices, the urban oasis is also intended to mitigate grey water overfill in New York’s combined sewer system and, in general, serve as a model for responsible environmental stewardship in urban areas.

The important technical aspects of the canopy specifically analyzed were:

a) how much rainwater could the canopy be expected ...


Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, Michael J. Curcio 2018 College of William and Mary

Clarity: An Exploration Of Semantic Information Encoded In Mobile Application Guis, Michael J. Curcio

Undergraduate Honors Theses

Upon installing a mobile application, human beings are able, to a great extent, to know immediately what the subcomponents of the screen do. They know what buttons return them to the previous screen, which ones submit their log in information, and which brings up the menu. This is the result of a combination of intuitive design and cross-platform design standards which allow users to draw on previous experience. Regardless, the fact that humans are able to understand the functionality of screen components at a glance suggests that there is semantic information encode into a mobile application’s GUI. In this ...


The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz 2018 Iowa State University

The 3d Abstract Tile Assembly Model Is Intrinsically Universal, Aaron Koch, Daniel Hader, Matthew J. Patitz

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we prove that the three-dimensional abstract Tile Assembly Model (3DaTAM) is intrinsically universal. This means that there is a universal tile set in the 3DaTAM which can be used to simulate any 3DaTAM system. This result adds to a body of work on the intrinsic universality of models of self-assembly, and is specifically motivated by a result in FOCS 2016 showing that any intrinsically universal tile set for the 2DaTAM requires nondeterminism (i.e. undirectedness) even when simulating directed systems. To prove our result we have not only designed, but also fully implemented what we believe to ...


Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith 2018 University of Arkansas, Fayetteville

Comparison Of Google Image Search And Resnet Image Classification Using Image Similarity Metrics, David Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

In this paper, we compare the results of ResNet image classification with the results of Google Image search. We created a collection of 1,000 images by performing ten Google Image searches with a variety of search terms. We classified each of these images using ResNet and inspected the results. The ResNet classifier predicted the category that matched the search term of the image 77.5% of the time. In our best case, with the search term “forklift”, the classifier categorized 92 of the 100 images as forklifts. In the worst case, for the category “hammer”, the classifier matched the ...


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman 2018 University of Louisville

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The ...


Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao 2018 University of Maine

Detailed Power Measurement With Arm Embedded Boards, Yanxiang Mao

Electronic Theses and Dissertations

Power and energy are becoming important considerations in today's electronic equipment. The amount of power required to run a supercomputer for an hour could supply an ordinary household for many months. The need for low-power computing also extends to smaller devices, such as mobile phones, laptops and embedded devices.

In order to optimize power usage of electronic equipment, we need to collect information on the power consumption of these devices. Unfortunately it is not easy to do this on modern computing systems. Existing measuring equipment is often expensive, inaccurate, and difficult to operate. The main goal of this project ...


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels 2018 Southern Methodist University

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short ...


Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel 2018 Louisiana State University and Agricultural and Mechanical College

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel

LSU Master's Theses

A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary ...


Gradel, Emily R. Wolf, Christopher D. Brauns II, Timothy G. Smith II, Emmett Z. Budd 2018 Cedarville University

Gradel, Emily R. Wolf, Christopher D. Brauns Ii, Timothy G. Smith Ii, Emmett Z. Budd

The Research and Scholarship Symposium (2013-2019)

A major problem facing Computer Science faculty members at Cedarville University is grading student assignments. Specifically, grading programming assignments can be a repetitive, time-consuming process which makes it prime for automation. Professors need a web application that takes student code, compiles it, and compares the output to what the professors provides as correct. Gradel, a senior design project, allows students to submit their code online and receive instant feedback based on professor-designed test cases. Furthermore, professors need to be able to keep track of what grades students earn on their projects, which is functionality Gradel provides. In addition to allowing ...


The Computer Modeling Of A Space Habitat: The City College Experience, Orlando McAllister 2018 College of New Rochelle

The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister

Orlando McAllister

No abstract provided.


Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani 2018 Louisiana State University and Agricultural and Mechanical College

Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani

LSU Doctoral Dissertations

In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.

In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the ...


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki 2018 Cape Peninsula University of Technology, Cape Town

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two ...


A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou 2018 Beijing Normal University

A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou

Journal of Digital Forensics, Security and Law

The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our ...


Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar 2018 Louisiana State University and Agricultural and Mechanical College

Evaluating Classifiers' Optimal Performances Over A Range Of Misclassification Costs By Using Cost-Sensitive Classification, Ramy Al-Saffar

LSU Master's Theses

We believe that using the classification accuracy is not enough to evaluate the performances of classification algorithms. It can be misleading due to overlooking an important element which is the cost if classification is inaccurate. Furthermore, the Receiver Operational Characteristic (ROC) is one of the most popular graphs used to evaluate classifiers performances. However, one of the biggest ROC’s shortcomings is the assumption of equal costs for all misclassified data. Therefore, our goal is to reduce the total cost of decision making by selecting the classifier that has the least total misclassification cost. Nevertheless, the exact misclassification cost is ...


The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, SHI SHA 2018 Florida International University

The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, Shi Sha

FIU Electronic Theses and Dissertations

Over the past decades, the shrinking transistor size enabled more transistors to be integrated into an IC chip, to achieve higher and higher computing performances. However, the semiconductor industry is now reaching a saturation point of Moore’s Law largely due to soaring power consumption and heat dissipation, among other factors. High chip temperature not only significantly increases packing/cooling cost, degrades system performance and reliability, but also increases the energy consumption and even damages the chip permanently. Although designing 2D and even 3D multi-core processors helps to lower the power/thermal barrier for single-core architectures by exploring the thread ...


An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon 2018 University of Nebraska-Lincoln

An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon

Honors Theses, University of Nebraska-Lincoln

The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.

Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.


Digital Commons powered by bepress