Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

845 Full-Text Articles 1,181 Authors 458,142 Downloads 92 Institutions

All Articles in Other Computer Engineering

Faceted Search

845 full-text articles. Page 9 of 36.

An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon 2018 University of Nebraska-Lincoln

An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon

Honors Theses, University of Nebraska-Lincoln

The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.

Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.


Plant Identification Using Tensorflow, Kody G. Dangtongdee 2018 California Polytechnic State University, San Luis Obispo

Plant Identification Using Tensorflow, Kody G. Dangtongdee

Computer Engineering

Exploring the diverse nature that is available in San Luis Obispo is one of my favorite activities, however, I often am frustrated that I am unable to identify or learn more about the plants that I appreciate. This project is an attempt at using the concepts of neural networks to create an image classifier which can identify plants. Machine learning is one of the biggest topics in computer science at the moment, and its many uses make it a topic that will continue to be researched for a very long time. Convolutional neural networks are a popular realm of machine ...


Skylux Smartphone Controlled Skylight, James A. Green VI 2018 Cal Poly

Skylux Smartphone Controlled Skylight, James A. Green Vi

Computer Engineering

There are numerous electric skylight openers available for purchase for home-use, but the majority of them are remote based, or operated by a wall-unit. Furthermore, these devices are in hard to reach places, so if one were to lose the remote on a remote operated system, the only option is to contact the manufacturer for a new device. As such, my senior project, in collaboration with Colton Sundstrom’s senior project, build upon our existing capstone project in order to allow operation of the Internet of Things (IoT) device over the internet. Our client, Richard Murray, was unsatisfied with the ...


Predicting The Vote Using Legislative Speech, Aditya Budhwar 2018 California Polytechnic State University, San Luis Obispo

Predicting The Vote Using Legislative Speech, Aditya Budhwar

Master's Theses and Project Reports

As most dedicated observers of voting bodies like the U.S. Supreme Court can attest, it is possible to guess vote outcomes based on statements made during deliberations or questioning by the voting members. In most forms of representative democracy, citizens can actively petition or lobby their representatives, and that often means understanding their intentions to vote for or against an issue of interest. In some U.S. state legislators, professional lobby groups and dedicated press members are highly informed and engaged, but the process is basically closed to ordinary citizens because they do not have enough background and familiarity ...


Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste 2018 The University of Western Ontario

Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste

Electronic Thesis and Dissertation Repository

The DNA Next Generation Sequencing (NGS) technologies produce data at a low cost, enabling their application to many ambitious fields such as cancer research, disease control, personalized medicine etc. However, even after a decade of research, the modern aligners and assemblers are far from providing efficient and error free genome alignments and assemblies respectively. This is due to the inherent nature of the genome alignment and assembly problem, which involves many complexities. Many algorithms to address this problem have been proposed over the years, but there still is a huge scope for improvement in this research space.

Many new genome ...


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya LeBlanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro 2018 Pacific Northwest National Laboratory

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types ...


A Deep Learning Agent For Games With Hidden Information, Robert A. Mills 2018 Bard College

A Deep Learning Agent For Games With Hidden Information, Robert A. Mills

Senior Projects Spring 2018

The goal of this project is to develop an agent capable of playing a particular game at an above average human level. In order to do so we investigated reinforcement and deep learning techniques for making decisions in discrete action spaces with hidden information. The methods we used to accomplish this goal include a standard word2vec implementation, an alpha-beta minimax tree search, and an LSTM network to evaluate game states. Given just the rules of the game and a vector representation of the game states, the agent learned to play the game by competitive self play. The emergent behavior from ...


Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang 2018 University of Massachusetts Amherst

Multi-Sensor Localization And Tracking In Disaster Management And Indoor Wayfinding For Visually Impaired Users, Zhuorui Yang

Doctoral Dissertations

This dissertation proposes a series of multi-sensor localization and tracking algorithms particularly developed for two important application domains, which are disaster management and indoor wayfinding for blind and visually impaired (BVI) users. For disaster management, we developed two different localization algorithms, one each for Radio Frequency Identification (RFID) and Bluetooth Low Energy (BLE) technology, which enable the disaster management system to track patients in real-time. Both algorithms work in the absence of any pre-deployed infrastructure along with smartphones and wearable devices. Regarding indoor wayfinding for BVI users, we have explored several types of indoor positioning techniques including BLE-based, inertial, visual ...


Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang 2018 Michigan Technological University

Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang

Dissertations, Master's Theses and Master's Reports

Harnessing the heterogeneous data sets would improve system observability. While the current metering infrastructure in distribution network has been utilized for the operational purpose to tackle abnormal events, such as weather-related disturbance, the new normal we face today can be at a greater magnitude. Strengthening the inter-dependencies as well as incorporating new crowd-sourced information can enhance operational aspects such as system reconfigurability under extreme conditions. Such resilience is crucial to the recovery of any catastrophic events. In this dissertation, it is focused on the anomaly of potential foul play within an electrical distribution system, both primary and secondary networks as ...


Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez 2018 University of Nebraska - Lincoln

Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez

Anthropology Faculty Publications

The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept ...


Green Roof Policy Optimization Algorithms And Microsimulations Benefits And Downsides Of Green Roof Incentives And Mandates In San Francisco, Harrison Freund 2018 University of Iowa

Green Roof Policy Optimization Algorithms And Microsimulations Benefits And Downsides Of Green Roof Incentives And Mandates In San Francisco, Harrison Freund

Honors Theses at the University of Iowa

As the 21st Century progresses, developers are becoming more aware of their environmental footprint. As the Green Economy slowly gains its footing, developers will be expected to change current building practices to reflect the increasing demand to adapt to sustainability challenges. One such methodology used by LEED to evaluate the sustainability of a building is the implementation of a green roof, the installment of vegetation on the top of a building. There are many socioecological benefits that justify the implementation of a green roof, which explain why in recent years municipalities have enacted new policies to mandate or incentivize their ...


Blockchain Scalability And Security, Tuyet Duong 2018 Virginia Commonwealth University

Blockchain Scalability And Security, Tuyet Duong

Theses and Dissertations

Cryptocurrencies like Bitcoin have proven to be a phenomenal success. The underlying techniques hold huge promise to change the future of financial transactions, and eventually the way people and companies compute, collaborate, and interact. At the same time, the current Bitcoin-like proof-of-work based blockchain systems are facing many challenges. In more detail, a huge amount of energy/electricity is needed for maintaining the Bitcoin blockchain. In addition, their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption ...


Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma 2018 University of Massachusetts Amherst

Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma

Doctoral Dissertations

Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator.

Transient ...


Power Laws In Complex Graphs: Parsimonious Generative Models, Similarity Testing Algorithms, And The Origins, Shan Lu 2018 University of Massachusetts, Amherst

Power Laws In Complex Graphs: Parsimonious Generative Models, Similarity Testing Algorithms, And The Origins, Shan Lu

Doctoral Dissertations

This dissertation mainly discussed topics related to power law graphs, including graph similarity testing algorithms and power law generative models.

For graph similarity testing, we proposed a method based on the mathematical theory of diffusion over manifolds using random walks over graphs. We show that our method not only distinguishes between graphs with different degree distributions, but also graphs with the same degree distributions. We compare the undirected power law graphs generated by Barabasi-Albert model and directed power law graphs generated by Krapivsky's model to the random graphs generated by Erdos-Renyi model. We also compare power law graphs generated ...


Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan 2018 Claremont Colleges

Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan

CMC Senior Theses

Sentiment analysis has taken on various machine learning approaches in order to optimize accuracy, precision, and recall. However, Long Short-Term Memory (LSTM) Recurrent Neural Networks (RNNs) account for the context of a sentence by using previous predictions as additional input for future sentence predictions. Our approach focused on developing an LSTM RNN that could perform binary sentiment analysis for positively and negatively labeled sentences. In collaboration with Mariam Salloum, I developed a collection of programs to classify individual sentences as either positive or negative. This paper additionally looks into machine learning, neural networks, data preprocessing, implementation, and resulting comparisons.


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan 2018 Cleveland State University

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual ...


Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans 2018 Cleveland State University

Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans

ETD Archive

In recent years, researchers had been inquisitive about the use of technology to enhance the healthcare and wellness of patients with dementia. Dementia symptoms are associated with the decline in thinking skills and memory severe enough to reduce a person’s ability to pay attention and perform daily activities. Progression of dementia can be assessed by monitoring the daily activities of the patients. This thesis encompasses continuous localization and behavioral analysis of patient’s motion pattern over a wide area indoor living space using multiple calibrated Kinect sensors connected over the network. The skeleton data from all the sensor is ...


Existence Of Dependency-Based Attacks In Nodejs Environment, Prachi R. Patel 2018 Iowa State University

Existence Of Dependency-Based Attacks In Nodejs Environment, Prachi R. Patel

Creative Components

Node.js is an open source server-side run-time platform for JavaScript applications. Node.js applications are dependent on several, even hundreds, packages, which in turn have many dependencies. There is always a risk of malicious code hidden in one of these dependencies.

This work analyzes vulnerabilities found in Node.js based applications, discusses basic types of attacks and reports about the assessment of five frequently-used Node.js packages.


Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula 2018 Iowa State University

Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula

Creative Components

There is an increasing demand to utilize modern technology in the eld of transportation to help decrease congestion on roads so that proper measures can be pursued to facilitate lower travel times and an effective utilization of the transportation network. This project aims to develop a solution for real time detection of traffic congestion on a road. The solution captures images from the live feed of traffic cameras situated at various locations and runs a deep learning algorithm to detect whether an image shows traffic congestion. Using a set of these images and a persistence check, the application identifies the ...


Simulation Of Any-To-One Communication Protocol For Wsn In Cooja Simulator Of Contiki Os, Nirupana Naregudam 2018 Iowa State University

Simulation Of Any-To-One Communication Protocol For Wsn In Cooja Simulator Of Contiki Os, Nirupana Naregudam

Creative Components

Increase in the usage Internet of Things has driven lot of importance to wireless sensor networks. Wireless sensor network consists of sensor nodes with low power and low transmission range. Sensor power is the crucial part because if the power goes down, the sensors die out and will not be available for communication. This project deals with sensor nodes which are deployed in an area and there is an external source available for harvesting power. The harvested energy keeps the sensor nodes powered and the communication in the network can sustain for longer time.

This work talks about the simulation ...


Digital Commons powered by bepress