Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 12802

Full-Text Articles in Computer Engineering

An Approach To Fast Multi-Robot Exploration In Buildings With Inaccessible Spaces, Matt Mcneill, Damian Lyons Dec 2019

An Approach To Fast Multi-Robot Exploration In Buildings With Inaccessible Spaces, Matt Mcneill, Damian Lyons

Faculty Publications

The rapid exploration of unknown environments is a common application of autonomous multi-robot teams. For some types of exploration missions, a mission designer may possess some rudimentary knowledge about the area to be explored. For example, the dimensions of a building may be known, but not its floor layout or the location of furniture and equipment inside. For this type of mission, the Space- Based Potential Field (SBPF) method is an approach to multirobot exploration which leverages a priori knowledge of area bounds to determine robot motion. Explored areas and obstacles exert a repulsive force, and unexplored areas exert an ...


Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah Dec 2019

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah

Publications

Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual ...


Android And Web Application For Tracking Employees, Kaival Dholakia Dec 2019

Android And Web Application For Tracking Employees, Kaival Dholakia

Electronic Theses, Projects, and Dissertations

The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner ...


Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha Dec 2019

Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha

Theses and Dissertations

This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction plays a key role while we derive the networks, thus our technique relies upon our ability to determine when two characters are in conversation. Our process involves encoding plain literary text into the Text Encoding Initiative’s (TEI) XML format, character name identification, conversation and co-occurrence detection, and social network construction. Previous work in social network construction for literature have focused on drama, specifically manually TEI-encoded Shakespearean plays in which character interactions are much easier ...


Robot Simulation Analysis, Jacob Miller, Jeremy Evert Nov 2019

Robot Simulation Analysis, Jacob Miller, Jeremy Evert

Student Research

• Simulate virtual robot for test and analysis

• Analyze SLAM solutions using ROS

• Assemble a functional Turtlebot

• Emphasize projects related to current research trajectories for NASA, and general robotics applications


Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison Nov 2019

Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison

Journal of Network Music and Arts

In 2016, I created an interactive installation called Video Voto Matic. This project was a mashup between the Votomatic voting system and a Roland TR-808 drum machine. To coincide with the 2020 election season, I am currently working on an update of the project that will include a touch screen voting interface and multiple networked stations that also produce audio and video output. The interface will be housed in the same voting booths that once housed the Diebold Accuvote TS. The Diebold Accuvote TS is a screen-based voting machine that does not utilize paper as a backup. Researchers have examined ...


Being Together—Or, Being Less Un-Together—With Networked Music, Rebekah Wilson, Andrew Mcmillan Nov 2019

Being Together—Or, Being Less Un-Together—With Networked Music, Rebekah Wilson, Andrew Mcmillan

Journal of Network Music and Arts

When musicians cannot travel to another location where other musicians are, they generally assume that this means they cannot perform music together—even while the technology exists to allow them to do so. The perception that Internet technology is not suited for music performance is due to a lack of exposure on navigating the limitations specific to networked music, along with the cultural belief that latency is incompatible with music performance. Many groups, however, have successfully created networked music performance systems. Such systems are particularly interesting in affording new musical and social opportunities in cases when musicians cannot travel due ...


Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice Nov 2019

Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice

Journal of Network Music and Arts

Participation in conferences is an elemental component of professional life throughout the world. Two problems offset the social synergy gained from attending a far-away gathering of like-minded people. The first is the highly pronounced carbon footprint from air travel, and the second is the expense involved to participate in a conference which may be on another continent. These factors prevent many from participating who could otherwise benefit as well as contribute. As videoconferencing becomes more common and more sophisticated, it will serve as an alternative that not only benefits constituencies, but will expand the reach of a conference to more ...


Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler Nov 2019

Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler

Journal of Network Music and Arts

Under the conditions of its geographic distribution, the “telematic performance” can be regarded as a remediation of traditional concert, theater or dance formats. Conversely, and as this paper argues, the telematic performance can also be understood as an artistic format of its own right, one which then can serve as a trope for social interaction under the conditions of critical posthumanism. To gain a wider perspective, this paper analyzes Alan Turing’s “Imitation Game” from his seminal article Computing Machinery and Intelligence, 1950, proposing it as an early conceptualization of a telematic performance. This against-the-grain reading of Turing’s text ...


Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius Nov 2019

Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius

Journal of Network Music and Arts

INTIMAL is an interactive system for relational listening, which integrates physical-virtual interfaces for people to sonically improvise between distant locations. The aim is to embrace two key aspects in the context of human migration: the sense of place and the sense of presence. This paper reflects on the use of INTIMAL in a long-distance improvisation between the cities of Oslo, Barcelona and London in May 2019. This improvisation was performed by nine Colombian migrant women, who had been involved in a research process using the Deep Listening® practice developed by Pauline Oliveros. Here we describe the performance setting and the ...


Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon Nov 2019

Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon

Journal of Network Music and Arts

No abstract provided.


Editorial, Sarah Weaver Nov 2019

Editorial, Sarah Weaver

Journal of Network Music and Arts

Welcome to the Journal of Network Music and Arts (JONMA). JONMA is a peer-reviewed open access digital research journal published by Stony Brook University. Network Music and Arts utilize the Internet and related technologies as an artistic medium for works created for this platform. JONMA will publish research by artists, technologists, educators, and related scholars. The journal content will include articles, audio and video documentation, and reviews for books and recordings.


On Privacy Of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, Anil Vikram Nov 2019

On Privacy Of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, Anil Vikram

Ye Zhu

Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmissions when silence is detected. However, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new class of traffic analysis attacks to encrypted speech communications with the goal of detecting speakers of encrypted speech communications. These attacks are based on packet timing information only and the attacks can detect speakers of speech communications made with different codecs. We evaluate the proposed attacks with ...


Dynamic Modeling, Parameter Estimation And Control Of A Leg Prosthesis Test Robot, Hanz Richter, Daniel J. Simon, William A. Smith, Sergey Samorezov Nov 2019

Dynamic Modeling, Parameter Estimation And Control Of A Leg Prosthesis Test Robot, Hanz Richter, Daniel J. Simon, William A. Smith, Sergey Samorezov

Daniel J. Simon

Robotic testing can facilitate the development of new concepts, designs and control systems for prosthetic limbs. Human subject test clearances, safety and the lack of repeatability associated with human trials can be reduced or eliminated with automated testing, and test modalities are possible which are dangerous or inconvenient to attempt with patients. This paper describes the development, modeling, parameter estimation and control of a robot capable of reproducing two degree-of-freedom hip motion in the sagittal plane. Hip vertical displacement and thigh angle motion profiles are applied to a transfemoral prosthesis attached to the robot. A treadmill is used as walking ...


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the ...


Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird Nov 2019

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird

Student Works

Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both ...


#49 - Creaton And Analysis Of 3-Dimensional Thermal Models, Bradley Andrew, Ryan S. Elliott Nov 2019

#49 - Creaton And Analysis Of 3-Dimensional Thermal Models, Bradley Andrew, Ryan S. Elliott

Georgia Undergraduate Research Conference (GURC)

According to the European Commissions, the largest potential saving of energy lies within commercial and residential buildings. A considerable amount of energy loss from buildings is due to heat or infrared radiation. For this reason, we have been collecting infrared data and creating 3-dimensional models of various structures located on the University of North Georgia Dahlonega campus. Images and data were obtained using a drone and a FLIR Pro infrared camera. Using a specialized software, we were able to analyze infrared images. Through the combined use of Agisoft Metashape and many high-resolution infrared images, a 3D model with thermal data ...


Pneumothorax Radiograph Diagnosis Utilizing Deep Convolutional Neural Network, Ziqi Wang Nov 2019

Pneumothorax Radiograph Diagnosis Utilizing Deep Convolutional Neural Network, Ziqi Wang

Georgia Undergraduate Research Conference (GURC)

Pneumothorax is a life-threatening respiratory disease caused by physical trauma to the chest or as a complication of medical or surgical intervention (Zarogoulidis, 2014). Despite many available methods, a chest radiograph remains a primary method used for diagnosis. Although this technique is commonly used, it is challenging to diagnose based upon chest radiographs. Highly trained specialists are needed to review the chest radiographs which tends to create a large amount of additional work. Hence, in this study, our goal is to develop an algorithm using Deep Convolutional Neural Networks (DCNNs) to detect visual signs for pneumothorax in medical images and ...


Enhancing Cpr Training: Development And Assessment Of An Affordable, Open-Source Real-Time Feedback Manikin, Anish Sangari, Nitish Sood, Joseph Andrew Hauger Nov 2019

Enhancing Cpr Training: Development And Assessment Of An Affordable, Open-Source Real-Time Feedback Manikin, Anish Sangari, Nitish Sood, Joseph Andrew Hauger

Georgia Undergraduate Research Conference (GURC)

Cardiopulmonary Resuscitation (CPR) is a life-saving technique used in cases of cardiac arrest. Immediate CPR can increase survival rates two to three-fold. While many CPR training courses use non-electronic CPR manikins, recent literature has shown that training on a real-time feedback CPR manikin improves functional outcomes such as chest compression rate and mean tidal volume. However, current commercially available real-time feedback manikins only measure metrics on chest compressions or can be prohibitively expensive ( >$200). Accordingly, we have designed, constructed, and tested a low-cost Arduino microcontroller-based CPR manikin that provides real-time feedback to trainees on eight critical metrics including force of ...


Simphysics, Taylor Woods, Maidel Fletes, Mary Elizabeth Harrell, Paul Halford Nov 2019

Simphysics, Taylor Woods, Maidel Fletes, Mary Elizabeth Harrell, Paul Halford

Georgia Undergraduate Research Conference (GURC)

Understanding and interpreting relationships and functional trends with 2-D graphs are foundational skills in STEM fields, in other sciences and in all disciplines that utilize data analysis. Introductory physics courses regularly start with the topic of kinematics which heavily utilizes 2-D graphs that describe motion. This is why difficulties that students face in understanding 2-D graphs surface early on in physics. Yet, for this same reason kinematics can be used as a great opportunity to teach graphing skills in general. The primary goal of this project is to develop an interactive intelligent tutoring system (PhysicsSim) that makes use of kinematics ...


Electronic Data Capture And Study Management, William A. Mattingly Nov 2019

Electronic Data Capture And Study Management, William A. Mattingly

Division of Infectious Diseases

Electronic Data Capture (EDC) is the process of recording data from a primary data source into a computerized system for improved reliability, security, and convenience. Data stored in EDC systems are used for analysis and, in the case of clinical studies, are an important part of the development pipeline for new drugs and medical devices. This text provides an introduction to data capture and the management of a scientific study using the popular EDC solution REDCap.


Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond Smith Nov 2019

Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond Smith

Research Collection Lee Kong Chian School Of Business

Earlier, business was not quite as dynamic, employment was intended for the long-term, and the idea of pay linked to performance was quite a dependable model. But as we examine the tradition of performance management in light of today's digital business models, there are a number of new questions that emerge.


Maximizing Multifaceted Network Influence, Yuchen Li, Ju Fan, George V. Ovchinnikov, Panagiotis Karras Nov 2019

Maximizing Multifaceted Network Influence, Yuchen Li, Ju Fan, George V. Ovchinnikov, Panagiotis Karras

Research Collection School Of Information Systems

An information dissemination campaign is often multifaceted, involving several facets or pieces of information disseminating from different sources. The question then arises, how should we assign such pieces to eligible sources so as to achieve the best viral dissemination results? Past research has studied the problem of Influence Maximization (IM), which is to select a set of k promoters that maximizes the expected reach of a message over a network. However, in this classical IM problem, each promoter spreads out the same unitary piece of information. In this paper, we propose the Optimal Influential Pieces Assignment (OIPA) problem, which is ...


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic ...


Web-Based Ppgis For Wilhelmsburg, Germany: An Integration Of Interactive Gis-Based Maps With An Online Questionnaire, Alenka Poplin Oct 2019

Web-Based Ppgis For Wilhelmsburg, Germany: An Integration Of Interactive Gis-Based Maps With An Online Questionnaire, Alenka Poplin

Alenka Poplin

The aim of this paper is to study the implementation of a Web-based public participation geographic information system (PPGIS) with open-source technology and its integration with an online questionnaire. Its theoretical foundations are based on previous work in PPGISs, online surveys, field research, and map-based surveys. The concept of a PPGIS that interlinks interactive GIS maps with an online questionnaire was developed. The concept was implemented with open-source technology and tested in a public participation process designed with the European project SWITCH. The study case was taken from a city district, Wilhelmsburg, in Hamburg, Germany. The combination of the GIS ...


Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao Oct 2019

Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao

Posters-at-the-Capitol

Abstract

The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We then propose three ...


Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun Oct 2019

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun

Houbing Song

Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.

In this paper, we propose a new CPS design ...


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this ...


Mobile Ad Hoc Networks In Transportation Data Collection And Dissemination, Kontigue Konte Oct 2019

Mobile Ad Hoc Networks In Transportation Data Collection And Dissemination, Kontigue Konte

Theses and Dissertations

The field of transportation is rapidly changing with new opportunities for systems solutions and emerging technologies. The global economic impact of congestion and accidents are significant. Improved means are needed to solve them. Combined with the increasing numbers of vehicles on the road, the net economic impact is measured in the many billions of dollars. Promising methodologies explored in this thesis include the use of the Internet of Things (IoT) and Mobile Ad Hoc Networks (MANET). Interconnecting vehicles using Dedicated Short Range Communication technology (DSRC) brings many benefits. Integrating DSRC into roadway vehicles offers the promise of reducing the problems ...