Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

609 Full-Text Articles 731 Authors 216158 Downloads 51 Institutions

All Articles in Computational Engineering

Faceted Search

609 full-text articles. Page 1 of 23.

Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed 2016 WMU

Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Modern day analytics deals with big datasets from diverse fields. For many application the data is in the form of an array which consists of large number of smaller arrays. Existing techniques focus on sorting a single large array and cannot be used for sorting large number of smaller arrays in an efficient manner. Currently no such algorithm is available which can sort such large number of arrays utilizing the massively parallel architecture of GPU devices. In this paper we present a highly scalable parallel algorithm, called GPU-ArraySort, for sorting large number of arrays using a GPU. Our algorithm performs ...


Least Squares Spectral Element Method For Laminar And Turbulent Flows, –Continuous And Discontinuous Approaches–, Jaber Javanshir Hasbestan 2016 University of Tennessee at Chattanooga

Least Squares Spectral Element Method For Laminar And Turbulent Flows, –Continuous And Discontinuous Approaches–, Jaber Javanshir Hasbestan

Masters Theses and Doctoral Dissertations

In this research, application of a least squares spectral element method for compressible laminar and turbulent flow problems is investigated. For the turbulent Reynolds Averaged Navier-Stokes (RANS), a modified Spalart-Allmaras (SA) turbulence model is employed and integrated with the mean flow equations in a segregated fashion. Two different approaches are presented for solving the SA model using the least squares method. The first method represents a simple rearrangement of the equation. However, proper arrangement of the SAmodel is required in order to produce a stable scheme for the least squares methodology. The second approach is into divide the SA equation ...


Solution Of Fully-Coupled Shallow Water Equations And Contaminant Transport Using A Primitive Variable Riemann Solver And A Semi-Discrete Supg Method, Faranak Behzadi 2016 University of Tennessee at Chattanooga

Solution Of Fully-Coupled Shallow Water Equations And Contaminant Transport Using A Primitive Variable Riemann Solver And A Semi-Discrete Supg Method, Faranak Behzadi

Masters Theses and Doctoral Dissertations

In the present dissertation, a finite volume and a finite element model are developed and tuned for the solution of the fully-coupled two-dimensional Shallow Water and Contaminant transport Equations with arbitrary bed topography and wetting-drying fronts. A Riemann-solver finite volume scheme, using primitive variables rather than conserved variables, and a semi-discrete Streamline Upwind Petrov-Galerkin (SUPG) method in finite element context are applied to compare the performance of these two numerical models. The Riemann-solver scheme is based on the unstructured finite volume discretization using primitive-variable Roe-flux approximation with an entropy fix. Second-order accuracy in space and time, an implicit scheme based ...


Strategies For Protecting Intellectual Property When Using Cuda Applications On Graphics Processing Units, xavier bellekens 2016 Abertay University

Strategies For Protecting Intellectual Property When Using Cuda Applications On Graphics Processing Units, Xavier Bellekens

xavier bellekens

Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased
their use for general purpose computation, as companies look to take advantage of big data processing techniques.
This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators
examining the operation of software. The ability to carry out reverse-engineering of software is of great importance
within the security and forensics elds, particularly when investigating malicious software or carrying out forensic
analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Unied Device ...


A Compact Bandpass Filter Based On Fractal Defected Ground Structure Resonators, Jawad K. Ali, Hadi T. Ziboon 2016 Department of Electrical Engineering, University of Technology, Iraq

A Compact Bandpass Filter Based On Fractal Defected Ground Structure Resonators, Jawad K. Ali, Hadi T. Ziboon

Professor Jawad K. Ali

In this paper, Minkowski fractal based defected ground structure (DGS) resonators are adopted
to design compact size microstrip bandpass filters (BPF) as a candidate for use in wireless
communication applications. Up to the second iteration Minkowski fractal based two coupled
resonators have been adopted to design compact size microstrip BPFs. The different iteration
fractal DGS structures have been modeled and their performances have been evaluated using the
commercially available EM simulator, IE3D. This simulator performs electromagnetic analysis
using the method of moments (MoM). Simulation results show that the proposed fractal based
DGS resonators can be used to construct compact microstrip ...


Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, Katarina Grolinger, Miriam AM Capretz, Luke Seewald 2016 Western University

Energy Consumption Prediction With Big Data: Balancing Prediction Accuracy And Computational Resources, Katarina Grolinger, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

In recent years, advances in sensor technologies and expansion of smart meters have resulted in massive growth of energy data sets. These Big Data have created new opportunities for energy prediction, but at the same time, they impose new challenges for traditional technologies. On the other hand, new approaches for handling and processing these Big Data have emerged, such as MapReduce, Spark, Storm, and Oxdata H2O. This paper explores how findings from machine learning with Big Data can benefit energy consumption prediction. An approach based on local learning with support vector regression (SVR) is presented. Although local learning itself is ...


Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl 2016 University of Texas at Austin

Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl

Jay Gopalakrishnan

In this concluding part of a series of papers on tetrahedral polynomial extension operators, the existence of a polynomial extension operator in the Sobolev space H(div) is proven constructively. Specifically, on any tetrahedron K, given a function w on the boundary ∂K that is a polynomial on each face, the extension operator applied to w gives a vector function whose components are polynomials of at most the same degree in the tetrahedron. The vector function is an extension in the sense that the trace of its normal component on the boundary ∂K coincides with w. Furthermore, the extension operator ...


Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl 2016 University of Texas at Austin

Polynomial Extension Operators. Part Iii, Leszek Demkowicz, Jay Gopalakrishnan, Joachim Schöberl

Jay Gopalakrishnan

In this concluding part of a series of papers on tetrahedral polynomial extension operators, the existence of a polynomial extension operator in the Sobolev space H(div) is proven constructively. Specifically, on any tetrahedron K, given a function w on the boundary ∂K that is a polynomial on each face, the extension operator applied to w gives a vector function whose components are polynomials of at most the same degree in the tetrahedron. The vector function is an extension in the sense that the trace of its normal component on the boundary ∂K coincides with w. Furthermore, the extension operator ...


A Class Of Discontinuous Petrov–Galerkin Methods. Part Iii: Adaptivity, Leszek Demkowicz, Jay Gopalakrishnan, Antti H. Niemi 2016 University of Texas at Austin

A Class Of Discontinuous Petrov–Galerkin Methods. Part Iii: Adaptivity, Leszek Demkowicz, Jay Gopalakrishnan, Antti H. Niemi

Jay Gopalakrishnan

We continue our theoretical and numerical study on the Discontinuous Petrov–Galerkin method with optimal test functions in context of 1D and 2D convection-dominated diffusion problems and hp-adaptivity. With a proper choice of the norm for the test space, we prove robustness (uniform stability with respect to the diffusion parameter) and mesh-independence of the energy norm of the FE error for the 1D problem. With hp-adaptivity and a proper scaling of the norms for the test functions, we establish new limits for solving convection-dominated diffusion problems numerically: for 1D and for 2D problems. The adaptive process is fully automatic and ...


Commuting By Customized Bus: A Comparative Analysis With Private Car And Conventional Public Transport In Two Cities, Tao Liu, Avishai Ceder, Romain Bologna, Benjamin Cabantous 2016 University of Auckland

Commuting By Customized Bus: A Comparative Analysis With Private Car And Conventional Public Transport In Two Cities, Tao Liu, Avishai Ceder, Romain Bologna, Benjamin Cabantous

Journal of Public Transportation

Commuting is a major component in the creation of traffic and travel problems. Thus, more attention should be given to its practice. Private car (PC) transport, the dominant mode of commuting in most of the world’s major cities, creates traffic-related social problems such as traffic congestion, traffic fatalities and injuries, and adverse environmental impacts. This study proposes a novel commuting travel mode—a customized bus (CB) transit system that provides advanced, personalized, and flexible demand-interactive minibus service using Internet, telephone, and smartphone apps. The aim was to assess and compare the performance of CB with PC and with conventional ...


Cashtag Ios Application, Kevin J. Tsui 2016 California Polytechnic State University, San Luis Obispo

Cashtag Ios Application, Kevin J. Tsui

Computer Science

An iOS Application meant to help manage cash purchases/transactions.


High-Low, Cameron Burwell, Bryce Cheng-Campbell 2016 California Polytechnic State University, San Luis Obispo

High-Low, Cameron Burwell, Bryce Cheng-Campbell

Computer Science

The card game High-Low is a cooperative game that provides a unique problem of where all players have partial information and build off other players guesses to win the game. This problem lends itself to creating an AI bot that can play the game with other human players. By making decisions that change as the other players make guesses through the rounds, we have created an AI bot that plays the game with a good degree of accuracy.


Automatic Generation And Grading Of Programming Exercises, Andrew DuFrene 2016 California Polytechnic State University, San Luis Obispo

Automatic Generation And Grading Of Programming Exercises, Andrew Dufrene

Computer Science

In our current age of technological advances, and rising education costs, it is becoming increasingly beneficial to use technology to aid in education, usually through automated lectures or grading. One missing feature from this automated education is complex grading and problem generation. The main objective of this project is to create a program that can automatically generate and grade problems of varying difficulties based on the topic of programming for loops. The project solution was created as a program designed for use in Dr. Clinton Staley’s Intelligent Homework System, which is used precisely for automated exercise grading and generation ...


Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet 2016 California Polytechnic State University, San Luis Obispo

Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

Master's Theses and Project Reports

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration ...


The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky 2016 California Polytechnic State University, San Luis Obispo

The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

Master's Theses and Project Reports

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time ...


A Compact Dual-Band Antenna With Fractal Slot Annular Ring And Defected Ground Structure, Mahmood T. Yassen, Mohammed R. Hussan, Hussain A. Hammas, Jawad K. Ali 2016 Department of Electrical Engineering, University of Technology, Iraq

A Compact Dual-Band Antenna With Fractal Slot Annular Ring And Defected Ground Structure, Mahmood T. Yassen, Mohammed R. Hussan, Hussain A. Hammas, Jawad K. Ali

Professor Jawad K. Ali

An innovated way for designing a dual band slot antenna has been adopted to serve the wireless communication applications in this paper. The intended design of the proposed antenna is based on the annular slot-ring with a Koch snowflake fractal geometry of the third iteration applied to its outer and inner perimeters. The proposed antenna has a compact size of (40 × 40 × 1.6) mm3. The antenna slot structure has been etched on the ground plane of an FR-4 substrate with relative permittivity of 4.4 and 1.6 mm thickness. On the other side of the substrate, a microstrip ...


User-Composable Electronic Health Record Improves Efficiency Of Clinician Data Viewing For Patient Case Appraisal: A Mixed-Methods Study, Yalini Senathirajah, David R. Kaufman, Suzanne R. Bakken 2016 SUNY Downstate Medical Center

User-Composable Electronic Health Record Improves Efficiency Of Clinician Data Viewing For Patient Case Appraisal: A Mixed-Methods Study, Yalini Senathirajah, David R. Kaufman, Suzanne R. Bakken

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Background: Challenges in the design of electronic health records (EHRs) include designing usable systems that must meet the complex, rapidly changing, and high-stakes information needs of clinicians. The ability to move and assemble elements together on the same page has significant human-computer interaction (HCI) and efficiency advantages, and can mitigate the problems of negotiating multiple fixed screens and the associated cognitive burdens.

Objective: We compare MedWISE—a novel EHR that supports user-composable displays—with a conventional EHR in terms of the number of repeat views of data elements for patient case appraisal.

Design and Methods: The study used mixed-methods for ...


A Stabilized Finite Element Dynamic Overset Method For The Navier-Stokes Equations, Chao Liu 2016 University of Tennessee at Chattanooga

A Stabilized Finite Element Dynamic Overset Method For The Navier-Stokes Equations, Chao Liu

Masters Theses and Doctoral Dissertations

In terms of mesh resolution requirements, higher-order finite element discretization methods offer a more economic means of obtaining accurate simulations and/or to resolve physics at scales not possible with lower-order schemes. For simulations that may have large relative motion between multiple bodies, overset grid methods have demonstrated distinct advantages over mesh movement strategies. Combining these approaches offers the ability to accurately resolve the flow phenomena and interaction that may occur during unsteady moving boundary simulations. Additionally, overset grid techniques when utilized within a finite element setting mitigate many of the difficulties encountered in finite volume implementations. This research presents ...


Improving Ventricular Catheter Design Through Computational Fluid Dynamics, Sofy Hefets Weisenberg 2016 University of Tennessee - Knoxville

Improving Ventricular Catheter Design Through Computational Fluid Dynamics, Sofy Hefets Weisenberg

Masters Theses

Cerebrospinal fluid (CSF) shunts are fully implantable medical devices that are used to treat patients suffering from conditions characterized by elevated intracranial pressure, such as hydrocephalus. In cases of shunt failure or malfunction, patients are often required to endure one or more revision surgeries to replace all or part of the shunt. One of the primary causes of CSF shunt failure is obstruction of the ventricular catheter, a component of the shunt system implanted directly into the brain's ventricular system. This work aims to improve the design of ventricular catheters in order to reduce the incidence of catheter obstruction ...


Droplet Generation At Megahertz Frequencies, John C. Miers 2016 University of Arkansas, Fayetteville

Droplet Generation At Megahertz Frequencies, John C. Miers

Mechanical Engineering Undergraduate Honors Theses

Droplet formation has been a fascinating subject to scientists for centuries due to its natural beauty and importance to both scientific and industrial applications, such as inkjet printing, reagent deposition, and spray cooling. However, the droplet generation frequency of common drop-on-demand jetting techniques is mostly limited to ~10 kHz. This paper presents an investigation of the possibility of jetting at megahertz frequencies in order to boost the productivity of drop-on-demand material deposition by ~100 times. The focus of this paper is to understand the limitations of generating droplets at a megahertz frequency and to explore possible solutions for overcoming these ...


Digital Commons powered by bepress