Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

630 Full-Text Articles 1,037 Authors 284,372 Downloads 80 Institutions

All Articles in Computational Engineering

Faceted Search

630 full-text articles. Page 1 of 29.

Using Principle Component Analysis To Analyze Tertiary And Quaternary Spectral Mixtures, David Burnett 2019 Olivet Nazarene University

Using Principle Component Analysis To Analyze Tertiary And Quaternary Spectral Mixtures, David Burnett

Scholar Week 2016 - present

CRISM images from Mars are expected to contain carbonates such as magnesite. Prior research has been successfully able to determine the approximate percent composition of phyllosilicates in binary lab mixtures using Principle Component Analysis (PCA). In order to expand this model to work on CRISM images, one of preliminary steps is allowing the algorithm to work on mixtures with more than two components, which was the primary purpose of this research.


Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell 2019 St George Police Department

Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists ...


A Framework For Evaluating Model-Driven Self-Adaptive Software Systems, Basel Magableh 2019 Dublin Institute of Technology

A Framework For Evaluating Model-Driven Self-Adaptive Software Systems, Basel Magableh

Articles

In the last few years, Model Driven Development (MDD), Component-based Software Development (CBSD), and context-oriented software have become interesting alternatives for the design and construction of self-adaptive software systems. In general, the ultimate goal of these technologies is to be able to reduce development costs and effort, while improving the modularity, flexibility, adaptability, and reliability of software systems. An analysis of these technologies shows them all to include the principle of the separation of concerns, and their further integration is a key factor to obtaining high-quality and self-adaptable software systems. Each technology identifies different concerns and deals with them separately ...


A Deep Recurrent Q Network Towards Self-Adapting Distributed Microservices Architecture (In Press), Basel Magableh 2019 Dublin Institute of Technology

A Deep Recurrent Q Network Towards Self-Adapting Distributed Microservices Architecture (In Press), Basel Magableh

Articles

One desired aspect of microservices architecture is the ability to self-adapt its own architecture and behaviour in response to changes in the operational environment. To achieve the desired high levels of self-adaptability, this research implements the distributed microservices architectures model, as informed by the MAPE-K model. The proposed architecture employs a multi adaptation agents supported by a centralised controller, that can observe the environment and execute a suitable adaptation action. The adaptation planning is managed by a deep recurrent Q-network (DRQN). It is argued that such integration between DRQN and MDP agents in a MAPE-K model offers distributed microservice architecture ...


Context Oriented Software Middleware, Basel Magableh 2019 Dublin Institute of Technology

Context Oriented Software Middleware, Basel Magableh

Articles

This article proposes a new paradigm for building an adaptive middleware that supports software systems with self-adaptability and dependability. In this article, we wish to explore how far we can support the engineering of self- adaptive applications using a generic and platform-independent middleware architecture provided by non-specialised programming languages such as Context-Oriented Programming (COP), and Aspect-Oriented Programming (AOP), and not limited to a specific platform or framework. This gives the software developers the flexibility to construct a self-adaptive application using a generic and reusable middleware components that employ popular design patterns, instead of forcing the software developers to use a ...


A Multiline Anchor Concept For Floating Offshore Wind Turbines, Casey Fontana 2019 University of Massachusetts Amherst

A Multiline Anchor Concept For Floating Offshore Wind Turbines, Casey Fontana

Doctoral Dissertations

Floating offshore wind turbines (FOWTs) hold great potential for the renewable energy industry, but capital costs remain high. In efforts to increase FOWT substructure efficiency and reduce costs, this thesis investigates a novel multiline anchor concept in which FOWTs share anchors instead of being moored separately. The goal of this thesis is to evaluate the force dynamics, design, and potential cost reduction of the system. Anchor forces are simulated using the NREL 5 MW reference turbine and OC4-DeepCwind semisubmersible platform, and multiline anchor force is computed as the vector sum of the contributing mooring line tensions.

The use of a ...


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski 2018 Wojciech Budzianowski Consulting Services

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali 2018 The University of Western Ontario

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce 2018 Iowa State University

Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce

Civil, Construction and Environmental Engineering Publications

Engineering systems experiencing events of amplitudes higher than 100 gn for a duration under 100 ms, here termed high-rate dynamics, can undergo rapid damaging effects. If the structural health of such systems could be accurately estimated in a timely manner, preventative measures could be employed to minimize adverse effects. For complex high-rate problems, adaptive observers have shown promise due to their capability to deal with nonstationary, noisy, and uncertain systems. However, adaptive observers have slow convergence rates, which impede their applicability to the high-rate problems. To improve on the convergence rate, we propose a variable input space concept for ...


A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver 2018 The University of Southern Mississippi

A Computational Analysis Of The Gradient Concentration Profile Of Deet And The Mosquito Behavioral Response, Brandon Carver

Master's Theses

DEET is a common active ingredient in most spatial repellents. DEET is also a volatile organic compound. DEET prevents mosquitoes from detecting and coming into contact with an human individual. Gas sensing technologies such as metal oxide semiconductor sensors can detect VOCs. The World Health Organization provides the majority of efficacy testing methods. This research adapts methods from the WHO and use of MOS sensors to further understand how and why DEET affects mosquitos. A custom developed system is used to measure DEET dissipation and observe mosquito behavioral response to the DEET. DEET dissipations and mosquito behavior is measured within ...


A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, Jace J. McPherson 2018 University of Arkansas, Fayetteville

A Scalable, Chunk-Based Slicer For Cooperative 3d Printing, Jace J. Mcpherson

Computer Science and Computer Engineering Undergraduate Honors Theses

Cooperative 3D printing is an emerging technology that aims to increase the 3D printing speed and to overcome the size limit of the printable object by having multiple mobile 3D printers (printhead-carrying mobile robots) work together on a single print job on a factory floor. It differs from traditional layer-by-layer 3D printing due to requiring multiple mobile printers to work simultaneously without interfering with each other. Therefore, a new approach for slicing a digital model and generating commands for the mobile printers is needed, which has not been discussed in literature before. We propose a chunk-by-chunk based slicer that divides ...


Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez 2018 University of Arkansas, Fayetteville

Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez

Computer Science and Computer Engineering Undergraduate Honors Theses

Fingerprint identification is one of the most accurate sources of identification, yet it is not widely used in public facilities for security concerns. Moreover, the cost of fingerprint system is inaccessible for small-budget business because of their high cost. Therefore, this study created an open-source solution to secure fingerprint samples in the database while using low-cost hardware components. Locality Sensitive Hashing Algorithms such as ORB and Image hash were compared in this study as a potential alternative to SURF. To test the design, fifteen samples were collected and stored in a database without verifying the quality of the samples. Then ...


Blokus Game Solver, Chin Chao 2018 California Polytechnic State University, San Luis Obispo

Blokus Game Solver, Chin Chao

Computer Engineering

Blokus (officially pronounced as “Block us”) is an abstract strategy board game with transparent Tetris-shaped, color pieces that players are trying to place onto the board. However, the players can only place a piece that touches at least one corner of their own pieces on the board. The ultimate goal of the game is to place as many pieces onto the board as a player can while blocking off the opponent’s ability to place more pieces onto the board. Each player has pieces with different shapes and sizes that can be placed onto the board, where each block within ...


Landmine Detection Using Semi-Supervised Learning., Graham Reid 2018 University of Louisville

Landmine Detection Using Semi-Supervised Learning., Graham Reid

Electronic Theses and Dissertations

Landmine detection is imperative for the preservation of both military and civilian lives. While landmines are easy to place, they are relatively difficult to remove. The classic method of detecting landmines was by using metal-detectors. However, many present-day landmines are composed of little to no metal, necessitating the use of additional technologies. One of the most successful and widely employed technologies is Ground Penetrating Radar (GPR). In order to maximize efficiency of GPR-based landmine detection and minimize wasted effort caused by false alarms, intelligent detection methods such as machine learning are used. Many sophisticated algorithms are developed and employed to ...


A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert 2018 Southwestern Oklahoma State University

A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert

Student Research

Artificial Intelligence(AI) is a growing topic in Computer Science and has many uses in real world applications. One application is using Al, or more specifically Neural Networks to model data and predict outcomes. Neural Networks have been used in the past to predict weather changes, create facial recognition software , and to create self-driving cars. Our project is a validation study of, “Modeling Time Series Data With Deep Fourier Neural Networks” by Gashler and Ashmore, 2016. Here we show that a neural network can be trained to be an effective predictor of weather patterns in Alaska over several years. Our ...


Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, Aly Mousaad Aly 2018 Louisiana State University

Toward Building Resilient, Sustainable, And Smart Infrastructure In The 21st Century, Aly Mousaad Aly

Faculty Publications

In recent years, as a result of significant climate change, stringent windstorms are becoming more frequent than before. Given the threat that windstorms bring to people and property, wind/structural engineering research is imperative to improve the resilience of existing and new infrastructure, for community safety and assets protection. The Windstorm Impact, Science and Engineering (WISE) research program at Louisiana State University (LSU) focuses on creating new knowledge applicable to the mitigation of existing and new infrastructure, to survive and perform optimally under natural hazards. To achieve our research goals, we address two imperious challenges: (i) characterization of realistic wind ...


Dynamic Fracture Of Pmma, Intefacial Failure, And Local Heating, Javad Mehrmashhadi, Longzhen Wang, Florin Bobaru Ph.D. 2018 University of Nebraska - Lincoln

Dynamic Fracture Of Pmma, Intefacial Failure, And Local Heating, Javad Mehrmashhadi, Longzhen Wang, Florin Bobaru Ph.D.

Javad Mehrmashhadi

Recent impact experiments showed the influence of a strong or weak interface in a bi-layered PMMA material has on dynamic fracture mechanisms. We show that a linear elastic with brittle damage peridynamic model, which works very well for glass, leads to crack propagation speeds significantly faster than those measured experimentally in the PMMA system. We propose an explanation for this behavior: localized heating in the region near the crack tip (due to high strain rates) softens the material sufficiently to make a difference. We introduce this effect in our peridynamic model, via a bi-linear bond force-strain relationship, and the computed ...


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto 2018 University of York

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Anthropology Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


Esense 2.0: Modeling Biomimetic Predation With Multi-Agent Multi-Team Distributed Artificial Intelligence, D. Michael Franklin, Derek Martin 2018 Kennesaw State University

Esense 2.0: Modeling Biomimetic Predation With Multi-Agent Multi-Team Distributed Artificial Intelligence, D. Michael Franklin, Derek Martin

Georgia Undergraduate Research Conference (GURC)

Biologic predation is a complex interaction amongst sets of predators and prey operating within the same environment. There are many disparate factors for each member of each set to consider as they interact. Additionally, they each must seek food while avoiding other predators, meaning that they must prioritize their actions based on policies. eSense provides a powerful yet simplistic reinforcement learning algorithm that employs model-based behavior across multiple learning layers. These independent layers split the learning objectives across multiple layers, avoiding the learning-confusion common in many multi-agent systems. The new eSense 2.0 increases the number of layers and the ...


Resource Allocation In The Cognitive Radio Network-Aided Internet Of Things For The Cyber-Physical-Social System: An Efficient Jaya Algorithm, Xiong Luo, Zhijie He, Zhigang Zhao, Long Wang, Weiping Wang, Huansheng Ning, Jenq-Haur Wang, Wenbing Zhao, Jun Zhang 2018 University of Science and Technology Beijing

Resource Allocation In The Cognitive Radio Network-Aided Internet Of Things For The Cyber-Physical-Social System: An Efficient Jaya Algorithm, Xiong Luo, Zhijie He, Zhigang Zhao, Long Wang, Weiping Wang, Huansheng Ning, Jenq-Haur Wang, Wenbing Zhao, Jun Zhang

Electrical Engineering & Computer Science Faculty Publications

Currently, there is a growing demand for the use of communication network bandwidth for the Internet of Things (IoT) within the cyber-physical-social system (CPSS), while needing progressively more powerful technologies for using scarce spectrum resources. Then, cognitive radio networks (CRNs) as one of those important solutions mentioned above, are used to achieve IoT effectively. Generally, dynamic resource allocation plays a crucial role in the design of CRN-aided IoT systems. Aiming at this issue, orthogonal frequency division multiplexing (OFDM) has been identified as one of the successful technologies, which works with a multi-carrier parallel radio transmission strategy. In this article, through ...


Digital Commons powered by bepress