Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

6,203 Full-Text Articles 5,546 Authors 1,614,791 Downloads 101 Institutions

All Articles in Computer Engineering

Faceted Search

6,203 full-text articles. Page 1 of 142.

The Crossroads Of Embracing Content Management: Using The Beaglebone Black Microcomputer To Host Omeka., Michael D. Wells, Craig Rosenbeck 2015 Northern Kentucky University

The Crossroads Of Embracing Content Management: Using The Beaglebone Black Microcomputer To Host Omeka., Michael D. Wells, Craig Rosenbeck

Annual Conference on Information and Religion

As organizations are concerned about managing their content, it would be advantageous to know alternatives to outsourcing the content management to "the cloud". When decisions need to made because of budget or staffing restrictions, alternative solutions can be a challenge. The purpose of this presentation is to explore an alternative solution to host digital content in house for small libraries. This work seeks to explore using the single board computer called "BeagleBone Black", to host the institutional repository software Omeka. There are advantages to being able to host organizational content in house, and this solution could be an alternative that ...


Pl-X (Roborodentia), Kelly Leung, William Luo, Jeffrey Tang 2015 California Polytechnic State University - San Luis Obispo

Pl-X (Roborodentia), Kelly Leung, William Luo, Jeffrey Tang

Computer Engineering

Pl-x is the name of the robot that will be competing in Roborodentia, an annual autonomous robot competition. This year the competition involves moving rings from one end of a course to the opposite end of the course.


Antics: A Cross-Platform Mobile Game, Gerren D. Willis 2015 California State University - San Bernardino

Antics: A Cross-Platform Mobile Game, Gerren D. Willis

Electronic Theses, Projects, and Dissertations

Recent technologies have made it increasingly easier for independent developers to build and deploy gaming applications for mobile devices. The focus of this master's project is to investigate one such set of technologies, which include Adobe AIR, Starling and Feathers, that allow games to be written in ActionScript and run on both Android and iOS devices. For this purpose, I chose to use these technologies to design and implement the game ANTics proposed by Whim Independent Studios, a start up game studio in San Bernardino. ANTics is written in ActionScript and runs on Adobe AIR. It can be deployed ...


Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett 2015 University of Connecticut - Storrs

Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett

UConn Libraries Presentations

No abstract provided.


Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett 2015 University of Connecticut - Storrs

Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett

UConn Libraries Published Works

Though the roots of photogrammetry can be traced back to photography’s earliest days, only recent advances in both digital technology and software applications have put the possibilities of 3D modeling from 2D source images in the hands of the greater cultural heritage community. The possibilities of such 3D digital rendering are many. With these possibilities come unique digital preservation challenges. This study explores basic close-range photogrammetry as applied to sample archival objects. Additionally, the latest BagIt and ZIP-based bundling formats along with repository-based solutions are also surveyed as potential 3D data management and archiving aggregators for resulting 3D models.


Design And Development Of Personal Geoservices For Universities, James Carswell, Andrea Ballatore, Thoa Pham, Junjun Yin, Linh TruongHong 2015 Dublin Institute of Technology

Design And Development Of Personal Geoservices For Universities, James Carswell, Andrea Ballatore, Thoa Pham, Junjun Yin, Linh Truonghong

Books/Book chapters

Personal GeoServices are emerging as an interaction paradigm linking users to information rich environments like a university campus or to Big Data sources like the Internet of Things by delivering spatially intelligent web-services. OpenStreetMap (OSM) constitutes a valuable source of spatial base-data that can be extracted, integrated, and utilised with such heterogeneous data sources for free. In this paper, we present a Personal GeoServices application built on OSM spatial data and university-specific business data for staff, faculty, and students. While generic products such as Google Maps and Google Earth enable basic forms of spatial exploration, the domain of a university ...


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout 2015 U.C. Berkeley

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group ...


Co-Design Of Anytime Computation And Robust Control (Supplimental), Yash Vardhan Pant, Kartik Mohta, Houssam Abbas, Truong X Nghiem, Joesph Deveitti, Rahul Mangharam 2015 University of Pennsylvania

Co-Design Of Anytime Computation And Robust Control (Supplimental), Yash Vardhan Pant, Kartik Mohta, Houssam Abbas, Truong X Nghiem, Joesph Deveitti, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

No abstract provided.


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo 2015 Purdue University

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images ...


Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad 2015 University of Southern Mississippi

Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical ...


Abstraction-Tree For Closed-Loop Model Checking Of Medical Devices, Zhihao Jiang, Houssam Abbas, Pieter J. Mosterman, Rahul Mangharam 2015 University of Pennsylvania

Abstraction-Tree For Closed-Loop Model Checking Of Medical Devices, Zhihao Jiang, Houssam Abbas, Pieter J. Mosterman, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

No abstract provided.


Privacy-Preserving Accountable Cloud Storage, Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao 2015 Iowa State University

Privacy-Preserving Accountable Cloud Storage, Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao

Computer Science Technical Reports

In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving access pattern privacy requires data to be frequently re-encrypted and re-positioned at the storage server, which can easily conceal the traces that are needed for account- ability support to detect misbehaviors and identify attackers. To address this issue ...


Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li 2015 Northeastern University

Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li

Computer Engineering Dissertations

The increasing ubiquitousness of multimedia information in today's world has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance footage. Consumer-grade video is becoming abundant on the Internet, and it is now easier than ever to download multimedia material of any kind and quality. This raises a series of technological demands for automatic video understanding, which has motivated the research community to guide its steps towards a better attainment of such capabilities. As a result, current trends on cognitive vision promise to recognize complex events and self-adapt to different ...


Guaranteeing Data Storage Security In Cloud Computing, Innovative Research Publications IRP India, Viswanath Aiyer, Rohit Bhutkar, Sagar Anvekar, Dinesh Chavan 2015 Innovative Research Publications

Guaranteeing Data Storage Security In Cloud Computing, Innovative Research Publications Irp India, Viswanath Aiyer, Rohit Bhutkar, Sagar Anvekar, Dinesh Chavan

Innovative Research Publications IRP India

Cloud Computing has been imagined as the next generation structural engineering of IT Enterprise. .By using the homomorphic token with dispersed verification of eradication coded information, our plan attains to the combination of capacity rightness protection and information blunder limitation, i.e., the identification of getting rowdy server(s)


Cpas - Campus Parking Availability System, Jacob Lambert 2015 University of Tennessee - Knoxville

Cpas - Campus Parking Availability System, Jacob Lambert

University of Tennessee Honors Thesis Projects

No abstract provided.


Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications IRP India, Amin Shadravan Lalezari, Jalil Shirazi 2015 Innovative Research Publications

Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi

Innovative Research Publications IRP India

Pitch frequency is the fundamental frequency of a speech signal. It is one of the most important parameters for speech signal processing. The simulated results on Keele pitch reference database show that the performance of the proposed wavelet transform based pitch detection algorithm is obviously better than the original AMDF and its improvements based algorithms


Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee 2015 University of Nebraska-Lincoln

Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee

Dissertations & Student Research in Computer Electronics & Engineering

‘Population aging’ is a growing concern for most of us living in the twenty first century, primarily because many of us in the next few years will have a senior person to care for - spending money towards their healthcare expenditures AND/OR having to balance a full-time job with the responsibility of care-giving, travelling from another city to be with this elderly citizen who might be our parent, grand-parent or even community elders. As informal care-givers, if somehow we were able to monitor the day-to-day activities of our elderly dependents, and be alerted when wrong happens to them that would ...


Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia 2015 Boise State University

Developing An Application For Evolutionary Search For Computational Models Of Cellular Development, Nicolas Scott Cornia

Boise State University Theses and Dissertations

VPEvolve is a free and open source application that utilizes a Visual Programming Environment (VPE) for the setup of the Genetic Algorithm (GA), for optimization of computational models. Specifically, the User Interface uses connected glyphs to represent the genetic operators of mutation, reproduction, fitness and selection. These glyphs give the user an intuitive way to set the parameters for the GA, and better visualization of the population's flow through these operators.

VPEvolve is currently being developed alongside research being done in Biocomputing to create models of cellular regeneration based on the regenerative properties of Planaria or flatworms. Since these ...


Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, Jedrzej Kowalczuk 2015 University of Nebraska-Lincoln

Robust And Real-Time Stereo Matching On Parallel Graphics Hardware Using Gradient-Based Disparity Refinement, Jedrzej Kowalczuk

Electrical Engineering Theses and Dissertations

Computer vision attempts to provide camera-equipped machines with visual perception, i.e., the capability to comprehend their surroundings through the analysis and understanding of images. The ability to perceive depth is a vital component of visual perception that enables machines to interpret the three-dimensional structure of their surroundings and allows them to navigate through the environment. In computer vision, depth perception is achieved via stereo matching, a process that identifies correspondences between pixels in images acquired using a pair of horizontally offset cameras. It is possible to calculate depths from correspondences or, more specifically, the positional offsets (disparities) between pixels ...


Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani 2015 The University of Western Ontario

Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani

University of Western Ontario - Electronic Thesis and Dissertation Repository

A new form of computation is emerging rapidly with cloud computing, mobile computing, wearable computing and the Internet-of-Things. All can be characterized as a class of “Cooperative Distributed Systems” (CDS) in open environment. A major driver of the growth is the exponential adoption by people and organizations within all aspects of their day-to-day matters. In this context, users’ requirements for privacy protection are becoming essential and complex beyond the traditional approaches. This requires a formal treatment of “privacy” as a fundamental computation concept in CDS paradigm.

The objective is to develop a comprehensive formal model for “privacy” as base to ...


Digital Commons powered by bepress