Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

6,415 Full-Text Articles 5,911 Authors 1,668,543 Downloads 109 Institutions

All Articles in Computer Engineering

Faceted Search

6,415 full-text articles. Page 1 of 150.

Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed 2015 Western Michigan University

Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage, transfer, analysis and visualization. Integrating these big data sets (NGS+MS) for proteogenomics studies compounds all of the associated computational problems. Existing sequential algorithms for these proteogenomics datasets analysis are inadequate for big data and high performance computing (HPC) solutions are almost non-existent. The purpose of ...


The Design And Implementation Of An Adaptive Chess Game, Mehdi Peiravi 2015 mehdi peiravi

The Design And Implementation Of An Adaptive Chess Game, Mehdi Peiravi

Electronic Theses, Projects, and Dissertations

In recent years, computer games have become a common form of entertainment. Fast advancement in computer technology and internet speed have helped entertainment software developers to create graphical games that keep a variety of players’ interest. The emergence of artificial intelligence systems has evolved computer gaming technology in new and profound ways. Artificial intelligence provides the illusion of intelligence in the behavior of NPCs (Non-Playable-Characters). NPCs are able to use the increased CPU, GPU, RAM, Storage and other bandwidth related capabilities, resulting in very difficult game play for the end user. In many cases, computer abilities must be toned down ...


Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande 2015 California State University - San Bernardino

Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande

Electronic Theses, Projects, and Dissertations

Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program ...


Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward 2015 Loyola University Chicago

Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward

Computer Science: Faculty Publications and Other Works

Software metrics are a critical tool which provide continuous insight to products and processes and help build reliable software in mission critical environments. Using software metrics we can perform calculations that help assess the effectiveness of the underlying software or process. The two types of metrics relevant to our work is complexity metrics and in-process metrics. Complexity metrics tend to focus on intrinsic code properties like code complexity. In-process metrics focus on a higher-level view of software quality, measuring information that can provide insight into the underlying software development process.

Our aim is to develop and evaluate a metrics dashboard ...


Integrity Coded Databases (Icdb) - An Evaluation Of Efficiency, Performance, And Practicality, Jake Rodden, Jyh-haw Yeh (Mentor), Elmer Duran, Dan Kondratyuk 2015 Boise State University

Integrity Coded Databases (Icdb) - An Evaluation Of Efficiency, Performance, And Practicality, Jake Rodden, Jyh-Haw Yeh (Mentor), Elmer Duran, Dan Kondratyuk

Idaho Conference on Undergraduate Research

Recently, cloud database storage has become an inexpensive and convenient option to store information; however, this relatively new area of service can be vulnerable to security breaches. Storing data in a foreign location requires the owner to relinquish control of their information. This opens the possibility for internal, malicious attacks that can involve the manipulation, omission, or addition of data. Our research tests a potential solution for retaining data as it was intended to be stored (known as integrity) in these cloud-stored databases: by converting the original databases to Integrity-Coded Databases (ICDB). ICDBs utilize Integrity Codes: cryptographic codes created for ...


A Parallel Algorithm For Compression Of Big Next-Generation Sequencing Datasets, Sandino N. Vargas Perez, Fahad Saeed 2015 Western Michigan University

A Parallel Algorithm For Compression Of Big Next-Generation Sequencing Datasets, Sandino N. Vargas Perez, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

With the advent of high-throughput next-generation sequencing (NGS) techniques, the amount of data being generated represents challenges including storage, analysis and transport of huge datasets. One solution to storage and transmission of data is compression using specialized compression algorithms. However, these specialized algorithms suffer from poor scalability with increasing size of the datasets and best available solutions can take hours to compress gigabytes of data. In this paper we introduce paraDSRC, a parallel implementation of DSRC algorithm using a message passing model that presents reduction of the compression time complexity by a factor of O(1/p ). Our experimental results ...


Assessment Of The Stability Of A Four Legged Robot Manipulator, Dr. Awad Eisa G. Mohamed 2015 Department of Mechanical Engineering, Faculty of Engineering, Omdurman Islamic University, SUDAN

Assessment Of The Stability Of A Four Legged Robot Manipulator, Dr. Awad Eisa G. Mohamed

Innovative Research Publications IRP India

This paper deals with static stability of a four legged robot manipulator when it moves with trot gait. In this paper, the stability analysis based on dynamics of walking usually proposed for the analysis of walking system studied and identified its limits and ambiguity. After identifying the key issues of stability, it has been identified that moment around the supporting diagonal line of quadruped in trotting gait largely influences walking stability. Therefore Moment around the supporting diagonal line of quadruped in trotting gait is modeled and its effects on body attitude (roll and pitch) are analyzed. The degree of influence ...


Formal Specification Driven Development, Titus Fofung 2015 Kennesaw State University

Formal Specification Driven Development, Titus Fofung

Dissertations, Theses and Capstone Projects

This paper researches a quantitative metric of investigating Formal Specification-Driven Development (FSDD). Formal specification is needed at the beginning of the development process to prevent ambiguity and to improve the quality through corrections of errors found in the late phases of a traditional design process, Software Development Life Cycle (SDLC). The research is conducted with capstone students using both the FSDD and the SDLC (traditional) models and a quantitative analysis is presented to evaluate the internal quality of the software. The tool used to measure the internal quality is the .NET 2013 analysis tool. Formal Specification-Driven Development (FSDD) is a ...


The Edge Group Coloring Problem With Applications To Multicast Switching, Jonathan Turner 2015 Washington University in St Louis

The Edge Group Coloring Problem With Applications To Multicast Switching, Jonathan Turner

All Computer Science and Engineering Research

This paper introduces a natural generalization of the classical edge coloring problem in graphs that provides a useful abstraction for two well-known problems in multicast switching. We show that the problem is {\sl NP}-hard and evaluate the performance of several approximation algorithms, both analytically and experimentally. We find that for random $\chi$-colorable graphs, the number of colors used by the best algorithms falls within a small constant factor of $\chi$, where the constant factor is mainly a function of the ratio of the number of outputs to inputs. When this ratio is less than 10, the best algorithms ...


Digital Anonymity: Investigating The Open Threat By The Hidden User, Derrick B. Rumer 2015 American Public University System

Digital Anonymity: Investigating The Open Threat By The Hidden User, Derrick B. Rumer

Master's Capstone Theses

Anonymous networks provide users the opportunity to navigate the internet anonymously by adding additional connections between client and server that mask the users IP address and provide other layers of security that protect user identities while navigating the web. With this technology also come ramifications when criminals use the technology to cover their tracks. This paper will provide insight to digital anonymity as well as review previous research conducted on the subject. The United Stated Government and law enforcement agencies have made great strides in combatting crimes conducted over anonymous networks. The purpose of this study is to determine if ...


Agile Information Security Using Scrum, James R. Fitzer 2015 American Public University System

Agile Information Security Using Scrum, James R. Fitzer

Master's Capstone Theses

The increased importance of information protection, coupled with rapidly changing security landscape, has led to information security professionals finding it difficult to stay ahead of emerging threats. This problem has been compounded by the increased prevalence of agile software development methodologies, which ensure a rapidly changing system. This project unifies the principles of Agile software development, particularly Scrum, with established security best practices in the form of a technical book for mass-market publication. The book provides a guidance and framework for using the Scrum method to construct an information security program, conduct risk assessments, and implement policies and controls. This ...


The Lack Of Women In Technology: The Role Culture And Sexism Play, Paul B. Hanton 2015 American Public University System

The Lack Of Women In Technology: The Role Culture And Sexism Play, Paul B. Hanton

Master's Capstone Theses

The technology industry is huge and will only grow as the world’s reliance on technology expands at an ever increasing rate. This ends up generating a large amount of profit along with a large number of jobs that need to be filled by qualified individuals. It is no secret that right now women are vastly underrepresented in the technology industry with no concrete explanation why. Some common theories are that women are not naturally good or interested in technology, the education system is failing young women, or there are not enough role models. This paper seeks another explanation that ...


Novelty Wins, “Straight Toward Objective” Loses! Or Book Review: Why Greatness Cannot Be Planned: The Myth Of The Objective, By Kenneth O. Stanley And Joel Lehman, Reuben Hersh 2015 University of New Mexico

Novelty Wins, “Straight Toward Objective” Loses! Or Book Review: Why Greatness Cannot Be Planned: The Myth Of The Objective, By Kenneth O. Stanley And Joel Lehman, Reuben Hersh

Journal of Humanistic Mathematics

Experiments in evolutionary artificial intelligence demonstrate that progress toward an important, difficult goal is not best achieved by attempting to go directly toward that goal, but rather, by rewarding novelty.


Counteracting Bloom Filter Encoding Techniques For Private Record Linkage, Vasundhara Sharma 2015 The University of Western Ontario

Counteracting Bloom Filter Encoding Techniques For Private Record Linkage, Vasundhara Sharma

Electronic Thesis and Dissertation Repository

Record Linkage is a process of combining records representing same entity spread across multiple and different data sources, primarily for data analytics. Traditionally, this could be performed with comparing personal identifiers present in data (e.g., given name, surname, social security number etc.). However, sharing information across databases maintained by disparate organizations leads to exchange of personal information pertaining to an individual. In practice, various statutory regulations and policies prohibit the disclosure of such identifiers. Private record linkage (PRL) techniques have been implemented to execute record linkage without disclosing any information about other dissimilar records.

Various techniques have been proposed ...


Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel 2015 University of Nebraska-Lincoln

Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel

Computer Science and Engineering: Theses, Dissertations, and Student Research

Campus research computing has evolved from many small decentralized resources, such as individual desktops, to fewer, larger centralized resources, such as clusters. This change has been necessitated by the increasing size of researcher's workloads, but this change has harmed the researcher's user experience. We propose to improve the user experience on the computational resources by creating an overlay cluster they are able to control. This overlay should transparently scale to national cyberinfrastructure as the user's demands increase.

We explore methods for improving the user experience when submitting jobs on a campus grid. To this end, we created ...


Apis And The Library: What, Why?, Graham S. Hukill 2015 Wayne State University

Apis And The Library: What, Why?, Graham S. Hukill

Scholars Cooperative Brown Bag Series

APIs (Application Programming Interface): What are they? Why are they? Introduction to APIs and their role in the Library


Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher 2015 Portland State University

Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher

Electrical and Computer Engineering Faculty Publications and Presentations

Resistive switches are a class of emerging nanoelectronics devices that exhibit a wide variety of switching characteristics closely resembling behaviors of biological synapses. Assembled into random networks, such resistive switches produce emerging behaviors far more complex than that of individual devices. This was previously demonstrated in simulations that exploit information processing within these random networks to solve tasks that require nonlinear computation as well as memory. Physical assemblies of such networks manifest complex spatial structures and basic processing capabilities often related to biologically-inspired computing. We model and simulate random resistive switch networks and analyze their computational capacities. We provide a ...


Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh 2015 Abdulaziz University, Jeddah, Saudi Arabia

Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh

Innovative Research Publications IRP India

A criteria is developed for the approximations of a logarithmic function to piecewise straight lines at multiple segments such that the maximum absolute error is minimized.The optimum cutting points for segmentation are estimated numerically with an exhaustive search. Our hardware implementation is restricted to integer operations (addition and shifting).


Jsish, Ryan Grasell 2015 California Polytechnic State University - San Luis Obispo

Jsish, Ryan Grasell

Computer Science

For my senior project, I implemented Professor Keen’s JSish spec in C++. JSish is a subset of Javascript with support for execution from the command line and files.

I chose this project because I wanted to reinforce my programing language skills, learn C++, and gain a deeper understanding of garbage collection.

I quickly grew familiar with C++. My prior experience with both C and Java was a good enough introduction to let me hit the ground running. The biggest hurdle for me was the lack of garbage collection built into C++. I understood the principles of manual memory management ...


Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson 2015 Stratospheric Ballooning Association

Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson

2015 Academic High Altitude Conference

Collecting multiple data points in adverse conditions such as a thunderstorm presents a number of challenges in collecting and relaying data. Wireless sensor mesh networks is a proven method for extracting and relaying data in radio environments that may either be roving, in adverse conditions or both. This paper explores using wireless sensor mesh networks to collect atmospheric data that is present in a thunderstorm system to enable researchers to learn more from these systems. A wireless sensor mesh network is ideal since it is well suited for both moving and sensor nodes that are in adverse RF conditions. A ...


Digital Commons powered by bepress