Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

5,715 Full-Text Articles 4,799 Authors 1,281,071 Downloads 84 Institutions

All Articles in Computer Engineering

Faceted Search

5,715 full-text articles. Page 1 of 121.

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson 2015 SelectedWorks

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman 2014 SelectedWorks

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...


Computer Programming Slides, janagiammal ramasamy 2014 SelectedWorks

Computer Programming Slides, Janagiammal Ramasamy

janagiammal ramasamy

slides presenting lecture notes


Designing An Articulation-Agreement Database For The College Of Science And Engineering And Technology Advising Center, Stephanie Fasen, Susan Hendley, Tim Pham, Danish Zaman 2014 Minnesota State University, Mankato

Designing An Articulation-Agreement Database For The College Of Science And Engineering And Technology Advising Center, Stephanie Fasen, Susan Hendley, Tim Pham, Danish Zaman

Journal of Undergraduate Research at Minnesota State University, Mankato

During their academic careers, some college students transfer to different universities. To allow students to transfer seamlessly to other colleges, advisors at Minnesota universities create articulation agreements that list the classes that transfer between two universities. To use these documents, students and advisors must search through binders to find the correct articulation agreement and then manually review it. This is a time-consuming process for both students and advisors. To make this information more accessible, we created a web-based database that instantly produces a list of equivalent classes for majors offered at Minnesota St ate University, Mankato (MSU) and other Minnesota ...


Verification Of Costless Merge Pairing Heaps, Joshua Vander Hook 2014 Minnesota State University, Mankato

Verification Of Costless Merge Pairing Heaps, Joshua Vander Hook

Journal of Undergraduate Research at Minnesota State University, Mankato

Most algorithms’ performance is limited by the data structures they use. Internal algorithms then decide the performance of the data structure. This cycle continues until fundamental results, verified by analysis and experiment, prevent further improvement. In this paper I examine one specific example of this. The focus of this work is primarily on a new variant of the pairing heap. I will review the new implementation, compare its theoretical performance, and discuss my original contribution: the first preliminary data on its experimental performance. It is instructive to provide some background information, followed by a formal definition of heaps in 1 ...


Automated Image Interpretation For Science Autonomy In Robotic Planetary Exploration, Raymond Francis 2014 Western University

Automated Image Interpretation For Science Autonomy In Robotic Planetary Exploration, Raymond Francis

University of Western Ontario - Electronic Thesis and Dissertation Repository

Advances in the capabilities of robotic planetary exploration missions have increased the wealth of scientific data they produce, presenting challenges for mission science and operations imposed by the limits of interplanetary radio communications. These data budget pressures can be relieved by increased robotic autonomy, both for onboard operations tasks and for decision- making in response to science data.

This thesis presents new techniques in automated image interpretation for natural scenes of relevance to planetary science and exploration, and elaborates autonomy scenarios under which they could be used to extend the reach and performance of exploration missions on planetary surfaces.

Two ...


A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee 2014 University of Nebraska - Lincoln

A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee

Computer Science and Engineering: Theses, Dissertations, and Student Research

Monitoring lakes, rivers, and oceans is critical to improving our understanding of complex large-scale ecosystems. We introduce a method of underwater monitoring using semi-mobile underwater sensor networks and mobile underwater robots in this thesis. The underwater robots can move freely in all dimension while the sensor nodes are anchored to the bottom of the water column and can move only up and down along the depth of the water column. We develop three different algorithms to optimize the path of the underwater robot and the positions of the sensors to improve the overall quality of sensing of an area of ...


Foss Big Data Storage Solution, nurdeen salami 2014 California Polytechnic State University

Foss Big Data Storage Solution, Nurdeen Salami

STEM Teacher and Researcher (STAR) Program Posters

NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to ...


Foss Big Data Storage Solution, Gary L. Jaffe 2014 California Polytechnic State University

Foss Big Data Storage Solution, Gary L. Jaffe

STEM Teacher and Researcher (STAR) Program Posters

Utilizing the AERO Institute as an IT test bed or “sandbox”, a small-agile development team will design, build, and test a data management storage system to support post processing of archived and in-flight data collected with the Piccolo flight control system and Compact Fiber Optic Sensing System (C-FOSS). Both systems are integrated on the APV3 aircraft, a small remote-operated vehicle. Due to the amount of data collected from C-FOSS, a system will be designed to sort and organize large data sets. An open-source database will be explored as a viable solution to manage large data loads and provide multi-cluster system ...


Sensing With A 3-Toe Foot For A Mini Biped Robot, Sergio Orlando Castro Gomez 2014 Northeastern University

Sensing With A 3-Toe Foot For A Mini Biped Robot, Sergio Orlando Castro Gomez

Electrical and Computer Engineering Master's Theses

This thesis describes the implementation of a 3-toe foot for biped robots. The objective is to provide a reliable and low-cost solution for the problem of sensing the center of pressure when stepping over uneven surfaces. To accomplish this goal, a new method for measuring force based on the degree of deflection of a flexural plastic toe is presented. Empirical results confirm that it is possible to obtain the same level of accuracy using this new method than using standard force sensing resistors (FSR).

In order to measure the level of deflection of the plastic toe, a small magnet has ...


Calibrative Source-Level Multi-Target Performance Estimation, Kasra Moazzemi 2014 Northeastern University

Calibrative Source-Level Multi-Target Performance Estimation, Kasra Moazzemi

Electrical and Computer Engineering Master's Theses

The growing system complexity and decrease in time-to-market make designing a sys- tem more and more challenging. In order to solve these challenges, trends are emerging to move the design process to higher levels of abstraction. Using a systematic top-down approach from system-level specification down to implementation enables finding globally efficient solutions and accelerates the path to implementation. Designing at system-level requires methods that enable designers to explore the large design space in a rapid but sufficiently accurate fashion to compare the large amount of possible choices at this stage.

Design space exploration (DSE) is an essential aspect of System-level ...


Reputation Computation In Social Networks And Its Applications, JooYoung Lee 2014 Syracuse University

Reputation Computation In Social Networks And Its Applications, Jooyoung Lee

Dissertations - ALL

This thesis focuses on a quantification of reputation and presents models which compute reputation within networked environments. Reputation manifests past behaviors of users and helps others to predict behaviors of users and therefore reduce risks in future interactions. There are two approaches in computing reputation on networks- namely, the macro-level approach and the micro-level approach. A macro-level assumes that there exists a computing entity outside of a given network who can observe the entire network including degree distributions and relationships among nodes. In a micro-level approach, the entity is one of the nodes in a network and therefore can only ...


Early Performance Prediction Methodology For Many-Cores On Chip Based Applications, Boray S. Deepaksubramanyan 2014 Syracuse University

Early Performance Prediction Methodology For Many-Cores On Chip Based Applications, Boray S. Deepaksubramanyan

Dissertations - ALL

Modern high performance computing applications such as personal computing, gaming, numerical simulations require application-specific integrated circuits (ASICs) that comprises of many cores. Performance for these applications depends mainly on latency of interconnects which transfer data between cores that implement applications by distributing tasks. Time-to-market is a critical consideration while designing ASICs for these applications. Therefore, to reduce design cycle time, predicting system performance accurately at an early stage of design is essential. With process technology in nanometer era, physical phenomena such as crosstalk, reflection on the propagating signal have a direct impact on performance. Incorporating these effects provides a better ...


A Methodology And Tool For Concurrent Fault Injection, ZhongYin Zhang 2014 University of Nebraska - Lincoln

A Methodology And Tool For Concurrent Fault Injection, Zhongyin Zhang

Computer Science and Engineering: Theses, Dissertations, and Student Research

As the speed of microprocessors tails off, utilizing multiple processing cores per chip is becoming a common way for developers to achieve higher performance. However, writing concurrent programs can be a big challenge because of common concurrency faults. Because concurrency faults are hard to detect and reproduce, traditional testing techniques are not suitable. New techniques are needed, and these must be assessed. A typical method for assessing testing techniques is to embed faults in programs using mutation tools, and assess the ability of techniques to detect these. Although mutation testing techniques can be used to represent common faults, approaches for ...


Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah 2014 University of Nebraska - Lincoln

Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah

Dissertations & Student Research in Computer Electronics & Engineering

One of the most promising network that has emerged from the technology world is the mobile ad-hoc network or MANET. It is a type of multi-hop network. Wireless by nature, MANETs do not have a specific network infrastructure. It is a collection of wireless mobile devices that communicate with each other without the help of any third party backbone like a base-station or a router. It can be hard to imagine how every node in this type of network communicate with one another without having a router. In MANETs, nodes change locations with time, configure themselves and get the information ...


Measuring Autonomy And Solving General Stabilization Problems With Multi-Agent Systems, Rasheed A. Rajabzadeh 2014 University of Nebraska - Lincoln

Measuring Autonomy And Solving General Stabilization Problems With Multi-Agent Systems, Rasheed A. Rajabzadeh

Computer Science and Engineering: Theses, Dissertations, and Student Research

Many distributed complex problems address a particular form of resource scheduling where proper resource management can cut costs by stabilizing a set of stochastic fluctuating parameters. Wireless sensor network communication, supply chain management, stock trading, intelligent traffic management, and smart grid systems are examples of these problems. Among the various solutions, a common strategy often used to address this type of problems is fluctuation reduction via resource buffering combined with load shifting. Respectively, stable wireless communication, demand for supplies, liquidity, traffic speed, and power demand reduce cost and can be achieved by properly managing sensor data buffers, warehouses, capital, distance ...


Oswald Physical And Engineering Sciences Honorable Mention: Summer 2012 Lip6 Write Up, Josiah Hanna 2014 University of Kentucky

Oswald Physical And Engineering Sciences Honorable Mention: Summer 2012 Lip6 Write Up, Josiah Hanna

Kaleidoscope

Planning under uncertainty is a central problem in developing intelligent autonomous systems. The traditional representation for these problems is a Markov Decision Process (MDP). The MDP model can be extended to a Multi-criteria MDP (MMDP) for planning under uncertainty while trying to optimize multiple criteria. However, due to the trade-offs involved in multi criteria problems there may be infinitely many optimal solutions. The focus of this project has been to find a method that efficiently computes a subset of solutions that represents the entire set of optimal solutions for bi-objective MDPs.


Heart-On-A-Chip: A Closed-Loop Testing Platform For Implantable Pacemakers, Zhihao Jiang, Sriram Radhakrishnan, Varun Sampath, Shilpa Sarode, Rahul Mangharam 2014 University of Pennsylvania

Heart-On-A-Chip: A Closed-Loop Testing Platform For Implantable Pacemakers, Zhihao Jiang, Sriram Radhakrishnan, Varun Sampath, Shilpa Sarode, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Implantable cardiac pacemakers restore normal heart rhythm by delivering external electrical pacing to the heart. The pacemaker software is life-critical as the timing of the pulses determine its ability to control the heart rate. Recalls due to software issues have been on the rise with the increasing complexity of pacing algorithms. Open-loop testing remains the primary approach to evaluate the safety of pacemaker software. While this tests how the pacemaker responds to stimulus, it cannot reveal pacemaker malfunctions which drive the heart into an unsafe state over multiple cycles. To evaluate the safety and efficacy of pacemaker software we have ...


Invariant Inferring And Monitoring In Robotic Systems, Hengle Jiang 2014 University of Nebraska - Lincoln

Invariant Inferring And Monitoring In Robotic Systems, Hengle Jiang

Computer Science and Engineering: Theses, Dissertations, and Student Research

System monitoring can help to detect abnormalities and avoid failures. Crafting monitors for today’s robotic systems, however, can be very difficult due to the systems’ inherent complexity and its rich operating environment.

In this work we address this challenge through an approach that automatically infers system invariants and synthesizes those invariants into monitors. This approach is inspired by existing software engineering approaches for automated invariant inference, and it is novel in that it derives invariants by observing the messages passed between system nodes and the invariants types are tailored to match the spatial, time, temporal, and architectural attributes of ...


Story Guided Virtual Cultural Heritage Applications, Selma Rizvic 2014 Rochester Institute of Technology

Story Guided Virtual Cultural Heritage Applications, Selma Rizvic

Journal of Interactive Humanities

Virtual cultural heritage applications, particularly virtual museums, nowadays include various forms of storytelling. Every object, site or artifact is better perceived and understood through the adjoining story. Interactive applications naturally request the storytelling to become interactive as well. This paper describes the concepts of interactive digital storytelling in our virtual museums and cultural heritage presentations and discusses their advantages and drawbacks recognized through user evaluation. We used digital stories not only to introduce visitors with the context and information on the objects, but also to enhance their navigation through virtual environments with purpose of learning and perceiving maximum amount of ...


Digital Commons powered by bepress