Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,427 Full-Text Articles 17,115 Authors 4,117,996 Downloads 205 Institutions

All Articles in Computer Engineering

Faceted Search

13,427 full-text articles. Page 1 of 459.

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro 2020 Seattle University School of Law

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal 2020 Purdue University

Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

In the blooming era of smart edge devices, surveillance cam- eras have been deployed in many locations. Surveillance cam- eras are most useful when they are spaced out to maximize coverage of an area. However, deciding where to place cam- eras is an NP-hard problem and researchers have proposed heuristic solutions. Existing work does not consider a signifi- cant restriction of computer vision: in order to track a moving object, the object must occupy enough pixels. The number of pixels depends on many factors (how far away is the object? What is the camera resolution? What is the focal length ...


Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris 2020 Washington University in St. Louis

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris

Engineering and Applied Science Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...


A Real-Time Feature Indexing System On Live Video Streams, Aditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu 2020 Purdue University

A Real-Time Feature Indexing System On Live Video Streams, Aditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu

Computer Science: Faculty Publications and Other Works

Most of the existing video storage systems rely on offline processing to support the feature-based indexing on video streams. The feature-based indexing technique provides an effec- tive way for users to search video content through visual features, such as object categories (e.g., cars and persons). However, due to the reliance on offline processing, video streams along with their captured features cannot be searchable immediately after video streams are recorded. According to our investigation, buffering and storing live video steams are more time-consuming than the YOLO v3 object detector. Such observation motivates us to propose a real-time feature indexing (RTFI ...


From Protecting To Performing Privacy, Garfield Benjamin 2020 Solent University

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action ...


A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak 2020 Purdue University

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...


Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí de Fréin, Benjamin Aziz 2020 Technological University Dublin

Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz

Articles

There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in the harshest of environments. Software-Defined Networking (SDN) is gaining traction as a promising approach for designing network architectures which are robust and flexible. One reason for this is that separating the data plane from the control plane, increases the controller’s ability to configure the network rapidly. When network failure events occur, the network manager may trade-off the optimality of ...


Trading Up: Exchanging Our Data For A Better Life, Nathan Turner 2020 Brigham Young University

Trading Up: Exchanging Our Data For A Better Life, Nathan Turner

Marriott Student Review

We live in a data-driven economy. Many people feel like consumers are on the losing end of an economic data-battle with tech giants, but this is simply not true; our data can drive innovation. That’s right—personal data collected from you and me can influence new technologies that will improve our lives. This should excite us, but our fear of losing data privacy can quell our excitement for progress and even restrict innovation. Our quality of life has already begun to improve through data driven innovation, and technological progress is not slowing down. If we let our fear of ...


Security Camera Using Raspberry Pi, Tejendra Khatri 2020 Minnesota State University Moorhead

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

No abstract provided.


Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling 2020 Minnesota State University Moorhead

Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling

Student Academic Conference

Overview of a predictive analysis regression developed using machine learning alongside ETL process techniques.


Estimating The Tempo Of Audio Files, Parker Ostertag 2020 Minnesota State University Moorhead

Estimating The Tempo Of Audio Files, Parker Ostertag

Student Academic Conference

On the market today, there exists a multitude of software that allows for the detection and prediction of beats per minute (BPM) contained in audio files. There are both free and monetized versions of these programs, but there is one thing that they all have in common: they are inaccurate. This is simply because the science behind beat detection is unfinished, and may never be. In this project, I decided to use a method of audio peak detection to help me detect the tempo that may exist in any audio file. I started by researching existing programs and the science ...


Implementation Of A Computer-Vision System As A Supportive Diagnostic Tool For Parkinson’S Disease, Diego Machado Reyes 2020 University of Mississippi

Implementation Of A Computer-Vision System As A Supportive Diagnostic Tool For Parkinson’S Disease, Diego Machado Reyes

Honors Theses

Parkinson’s disease is the second most common neurodegenerative disorder, affecting nearly 1 million people in the US and it is predicted that the number will keep increasing. Parkinson’s disease is difficult to diagnose due to its similarity with other diseases that share the parkinsonian symptoms and the subjectivity of its assessment, thus increasing the probabilities of misdiagnosis. Therefore, it is relevant to develop diagnostic tools that are quantitatively based and monitoring tools to improve the patient’s quality of life. Computer-based assessment systems have shown to be successful in this field through diverse approaches that can be classified ...


Methods To Detect Forgeries In Static Signatures, Jennifer Lauriello 2020 University of Mississippi

Methods To Detect Forgeries In Static Signatures, Jennifer Lauriello

Honors Theses

Statistical and machine learning approaches to forgery detection in offline sig- natures are attempted and evaluated. Offline signatures are static signatures found on physical media, mainly a piece of paper. A dataset of 330 signatures for 33 people is used, containing five genuine and five forged signatures for each person. The statistical analysis approach proves more successful than a machine learning approach, likely due to the size of the dataset.


Empirical Evaluation Of Vehicle Detection, Tracking And Recognition Algorithms Operating On Real Time Video Feeds, Yunik Tamrakar 2020 University of Mississippi

Empirical Evaluation Of Vehicle Detection, Tracking And Recognition Algorithms Operating On Real Time Video Feeds, Yunik Tamrakar

Honors Theses

A traffic surveillance camera system is an important part of an intelligent transportation system.(Zhang et al., 2013) This system is capable of performing useful object detections on the incoming feed. These detected objects can then be used for tracking purposes which forms the basis for monitoring important traffic data such as collisions, vehicle count, pedestrian count and so on. Furthermore, other additional information such as the weather conditions, time of day as well as date can also be extracted from a live feed. (Sun et al., 2004) Different algorithms can yield different results for any given video input. Not ...


Elicitation And Aggregation Of Data In Knowledge Intensive Crowdsourcing, Dohoon Kim 2020 Washington University in St. Louis

Elicitation And Aggregation Of Data In Knowledge Intensive Crowdsourcing, Dohoon Kim

All Computer Science and Engineering Research

With the significant advance of internet and connectivity, crowdsourcing gained more popularity and various crowdsourcing platforms emerged. This project focuses on knowledge-intensive crowdsourcing, in which agents are presented with the tasks that require certain knowledge in domain. Knowledge-intensive crowdsourcing requires agents to have experiences on the specific domain. With the constraint of resources and its trait as sourcing from crowd, platform is likely to draw agents with different levels of expertise and knowledge and asking same task can result in bad performance. Some agents can give better information when they are asked with more general question or more knowledge-specific task ...


Minet Magnetic Localization, Michael Robert Drake 2020 University of Mississippi

Minet Magnetic Localization, Michael Robert Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization is a less popular sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of optimizing a particle filter, by ...


Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam 2020 Purdue University

Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam

Faculty Publications

In this article, the results of experiments for the observation of Zenneck surface waves in sub GHz frequency range using dipole antennas are presented. Experiments are conducted over three different soils for communications distances of up to 1 m. This empirical analysis confirms the existence of Zenneck waves over the soil surface. Through the power delay profile (PDP) analysis, it has been shown that other subsurface components exhibit rapid decay as compared to the Zenneck waves. A potential application of the Zenneck waves for energy transmission in the area of decision agriculture is explored. Accordingly, a novel wireless through-the-soil power ...


Centrality Of Blockchain, Zixuan Li 2020 Washington University in St. Louis

Centrality Of Blockchain, Zixuan Li

All Computer Science and Engineering Research

Decentralization is widely recognized as the property and one of most important advantage of blockchain over legacy systems. However, decentralization is often discussed on the consensus layer and recent research shows the trend of centralization on several subsystem of blockchain. In this project, we measured centralization of Bitcoin and Ethereum on source code, development eco-system, and network node levels. We found that the programming language of project is highly centralized, code clone is very common inside Bitcoin and Ethereum community, and developer contribution distribution is highly centralized. We further discuss how could these centralizations lead to security issues in blockchain ...


Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler 2020 University of Nebraska - Lincoln

Understanding Eye Gaze Patterns In Code Comprehension, Jonathan Saddler

Computer Science and Engineering: Theses, Dissertations, and Student Research

Program comprehension is a sub-field of software engineering that seeks to understand how developers understand programs. Comprehension acts as a starting point for many software engineering tasks such as bug fixing, refactoring, and feature creation. The dissertation presents a series of empirical studies to understand how developers comprehend software in realistic settings. The unique aspect of this work is the use of eye tracking equipment to gather fine-grained detailed information of what developers look at in software artifacts while they perform realistic tasks in an environment familiar to them, namely a context including both the Integrated Development Environment (Eclipse or ...


Augmented Reality In A Dynamic Drone Based Environment, Christopher Davis 2020 University of Tennessee at Chattanooga

Augmented Reality In A Dynamic Drone Based Environment, Christopher Davis

Honors Theses

Augmented Reality (AR) and Unmanned Ariel Vehicles (UAVs) are fast advancing technologies, and this research seeks to combine them to offer an effective, user friendly approach for monitoring infrastructure. Drones provide a means to easily access otherwise difficult to reach locations and visualize useful information with Augmented Reality. A UAV employs a wide-angle view and, when paired with AR, this will enable the user to better complete their task by effortlessly providing the critical information they need in the most intuitive way possible. This research is particularly applicable for civil applications such as construction and monitoring of difficult to access ...


Digital Commons powered by bepress