Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

10853 Full-Text Articles 11984 Authors 2393765 Downloads 145 Institutions

All Articles in Computer Engineering

Faceted Search

10853 full-text articles. Page 1 of 313.

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio 2017 Dublin Institute of Technology

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio

Conference papers

This paper proposes a computational framework to reason with conflicting and gradual evidence. The framework is a synthesis of Dung’s seminal work in argumentation semantics with multi-valued logic. Abstract grounded semantics is used to identify the conditions under which a conclusion can be accepted, while multi-valued logic operators are used to quantify the degree of truth of such conditions. We propose a truth-compositional recursive computation based on the notion of irrelevant arguments, and we discuss examples using the major multi-valued logics: Godel’s, Zadeh’s and Łukasiewicz's logic.


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni 2017 South Dakota

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Harshith Keni

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID ...


Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. MacKinnon, Shelley P. Gallup, Joseph L. Billingsley 2016 Naval Postgraduate School

Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley

Military Cyber Affairs

Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the ...


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held 2016 The University of Western Ontario

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and ...


Study Of Mobile Robot Operations Related To Lunar Exploration, Matthew Cross 2016 The University of Western Ontario

Study Of Mobile Robot Operations Related To Lunar Exploration, Matthew Cross

Electronic Thesis and Dissertation Repository

Mobile robots extend the reach of exploration in environments unsuitable, or unreachable, by humans. Far-reaching environments, such as the south lunar pole, exhibit lighting conditions that are challenging for optical imagery required for mobile robot navigation. Terrain conditions also impact the operation of mobile robots; distinguishing terrain types prior to physical contact can improve hazard avoidance.

This thesis presents the conclusions of a trade-off that uses the results from two studies related to operating mobile robots at the lunar south pole. The lunar south pole presents engineering design challenges for both tele-operation and lidar-based autonomous navigation in the context of ...


Recent Semantic Changes For The Term "Digital", Tore Brattli 2016 University of Tromsø

Recent Semantic Changes For The Term "Digital", Tore Brattli

Proceedings from the Document Academy

The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media ...


Doctor Of Philosophy Thesis In Military Informatics : Lethal Autonomy Of Weapons Is Designed And/Or Recessive, Nyagudi M. Nyagudi 2016 Independent Contractor - Litigation Support

Doctor Of Philosophy Thesis In Military Informatics : Lethal Autonomy Of Weapons Is Designed And/Or Recessive, Nyagudi M. Nyagudi

Nyagudi M Nyagudi, B.Sc. Math & Phy (Nairobi, 1997), M.Sc. Info. Sys. (equiv. 2013), PhD in Military Informatics(OpenPhD, 2016)

My original contribution to knowledge is : Any weapon that exhibits intended and/or untended lethal autonomy in targeting and interdiction – does so by way of design and/or recessive flaw(s) in its systems of control – any such weapon is capable of war-fighting and other battle-space interaction in a manner that its Human Commander does not anticipate. Even with the complexity of Lethal Autonomy issues there is nothing particular to gain from being a low-tech Military. Lethal autonomous weapons are therefore independently capable of exhibiting positive or negative
recessive norms of targeting in its perceptions of Discrimination between Civilian and ...


Multipath And Rate Stability, Junjie Liu, Roch A. Guérin 2016 Washington University in St. Louis

Multipath And Rate Stability, Junjie Liu, Roch A. Guérin

All Computer Science and Engineering Research

Originally Published In Proc. IEEE Globecom Conference - CQRM: Communication QoS, Reliability & Modeling Symposium


Coyotelab - Linux Containers For Educational Use, Michael D. Korcha 2016 California State University - San Bernardino

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha

Electronic Theses, Projects, and Dissertations

CoyoteLab is an exploration in the use of Linux container technology as a means to simplify the way students in computing fields access and complete laboratory work in their educational career. This project provides two main benefits: creating a simple way for students to log in and access their coursework without anything more than their web browser, and providing course instructors a way to verify that assigned work is completed successfully. Thanks to advances in container technology and the advent of WebSockets, this becomes a middle layer between a WebSocket opened up on the client’s browser and the SSH ...


Design Of A Flexible Control Platform And Miniature In Vivo Robots For Laparo-Endoscopic Single-Site Surgeries, Lou P. Cubrich 2016 University of Nebraska-Lincoln

Design Of A Flexible Control Platform And Miniature In Vivo Robots For Laparo-Endoscopic Single-Site Surgeries, Lou P. Cubrich

Mechanical (and Materials) Engineering -- Dissertations, Theses, and Student Research

Minimally-invasive laparoscopic procedures have proven efficacy for a wide range of surgical procedures as well as benefits such as reducing scarring, infection, recovery time, and post-operative pain. While the procedures have many advantages, there are significant shortcomings such as limited instrument motion and reduced dexterity. In recent years, robotic surgical technology has overcome some of these limitations and has become an effective tool for many types of surgeries. These robotic platforms typically have an increased workspace, greater dexterity, improved ergonomics, and finer control than traditional laparoscopic methods. This thesis presents the designs of both a four degree-of-freedom (DOF) and 5-DOF ...


A New System For Human Microrna Functional Evaluation And Network, Jiachun Han 2016 University of Nebraska - Lincoln

A New System For Human Microrna Functional Evaluation And Network, Jiachun Han

Computer Science and Engineering: Theses, Dissertations, and Student Research

MicroRNAs are functionally important endogenous non-coding RNAs that silence host genes in animal and plant via destabilizing the mRNAs or preventing the translation. Given the far-reaching implication of microRNA regulation in human health, novel bioinformatics tools are desired to facilitate the mechanistic understanding of microRNA mediated gene regulation, their roles in biological processes, and the functional relevance among microRNAs. However, most state-of-the-art computational methods still focus on the functional study of microRNA targets and there is no e ective strategy to infer the functional similarity among microRNAs. In this study, we developed a new method to quantitatively measure the functional ...


Cal Poly Engineering Photobot: Final Design Review, Samantha Clements, Carlos Esquivel, Kassandra Rodriguez, Aubrey Russell 2016 California Polytechnic State University, San Luis Obispo

Cal Poly Engineering Photobot: Final Design Review, Samantha Clements, Carlos Esquivel, Kassandra Rodriguez, Aubrey Russell

Mechanical Engineering

The purpose of this project was to create a remotely controlled camera device; the PhotoBot captures images and videos of various plants and perhaps animals for biological analysis. The features for such a device allows a user to capture images and videos from various angles and heights with minimal outside assistance. Furthermore, the device is designed for users that do not wish to spend an extensive amount of time and effort taking pictures and videos in the rainforest. The key constraints of the device includes safety, versatility, ease of use, and durability. Ultimately, this project was completed for Dr. Cris ...


Testing The Independence Hypothesis Of Accepted Mutations For Pairs Of Adjacent Amino Acids In Protein Sequences, Jyotsna Ramanan 2016 University of Nebraska-Lincoln

Testing The Independence Hypothesis Of Accepted Mutations For Pairs Of Adjacent Amino Acids In Protein Sequences, Jyotsna Ramanan

Computer Science and Engineering: Theses, Dissertations, and Student Research

Evolutionary studies usually assume that the genetic mutations are independent of each other. However, that does not imply that the observed mutations are independent of each other because it is possible that when a nucleotide is mutated, then it may be biologically beneficial if an adjacent nucleotide mutates too.

With a number of decoded genes currently available in various genome libraries and online databases, it is now possible to have a large-scale computer-based study to test whether the independence assumption holds for pairs of adjacent amino acids. Hence the independence question also arises for pairs of adjacent amino acids within ...


On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson 2016 University of Nebraska - Lincoln

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson

Computer Science and Engineering: Theses, Dissertations, and Student Research

Constraint satisfaction problems (CSPs) provide a flexible and powerful framework for modeling and solving many decision problems of practical importance. Consistency properties and the algorithms for enforcing them on a problem instance are at the heart of Constraint Processing and best distinguish this area from other areas concerned with the same combinatorial problems. In this thesis, we study path consistency (PC) and investigate several algorithms for enforcing it on binary finite CSPs. We also study algorithms for enforcing consistency properties that are related to PC but are stronger or weaker than PC.

We identify and correct errors in the literature ...


Optimization Of Irrigation Decision In Cornsoywater, Dharmic Payyala 2016 University of Nebraska-Lincoln

Optimization Of Irrigation Decision In Cornsoywater, Dharmic Payyala

Computer Science and Engineering: Theses, Dissertations, and Student Research

A crop simulation model is used to estimate crop production as a function of weather conditions, soil parameters, and plant related inputs. These crop simulation models are extensively used by farmers, corporations and policy makers for agronomical planning and decision making. CornSoyWater is one such application which provides irrigation recommendation for soy and corn farmers using hybrid maize and soy sim models. As this is a simulation technology, the accuracy of results depends on the quality of data provided to it. One such important input parameter is weather data. CornSoyWater simulates field and crop conditions by retrieving the updated weather ...


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu 2016 University of Nebraska-Lincoln

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and ...


Power Management In Heterogeneous Mapreduce Cluster, Rojee Sunuwar 2016 University of Nebraska-Lincoln

Power Management In Heterogeneous Mapreduce Cluster, Rojee Sunuwar

Computer Science and Engineering: Theses, Dissertations, and Student Research

The growing expenses of power in data centers as compared to the operation costs has been a concern for the past several decades. It has been predicted that without an intervention, the energy cost will soon outgrow the infrastructure and operation cost. Therefore, it is of great importance to make data center clusters more energy efficient which is critical for avoiding system overheating and failures. In addition, energy inefficiency causes not only the loss of capital but also environmental pollution. Various Power Management(PM) strategies have been developed over the years to make system more energy efficient and to counteract ...


The Effect Of Frequency Resolution On Intelligibility Sentence And Its Relevance To Cochlear Implant Design, Seth H. Roy 2016 University of Nebraska-Lincoln

The Effect Of Frequency Resolution On Intelligibility Sentence And Its Relevance To Cochlear Implant Design, Seth H. Roy

Computer Science and Engineering: Theses, Dissertations, and Student Research

The purpose of this study is to understand how electrical stimulation (as opposed to acoustical stimulation) of the auditory nerve is used in cochlear implants. Speech is a complex signal that changes rapidly in time and frequency domains. Since phonemes (the smallest unit of speech that distinguishes words) depend on nuanced differences in frequency patterns, it would be expected that a signal with drastically reduced frequency information would be of limited value for conveying speech. Such a frequency-poor signal is the object to be investigated in the present work. It is also the basis of the way speech is represented ...


Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal 2016 University of Nebraska-Lincoln

Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal

Computer Science and Engineering: Theses, Dissertations, and Student Research

Online reviews increase consumer visits, increase the time spent on the website, and create a sense of community among the frequent shoppers. Because of the importance of online reviews, online retailers such as Amazon.com and eOpinions provide detailed guidelines for writing reviews. However, though these guidelines provide instructions on how to write reviews, reviewers are not provided instructions for writing product-specific reviews. As a result, poorly-written reviews are abound and a customer may need to scroll through a large number of reviews, which could be up to 6000 pixels down from the top of the page, in order to ...


Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey 2016 University of Tennessee, Knoxville

Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey

Masters Theses

In this thesis we designed, prototyped, and constructed a printed circuit board for real-time, low size, weight, and power (SWaP) HDMI video processing and developed a general purpose library of image processing functions for FPGAs.

The printed circuit board is a baseboard for a Xilinx Zynq based system-on-module (SoM). The board provides power, HDMI input, and HDMI output to the SoM and enables low-SWaP, high-resolution, real-time video processing.

The image processing library for FPGAs is designed for high performance and high reusability. These objectives are achieved by utilizing the Chisel hardware construction language to create parameterized modules that construct low-level ...


Digital Commons powered by bepress