Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

11,205 Full-Text Articles 13,700 Authors 3,288,480 Downloads 182 Institutions

All Articles in Computer Engineering

Faceted Search

11,205 full-text articles. Page 1 of 363.

An Assessment Tool To Analyze Code Written In App Inventor, Rohit Gopalan 2018 Utah State University

An Assessment Tool To Analyze Code Written In App Inventor, Rohit Gopalan

All Graduate Plan B and other Reports

Assessment plays a significant role in today’s educational field. When creating an assessment tool, we should keep in mind that the tool measures learning, supports learning and encourages learning. Many assessment tools are available in the educational market such as Dr. Scratch, FCS1 Assessment Instrument, and Beyond the rubric. These tools help teachers to evaluate students’ performance in programming activities, but they do not completely measure the creativity shown by students in programming. For example, Dr. Scratch measures abstraction, problem decomposition, and parallelism. FCS1 Assessment Instrument measures a set of foundational computer science concepts like variables, loops, and arrays ...


Teen Driver System Modeling: A Tool For Policy Analysis, Celestin Missikpode, Corrine Peek-Asa, Daniel V. McGehee, James Torner, Wayne Wakeland, Robert Wallace 2018 Department of Epidemiology, College of Public Health University of Iowa

Teen Driver System Modeling: A Tool For Policy Analysis, Celestin Missikpode, Corrine Peek-Asa, Daniel V. Mcgehee, James Torner, Wayne Wakeland, Robert Wallace

Systems Science Faculty Publications and Presentations

Background: Motor vehicle crashes remain the leading cause of teen deaths in spite of preventive efforts. Prevention strategies could be advanced through new analytic approaches that allow us to better conceptualize the complex processes underlying teen crash risk. This may help policymakers design appropriate interventions and evaluate their impacts. Methods: System Dynamics methodology was used as a new way of representing factors involved in the underlying process of teen crash risk. Systems dynamics modeling is relatively new to public health analytics and is a promising tool to examine relative influence of multiple interacting factors in predicting a health outcome. Dynamics ...


Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das 2018 Louisiana State University and Agricultural and Mechanical College

Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das

LSU Doctoral Dissertations

The aim of this thesis is to advance the theory behind quantum information processing tasks, by deriving fundamental limits on bipartite quantum interactions and dynamics. A bipartite quantum interaction corresponds to an underlying Hamiltonian that governs the physical transformation of a two-body open quantum system. Under such an interaction, the physical transformation of a bipartite quantum system is considered in the presence of a bath, which may be inaccessible to an observer. The goal is to determine entangling abilities of such arbitrary bipartite quantum interactions. Doing so provides fundamental limitations on information processing tasks, including entanglement distillation and secret key ...


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn 2018 HU University of Applied Science

Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn

Communications of the IIMA

In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear 2018 Embry-Riddle Aeronautical University

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia was ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley 2018 Embry-Riddle Aeronautical University

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee 2018 Embry-Riddle Aeronautical University

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online ...


Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin CAO, Chenyu HOU, Suifei LI, Jing FAN, Jianwei YIN, Baihua ZHENG, Jie BAO 2018 Singapore Management University

Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao

Research Collection School Of Information Systems

Nowadays, many location-based applications require the ability of querying k-nearest neighbors over a very large scale of5 moving objects in road networks, e.g., taxi-calling and ride-sharing services. Traditional grid index with equal-sized cells can not adapt6 to the skewed distribution of moving objects in real scenarios. Thus, to obtain the fast querying response time, the grid needs to be split7 into more smaller cells which introduces the side-effect of higher memory cost, i.e., maintaining such a large volume of cells requires a8 much larger memory space at the server side. In this paper, we present SIMkNN, a scalable ...


Augmenting And Structuring User Queries To Support Efficient Free-Form Code Search, Raphael SIRRES, Tegawendé F. BISSYANDE, Dongsun KIM, David LO, Jacques KLEIN, Kisub KIM, Yves Le TRAON 2018 Singapore Management University

Augmenting And Structuring User Queries To Support Efficient Free-Form Code Search, Raphael Sirres, Tegawendé F. Bissyande, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon

Research Collection School Of Information Systems

Source code terms such as method names and variable types are often different from conceptual words mentioned in a search query. This vocabulary mismatch problem can make code search inefficient. In this paper, we present COde voCABUlary (CoCaBu), an approach to resolving the vocabulary mismatch problem when dealing with free-form code search queries. Our approach leverages common developer questions and the associated expert answers to augment user queries with the relevant, but missing, structural code entities in order to improve the performance of matching relevant code examples within large code repositories. To instantiate this approach, we build GitSearch, a code ...


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli 2018 Kennesaw State University

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices ...


Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie Wissel, Lisa DeLuca 2018 Seton Hall University

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie Wissel, Lisa Deluca

Lisa DeLuca, MLIS, MPA

No abstract provided.


Deep Rc: Enabling Remote Control Through Deep Learning, Jaron Ellingson, Gary Ellingson, Tim McLain 2018 Brigham Young University

Deep Rc: Enabling Remote Control Through Deep Learning, Jaron Ellingson, Gary Ellingson, Tim Mclain

All Student Publications

Human remote-control (RC) pilots have the ability to perceive the position and orientation of an aircraft using only third-person-perspective visual sensing. While novice pilots often struggle when learning to control RC aircraft, they can sense the orientation of the aircraft with relative ease. In this paper, we hypothesize and demonstrate that deep learning methods can be used to mimic the human ability to perceive the orientation of an aircraft from monocular imagery.

This work uses a neural network to directly sense the aircraft attitude. The network is combined with more conventional image processing methods for visual tracking of the aircraft ...


Minutes & Seconds: The Scientists, Patrick Aievoli 2018 Long Island University - C W Post Campus

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an ...


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...


Rotating Scatter Mask Optimization For Gamma Source Direction Identification, Darren E. Holland, James E. Blevins, Larry W. Burggraf, Buckley E. O'Day 2018 Cedarville University

Rotating Scatter Mask Optimization For Gamma Source Direction Identification, Darren E. Holland, James E. Blevins, Larry W. Burggraf, Buckley E. O'Day

Engineering and Computer Science Faculty Publications

Rotating scattering masks have shown promise as an inexpensive, lightweight method with a large field-of-view for identifying the direction of a gamma emitting source or sources. However, further examination of the current rotating scattering mask design shows that changing the geometry may improve the identification by reducing or eliminating degenerate solutions and lower required count times. These changes should produce more linearly independent characteristics for the mask, resulting in a decrease in the mis-identification probability. Three approaches are introduced to generate alternative mask geometries. The eigenvector method uses a spring–mass system to create a geometry basis. The binary approach ...


Analysing Online User Activity To Implicitly Infer The Mental Workload Of Web-Based Tasks Using Defeasible Reasoning, Paul Mara 2018 Dublin Institute of Technology

Analysing Online User Activity To Implicitly Infer The Mental Workload Of Web-Based Tasks Using Defeasible Reasoning, Paul Mara

Dissertations

Mental workload can be considered the amount of cognitive load or effort used over time to complete a task in a complex system. Determining the limits of mental workload can assist in optimising designs and identify if user performance is affected by that design. Mental workload has also been presented as a defeasible concept, where one reason can defeat another and a 5-layer schema to represent domain knowledge to infer mental workload using defeasible reasoning has compared favourably to state-of-the-art inference techniques. Other previous work investigated using records of user activity for measuring mental workload at scale using web-based tasks ...


Androparse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, Ibrahim Baggili 2018 University of New Haven

Androparse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware has become a major challenge. As a consequence, practitioners and researchers spend a significant time analyzing Android applications (APK). A common procedure (especially for data scientists) is to extract features such as permissions, APIs or strings which can then be analyzed. Current state of the art tools have three major issues: (1) a single tool cannot extract all the significant features used by scientists and practitioners (2) Current tools are not designed to be extensible and (3) Existing parsers do not have runtime efficiency. Therefore, this work presents AndroParse which is an open-source Android parser written in Golang ...


Digital Commons powered by bepress