Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

5,786 Full-Text Articles 4,958 Authors 1,367,574 Downloads 83 Institutions

All Articles in Computer Engineering

Faceted Search

5,786 full-text articles. Page 1 of 125.

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson 2015 SelectedWorks

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim 2015 SelectedWorks

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations ...


Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai 2015 Northeastern University

Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai

Computer Engineering Dissertations

In this thesis, we present our works on resource management in large scale systems, especially for enterprise cluster and storage systems. Large-scale cluster systems become quite popular among a community of users by offering a variety of resources. Such systems require complex resource management schemes for multi-objective optimizations and should be specific to different system requirements. In addition, burstiness has often been found in enterprise workloads, being a key factor in performance degradation. Therefore, it is an extremely challenging problem of managing heterogeneous resources (e.g., computing, networking and storage) for such a large scale system under bursty conditions while ...


High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan 2015 Northeastern University

High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan

Computer Engineering Dissertations

Embedded vision is a top tier, rapidly growing market with a host of challenges and conflicting requirements. Complex algorithms can pose immense computation ( > 50GOPs) and communication ( > 8GB/s) demands, especially considering adaptive vision algorithms (which employ machine learning techniques and concurrently update a scene model). Yet at the same time, their embedded deployment demands low power operation consuming only a few Watts. Multiprocessor System-on-Chips (MPSoCs) have emerged as one main architecture approach to improve power efficiency while increasing computational performance. Still, current vision MPSoCs either shy away from supporting adaptive vision algorithms or operate at very limited resolutions due to ...


The Visit-Data Warehouse: Enabling Novel Secondary Use Of Health Information Exchange Data, William Fleischman, Tina Lowry, Jason Shapiro 2014 EDM Forum

The Visit-Data Warehouse: Enabling Novel Secondary Use Of Health Information Exchange Data, William Fleischman, Tina Lowry, Jason Shapiro

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Introduction/Objectives: Health Information Exchange (HIE) efforts face challenges with data quality and performance, and this becomes especially problematic when data is leveraged for uses beyond primary clinical use. We describe a secondary data infrastructure focusing on patient-encounter, nonclinical data that was built on top of a functioning HIE platform to support novel secondary data uses and prevent potentially negative impacts these uses might have otherwise had on HIE system performance.

Background: HIE efforts have generally formed for the primary clinical use of individual clinical providers searching for data on individual patients under their care, but many secondary uses have ...


Requirement-Guided Model Refinement, Zhihao Jiang, Pieter Mosterman, Rahul Mangharam 2014 University of Pennsylvania

Requirement-Guided Model Refinement, Zhihao Jiang, Pieter Mosterman, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Medical device is a typical Cyber-Physical System and ensuring the safety and efficacy of the device requires closed-loop verification. Currently closed-loop verifications of medical devices are performed in the form of clinical trials in which the devices are tested on the patients.


A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji 2014 University of Nebraska - Lincoln

A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji

Computer Science and Engineering: Theses, Dissertations, and Student Research

In this thesis, we study several algorithms for enforcing Generalized Arc­-Consistency (GAC), which is the most popular consistency property for solving Constraint Satisfaction Problems (CSPs) with backtrack search. The popularity of such algorithms stems from their relative low cost and effectiveness in improving the performance of search. Virtually all commercial and public- domain constraint solvers include some implementation of a generic GAC algorithm. In recent years, several algorithms for enforcing GAC have been proposed in the literature that relies on increasingly complex data structures and mechanisms to improve performance. In this thesis, we study, assess, and compare a basic ...


Data Transport System, Rahav Dor 2014 Washington University in St. Louis

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database ...


Badge Web Application, Ryan Green 2014 California Polytechnic State University

Badge Web Application, Ryan Green

Computer Engineering

This project includes the imagining, design, build, and test of a web application that creates and tracks a user’s progress on completing tasks that an administrator has created for the user. The goal of this project is to have a functioning webpage that is robust and scalable to support many users and many tasks. The application will be developed for use on all modern web browsers, and will have a persistent server to access from any platform. This project was designed to be an exercise in building a modern web application, and as such is written using many different ...


Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen 2014 California Polytechnic State University

Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen

Liberal Arts and Engineering Studies

Many users are now transitioning to small-scale hydroponics and aquaponics at home. There can be a barrier to entry with these systems as there is a delicate balance of chemicals, pH, etc. that must be maintained. There are sensors for these various components but they are either aimed at commercial production or are un-automated. Fresh Bytes is a microcomputer with sensors to detect all of these unseen components in a hydroponic system. A prototype of this microcomputer is produced along with CAD plans for more professional versions of it. The sensors are verified and future development is contemplated.


Quickbooks Self-Employed Ios Application, Braden Young 2014 California Polytechnic State University

Quickbooks Self-Employed Ios Application, Braden Young

Computer Science

No abstract provided.


Rapdb: The Rapid Social Application Deployment Service, Lance Tyler, Matthew Morris 2014 California Polytechnic State University

Rapdb: The Rapid Social Application Deployment Service, Lance Tyler, Matthew Morris

Computer Science

No abstract provided.


Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky 2014 California Polytechnic State University

Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky

Electrical Engineering

Popularity of home automation devices has increased greatly in recent years due to higher affordability and simplicity through smartphone and tablet connectivity. For the purpose of this experiment, we have developed the Smart Outlet: a stand-alone communication unit, used to connect home outlets to the internet. The Smart Outlet controls lighting and simple appliances throughout the home, remotely, using wireless commands from the web. A Google Calendar interface directly controls the outlets’ function by scheduling them with dedicated calendar events. The calendar’s interface can even be accessed from multiple different platforms (i.e. phones, computers, tablets) for the convenience ...


Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin 2014 Washington University in St. Louis

Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin

All Computer Science and Engineering Research

Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but ...


A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef 2014 Western University

A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef

University of Western Ontario - Electronic Thesis and Dissertation Repository

The recent emergence of online social networks (OSNs) has changed the communication behaviors of thousand of millions of users. OSNs have become significant platforms for connecting users, sharing information, and a valuable source of private and sensitive data about individuals. While OSNs insert constantly new social features to increase the interaction between users, they, unfortunately, offer primitive access control mechanisms that place the burden of privacy policy configuration solely on the holder who has shared data in her/his profile regardless of other associated users, who may have different privacy preferences. Therefore, current OSN privacy mechanisms violate the privacy of ...


Introduction To Web Technology With Dreamweaver, Abegunde oluwatosin daniel 2014 SelectedWorks

Introduction To Web Technology With Dreamweaver, Abegunde Oluwatosin Daniel

Abegunde oluwatosin daniel

HTML is a MARKUP language Using HTML tags and elements, we can: Control the appearance of the page and the content Publish online documents and retrieve online information using the links inserted in the HTML document Create on-line forms. These forms can be used to collect information about the user, conduct transactions, and so on


Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba 2014 SelectedWorks

Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba

Masoud Shakiba

The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant ...


Instructions-Based Detection Of Sophisticated Obfuscation And Packing, Moustafa Saleh, Edward Paul Ratazzi, Shouhuai Xu 2014 Syracuse University

Instructions-Based Detection Of Sophisticated Obfuscation And Packing, Moustafa Saleh, Edward Paul Ratazzi, Shouhuai Xu

Electrical Engineering and Computer Science

Every day thousands of malware are released online. The vast majority of these malware employ some kind of obfuscation ranging from simple XOR encryption, to more sophisticated anti-analysis, packing and encryption techniques. Dynamic analysis methods can unpack the file and reveal its hidden code. However, these methods are very time consuming when compared to static analysis. Moreover, considering the large amount of new malware being produced daily, it is not practical to solely depend on dynamic analysis methods. Therefore, finding an effective way to filter the samples and delegate only obfuscated and suspicious ones to more rigorous tests would significantly ...


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman 2014 SelectedWorks

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...


An Autonomous Robotic Indoor Environment Surveillance System, Andrew Gunnerson, Bogdan Olar, Haodong Wang 2014 Cleveland State University

An Autonomous Robotic Indoor Environment Surveillance System, Andrew Gunnerson, Bogdan Olar, Haodong Wang

Undergraduate Research Posters 2014

We developed an autonomous mobile robot platform capable of following a path and gather environmental data, including temperature, humidity, light intensity, etc. The robot is capable of detecting the path using its camera and correct most navigational errors, while the sensors support a limited set of instructions regarding which sensor data to collect and how often. Our experiment consisted of having the robot follow a looped path we set up in BU004 Lab. The robot was able to complete the loop and gather sensor data for light intensity, humidity and temperature at a frequency of once per second, and also ...


Digital Commons powered by bepress