Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

5,726 Full-Text Articles 4,829 Authors 1,325,415 Downloads 82 Institutions

All Articles in Computer Engineering

Faceted Search

5,726 full-text articles. Page 1 of 122.

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson 2015 SelectedWorks

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim 2015 SelectedWorks

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations ...


A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji 2014 University of Nebraska - Lincoln

A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji

Computer Science and Engineering: Theses, Dissertations, and Student Research

In this thesis, we study several algorithms for enforcing Generalized Arc­-Consistency (GAC), which is the most popular consistency property for solving Constraint Satisfaction Problems (CSPs) with backtrack search. The popularity of such algorithms stems from their relative low cost and effectiveness in improving the performance of search. Virtually all commercial and public- domain constraint solvers include some implementation of a generic GAC algorithm. In recent years, several algorithms for enforcing GAC have been proposed in the literature that relies on increasingly complex data structures and mechanisms to improve performance. In this thesis, we study, assess, and compare a basic ...


Introduction To Web Technology With Dreamweaver, Abegunde oluwatosin daniel 2014 SelectedWorks

Introduction To Web Technology With Dreamweaver, Abegunde Oluwatosin Daniel

Abegunde oluwatosin daniel

HTML is a MARKUP language Using HTML tags and elements, we can: Control the appearance of the page and the content Publish online documents and retrieve online information using the links inserted in the HTML document Create on-line forms. These forms can be used to collect information about the user, conduct transactions, and so on


Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba 2014 SelectedWorks

Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba

Masoud Shakiba

The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant ...


Vast 2014, Challenge One: Event Analysis Within Big Data, Isaac C. Sheeley, Jieqiong Zhao, Jing Xia, Shehzad Afzal, Joseph Christopher, David Ebert Dr. 2014 Purdue University

Vast 2014, Challenge One: Event Analysis Within Big Data, Isaac C. Sheeley, Jieqiong Zhao, Jing Xia, Shehzad Afzal, Joseph Christopher, David Ebert Dr.

The Summer Undergraduate Research Fellowship (SURF) Symposium

News articles and email conversation data could be very useful in the analysis of developing and ongoing events, such as preventing a potential threat or possibly even locating a missing person. There is currently no “one-size-fits-all” solution to visualizing diverse forms of datasets and their sheer sizes are far too great to efficiently analyze by brute force methods. However, using principles of Visual Analytics, it is possible to take this information overload and transform it into a useful tool to help increase the efficiency of event analysis. A visualization system was developed for email conversation networks using web technologies. An ...


Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert 2014 Purdue University

Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the fast growth of social media services, vast amount of user-generated content with time-space stamps are produced everyday. Considerable amount of these data are publicly available online, some of which collectively convey information that are of interest to data analysts. Social media data are dynamic and unstructured by nature, which makes it very hard for analysts to efficiently and effectively retrieve useful information. Social Media Analytics Reporting Toolkit (SMART), a system developed at Purdue VACCINE lab, aims to support such analyzing. The current framework collects real-time Twitter messages and visualizes volume densities on a map. It uses Latent Dirichilet ...


Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon JIn, Eugenio Culurciello 2014 Purdue University

Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello

The Summer Undergraduate Research Fellowship (SURF) Symposium

There has been success in recent years for neural networks in applications requiring high level intelligence such as categorization and assessment. In this work, we present a neural network model to learn control policies using reinforcement learning. It takes a raw pixel representation of the current state and outputs an approximation of a Q value function made with a neural network that represents the expected reward for each possible state-action pair. The action is chosen an \epsilon-greedy policy, choosing the highest expected reward with a small chance of random action. We used gradient descent to update the weights and biases ...


Dynamic Surgical Tool Tracking And Delivery System Using Baxter Robot, Sthitapragyan Parida, Juan Pablo Wachs, Maria Eugenia Cabrera 2014 Purdue University

Dynamic Surgical Tool Tracking And Delivery System Using Baxter Robot, Sthitapragyan Parida, Juan Pablo Wachs, Maria Eugenia Cabrera

The Summer Undergraduate Research Fellowship (SURF) Symposium

Several hospitals face nurse staffing shortages for surgeries. This research focuses on building a system with Baxter robot capable of identifying surgical tools using computer vision and delivering them to the surgeon on demand. This would deal with the issue of nurse unavailability during simple surgical procedures. The key aspects of the project were: testing the accuracies of various Artificial Neural Networks (ANNs) in classifying surgical instruments, and programming Baxter to implement a surgical tool delivery system using magnets at the tip of its 7-DOF robotic arms. The methodology consisted of, first, implementing algorithms to enable Baxter to do pick ...


Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri 2014 Purdue University

Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri

The Summer Undergraduate Research Fellowship (SURF) Symposium

Untethered submilliliter-sized robots (microrobots) are showing potential use in different industrial, manufacturing and medical applications. A particular type of these microrobots, magnetic robots, have shown improved performance in power and control capabilities compared to the other thermal and electrostatic based robots. However, the magnetic robot designs have not been assessed in a robust manner to understand the degree of control in different environments and their application feasibility. This research project seeks to develop a custom control software interface to provide a holistic tool for researchers to evaluate the microrobotic performance through advance control features. The software deliverable involved two main ...


A User Study On Route Evaluation, Renjun Zheng, Jieqiong Zhao, David Ebert 2014 Purdue University

A User Study On Route Evaluation, Renjun Zheng, Jieqiong Zhao, David Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

Currently existing route direction representation like arrow on the route is vastly used and intuitive however it is not guaranteed to meet the requirement of application level use. With many routes overlapping with each other on a map, directions become vague and ambiguous for user to recognize. Route visualization is a vital part of map-related application. We developed several route direction representations to investigate which one performs best when user view the routes on actual map. The shapes we chose for these representations respectively are curve, arrow, triangle, right triangle, and taper. We established a complete mechanism to test route ...


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman 2014 SelectedWorks

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...


An Autonomous Robotic Indoor Environment Surveillance System, Andrew Gunnerson, Bogdan Olar, Haodong Wang 2014 Cleveland State University

An Autonomous Robotic Indoor Environment Surveillance System, Andrew Gunnerson, Bogdan Olar, Haodong Wang

Undergraduate Research Posters 2014

We developed an autonomous mobile robot platform capable of following a path and gather environmental data, including temperature, humidity, light intensity, etc. The robot is capable of detecting the path using its camera and correct most navigational errors, while the sensors support a limited set of instructions regarding which sensor data to collect and how often. Our experiment consisted of having the robot follow a looped path we set up in BU004 Lab. The robot was able to complete the loop and gather sensor data for light intensity, humidity and temperature at a frequency of once per second, and also ...


Computer Programming Slides, janagiammal ramasamy 2014 SelectedWorks

Computer Programming Slides, Janagiammal Ramasamy

janagiammal ramasamy

slides presenting lecture notes


Designing An Articulation-Agreement Database For The College Of Science And Engineering And Technology Advising Center, Stephanie Fasen, Susan Hendley, Tim Pham, Danish Zaman 2014 Minnesota State University, Mankato

Designing An Articulation-Agreement Database For The College Of Science And Engineering And Technology Advising Center, Stephanie Fasen, Susan Hendley, Tim Pham, Danish Zaman

Journal of Undergraduate Research at Minnesota State University, Mankato

During their academic careers, some college students transfer to different universities. To allow students to transfer seamlessly to other colleges, advisors at Minnesota universities create articulation agreements that list the classes that transfer between two universities. To use these documents, students and advisors must search through binders to find the correct articulation agreement and then manually review it. This is a time-consuming process for both students and advisors. To make this information more accessible, we created a web-based database that instantly produces a list of equivalent classes for majors offered at Minnesota St ate University, Mankato (MSU) and other Minnesota ...


Verification Of Costless Merge Pairing Heaps, Joshua Vander Hook 2014 Minnesota State University, Mankato

Verification Of Costless Merge Pairing Heaps, Joshua Vander Hook

Journal of Undergraduate Research at Minnesota State University, Mankato

Most algorithms’ performance is limited by the data structures they use. Internal algorithms then decide the performance of the data structure. This cycle continues until fundamental results, verified by analysis and experiment, prevent further improvement. In this paper I examine one specific example of this. The focus of this work is primarily on a new variant of the pairing heap. I will review the new implementation, compare its theoretical performance, and discuss my original contribution: the first preliminary data on its experimental performance. It is instructive to provide some background information, followed by a formal definition of heaps in 1 ...


Automated Image Interpretation For Science Autonomy In Robotic Planetary Exploration, Raymond Francis 2014 Western University

Automated Image Interpretation For Science Autonomy In Robotic Planetary Exploration, Raymond Francis

University of Western Ontario - Electronic Thesis and Dissertation Repository

Advances in the capabilities of robotic planetary exploration missions have increased the wealth of scientific data they produce, presenting challenges for mission science and operations imposed by the limits of interplanetary radio communications. These data budget pressures can be relieved by increased robotic autonomy, both for onboard operations tasks and for decision- making in response to science data.

This thesis presents new techniques in automated image interpretation for natural scenes of relevance to planetary science and exploration, and elaborates autonomy scenarios under which they could be used to extend the reach and performance of exploration missions on planetary surfaces.

Two ...


A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee 2014 University of Nebraska - Lincoln

A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee

Computer Science and Engineering: Theses, Dissertations, and Student Research

Monitoring lakes, rivers, and oceans is critical to improving our understanding of complex large-scale ecosystems. We introduce a method of underwater monitoring using semi-mobile underwater sensor networks and mobile underwater robots in this thesis. The underwater robots can move freely in all dimension while the sensor nodes are anchored to the bottom of the water column and can move only up and down along the depth of the water column. We develop three different algorithms to optimize the path of the underwater robot and the positions of the sensors to improve the overall quality of sensing of an area of ...


Foss Big Data Storage Solution, nurdeen salami 2014 California Polytechnic State University

Foss Big Data Storage Solution, Nurdeen Salami

STEM Teacher and Researcher (STAR) Program Posters

NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to ...


Foss Big Data Storage Solution, Gary L. Jaffe 2014 California Polytechnic State University

Foss Big Data Storage Solution, Gary L. Jaffe

STEM Teacher and Researcher (STAR) Program Posters

Utilizing the AERO Institute as an IT test bed or “sandbox”, a small-agile development team will design, build, and test a data management storage system to support post processing of archived and in-flight data collected with the Piccolo flight control system and Compact Fiber Optic Sensing System (C-FOSS). Both systems are integrated on the APV3 aircraft, a small remote-operated vehicle. Due to the amount of data collected from C-FOSS, a system will be designed to sort and organize large data sets. An open-source database will be explored as a viable solution to manage large data loads and provide multi-cluster system ...


Digital Commons powered by bepress