Transcribing Braille Code: Learning Equations Across Platforms, 2018 Purdue University
Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh
Purdue Journal of Service-Learning and International Engagement
Deegan Atha, a graduating senior in electrical engineering and a future engineer, is interested in human-centered design and developing technology that helps students engage and be successful in STEM.
Courtney Balogh, a junior in mechanical engineering, is interested in human-centered design and the importance it plays in product development. Deegan and Courtney are members of the Purdue EPICS project, Learning Equations Across Platforms (LEAP). They partnered with the Indiana School for the Blind and Visually Impaired (ISBVI) to develop a braille transcription device and web application that converts braille to print in real time.
Criticality Assessments For Improving Algorithmic Robustness, 2018 University of New Mexico
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Computer Science ETDs
Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.
In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems ...
Web-Based Archaeology And Collaborative Research, 2018 University of York
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Anthropology Faculty Publications
While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology
Development Of Digital Control Systems For Wearable Mechatronic Devices: Applications In Musculoskeletal Rehabilitation Of The Upper Limb, 2018 The University of Western Ontario
Development Of Digital Control Systems For Wearable Mechatronic Devices: Applications In Musculoskeletal Rehabilitation Of The Upper Limb, Tyler Desplenter
Electronic Thesis and Dissertation Repository
The potential for wearable mechatronic systems to assist with musculoskeletal rehabilitation of the upper limb has grown with the technology. One limiting factor to realizing the benefits of these devices as motion therapy tools is within the development of digital control solutions. Despite many device prototypes and research efforts in the surrounding fields, there are a lack of requirements, details, assessments, and comparisons of control system characteristics, components, and architectures in the literature. Pairing this with the complexity of humans, the devices, and their interactions makes it a difficult task for control system developers to determine the best solution for ...
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, 2018 Georgia Southern University
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...
Developing High Performance Grid Computing Systems On A Budget, 2018 Embry-Riddle Aeronautical University
Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley
Undergraduate Research Symposium - Prescott
High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, 2018 Kennesaw State University
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Master of Science in Computer Science Theses
With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices ...
Teaching Adult Learners On Software Architecture Design Skills, 2018 Singapore Management University
Teaching Adult Learners On Software Architecture Design Skills, Eng Lieh Ouh, Yunghans Irawan
Research Collection School Of Information Systems
Software architectures present high-level views ofsystems, enabling developers to abstract away the unnecessarydetails and focus on the overall big picture. Designing a softwarearchitecture is an essential skill in software engineering and adultlearners are seeking this skill to further progress in their career.With the technology revolution and advancements in this rapidlychanging world, the proportion of adult learners attendingcourses for continuing education are increasing. Their learningobjectives are no longer to obtain good grades but the practicalskills to enable them to perform better in their work and advancein their career. Teaching software architecture to upskill theseadult learners requires contending with the problem ...
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, 2018 Singapore Management University
Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan
Research Collection School Of Information Systems
This paper shares our insights on exploring theexperiential learning model and risk management process todesign an undergraduate software architecture course. The keychallenge for undergraduate students to appreciate softwarearchitecture design is usually their limited experience in thesoftware industry. In software architecture, the high-level designprinciples are heuristics lacking the absoluteness of firstprinciples which for inexperienced undergraduate students, thisis a frustrating divergence from what they used to value. From aneducator's perspective, teaching software architecture requirescontending with the problem of how to express this level ofabstraction practically and also make the learning realistic. Inthis paper, we propose a model adapting the concepts ofexperiential ...
Minutes & Seconds: The Scientists, 2018 Long Island University - C W Post Campus
Minutes & Seconds: The Scientists, Patrick Aievoli
Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton
In creating Minutes & Seconds, Aievoli has assembled an ...
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
The African Journal of Information Systems
Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...
Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, 2018 Purdue University
Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, Zhao Xing Lim, Mohammad Jahanshahi, Tarutal Ghosh Mondal, Da Cheng, Shutao Wang, Mohammad K. Sweidan, Aanis Ahmad, Omar Hesham Abouhussein, Xi Chen
The Summer Undergraduate Research Fellowship (SURF) Symposium
Road defects such as potholes, humps, and road cracks have become one of the main concerns for road and traffic safety worldwide. Pavement defect detection is crucial to ensure road safety. However, current solutions to this problem are either too time-consuming or too expensive to be employed large-scale. We propose a novel approach which has the ability to autonomously detect potholes in real-time using cost-effective sensors. Inexpensive sensors are mounted on a vehicle and a deep learning algorithm is used to identify road defects. The detection system is paired with a GPS and positional sensors to map the location of ...
Sort Vs. Hash Join On Knights Landing Architecture, 2018 Purdue University
Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin
The Summer Undergraduate Research Fellowship (SURF) Symposium
With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join ...
Fusing Multi-Abstraction Vector Space Models For Concern Localization, 2018 Singapore Management University
Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun Zhang, David Lo, Xin Xia, Giuseppe Scanniello, Tien-Duy B. Le, Jianling Sun
Research Collection School Of Information Systems
Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that are relevant to the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose a multi-abstraction ...
Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, 2018 Carnegie Mellon University
Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian
Journal of Public Transportation
This paper introduces a novel transit data analytics platform for public transit planning, assessing service quality and revealing service problems in high spatiotemporal resolution for public transit systems based on Automatic Passenger Counting (APC) and Automatic Vehicle Location (AVL) technologies. The platform offers a systematic way for users and decision makers to understand system performance from many aspects of service quality, including passenger waiting time, stop-skipping frequency, bus bunching level, bus travel time, on-time performance, and bus fullness. The AVL-APC data from September 2012 to March 2016 were archived in a database to support the development of a user-friendly web ...
Investigating On Through Glass Via Based Rf Passives For 3-D Integration, 2018 Ningbo University
Investigating On Through Glass Via Based Rf Passives For 3-D Integration, Libo Qian, Jifei Sang, Yinshui Xia, Jian Wang, Peiyi Zhao
Mathematics, Physics, and Computer Science Faculty Articles and Research
Due to low dielectric loss and low cost, glass is developed as a promising material for advanced interposers in 2.5-D and 3-D integration. In this paper, through glass vias (TGVs) are used to implement inductors for minimal footprint and large quality factor. Based on the proposed physical structure, the impact of various process and design parameters on the electrical characteristics of TGV inductors is investigated with 3-D electromagnetic simulator HFSS. It is observed that TGV inductors have identical inductance and larger quality factor in comparison with their through silicon via counterparts. Using TGV inductors and parallel plate capacitors, a ...
Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, 2018 California State University, San Bernardino
Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam
Electronic Theses, Projects, and Dissertations
Indoor Positioning System (IPS) focuses on locating objects inside
Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings.  IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library ...
Development Of A Fully Instrumented, Resonant Tensegrity Strut, 2018 Union College
Development Of A Fully Instrumented, Resonant Tensegrity Strut, Kentaro Barhydt
A tensegrity is a structure composed of a series of rigid members connected in static equilibrium by tensile elements. A vibrating tensegrity robot is an underactuated system in which a set of its struts are vibrated at certain frequency combinations to achieve various locomotive gaits. Evolutionary robotics research lead by Professor John Rieffel focuses on exploiting the complex dynamics of tensegrity structures to control locomotion in vibrating tensegrity robots by finding desired gaits using genetic algorithms. A current hypothesis of interest is that the optimal locomotive gaits of a vibrating tensegrity exist at its resonant frequencies.
In order to observe ...
Role Of Diagnostic Monitoring Software Versus Fault-Tolerant Components In The Development Of Spacecraft Avionics Systems, Andrew Attorri
In any spacecraft, there are several systems that must work simultaneously to ensure a safe mission. One critical system is the ‘avionics’ system, which is comprised of all of the electronic controls on-board the spacecraft, as well as radio links to other craft and ground stations. These systems are present for both manned or unmanned spacecraft.
Throughout the history of spaceflight, there have been several disasters related to avionics failures. To make these systems safer and more reliable, two main strategies have been adopted. The first, more established approach is through use of fault-tolerant components, which can operate under a ...
Corridor Navigation For Monocular Vision Mobile Robots, 2018 California Polytechnic State University, San Luis Obispo
Corridor Navigation For Monocular Vision Mobile Robots, Matthew James Ng
Master's Theses and Project Reports
Monocular vision robots use a single camera to process information about its environment. By analyzing this scene, the robot can determine the best navigation direction. Many modern approaches to robot hallway navigation involve using a plethora of sensors to detect certain features in the environment. This can be laser range finders, inertial measurement units, motor encoders, and cameras.
By combining all these sensors, there is unused data which could be useful for navigation. To draw back and develop a baseline approach, this thesis explores the reliability and capability of solely using a camera for navigation. The basic navigation structure begins ...