Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

726 Full-Text Articles 992 Authors 363420 Downloads 71 Institutions

All Articles in Other Computer Engineering

Faceted Search

726 full-text articles. Page 1 of 29.

How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto 2017 University of Massachusetts Medical School

How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto

National Network of Libraries of Medicine New England Region (NNLM NER) Repository

Numerous systematic reviews of health-related mobile apps reveal they lack evidence based content. A major challenge to including evidence based content in apps is how to efficiently find accurate, credible, and vetted content. The National Library of Medicine houses the largest biomedical library in the world and provides numerous expert-developed online resources on disease and health education. In this webinar, Susan Halpin of the National Library of Medicine will introduce attendees to those resources, give examples of how they can and have been used in mobile apps, and discuss funding opportunities offered by the NLM.


2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris 2017 Southern Illinois University Carbondale

2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris

ASA Multidisciplinary Research Symposium

Evaluating the capabilities of Raspberry Pi computers to be used in embedded glass cockpit applications for experimental aircraft. This includes details of what is required for these applications as well as how well the Raspberry Pi 3B can perform in this role.


Priority Based Dynamic Resource Allocation In Cloud Computing, Chandrashekhar Pawar 2017 North Maharashtra University

Priority Based Dynamic Resource Allocation In Cloud Computing, Chandrashekhar Pawar

Chandrashekhar Pawar

Today cloud computing is on demand as it offers dynamic flexible resource allocation,
for reliable and guaranteed services in pay-as-you-use manner, to cloud service
user. In Cloud computing multiple cloud users can request number of cloud services
simultaneously. So there must be a provision that all resources are made available
to requesting users in efficient manner to satisfy their need. This resource provisioning
is done by considering the Service Level Agreements (SLA), which is a contract
signed among the customers and cloud service providers and with the help of parallel
processing. Recent work considers various strategies with single SLA parameters ...


In Search Of Homo Sociologicus, Yunqi Xue 2017 The Graduate Center, City University of New York

In Search Of Homo Sociologicus, Yunqi Xue

All Graduate Works by Year: Dissertations, Theses, and Capstone Projects

The subject of this dissertation is to build an epistemic logic system that is able to show the spreading of knowledge and beliefs in a social network that contains multiple subgroups. Epistemic logic is the study of logical systems that express mathematical properties of knowledge and belief. In recent years, there have been increasing number of new epistemic logic systems that are focused on community properties such as knowledge and belief adoption among friends.

We are interested in revisable and actionable social knowledge/belief that leads to a large group action. Instead of centralized coordination, bottom-up approach is our focus ...


Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang 2017 California State University, San Bernardino

Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang

Electronic Theses, Projects, and Dissertations

Natural Language Processing (NLP) is the field of study that focuses on the interactions between human language and computers. By “natural language” we mean a language that is used for everyday communication by humans. Different from programming languages, natural languages are hard to be defined with accurate rules. NLP is developing rapidly and it has been widely used in different industries. Technologies based on NLP are becoming increasingly widespread, for example, Siri or Alexa are intelligent personal assistants using NLP build in an algorithm to communicate with people. “Natural Language Processing Based Generator of Testing Instruments” is a stand-alone program ...


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow 2017 University of Pennsylvania Law School

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami 2017 Louisiana State University and Agricultural and Mechanical College

Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami

LSU Doctoral Dissertations

The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't ...


Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang 2017 The University of Texas MD Anderson Cancer Center UTHealth Graduate School of Biomedical Sciences

Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang

UT GSBS Dissertations and Theses (Open Access)

The mortality rate of cervical cancer is approximately 266,000 people each year, and 70% of the burden occurs in Low- and Middle- Income Countries (LMICs). Radiation therapy is the primary modality for treatment of locally advanced cervical cancer cases. In the absence of high quality diagnostic imaging needed to identify nodal metastasis, many LMIC sites treat standard pelvic fields, failing to include node metastasis outside of the field and/or to boost lymph nodes in the abdomen and pelvis. The first goal of this project was to create a program which automatically identifies positive cervical cancer lymph nodes on ...


Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi 2017 University of Louisville

Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi

Electronic Theses and Dissertations

While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race ...


Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson 2017 University of Missouri - St Louis

Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson

Maurice Dawson

This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets; 1. Security Solutions for Hyperconnectivity and the Internet of Things, 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 4. International Journal of Business Continuity and Risk Management, 5. Handbook of ...


Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha 2017 University of New Mexico - Main Campus

Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha

Electrical and Computer Engineering ETDs

A college student's success depends on many factors including pre-university characteristics and university student support services. Student graduation rates are often used as an objective metric to measure institutional effectiveness. This work studies the impact of such factors on graduation rates, with a particular focus on delay in graduation. In this work, we used feature selection methods to identify a subset of the pre-institutional features with the highest discriminative power. In particular, Forward Selection with Linear Regression, Backward Elimination with Linear Regression, and Lasso Regression were applied. The feature sets were selected in a multivariate fashion. High school GPA ...


Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger 2017 Iowa State University

Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger

Randall Geiger

Structural Health Monitoring (SHM) of transportation infrastructures is a complex task, typically conducted by visual inspection due to the technical and economical constrains of existing health monitoring technologies. It results that health monitoring is highly dependent on scheduling and on the judgment of the inspectors, which can be costly and ineffective. Thus, it is fundamental to automate the SHM process to allow timely inspection, maintenance, and management of transportation infrastructure. The authors propose a flexible membrane that can be deployed over large surfaces, at low cost, for automatic and continuous monitoring of strains. The membrane, termed sensing skin, is constituted ...


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer DR, Michael McKeever, Jonathan Blackledge Professor 2017 Dublin Institute of Technology

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Professor

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version ...


The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover 2017 University of Iowa

The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover

Diane Rover

This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed ...


Daily Dose, Ken H. Yasui, Joey M. Angeja 2017 California Polytechnic State University, San Luis Obispo

Daily Dose, Ken H. Yasui, Joey M. Angeja

Computer Engineering

The project goal is to develop a medication and vitamin management device that will sort and dispense pre-configured amounts of pills at designated times . The main clientele of this device is the elderly community with a secondary client base of the general public. The entire system is designed from scratch, powered by US standard line voltage. The main functionalities of the device are the ability to store multiple types of pills and the ability to accurately handle user input and data transfer. The two engineering specifications that were not met included the desired pill pick up rate and dimensions of ...


Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto 2017 California Polytechnic State University, San Luis Obispo

Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto

Computer Engineering

The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.


Sublimesurf, Nathan Sfard, Karis Russell 2017 California Polytechnic State University, San Luis Obispo

Sublimesurf, Nathan Sfard, Karis Russell

Computer Engineering

Surf conditions change rapidly day to day and location to location, which forces modern day surfers to utilize online forecasts and obtain a detailed knowledge of the places they want to surf. To ease this pain, we are developing SublimeSurf, an iOS application that will keep track of the current surf conditions and allow users to rate aspects of the surf. We plan to use this rating data in combination with surf forecast data available online to notify a user when conditions look favorable, based on their previous ratings. We also intend to mine the data submitted by all users ...


Slither.Io Deep Learning Bot, James Caudill 2017 California Polytechnic State University, San Luis Obispo

Slither.Io Deep Learning Bot, James Caudill

Computer Engineering

Recent advances in deep learning and computer vision techniques and algorithms have inspired me to create a model application. The game environment used is Slither.io. The system has no previous understanding of the game and is able to learn its surroundings through feature detection and deep learning. Contrary to other agents, my bot is able to dynamically learn and react to its environment. It operates extremely well in early game, with little enemy encounters. It has difficulty transitioning to middle and late game due to limited training time. I will continue to develop this algorithm.


Multispectral Identification Array, Zachary D. Eagan 2017 California Polytechnic State University, San Luis Obispo

Multispectral Identification Array, Zachary D. Eagan

Computer Engineering

The Multispectral Identification Array is a device for taking full image spectroscopy data via the illumination of a subject with sixty-four unique spectra. The array combines images under the illumination spectra to produce an approximate reflectance graph for every pixel in a scene. Acquisition of an entire spectrum allows the array to differentiate objects based on surface material. Spectral graphs produced are highly approximate and should not be used to determine material properties, however the output is sufficiently consistent to allow differentiation and identification of previously sampled subjects. While not sufficiently advanced for use as a replacement to spectroscopy the ...


Cpu Db Data Visualization, Ruchita Patel, Marek Moreno 2017 California Polytechnic State University, San Luis Obispo

Cpu Db Data Visualization, Ruchita Patel, Marek Moreno

Computer Engineering

Given the CPU database from Stanford, we wanted to create something that portrayed the data in a more visually pleasing way. The CPU database website wanted a web page that would allow users to create graphs based on the processor data from the database. The web page would allow users to select different data from the database and create the graphs they wanted to gain insight into the decades of processor data.


Digital Commons powered by bepress