Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

688 Full-Text Articles 889 Authors 316682 Downloads 58 Institutions

All Articles in Other Computer Engineering

Faceted Search

688 full-text articles. Page 1 of 27.

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio 2017 Dublin Institute of Technology

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio

Conference papers

This paper proposes a computational framework to reason with conflicting and gradual evidence. The framework is a synthesis of Dung’s seminal work in argumentation semantics with multi-valued logic. Abstract grounded semantics is used to identify the conditions under which a conclusion can be accepted, while multi-valued logic operators are used to quantify the degree of truth of such conditions. We propose a truth-compositional recursive computation based on the notion of irrelevant arguments, and we discuss examples using the major multi-valued logics: Godel’s, Zadeh’s and Łukasiewicz's logic.


Android Mobile Application For Hospital Executives, Vihitha Nalagatla 2017 California State University - San Bernardino

Android Mobile Application For Hospital Executives, Vihitha Nalagatla

Electronic Theses, Projects, and Dissertations

Hospitals are the largest and most complex organizations where health care is provided. Safe and effective patient care services in hospitals depend on the efficient decisions made by hospital executives. The main task of hospital executives is to ensure the hospital can provide high quality patient care and services. “Android Mobile Application For Hospital Executives” is an Android application used for displaying hospital performance metrics on a daily basis. This application allows hospital executives to review and monitor hospital operational data with ease of access and in a portable manner. Thus, reducing the effort of the hospital executives to perform ...


Coyotelab - Linux Containers For Educational Use, Michael D. Korcha 2016 California State University - San Bernardino

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha

Electronic Theses, Projects, and Dissertations

CoyoteLab is an exploration in the use of Linux container technology as a means to simplify the way students in computing fields access and complete laboratory work in their educational career. This project provides two main benefits: creating a simple way for students to log in and access their coursework without anything more than their web browser, and providing course instructors a way to verify that assigned work is completed successfully. Thanks to advances in container technology and the advent of WebSockets, this becomes a middle layer between a WebSocket opened up on the client’s browser and the SSH ...


Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey 2016 University of Tennessee, Knoxville

Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey

Masters Theses

In this thesis we designed, prototyped, and constructed a printed circuit board for real-time, low size, weight, and power (SWaP) HDMI video processing and developed a general purpose library of image processing functions for FPGAs.

The printed circuit board is a baseboard for a Xilinx Zynq based system-on-module (SoM). The board provides power, HDMI input, and HDMI output to the SoM and enables low-SWaP, high-resolution, real-time video processing.

The image processing library for FPGAs is designed for high performance and high reusability. These objectives are achieved by utilizing the Chisel hardware construction language to create parameterized modules that construct low-level ...


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez 2016 California Polytechnic State University, San Luis Obispo

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT application ...


Electronic Deer Warning System, David Zhuo, Anlang Lu 2016 California Polytechnic State University, San Luis Obispo

Electronic Deer Warning System, David Zhuo, Anlang Lu

Computer Engineering

Deer-vehicle collisions (DVCs) are extremely dangerous, often injuring or even killing drivers. Unfortunately, this form of automotive accident is commonplace in the United States. According to the NHTSA, DVCs result in 200 human deaths a year.2

Despite these deadly incidents, there currently are no deployed federal or state systems for preventing DVCs. There are many consumer electronic deer deterrent products, but their long-term effectiveness is questionable.3 In fact, there does not appear to be much research into electronic deer deterrent systems. Aside from constant audio output and electric shock, no other means of electronic deterrent exist. Even if ...


Rgb Painting Simulation, Brandon Eng 2016 California Polytechnic State University, San Luis Obispo

Rgb Painting Simulation, Brandon Eng

Computer Engineering

No abstract provided.


Harmonic Scale Transformations, John H. Chalmers 2016 University of California, San Diego

Harmonic Scale Transformations, John H. Chalmers

The STEAM Journal

My artwork derives from a project to delineate the transformations certain types of harmonic musical scales undergo as the sizes of their generating intervals vary over the space of the octave.


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly 2016 La Salle University

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information ...


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen LI, Tong Wang, Dongqiao Zhang 2016 Huazhong University of Science and Technology

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

Tong Wang

No abstract provided.


Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney 2016 California Polytechnic State University, San Luis Obispo

Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney

Master's Theses and Project Reports

The convenience of mobile applications combined with the efficiency and effectiveness provided by technology has contributed to an increased interest in mobile applications. Local groups and non-profit organizations often utilize outdated, manual processes and don’t have the resources or time to look into improving these systems. For Cal Poly students and other members of the community, this means there is an opportunity to apply technical skills and school projects to address these inefficiencies. This work explores whether a better system can be developed to provide the functionality of the existing system and enhance the experience of users through technology ...


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen LI, Tong Wang, Dongqiao Zhang 2016 Huazhong University of Science and Technology

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu 2016 University of Science and Technology Beijing

Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu 2016 Norfolk State University

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to ...


Empirical Comparative Analysis Of 1-Of-K Coding And K-Prototypes In Categorical Clustering, Fei Wang, Hector Franco, John Pugh, Robert Ross 2016 Dublin Institute of Technology

Empirical Comparative Analysis Of 1-Of-K Coding And K-Prototypes In Categorical Clustering, Fei Wang, Hector Franco, John Pugh, Robert Ross

Conference papers

Clustering is a fundamental machine learning application, which partitions data into homogeneous groups. K-means and its variants are the most widely used class of clustering algorithms today. However, the original k-means algorithm can only be applied to numeric data. For categorical data, the data has to be converted into numeric data through 1-of-K coding which itself causes many problems. K-prototypes, another clustering algorithm that originates from the k-means algorithm, can handle categorical data by adopting a different notion of distance. In this paper, we systematically compare these two methods through an experimental analysis. Our analysis shows that K-prototypes is more ...


Cyber Security Training Tools For The Nuclear Energy Sector, VU A. PHAM 8969082 2016 California State University, Sacramento

Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham 8969082

STAR (STEM Teacher and Researcher) Presentations

Nowadays, cyber security should be a priority for everyone when they connect their laptop to the internet; however, not many internet users have sufficient knowledge about cyber security. A cyberattack on an individual’s computer could result in the loss of personal information, financial information, or other resources. The damage from a cyberattack on a nuclear facility or other critical infrastructure could have much greater consequences. The attackers could impact the confidentiality of data, the availability of key systems, or the integrity of those safety or operating systems. Therefore, the National Nuclear Security Administration has tasked Pacific Northwest National Laboratory ...


A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim 2016 Boise State University

A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim

Boise State University Theses and Dissertations

The quality of indoor air depends on different types of pollutant sources existing in a semi-enclosed environment. The sources can be biological, chemical, or toxic pollutants. These sources can cause health issues and discomfort for occupants. One of the indicators of poor indoor air quality is Carbon Dioxide (CO2). CO2 can be used to indicate the indoor air exchange rate. The lack of air exchange means higher levels of CO2. High levels of indoor particulates can also be an indication of poor air quality. Due to the lack of fresh air, air circulation, and air filtration, the ...


Extending Capability And Implementing A Web Interface For The Xalt Software Monitoring Tool, Kapil Agrawal 2016 University of Tennessee, Knoxville

Extending Capability And Implementing A Web Interface For The Xalt Software Monitoring Tool, Kapil Agrawal

Masters Theses

As high performance computing centers evolve in terms of hardware, software, and user-base, the act of monitoring and managing such systems requires specialized tools. The tool discussed in this thesis is XALT, which is a collaborative effort between the National Institute for Computational Sciences and Texas Advanced Computing Center. XALT is designed to track link-time and job level information for applications that are compiled and executed on any Linux cluster, workstation, or high-end supercomputer. The key objectives of this work are to extend the existing functionality of XALT and implement a real-time web portal to easily visualize the tracked data ...


Inducing Emotional Response In Interactive Media, Keenan M. Reimer 2016 California Polytechnic State University, San Luis Obispo

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses and Project Reports

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects ...


Design Of Modified Low Power And High Speed Carry Select Adder Using Brent Kung Adder, Amala Maria Alex, Nidhish Antony 2016 Mangalam college of Engineering, Kottayam, Kerala, India

Design Of Modified Low Power And High Speed Carry Select Adder Using Brent Kung Adder, Amala Maria Alex, Nidhish Antony

Kirat Pal Singh

In order to perform the addition of two numbers adder is used. Adder also forms the integral part of ALU. Besides this application of adder in computer, it is also employed to calculate address and indices and also operation codes. Different algorithm in Digital Signal Processing such as FIR and IIR are also employed using adder. What all matter is speed and so it is the most important constraint. The important areas of VLSI areas are low power, high speed and data logic design. In Carry Select adder the possible value of input carry are 0 and 1. So in ...


Digital Commons powered by bepress