Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

680 Full-Text Articles 875 Authors 311824 Downloads 58 Institutions

All Articles in Other Computer Engineering

Faceted Search

680 full-text articles. Page 1 of 27.

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio 2017 Dublin Institute of Technology

Propagating Degrees Of Truth On An Argumentation Framework: An Abstract Account Of Fuzzy Argumentation, Pierpaolo Dondio

Conference papers

This paper proposes a computational framework to reason with conflicting and gradual evidence. The framework is a synthesis of Dung’s seminal work in argumentation semantics with multi-valued logic. Abstract grounded semantics is used to identify the conditions under which a conclusion can be accepted, while multi-valued logic operators are used to quantify the degree of truth of such conditions. We propose a truth-compositional recursive computation based on the notion of irrelevant arguments, and we discuss examples using the major multi-valued logics: Godel’s, Zadeh’s and Łukasiewicz's logic.


Coyotelab - Linux Containers For Educational Use, Michael D. Korcha 2016 California State University - San Bernardino

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha

Electronic Theses, Projects, and Dissertations

CoyoteLab is an exploration in the use of Linux container technology as a means to simplify the way students in computing fields access and complete laboratory work in their educational career. This project provides two main benefits: creating a simple way for students to log in and access their coursework without anything more than their web browser, and providing course instructors a way to verify that assigned work is completed successfully. Thanks to advances in container technology and the advent of WebSockets, this becomes a middle layer between a WebSocket opened up on the client’s browser and the SSH ...


Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey 2016 University of Tennessee, Knoxville

Architecture For Real-Time, Low-Swap Embedded Vision Using Fpgas, Steven Andrew Clukey

Masters Theses

In this thesis we designed, prototyped, and constructed a printed circuit board for real-time, low size, weight, and power (SWaP) HDMI video processing and developed a general purpose library of image processing functions for FPGAs.

The printed circuit board is a baseboard for a Xilinx Zynq based system-on-module (SoM). The board provides power, HDMI input, and HDMI output to the SoM and enables low-SWaP, high-resolution, real-time video processing.

The image processing library for FPGAs is designed for high performance and high reusability. These objectives are achieved by utilizing the Chisel hardware construction language to create parameterized modules that construct low-level ...


Harmonic Scale Transformations, John H. Chalmers 2016 University of California, San Diego

Harmonic Scale Transformations, John H. Chalmers

The STEAM Journal

My artwork derives from a project to delineate the transformations certain types of harmonic musical scales undergo as the sizes of their generating intervals vary over the space of the octave.


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly 2016 La Salle University

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information ...


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen LI, Tong Wang, Dongqiao Zhang 2016 Huazhong University of Science and Technology

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

Tong Wang

No abstract provided.


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen LI, Tong Wang, Dongqiao Zhang 2016 Huazhong University of Science and Technology

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu 2016 University of Science and Technology Beijing

Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu 2016 Norfolk State University

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to ...


Empirical Comparative Analysis Of 1-Of-K Coding And K-Prototypes In Categorical Clustering, Fei Wang, Hector Franco, John Pugh, Robert Ross 2016 Dublin Institute of Technology

Empirical Comparative Analysis Of 1-Of-K Coding And K-Prototypes In Categorical Clustering, Fei Wang, Hector Franco, John Pugh, Robert Ross

Conference papers

Clustering is a fundamental machine learning application, which partitions data into homogeneous groups. K-means and its variants are the most widely used class of clustering algorithms today. However, the original k-means algorithm can only be applied to numeric data. For categorical data, the data has to be converted into numeric data through 1-of-K coding which itself causes many problems. K-prototypes, another clustering algorithm that originates from the k-means algorithm, can handle categorical data by adopting a different notion of distance. In this paper, we systematically compare these two methods through an experimental analysis. Our analysis shows that K-prototypes is more ...


Cyber Security Training Tools For The Nuclear Energy Sector, VU A. PHAM 8969082 2016 California State University, Sacramento

Cyber Security Training Tools For The Nuclear Energy Sector, Vu A. Pham 8969082

STAR (STEM Teacher and Researcher) Presentations

Nowadays, cyber security should be a priority for everyone when they connect their laptop to the internet; however, not many internet users have sufficient knowledge about cyber security. A cyberattack on an individual’s computer could result in the loss of personal information, financial information, or other resources. The damage from a cyberattack on a nuclear facility or other critical infrastructure could have much greater consequences. The attackers could impact the confidentiality of data, the availability of key systems, or the integrity of those safety or operating systems. Therefore, the National Nuclear Security Administration has tasked Pacific Northwest National Laboratory ...


A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim 2016 Boise State University

A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim

Boise State University Theses and Dissertations

The quality of indoor air depends on different types of pollutant sources existing in a semi-enclosed environment. The sources can be biological, chemical, or toxic pollutants. These sources can cause health issues and discomfort for occupants. One of the indicators of poor indoor air quality is Carbon Dioxide (CO2). CO2 can be used to indicate the indoor air exchange rate. The lack of air exchange means higher levels of CO2. High levels of indoor particulates can also be an indication of poor air quality. Due to the lack of fresh air, air circulation, and air filtration, the ...


Inducing Emotional Response In Interactive Media, Keenan M. Reimer 2016 California Polytechnic State University, San Luis Obispo

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses and Project Reports

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects ...


Extending Capability And Implementing A Web Interface For The Xalt Software Monitoring Tool, Kapil Agrawal 2016 University of Tennessee, Knoxville

Extending Capability And Implementing A Web Interface For The Xalt Software Monitoring Tool, Kapil Agrawal

Masters Theses

As high performance computing centers evolve in terms of hardware, software, and user-base, the act of monitoring and managing such systems requires specialized tools. The tool discussed in this thesis is XALT, which is a collaborative effort between the National Institute for Computational Sciences and Texas Advanced Computing Center. XALT is designed to track link-time and job level information for applications that are compiled and executed on any Linux cluster, workstation, or high-end supercomputer. The key objectives of this work are to extend the existing functionality of XALT and implement a real-time web portal to easily visualize the tracked data ...


Design Of Modified Low Power And High Speed Carry Select Adder Using Brent Kung Adder, Amala Maria Alex, Nidhish Antony 2016 Mangalam college of Engineering, Kottayam, Kerala, India

Design Of Modified Low Power And High Speed Carry Select Adder Using Brent Kung Adder, Amala Maria Alex, Nidhish Antony

Kirat Pal Singh

In order to perform the addition of two numbers adder is used. Adder also forms the integral part of ALU. Besides this application of adder in computer, it is also employed to calculate address and indices and also operation codes. Different algorithm in Digital Signal Processing such as FIR and IIR are also employed using adder. What all matter is speed and so it is the most important constraint. The important areas of VLSI areas are low power, high speed and data logic design. In Carry Select adder the possible value of input carry are 0 and 1. So in ...


Scale Up Bayesian Network Learning, Xiannian Fan 2016 Graduate Center, City University of New York

Scale Up Bayesian Network Learning, Xiannian Fan

All Graduate Works by Year: Dissertations, Theses, and Capstone Projects

Bayesian networks are widely used graphical models which represent uncertain relations between the random variables in a domain compactly and intuitively. The first step of applying Bayesian networks to real-word problems is typically building the network structure. Optimal structure learning via score-and-search has become an active research topic in recent years. In this context, a scoring function is used to measure the goodness of fit of a structure to given data, and the goal is to find the structure which optimizes the scoring function. The problem has been viewed as a shortest path problem, and has been shown to be ...


Fulfilling A Restful Commitment: Test-Suite Generation For Swagger-Based Rest Apis, Noah Dietz 2016 California Polytechnic State University, San Luis Obispo

Fulfilling A Restful Commitment: Test-Suite Generation For Swagger-Based Rest Apis, Noah Dietz

Computer Science

An application programming interface (API) can be the most integral part of a product or service. APIs drive businesses and innovation in all aspects of technology and they rely on descriptive frameworks to detail what they have to offer. These descriptive frameworks are a rich source of information on a variety of levels, such as usage, best-practices and even basic implications towards the underlying implementation. The motivation of this project during my internship was to exploit this wealth of information in order to create a description-based, or contract-based, unit test generation tool specifically for Swagger-based REST APIs and to encourage ...


Slo Dancing, Ryan Moelter, Audrey Bruscia, Matthew Smith 2016 California Polytechnic State University, San Luis Obispo

Slo Dancing, Ryan Moelter, Audrey Bruscia, Matthew Smith

Computer Engineering

No abstract provided.


Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford 2016 California Polytechnic State University, San Luis Obispo

Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford

Computer Engineering

This paper presents Duck Watch, a proof of concept for a smart swimming pool. With our system, a swimmer will be able to log on to our website prior to leaving his or her house to help them decide if the conditions are favorable to go to a public lap swimming pool. Our system will inform the user of a number of environmental factors such as water temperature, exterior temperature, and humidity, as well as whether or not there are any open lanes currently.


Modeling And Python Scripting In Maya For The Animation Short Style, Gilenn Emille G. Collado 2016 California Polytechnic State University, San Luis Obispo

Modeling And Python Scripting In Maya For The Animation Short Style, Gilenn Emille G. Collado

Computer Engineering

The computer animation and graphics industry has dramatically improved over the years alongside the growth of technology. This paper discusses how that came about through a specific tool called Maya. It talks about its features and what it can create for you and the world. It also describes how scripting can simplify a job and make more of it. It highlights the effectiveness of the ability to manipulate code to create something amazing.


Digital Commons powered by bepress