Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

684 Full-Text Articles 983 Authors 372,044 Downloads 81 Institutions

All Articles in Other Computer Engineering

Faceted Search

684 full-text articles. Page 1 of 29.

The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales 2019 University of Kentucky

The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales

Manuscript Studies

This paper presents a software framework for the registration and visualization of layered image sets. To demonstrate the utility of these tools, we apply them to the St. Chad Gospels manuscript, relying on images of each page of the document as it appeared over time. An automated pipeline is used to perform non-rigid registration on each series of images. To visualize the differences between copies of the same page, a registered image viewer is constructed that enables direct comparisons of registered images. The registration pipeline and viewer for the resulting aligned images are generalized for use with other data sets.


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla 2018 California State University, San Bernardino

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


Social Network For Software Developers, Sanket Prabhakar Jadhav 2018 California State University - San Bernardino

Social Network For Software Developers, Sanket Prabhakar Jadhav

Electronic Theses, Projects, and Dissertations

This project is the design and implementation of a web-based message board for software developers. The purpose of “Social Network for Software Developers” is to connect inexperienced software developers with experienced software developers.


Exploring Photo Privacy Protection On Smartphones, David Darling 2018 University of Arkansas, Fayetteville

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence ...


A Survey Of Virtual Network Architectures, Lenoy Avidan 2018 California Polytechnic State University, San Luis Obispo

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures ...


Localization Using Convolutional Neural Networks, Shannon D. Fong 2018 California Polytechnic State University, San Luis Obispo

Localization Using Convolutional Neural Networks, Shannon D. Fong

Computer Engineering

With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These ...


Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist 2018 California Polytechnic State University, San Luis Obispo

Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist

Architectural Engineering

Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic ...


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie 2018 Kennesaw State University

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 ...


A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert 2018 Southwestern Oklahoma State University

A Validation Study Of Time Series Data Forecasting Using Neural Networks, Marco Martinez, Jeremy Evert

Student Research

Artificial Intelligence(AI) is a growing topic in Computer Science and has many uses in real world applications. One application is using Al, or more specifically Neural Networks to model data and predict outcomes. Neural Networks have been used in the past to predict weather changes, create facial recognition software , and to create self-driving cars. Our project is a validation study of, “Modeling Time Series Data With Deep Fourier Neural Networks” by Gashler and Ashmore, 2016. Here we show that a neural network can be trained to be an effective predictor of weather patterns in Alaska over several years. Our ...


Effective Methods And Tools For Mining App Store Reviews, Nishant Jha 2018 Louisiana State University and Agricultural and Mechanical College

Effective Methods And Tools For Mining App Store Reviews, Nishant Jha

LSU Doctoral Dissertations

Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these ...


Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn 2018 HU University of Applied Science

Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn

Communications of the IIMA

In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.


Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear 2018 Embry-Riddle Aeronautical University

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia was ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley 2018 Embry-Riddle Aeronautical University

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee 2018 Embry-Riddle Aeronautical University

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online ...


Minutes & Seconds: The Scientists, Patrick Aievoli 2018 Long Island University - C W Post Campus

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an ...


Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani 2018 The University of Western Ontario

Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani

Electronic Thesis and Dissertation Repository

Recurrent Neural Networks (RNN) show a remarkable result in sequence learning, particularly in architectures with gated unit structures such as Long Short-term Memory (LSTM). In recent years, several permutations of LSTM architecture have been proposed mainly to overcome the computational complexity of LSTM. In this dissertation, a novel study is presented that will empirically investigate and evaluate LSTM architecture variants such as Gated Recurrent Unit (GRU), Bi-Directional LSTM, and Dynamic-RNN for LSTM and GRU specifically on detecting network intrusions. The investigation is designed to identify the learning time required for each architecture algorithm and to measure the intrusion prediction accuracy ...


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger 2018 Embry-Riddle Aeronautical University

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

National Training Aircraft Symposium (NTAS)

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick 2018 Purdue University

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – such as ...


Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu 2018 University of Louisville

Spam Elimination And Bias Correction : Ensuring Label Quality In Crowdsourced Tasks., Lingyu Lyu

Electronic Theses and Dissertations

Crowdsourcing is proposed as a powerful mechanism for accomplishing large scale tasks via anonymous workers online. It has been demonstrated as an effective and important approach for collecting labeled data in application domains which require human intelligence, such as image labeling, video annotation, natural language processing, etc. Despite the promises, one big challenge still exists in crowdsourcing systems: the difficulty of controlling the quality of crowds. The workers usually have diverse education levels, personal preferences, and motivations, leading to unknown work performance while completing a crowdsourced task. Among them, some are reliable, and some might provide noisy feedback. It is ...


How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels 2018 Southern Methodist University

How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels

SMU Data Science Review

In this paper, we present a case study evaluating the level of information available about an individual through public, Internet-accessible sources. Privacy is a basic tenet of democratic society, but technological advances have made access to information and the identification of individuals much easier through Internet-accessible databases and information stores. To determine the potential level of privacy available to an individual in today’s interconnected world, we sought to develop a detailed history of Marc Mezvinsky, a semi-public figure, husband of Chelsea Clinton, and son of two former members of the United States House of Representatives. By utilizing only publicly ...


Digital Commons powered by bepress