Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1,384 Full-Text Articles 2,148 Authors 891,923 Downloads 144 Institutions

All Articles in Other Computer Engineering

Faceted Search

1,384 full-text articles. Page 5 of 63.

Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito 2023 Western University

Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito

Electronic Thesis and Dissertation Repository

Science autonomy onboard spacecraft can optimize image return by prioritizing downlink of meaningful data. Martian polygonally cracked ground is actively studied by planetary geologists and may be indicative of subsurface water. Filtering images containing these polygonal features can be used as a case study for science autonomy and to reduce the overhead associated with parsing through Martian surface images. This thesis demonstrates the use of deep learning techniques in the classification of Martian polygonally patterned ground from HiRISE images. Three tasks are considered, a binary classification to identify images containing polygons, multiclass classification distinguishing different polygon types and semantic segmentation …


Synthesis Of Control Systems With Multilayer Neural Networks Based On Velocity Gradient Methods, Oxunjon Boborayimov, Okyay Kaynak 2023 Tashkent State Technical University, Tashkent, Uzbekistan, Address: University street 2, 100095 Tashkent city, Republic of Uzbekistan. E-mail: boborayimov1992@mail.ru;

Synthesis Of Control Systems With Multilayer Neural Networks Based On Velocity Gradient Methods, Oxunjon Boborayimov, Okyay Kaynak

Chemical Technology, Control and Management

In this manuscripts, the synthesis of control systems with multilayer neural networks based on the speed gradient methods is given. For adjusting the weight coefficients of the base processor element, the gradient method of minimizing the learning criterion is used. A procedure for the synthesis of neural network control systems based on the velocity gradient methods has been developed. This guarantees the stabilization of the system under external limited disturbances that are inaccessible to direct measurement. Taking into account the state vector of the control object in the network learning function ensures the consistency of the processes of setting the …


Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi, Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan, E-mail: botirov_fz@mail.ru, Phone:+998-97-751-16-97.

Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov

Chemical Technology, Control and Management

This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.


The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown 2023 CUNY, New York City College of Technology

The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown

Publications and Research

In this study, the offline programming tool RoboDK is used to program industrial robots for the automation sector. The study explores the feasibility of using this non-disruptive robot programming software for classroom use; assesses how well RoboDK can be used to program various robots used in the industry; creates and tests various applications; and pinpoints technical obstacles that prevent a smooth link between offline programming and actual robots. Initial results indicate that RoboDK is an effective tool for deploying its offline programming code to a Universal Robot, UR3e. There are many potential for advanced applications. The goal of the project …


User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed ElHussiny 2023 American University in Cairo

User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny

Theses and Dissertations

With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …


The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany 2023 Technological University Dublin

The First Annual Teaching And Research Showcase Poster Tu Dublin – The Proof Is In The Pudding – Using Perceived Stress To Measure Short-Term Impact In Initiatives To Enhance Gender Balance In Computing Education, Alina Berry, Sarah Jane Delany

Other resources

The problem of gender imbalance in computing higher education has forced academics and professionals to implement a wide range of initiatives. Many initiatives use recruitment or retention numbers as their most obvious evidence of impact. This type of evidence of impact is, however, more resource heavy to obtain, as well as often requires a longitudinal approach. There are many shorter term initiatives that use other ways to measure their success.

First, this poster presents with a review of existing evaluation measures in interventions to recruit and retain women in computing education across the board. Three main groups of evaluation come …


A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee 2023 Macalester College

A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee

Macalester Journal of Physics and Astronomy

A portable component model (PCM) of a ground source heat pump system was developed and used as a test case in the creating of a PCM development framework. By developing this framework, new building energy simulation models will be able to be easily integrated into existing simulation software such as EnergyPlus and the Modelica Buildings Library. Our model uses a time responsive g-function and numerical methods to simulate ground source heat pumps for single time steps as well as long time scales. We validated our model against GHESim and GLHEPro and found that our model agrees with these two standards …


Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin 2023 California Polytechnic State University, San Luis Obispo

Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin

Master's Theses

Massively multiplayer online role-playing games (MMORPGs) are one of the most

popular genres in video games that combine massively multiplayer online genres with

role-playing gameplay. MMORPGs’ featured social interaction and forms of level pro-

gression through quest completion are the core for gaining players’ attention. Varied

and challenging quests play an essential part in retaining that attention. However,

well-crafted content takes much longer to develop with human efforts than it does to

consume, and the dominant procedural content generation models for quests suffer

from the drawback of being incompatible with dynamic world changes and the feeling

of repetition over time. …


Vr Force Feedback Gloves, Mark Wu, Claire Chen 2023 California Polytechnic State University, San Luis Obispo

Vr Force Feedback Gloves, Mark Wu, Claire Chen

Electrical Engineering

The goal of this project is to produce a manufacturing plan for a consumer VR glove. The total addressable market of VR is over 170 million global users as of 2022 (Kolmar , 2022) with a serviceable available market of 300,000 users on Meta’s own social platform (Heath, 2022). The targeted Quest 2 platform utilizes handheld controllers, which causes a lack of immersivity in social settings and gaming scenarios. One common use of the platform involves social platforms such as “Horizons” where users meet in a virtual world to interact; handheld controllers don’t allow users to shake hands, make finger …


Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey 2023 Department of Information Technology, Government College of Engineering & Ceramic Technology

Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey

Al-Bahir Journal for Engineering and Pure Sciences

Twitter is a social media platform where users can post, read, and interact with 'tweets'. Third party like corporate organization can take advantage of this huge information by collecting data about their customers' opinions. The use of emoticons on social media and the emotions expressed through them are the subjects of this research paper. The purpose of this paper is to present a model for analyzing emotional responses to real-life Twitter data. The proposed model is based on supervised machine learning algorithms and data on has been collected through crawler “TWEEPY” for empirical analysis. Collected data is pre-processed, pruned and …


A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar 2023 Department of Computer Applications, Bhilai Institute of Technology, Durg, (C.G.), India

A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar

Karbala International Journal of Modern Science

Automatic identification of insects and diseases has attracted researchers for the last few years. Researchers have suggested several algorithms to get around the problems of manually identifying insects and pests. Image processing techniques and deep convolution neural networks can overcome the challenges of manual insect identification and classification. This work focused on optimizing and assessing deep convolutional neural networks for insect identification. AlexNet, MobileNetv2, ResNet-50, ResNet-101, GoogleNet, InceptionV3, SqueezeNet, ShuffleNet, DenseNet201, VGG-16 and VGG-19 are the architectures evaluated on three different datasets. In our experiments, DenseNet 201 performed well with the highest test accuracy. Regarding training time, AlexNet performed well, …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan 2023 Washington University in St. Louis

Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan

McKelvey School of Engineering Theses & Dissertations

Trajectory prediction is an integral component of modern autonomous systems as it allows for envisioning future intentions of nearby moving agents. Due to the lack of other agents' dynamics and control policies, deep neural network (DNN) models are often employed for trajectory forecasting tasks. Although there exists an extensive literature on improving the accuracy of these models, there is a very limited number of works studying their robustness against adversarially crafted input trajectories. To bridge this gap, in this paper, we propose a targeted adversarial attack against DNN models for trajectory forecasting tasks. We call the proposed attack TA4TP for …


Enabling The Integration Of Sustainable Design Methodological Frameworks And Computational Life Cycle Assessment Tools Into Product Development Practice, Tejaswini Chatty 2023 Dartmouth College

Enabling The Integration Of Sustainable Design Methodological Frameworks And Computational Life Cycle Assessment Tools Into Product Development Practice, Tejaswini Chatty

Dartmouth College Ph.D Dissertations

Environmental sustainability has gained critical importance in product development (PD) due to increased regulation, market competition, and consumer awareness, leading companies to set ambitious climate targets . To meet these goals, PD practitioners (engineers and designers) are often left to adapt their practices to reduce the impacts of the products they manufacture. Literature review and interviews with practitioners show that they highly valued using quantitative life cycle assessment (LCA) results to inform decision making.

LCA is a technique to measure the environmental impacts across various stages of a product life cycle. Existing LCA software tools, however, are designed for dedicated …


Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno 2023 Southern Methodist University

Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno

Multidisciplinary Studies Theses and Dissertations

Grammatical triples extraction has become increasingly important for the analysis of large, textual corpora. By providing insight into the sentence-level linguistic features of a corpus, extracted triples have supported interpretations of some of the most relevant problems of our time. The growing importance of triples extraction for analyzing large corpora has put the quality of extracted triples under new scrutiny, however. Triples outputs are known to have large amounts of erroneous triples. The extraction of erroneous triples poses a risk for understanding a textual corpus because erroneous triples can be nonfactual and even analogous to misinformation. Disciplines such as the …


Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal 2023 Kennesaw State University

Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal

Master of Science in Computer Science Theses

The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …


An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez 2023 Louisiana State University and Agricultural and Mechanical College

An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez

LSU Master's Theses

In a world of continuously advancing technology, the reliance on these technologies continues to increase. Recently, transformer networks [22] have been implemented through various projects such as ChatGPT. These networks are extremely computationally demanding and require cutting-edge hardware to explore. However, with the growing increase and popularity of these neural networks, a question of reliability and resilience comes about, especially as the dependency and research on these networks grow. Given the computational demand of transformer networks, we investigate the resilience of the weights and biases of the predecessor of these networks, i.e. the Long Short-Term (LSTM) neural network, through four …


Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty 2023 University of Minnesota Law School

Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty

Minnesota Journal of Law, Science & Technology

No abstract provided.


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Digital Commons powered by bepress