Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

19,801 Full-Text Articles 30,176 Authors 6,911,423 Downloads 241 Institutions

All Articles in Computer Engineering

Faceted Search

19,801 full-text articles. Page 1 of 753.

Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly 2023 University of Nebraska-Lincoln

Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly

Computer Science and Engineering: Theses, Dissertations, and Student Research

The use of unmanned aerial vehicles (UAVs) in construction sites has been widely growing for surveying and inspection purposes. Their mobility and agility have enabled engineers to use UAVs in Structural Health Monitoring (SHM) applications to overcome the limitations of traditional approaches that require labor-intensive installation, extended time, and long-term maintenance. One of the critical applications of SHM is measuring bridge deflections during the bridge operation period. Due to the complex remote sites of bridges, remote sensing techniques, such as camera-equipped drones, can facilitate measuring bridge deflections. This work takes a step to build a pipeline using the state-of-the-art computer …


Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang 2023 The Graduate Center, City University of New York

Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang

Dissertations, Theses, and Capstone Projects

With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …


Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah 2023 University Of the Cumberlands

Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah

International Journal of Smart Sensor and Adhoc Network

One of the leading disruptive technologies in the upcoming technological revolution is Self-Driving vehicles. However, the absence of security is the greatest obstacle to adoption. This study looks at how cybersecurity impacts the adoption of driverless cars. The purpose of this paper is to perform a literature review supporting the in-depth analysis of cybersecurity and its impacts on the slower adoption rate of Self-Driving Vehicles. The study's primary goal is to determine the connection between worries about cybersecurity and the rate of adoption of self-driving vehicles. Driverless vehicles are the most effective and cutting-edge technology in the transportation sector, yet …


A Novel Insect And Pest Identification Model Based On A Weighted Multipath Convolutional Neural Network And Generative Adversarial Network, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Raunak Kumar Tamrakar 2023 Department of Computer Applications, Bhilai Institute of Technology, Durg, (C.G.), India

A Novel Insect And Pest Identification Model Based On A Weighted Multipath Convolutional Neural Network And Generative Adversarial Network, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Raunak Kumar Tamrakar

Karbala International Journal of Modern Science

Timely identification of insects and their management play a significant role in sustainable agriculture development. The proposed hybrid model integrates a weighted multipath convolutional neural network and generative adversarial network to identify insects efficiently. To address the shortcomings of single-path networks, this novel model takes input from numerous iterations of the same image to learn more specific features. To avoid redundancy produced due to multipath, weights have been assigned to each path. For Xie2 dataset, the model shows 3.75%, 2.74%, 1.54%, 1.76%, 1.76%, 2.74 %, and 2.14% performance improvement from AlexNet, ResNet50, ResNet101, GoogleNet, VGG-16, VGG-19, and simple CNN respectively. …


Completeness Of Nominal Props, Samuel Balco, Alexander Kurz 2023 Runtime Verication Inc.

Completeness Of Nominal Props, Samuel Balco, Alexander Kurz

Engineering Faculty Articles and Research

We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.


Antitrust Interoperability Remedies, Herbert J. Hovenkamp 2023 University of Pennsylvania Carey Law School

Antitrust Interoperability Remedies, Herbert J. Hovenkamp

Faculty Scholarship at Penn Carey Law

Compelled interoperability can be a useful remedy for dominant firms, including large digital platforms, who violate the antitrust laws. They can address competition concerns without interfering unnecessarily with the structures that make digital platforms attractive and that have contributed so much to economic growth.

Given the wide variety of structures and business models for big tech, “interoperability” must be defined broadly. It can realistically include everything from “dynamic” interoperability that requires real time sharing of data and operations, to “static” interoperability which requires portability but not necessarily real time interactions. Also included are the compelled sharing of intellectual property or …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden 2023 Kansas State University

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


The Use Of Blockchain In The Management Of Covid-19 Vaccine Data, Mehmood Ali Mohammed, Murtuza Ali Mohammed, Vazeer Ali Mohammed 2023 Department of IT, University of the Cumberlands

The Use Of Blockchain In The Management Of Covid-19 Vaccine Data, Mehmood Ali Mohammed, Murtuza Ali Mohammed, Vazeer Ali Mohammed

International Journal of Smart Sensor and Adhoc Network

ABSTRACT - The ongoing COVID-19 pandemic has disrupted nearly every sector of the world economy. The recently discovered vaccine has promised a return to normalcy. Since traditional database storage systems can be tampered with quickly, the incorporation of blockchain would preclude the limitations of conventional database systems. This paper thus discusses the use of blockchain technology in managing the COVID-19 vaccine data to ensure credibility, safety, security, and transparency.

Keywords - Blockchain technology, COVID-19 vaccine data, and vaccine supply chain.


Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma 2023 University Of the Cumberlands, KY

Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma

International Journal of Smart Sensor and Adhoc Network

In recent times, organizations are examining the art training situation to improve the operation efficiency and the cost of warehouse retail distribution and supply chain management. Microsoft Azure emerges as an expressive technology that leads optimization by giving infrastructure, software, and platform resolutions for the whole warehouse retail distribution and supply chain management. Using Microsoft Azure as a cloud computing tool in retail warehouse distribution and supply manacle management contributes to active and monetary benefits. At the same time, potential limitations and risks should be considered by the retail warehouse distribution and the supply chain administration investors. In this research …


Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu 2023 NYIT

Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu

International Journal of Smart Sensor and Adhoc Network

AI and Machine learning are playing a vital role in the financial domain in predicting future growth and risk and identifying key performance areas. We look at how machine learning and artificial intelligence (AI) directly or indirectly alter financial management in the banking and insurance industries. First, a non-technical review of the prior machine learning and AI methodologies beneficial to KPI management is provided. This paper will analyze and improve key financial performance indicators in insurance using machine learning (ML) algorithms. Before applying an ML algorithm, we must determine the attributes directly impacting the business and target attributes. The details …


Editorial, Sameeh Ullah Dr. 2023 School of Information Technology, Illinois State University (ISU), Normal, IL.

Editorial, Sameeh Ullah Dr.

International Journal of Smart Sensor and Adhoc Network

This special issue seeks papers that provide a convergent research perspective on business futures, i.e., research that draws on many disciplinary views and strives to establish fresh integrative frameworks and vocabularies. Addressing the difficulty of work culture and intelligent machines in a broad sense necessitates grappling with complicated issues such as motivation, cognition, machine learning, human learning, and system design, among others.


Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V 2023 Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.

Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V

Karbala International Journal of Modern Science

Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …


State Of The Art In Drivers’ Attention Monitoring – A Systematic Literature Review, Sama Hussein Al-Gburi, Kanar Alaa Al-Sammak, Ion Marghescu, Claudia Cristina Oprea 2023 Department of Telecommunications University POLITEHNICA of Bucharest, Romania

State Of The Art In Drivers’ Attention Monitoring – A Systematic Literature Review, Sama Hussein Al-Gburi, Kanar Alaa Al-Sammak, Ion Marghescu, Claudia Cristina Oprea

Karbala International Journal of Modern Science

Recently, driver inattention has become the leading cause of automobile accidents. As a result, the driver's perception and decision-making abilities are diminished, and the driver can lose control of the car. To prevent accidents caused by driver inattention, it’s vital to continuously monitor the driver and his driving behaviour and inform him if he becomes distracted or sleepy. This topic has been the subject of study for decades. Whenever feasible to recognise unsafe driving in advance, accidents could be avoided. This document presents an overview of the existing driver alertness system and the various techniques for detecting driver attentiveness.


"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls 2023 Morehead State University

"Semiclassical Mastermind", Curtis Bair, Alexa S. Cunningham, Joshua Qualls

Posters-at-the-Capitol

Games are often used in the classroom to teach mathematical and physical concepts. Yet the available activities used to introduce quantum mechanics are often overwhelming even to upper-level students. Further, the "games" in question range in focus and complexity from superficial introductions to games where quantum strategies result in decidedly nonclassical advantages, making it nearly impossible for people interested in quantum mechanics to have a simple introduction to the topic. In this talk, we introduce a straightforward and newly developed "Semiclassical Mastermind" based on the original version of mastermind but replace the colored pegs with 6 possible qubits (x+, x-, …


Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour 2023 Northern Kentucky University

Gesture-Based American Sign Language (Asl) Translation System, Kayleigh Moore, Stefano Pecile, Mahdi Yazdanpour

Posters-at-the-Capitol

According to the World Health Organization (WHO), over 5% of the world's population experiences severe hearing loss. Approximately 9 million people in the U.S. are either functionally deaf or have mild-to-severe hearing loss. In this research, we designed and implemented a translation interface which turns American Sign Language (ASL) gestures captured from a pair of soft robotic gloves into text and speech instantaneously.

We used a combination of flex sensors, tactile sensors, and accelerometers to recognize hand gestures and to record hand and fingers positions, movements, and orientations. The digitized captured gestures were then sent to our proposed translation interface …


A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees 2023 Information Systems Department, Helwan University

A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees

Future Computing and Informatics Journal

most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. shaban 2023 Helwan Univesity

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant 2023 Virginia Tech

Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant

Department of Electrical and Computer Engineering Faculty Publications

Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …


Max Fit Event Management With Salesforce, AKSHAY DAGWAR 2023 California State University, San Bernardino

Max Fit Event Management With Salesforce, Akshay Dagwar

Electronic Theses, Projects, and Dissertations

MAX FIT Gym is looking for an event management software program to help manage activities very efficiently, along with attendees and environmental statistics. The event management program is developed and deployed using the Salesforce platform. MAX FIT can efficiently create, edit, and remove events and send email alerts to clients. This task operated on opportunities captured under MAX FIT, including all clients, and prepared information in the Salesforce cloud. This also includes product inventory with various varieties of protein products, and business owners can also add more products to their inventory. In the event management program, the event addresses within …


Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens, Sumer Sareen 2023 Claremont Colleges

Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens, Sumer Sareen

CMC Senior Theses

Blockchain games took the internet by storm as they offered a new way for users to play video games, own the assets in those games, and benefit monetarily from their efforts. Through Non-Fungible Tokens (NFTs) and cryptocurrencies, new, Web3 games ushered in a unique asset class for retail and institutional investors to diversify into and benefit from. This paper uses cross-sectional data from 30 blockchain gaming companies to identify on and off-chain factors that affect the company’s token volatility, returns, and liquidity. A multiple linear regression found the percentage of tokens dedicated to a company’s private sale and rewarding users, …


Digital Commons powered by bepress