Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,722 Full-Text Articles 38,623 Authors 8,340,641 Downloads 268 Institutions

All Articles in Computer Engineering

Faceted Search

23,722 full-text articles. Page 13 of 937.

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances 2023 Air Force Institute of Technology

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Isolation And Characterization Of Caffeine-Degrading Bacteria From Coffee Plantation Areas In Malaysia, Elvina Clarie Dullah, Mohd Fazli Farida Asras 2023 Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang Al-Sultan Abdullah, Pahang 26600, Malaysia

Isolation And Characterization Of Caffeine-Degrading Bacteria From Coffee Plantation Areas In Malaysia, Elvina Clarie Dullah, Mohd Fazli Farida Asras

Makara Journal of Technology

Decaffeination by microbial degradation is currently the most optimal and low-cost approach, involving only microbial cells and/or their enzymes. The bacterium was characterized using a series of biochemical tests. Positive results were obtained from carbohydrate fermentation, citrate utilization, and catalase tests, while negative results were obtained from Voges-Proskauer (VP) and indole tests. Three different caffeine concentrations of 0.25%, 0.4%, and 2% were tested and measured through Gas Chromatography-Mass Spectrophotometry (GC-MS) analysis. The highest caffeine reduction (89.25%) was found when 0.25% caffeine was used in the media. Only a small amount of caffeine was reduced to 0.4% and 2%, with 34.78% …


Optimization Of The Building Envelope And Roof Shading To Reduce The Energy Consumption Of College Low-Rise Buildings In Indonesia, Nasruddin Nasruddin, Azimil Gani Alam, Mohammad Imroz Sohel 2023 Department of Mechanical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia

Optimization Of The Building Envelope And Roof Shading To Reduce The Energy Consumption Of College Low-Rise Buildings In Indonesia, Nasruddin Nasruddin, Azimil Gani Alam, Mohammad Imroz Sohel

Makara Journal of Technology

Energy consumption in buildings is a crucial concern globally, prompting researchers to explore innovative solutions to mitigate its impact. This study investigates the optimization of building envelopes and roof shading systems of existing buildings in Indonesia to realize notable energy savings. Multiple scenarios were explored, with modifications to building envelopes and roof shading, highlighting the overall thermal transfer value as a key parameter. Using EnergyPlus simulations, the efficacy of natural ventilation in corridors and roof shading modifications was assessed in reducing energy consumption. The findings revealed that renovating existing buildings by optimization of the building envelope and roof shading by …


Control Of Fully-Actuated Aerial Manipulators And Omni-Directional Multirotors, Riley M. McCarthy 2023 University of New Mexico

Control Of Fully-Actuated Aerial Manipulators And Omni-Directional Multirotors, Riley M. Mccarthy

Mechanical Engineering ETDs

This thesis details the system modeling, design, control, simulation, construction, and
testing of both a fully-actuated and omni-directional multirotor aerial system created
for the primary purpose of performing active tasks with their environment. This work
verifies the capabilities of both systems through empirical testing, and demonstrates
how through the use of new control methods and physical designs multirotors can
expand their purpose from passive inspection based tasks to active contact based
tasks. These systems take advantage of newly implemented control allocation features present in the PX4 flight control software, version 1.14. The use of which makes designing controllers for such …


Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar 2023 University of Maine

Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar

Electronic Theses and Dissertations

Graph summarization is a fundamental problem in the field of data analysis, aiming to distill extensive graph datasets into more manageable, yet informative representations. The challenge lies in creating compressed graphs that faithfully retain crucial structural information for downstream tasks. A recent advancement in this domain introduces an optimal transport-based framework that enables the incorporation of a priori knowledge regarding the importance of nodes, edges, and attributes during the graph summarization process. However, the statistical properties of this innovative framework remain largely unexplored. This master's thesis embarks on a comprehensive exploration of the field of graph summarization, with a particular …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman 2023 University of Southern Maine

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Chronic Kidney Disease Android Application, Paul Le 2023 Santa Clara University

Chronic Kidney Disease Android Application, Paul Le

Computer Science and Engineering Senior Theses

Chronic kidney disease is increasingly recognized as a leading public health problem over the world that affects more than 10 percent of the population worldwide, where electrolytes and wastes can build up in your system. Kidney failure might not be noticeable until more advanced stages where it may then become fatal if not for artificial filtering or a transplant. As a result, it is important to detect kidney disease early on to prevent it from progressing to kidney failure. The current main test of the disease is a blood test that measures the levels of a waste product called creatine …


Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros 2023 University of South Florida

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros

USF Tampa Graduate Theses and Dissertations

The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …


Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros 2023 University of South Florida

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros

USF Tampa Graduate Theses and Dissertations

The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …


Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye 2023 East Tennessee State University

Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye

Electronic Theses and Dissertations

Autoencoders, a type of artificial neural network, have gained recognition by researchers in various fields, especially machine learning due to their vast applications in data representations from inputs. Recently researchers have explored the possibility to extend the application of autoencoders to solve nonlinear differential equations. Algorithms and methods employed in an autoencoder framework include sparse identification of nonlinear dynamics (SINDy), dynamic mode decomposition (DMD), Koopman operator theory and singular value decomposition (SVD). These approaches use matrix multiplication to represent linear transformation. However, machine learning algorithms often use convolution to represent linear transformations. In our work, we modify these approaches to …


Docai, Riley Badnin, Justin Brunings 2023 California Polytechnic State University, San Luis Obispo

Docai, Riley Badnin, Justin Brunings

Computer Science and Software Engineering

DocAI presents a user-friendly platform for recording, transcribing, summarizing, and classifying doctor-patient consultations. The application utilizes AssemblyAI for conversational transcription, and the user interface allows users to either live-record consultations or upload an existing MP3 file. The classification process, powered by 'ml-classify-text,' organizes the consultation transcription into SOAP (Subjective, Objective, Assessment, and Plan) format – a widely used method of documentation for healthcare providers. The result of this development is a simple yet effective interface that effectively plays the role of a medical scribe. However, the application is still facing challenges of inconsistent summarization from the AssemblyAI backend. Future work …


Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening 2023 University of Nebraska-Lincoln

Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …


Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez 2023 Boise State University

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez

Cyber Operations and Resilience Program Graduate Projects

This research paper analyzes the ethical implications of utilizing artificial intelligence, specifically AI-based algorithms in business selection and recruiting processes, with a focus on potential violations under Title VII of the Civil Rights Act of 1964 and Title 1 of the Americans with Disabilities Act (ADA). Amazon’s attempt at launching AI recruiting tools is examined. This paper will assess the fairness of AI recruiting practices, considering data collection, potential biases, and accuracy concerns in its implementation process. Additionally, the paper will provide an overview of federal civil rights statutes enforced by the U.S. Equal Employment Opportunity Commission (EEOC) and recent …


Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett 2023 University of South Alabama

Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett

<strong> Theses and Dissertations </strong>

Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …


Are We Day-Dreaming Our Way To The Future?, John O'Connor 2023 Technological University Dublin

Are We Day-Dreaming Our Way To The Future?, John O'Connor

Presentations

This paper explores the transformative impact of technology on society, drawing on Marshall McLuhan’s insights. It scrutinizes the consequences of profit-driven technological progress, particularly in VR, brain-computer interfaces, and AI hallucinations. Critiquing the dominance of industry leaders in AI safety discussions, the paper advocates a balanced, inclusive approach.

Philosophical perspectives on AI and VR prompt questions about their impact on human experience. The paper proposes an educational shift to cultivate human attributes alongside technological skills. Examining AI hallucinations and gaming glitches, it raises concerns about the potential blurring of reality and virtuality.

Connecting technological advancements with environmental challenges, the paper …


Comparative Simulations Of An Electrochromic Glazing And A Roller Blind As Controlled By Seven Different Algorithms, Hani Alkhatib, Philippe Lemarchand, Brian Norton, Dominic O'Sullivan 2023 TU Dublin

Comparative Simulations Of An Electrochromic Glazing And A Roller Blind As Controlled By Seven Different Algorithms, Hani Alkhatib, Philippe Lemarchand, Brian Norton, Dominic O'Sullivan

Articles

The use of roller blind as a surrogate for a switchable glazing in a dynamic building environmental simulation is investigated. Seven different control algorithms were applied to simulations of both operations of the blind and of the switchable glazing. The configurations compared were an electrochromic glazing and a roller blind, the controllers used were rule-based, proportional-integral-derivative (PID), anti-windup PID (aPID) and a model predictive controller (MPC). Particular case studies were examined in the weather conditions of Dublin, Ireland to make comparisons of simulated energy savings and occupancy daylight comfort from the use of electrochromic glazing or a roller blind with …


Continuity And Change In Saudi Arabia’S Development And Humanitarian Aid, Narayani Sritharan, Ammar A. Malik, Asad Sami 2023 William & Mary - AidData

Continuity And Change In Saudi Arabia’S Development And Humanitarian Aid, Narayani Sritharan, Ammar A. Malik, Asad Sami

AidData

This paper delves into the motivations and drivers behind Saudi Arabia’s foreign aid, shedding light on the interplay between geopolitics, religious affinity, and strategic objectives. Drawing on newly released empirical data from the Saudi Aid Platform (SAP) dataset, encompassing 47 years of aid delivery, the study seeks to answer the long-standing debate surrounding the factors shaping Saudi Arabia’s foreign aid decisions. The study focuses on two pivotal periods: the Bosnian War and the post-Arab Spring era. By examining Saudi aid allocations during these periods, we investigate the influence of foreign policy and geostrategic objectives versus the humanitarian needs of the …


In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel 2023 University of Nebraska - Lincoln

In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel

Honors Theses

In this work, two sensing systems were researched in order to improve in situ environmental monitoring. The first is a pH and Total Alkalinity sensor used to determine these characteristics of sea water. I explored the facets of this sensor over a 7-week internship with Dr. Ellen Briggs in her lab in summer of 2023. The second is a more holistic sensing system that reads temperature, turbidity, and pressure used for studying environmental characteristics of Alaskan bever ponds. Both systems were developed in close collaboration with scientists who are collecting data to better understand the impacts of climate change. Better …


Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby 2023 Clemson University

Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby

All Theses

Myofascial Pain Syndrome (MPS) is a common chronic muscle pain disorder that affects a large portion of the global population, seen in 85-93% of patients in specialty pain clinics [10]. MPS is characterized by hard, palpable nodules caused by a stiffened taut band of muscle fibers. These nodules are referred to as Myofascial Trigger Points (MTrPs) and can be classified by two states: active MTrPs (A-MTrPs) and latent MtrPs (L-MTrPs). Treatment for MPS involves massage therapy, acupuncture, and injections or painkillers. Given the subjectivity of patient pain quantification, MPS can often lead to mistreatment or drug misuse. A deterministic way …


Trojan Detection Expansion Of Structural Checking, Zachary Chapman 2023 University of Arkansas-Fayetteville

Trojan Detection Expansion Of Structural Checking, Zachary Chapman

Graduate Theses and Dissertations

With the growth of the integrated circuit (IC) market, there has also been a rise in demand for third-party soft intellectual properties (IPs). However, the growing use of such Ips makes it easier for adversaries to hide malicious code, like hardware Trojans, into these designs. Unlike software Trojan detection, hardware Trojan detection is still an active research area. One proposed approach to this problem is the Structural Checking tool, which can detect hardware Trojans using two methodologies. The first method is a matching process, which takes an unknown design and attempts to determine if it might contain a Trojan by …


Digital Commons powered by bepress