Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

19,895 Full-Text Articles 30,355 Authors 6,911,423 Downloads 241 Institutions

All Articles in Computer Engineering

Faceted Search

19,895 full-text articles. Page 2 of 749.

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price 2022 Embry-Riddle Aeronautical University

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson 2022 Department of Chemical Engineering and Materials Science, Wayne State University, Detroit, MI

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst 2022 Washington University in St. Louis

Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst

McKelvey School of Engineering Theses & Dissertations

The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …


Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton 2022 Mississippi State University

Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton

Theses and Dissertations

All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …


Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon), Sahil Girin Patel 2022 Mississippi State University

Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon), Sahil Girin Patel

Theses and Dissertations

The increased quality and quantity of sensors provide an ever-increasing capability to collect large quantities of high-quality data in the field. Research devoted to translating that data is progressing rapidly; however, translating field data into usable information can require high performance computing capabilities. While high performance computing (HPC) resources are available in centralized facilities, bandwidth, latency, security and other limitations inherent to edge location in field sensor applications may prevent HPC resources from being used in a timely fashion necessary for potential United States Army Corps of Engineers (USACE) field applications. To address these limitations, the design requirements for RECON …


Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles, William Peyton Johnson 2022 Mississippi State University

Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles, William Peyton Johnson

Theses and Dissertations

Off-road autonomy is a challenging topic that requires robust systems to both understand and navigate complex environments. While on-road autonomy has seen a major expansion in recent years in the consumer space, off-road systems are mostly relegated to niche applications. However, these applications can provide safety and navigation to dangerous areas that are the most suited for autonomy tasks. Traversability analysis is at the core of many of the algorithms employed in these topics. In this thesis, a Clearpath Robotics Jackal vehicle is equipped with a 3D Ouster laser scanner to define and traverse off-road environments. The Mississippi State University …


Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints, Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee 2022 University of Pennsylvania

Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints, Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee

Departmental Papers (CIS)

Deep neural networks have emerged as the workhorse for a large section of robotics and control applications, especially as models for dynamical systems. Such data-driven models are in turn used for designing and verifying autonomous systems. This is particularly useful in modeling medical systems where data can be leveraged to individualize treatment. In safety-critical applications, it is important that the data-driven model is conformant to established knowledge from the natural sciences. Such knowledge is often available or can often be distilled into a (possibly black-box) model M. For instance, the unicycle model for an F1 racing car. In this light, …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer 2022 Kennesaw State University

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki 2022 Kennesaw State University

Unmanned Aerial System Design For Civil Engineering Operations – A Vip Study, Ezra Robles, Harrison Vicknair, Derek Price, Logan Westra, George Pitcock, Joshua Diamond, Bhuvan Saraswat, Jeremiah Prayor, Fon Saliki

Symposium of Student Scholars

Unmanned Aerial System Design for Civil Engineering Operations – A Case Study

The objective of the project is to design and build a modular Unmanned Aerial System (UAS) that meets the specifications set forth by United Consulting – a local civil engineering company. These specifications are achieved through three unique missions. In each mission, data is collected using different methods. These missions include land surveying, bridge structure inspection and manhole probing. The key requirements of the drone are to maintain a minimum flight time of 30 minutes and the ability to receive and transmit telemetry, photographic and video data from …


An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan 2022 University of Nebraska-Lincoln

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Computer Science and Engineering: Theses, Dissertations, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan 2022 University of Nebraska-Lincoln

A Robust Platform For Mobile Robotics Teaching And Developing Using Arduino’S Integrated Development Environment (Ide) For Programming The Arduino Mega 2560, Sajjad Alhassan

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

In light of the rapid pace at which development happens with modern technology, mobile robots play an important role in our daily lives. This is due to their great importance in facilitating the affairs of life in various economic, commercial, industrial, scientific, and many other fields. In this research and project, we have restructured the microcontroller and system for one of the mobile robots (CEENBOT) that was designed by the University of Nebraska and replaced it with an Arduino Mega 2560.

The purpose of using the Arduino Mega 2560 robot is to provide alternative programming for the CEENBOT platform to …


Information Flow Analysis In Multi-Level Security, Keerthi Prayojitha Bere 2022 California State University, San Bernardino

Information Flow Analysis In Multi-Level Security, Keerthi Prayojitha Bere

Electronic Theses, Projects, and Dissertations

1. The Bell-LaPadula Model enforces the Multilevel Security access control policies by implementing simple security property and star property. No published research has been done to identify vulnerable node in the Information Flow Digraph and measure their level of vulnerability. In this Culminating Experience Project, the Multilevel access control policy digraph representing Bell-LaPadula Model was transformed into Information Flow Digraph representing the information flow between the Subject and Object. The questions for this project were: Q#1: How should we interpret the critically identified nodes from the information flow perspective (or in MLS context)? Q#2: If the critically important node(s) is …


A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed 2022 California State University, San Bernardino

A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed

Electronic Theses, Projects, and Dissertations

Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …


An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu 2022 Canakkale Onsekiz Mart University, Turkey

An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu

Engineering Technology Faculty Publications

Nowadays, EVs are rapidly increasing in popularity, and are accepted as the vehicles of the future all over the world. The most important components are their battery and charging systems. The energy capacity of EVs’ batteries has a significant potential to supply different energy requirements. Therefore, EVs must be designed in accordance with bidirectional power flow, and Electric Vehicle Supply Equipment (EVSE) should be upgraded as Electric Vehicle Power Exchange Equipment (EVPE). This power exchange infrastructure can be called Vehicle-to-Anything (V2X). V2X will also be the key solution for energy grids of the future that will turn into a much …


Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal 2022 University of Nebraska - Lincoln

Learnfca: A Fuzzy Fca And Probability Based Approach For Learning And Classification, Suraj Ketan Samal

Computer Science and Engineering: Theses, Dissertations, and Student Research

Formal concept analysis(FCA) is a mathematical theory based on lattice and order theory used for data analysis and knowledge representation. Over the past several years, many of its extensions have been proposed and applied in several domains including data mining, machine learning, knowledge management, semantic web, software development, chemistry ,biology, medicine, data analytics, biology and ontology engineering.

This thesis reviews the state-of-the-art of theory of Formal Concept Analysis(FCA) and its various extensions that have been developed and well-studied in the past several years. We discuss their historical roots, reproduce the original definitions and derivations with illustrative examples. Further, we provide …


Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan 2022 University of Nebraska-Lincoln

Attention In The Faithful Self-Explanatory Nlp Models, Mostafa Rafaiejokandan

Computer Science and Engineering: Theses, Dissertations, and Student Research

Deep neural networks (DNNs) can perform impressively in many natural language processing (NLP) tasks, but their black-box nature makes them inherently challenging to explain or interpret. Self-Explanatory models are a new approach to overcoming this challenge, generating explanations in human-readable languages besides task objectives like answering questions. The main focus of this thesis is the explainability of NLP tasks, as well as how attention methods can help enhance performance. Three different attention modules are proposed, SimpleAttention, CrossSelfAttention, and CrossModality. It also includes a new dataset transformation method called Two-Documents that converts every dataset into two separate documents required by the …


Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell DeHaven 2022 University of Nebraska-Lincoln

Bevers: A General, Simple, And Performant Framework For Automatic Fact Verification, Mitchell Dehaven

Computer Science and Engineering: Theses, Dissertations, and Student Research

Fact verification has become an important process, primarily done manually by humans, to verify the authenticity of claims and statements made online. Increasingly, social media companies have utilized human effort to debunk false claims on their platforms, opting to either tag the content as misleading or false, or removing it entirely to combat misinformation on their sites. In tandem, the field of automatic fact verification has become a subject of focus among the natural language processing (NLP) community, spawning new datasets and research. The most popular dataset is the Fact Extraction and VERification (FEVER) dataset. In this thesis an end-to-end …


Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li 2022 University of Nebraska-Lincoln

Sequence-Based Bioinformatics Approaches To Predict Virus-Host Relationships In Archaea And Eukaryotes, Yingshan Li

Computer Science and Engineering: Theses, Dissertations, and Student Research

Viral metagenomics is independent of lab culturing and capable of investigating viromes of virtually any given environmental niches. While numerous sequences of viral genomes have been assembled from metagenomic studies over the past years, the natural hosts for the majority of these viral contigs have not been determined. Different computational approaches have been developed to predict hosts of bacteria phages. Nevertheless, little progress has been made in the virus-host prediction, especially for viruses that infect eukaryotes and archaea. In this study, by analyzing all documented viruses with known eukaryotic and archaeal hosts, we assessed the predictive power of four computational …


A Low-Power, Low-Area 10-Bit Sar Adc With Length-Based Capacitive Dac, Zhili Pan 2022 University of Nebraska-Lincoln

A Low-Power, Low-Area 10-Bit Sar Adc With Length-Based Capacitive Dac, Zhili Pan

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

A 2.5 V single-ended 10-bit successive-approximation-register analog-to-digital converter (SAR ADC) based on the TSMC 65 nm CMOS process is designed with the goal of achieving low power consumption (33.63 pJ/sample) and small area (2874 µm^2 ). It utilizes a novel length-based capacitive digital-to-analog converter (CDAC) layout to achieve low total capacitance for power efficiency, and a custom static asynchronous logic to free the dependence on a high-frequency external clock source. Two test chips have been designed and the problems found through testing the first chip are analyzed. Multiple improved versions of the ADC with minor variations are implemented on the …


A Stacking-Based Misbehavior Detection System In Vehicular Communication Networks, Troy Green 2022 University of Nebraska-Lincoln

A Stacking-Based Misbehavior Detection System In Vehicular Communication Networks, Troy Green

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Over the past few decades communication systems for vehicles have continued to advance. Communications between these vehicles can be classified into safety related and non safety related messages. An example of a safety related message would be one vehicle warning others of an icy road it encountered, where a non safety related communication would be a passenger streaming a movie. In either case it's important to secure the communications so that the system continues to behave as expected. In this thesis we propose a Misbehavior Detection System (MDS), which is a system that monitors messages sent between vehicles, and detects …


Digital Commons powered by bepress