Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

19,895 Full-Text Articles 30,355 Authors 6,911,423 Downloads 241 Institutions

All Articles in Computer Engineering

Faceted Search

19,895 full-text articles. Page 3 of 753.

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar 2022 Faculty of Engineering, Beirut Arab University

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar

BAU Journal - Science and Technology

This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …


Design And Prototyping Of A Low-Cost High Frequency Antenna For Vicinity Coupling Devices, Benjamin Kommey, Ernest Ofosu Addo, Elvis Tamakloe 2022 Department of Computer Engineering, Faculty of Electrical and Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi 00233, Ghana

Design And Prototyping Of A Low-Cost High Frequency Antenna For Vicinity Coupling Devices, Benjamin Kommey, Ernest Ofosu Addo, Elvis Tamakloe

Makara Journal of Technology

This paper describes the development of a high frequency (HF) antenna for high output power vicinity coupling devices (VCDs) operating at 13.56 MHz. Key design parameters, such as RF power level, antenna size, and communication protocol, and their link to the antenna features and requirements, have been discussed. For efficient reader interrogation, detection, and recovery of transponder responses, a tuning circuit necessary to adjust the antenna power matching and resonance characteristics was designed and prototyped. The antenna was fed to an industry standard reader and evaluated for read range performance with vicinity cards. The designed antenna on the reader achieved …


Damage Stability Study Of A 500 Dw Ro-Ro Ferry Vessel, Zulfaidah Ariany, Budhi Santoso, Sarwoko Sarwoko, Nauval Abdurrahman Prasetyo 2022 Departement of Industrial Technology, Vocational School, Universitas Diponegoro, Semarang 50275, Indonesia

Damage Stability Study Of A 500 Dw Ro-Ro Ferry Vessel, Zulfaidah Ariany, Budhi Santoso, Sarwoko Sarwoko, Nauval Abdurrahman Prasetyo

Makara Journal of Technology

The development of the crossing transportation industry is currently increasing in the island areas. The use of Ro-Ro type ferry boats is extremely efficient in moving people, goods, and vehicles. The current research focuses on the damage stability of the 500 DWT Ro-Ro ferry, which aims to meet the needs of the Ro-Ro ferry in the archipelago area. The previously existing initial design of a barge hull with a main size Lpp = 40.15 m, B = 12 m, H = 3.2 m, and T = 2.15 m was used to analyze the damage stability condition further. First, the drawings …


Designing A Loving Robot: A Social Construction Analysis Of A Sex Robot Creator’S Vision, Annette Masterson 2022 Temple University

Designing A Loving Robot: A Social Construction Analysis Of A Sex Robot Creator’S Vision, Annette Masterson

Human-Machine Communication

In 2018, one of the world’s first sex robots was released by CEO Matt McMullen and his company, RealDoll. With artificial intelligence capabilities, the Harmony model is meant to support and converse with users. Using a social construction of technology theory lens, this study develops the theory’s fourth level of analysis, emphasizing mass media’s construction abilities. A critical discourse analysis of 38 publicity interviews found a tendency to emphasize the companionship of sex robots while envisioning a future where integration is normalized, and a sentient robot is possible. As the creator, McMullen’s vision could determine the future of robotic design, …


The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel 2022 University of Tuebingen

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel

Human-Machine Communication

Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …


Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico de Luca 2022 University of Udine, Italy

Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca

Human-Machine Communication

Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …


Gender And Human-Machine Communication: Where Are We?, Leopoldina Fortunati, Autumn P. Edwards 2022 University of Udine

Gender And Human-Machine Communication: Where Are We?, Leopoldina Fortunati, Autumn P. Edwards

Human-Machine Communication

In this introduction to the fifth volume of the journal Human-Machine Communication, we present and discuss the five articles focusing on gender and human-machine communication. In this essay, we will analyze the theme of gender, including how this notion has historically and politically been set up, and for what reasons. We will start by considering gender in in-person communication, then we will progress to consider what happens to gender when it is mediated by the most important ICTs that preceded HMC: the telephone, mobile phone, and computer-mediated communication (CMC). We outline the historical framework necessary to analyze the last section …


Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost 2022 University of Windsor

Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost

Major Papers

The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn 2022 Grand Valley State University

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Modeling The Impact Of The Covid-19 Pandemic On Speeding At Rural Roadway Facilities In Maine Using Short-Term Speed And Traffic Count Data., Amirhossein Shahlaeegilan 2022 The University of Maine

Modeling The Impact Of The Covid-19 Pandemic On Speeding At Rural Roadway Facilities In Maine Using Short-Term Speed And Traffic Count Data., Amirhossein Shahlaeegilan

Electronic Theses and Dissertations

The COVID-19 pandemic caused a significant change in traffic operations and safety. For instance, various U.S. states reported an increase in the rate of fatal and severe injury crashes over this duration. In April and May 2020, the comprehensive stay-at-home orders were issued across the country, including in Maine. These orders resulted in drastic reductions in traffic volume,switching working policies of noticeable number of corporations and educational administrations like universities to the remote working, closure of many organizations during the lockdown period, and people avoidance to public places to suppress the possible exposure to the virus were among the most …


Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke 2022 The University of Western Ontario

Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke

Electronic Thesis and Dissertation Repository

The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li 2022 Kennesaw State University

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price 2022 Embry-Riddle Aeronautical University

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson 2022 Department of Chemical Engineering and Materials Science, Wayne State University, Detroit, MI

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst 2022 Washington University in St. Louis

Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst

McKelvey School of Engineering Theses & Dissertations

The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …


Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon), Sahil Girin Patel 2022 Mississippi State University

Design, Development And Evaluation Of The Ruggedized Edge Computing Node (Recon), Sahil Girin Patel

Theses and Dissertations

The increased quality and quantity of sensors provide an ever-increasing capability to collect large quantities of high-quality data in the field. Research devoted to translating that data is progressing rapidly; however, translating field data into usable information can require high performance computing capabilities. While high performance computing (HPC) resources are available in centralized facilities, bandwidth, latency, security and other limitations inherent to edge location in field sensor applications may prevent HPC resources from being used in a timely fashion necessary for potential United States Army Corps of Engineers (USACE) field applications. To address these limitations, the design requirements for RECON …


Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints, Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee 2022 University of Pennsylvania

Guaranteed Conformance Of Neurosymbolic Models To Natural Constraints, Kaustubh Sridhar, Souradeep Dutta, James Weimer, Insup Lee

Departmental Papers (CIS)

Deep neural networks have emerged as the workhorse for a large section of robotics and control applications, especially as models for dynamical systems. Such data-driven models are in turn used for designing and verifying autonomous systems. This is particularly useful in modeling medical systems where data can be leveraged to individualize treatment. In safety-critical applications, it is important that the data-driven model is conformant to established knowledge from the natural sciences. Such knowledge is often available or can often be distilled into a (possibly black-box) model M. For instance, the unicycle model for an F1 racing car. In this light, …


Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton 2022 Mississippi State University

Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton

Theses and Dissertations

All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …


Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles, William Peyton Johnson 2022 Mississippi State University

Assessment Of Simulated And Real-World Autonomy Performance With Small-Scale Unmanned Ground Vehicles, William Peyton Johnson

Theses and Dissertations

Off-road autonomy is a challenging topic that requires robust systems to both understand and navigate complex environments. While on-road autonomy has seen a major expansion in recent years in the consumer space, off-road systems are mostly relegated to niche applications. However, these applications can provide safety and navigation to dangerous areas that are the most suited for autonomy tasks. Traversability analysis is at the core of many of the algorithms employed in these topics. In this thesis, a Clearpath Robotics Jackal vehicle is equipped with a 3D Ouster laser scanner to define and traverse off-road environments. The Mississippi State University …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer 2022 Kennesaw State University

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


Digital Commons powered by bepress