Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,431 Full-Text Articles 17,119 Authors 4,117,996 Downloads 205 Institutions

All Articles in Computer Engineering

Faceted Search

13,431 full-text articles. Page 3 of 459.

Hardware Security Of The Controller Area Network (Can Bus), David Satagaj 2020 Liberty University

Hardware Security Of The Controller Area Network (Can Bus), David Satagaj

Senior Honors Theses

The CAN bus is a multi-master network messaging protocol that is a standard across the vehicular industry to provide intra-vehicular communications. Electronics Control Units within vehicles use this network to exchange critical information to operate the car. With the advent of the internet nearly three decades ago, and an increasingly inter-connected world, it is vital that the security of the CAN bus be addressed and built up to withstand physical and non-physical intrusions with malicious intent. Specifically, this paper looks at the concept of node identifiers and how they allow the strengths of the CAN bus to shine while also ...


Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras 2020 University of Nebraska - Lincoln

Open Dynamic Interaction Network: A Cell-Phone Based Platform For Responsive Ema, Gisela Font Sayeras

Computer Science and Engineering: Theses, Dissertations, and Student Research

The study of social networks is central to advancing our understanding of a wide range of phenomena in human societies. Social networks co-evolve concurrently alongside the individuals within them. Selection processes cause network structure to change in response to emerging similarities/differences between individuals. At the same time, diffusion processes occur as individuals influence one another when they interact across network links. Indeed, each network link is a logical abstraction that aggregates many short-lived pairwise interactions of interest that are being studied. Traditionally, network co-evolution is studied by periodically taking static snapshots of social networks using surveys. Unfortunately, participation incentives ...


Olivet Robotics, Caroline Orndorff, Allann Davidson, Jared Haworth, Nicholas Mills 2020 Olivet Nazarene University

Olivet Robotics, Caroline Orndorff, Allann Davidson, Jared Haworth, Nicholas Mills

Scholar Week 2016 - present

The VEX Robotics Competition is a challenging event series for elementary to university students. Each year, VEX creates thought provoking games with goals that must be accomplished via robotics. The question ONU Robotics Team must answer is “how can one create the most effective strategies in order to win?” during the 2019-2020 Tower Takeover Game. The ONU Robotics Senior Design Team (ORSeT) will work to answer this question with principles from Electrical Engineering, Mechanical Engineering, and Computer Science. ORSeT will use this opportunity to not only create a winning robot, but also to challenge team members’ creative abilities and engineering ...


Analysis And Implementation Of Quantum Computing Algorithms, Caroline Fedele 2020 University of North Florida

Analysis And Implementation Of Quantum Computing Algorithms, Caroline Fedele

Showcase of Osprey Advancements in Research and Scholarship (SOARS)

In this research, we investigate the relationships between classical and quantum computing, and the superior time complexity and memory allocation proposed theoretically for quantum algorithms. This is accomplished by building quantum circuits to represent algorithms and test in a quantum computer simulation. Classical circuit components have been continually reducing in size to the point where they are now being impacted by quantum properties, resulting in the need to investigate quantum computing. The inherent parallelism of quantum computing also allows us to solve problems for which classical computers are inept. The class of intractable problems in computing where the solution can ...


Performance Evaluation Of Long Range (Lora) Wireless Rf Technology Blue For The Internet Of Things (Iot) Using Dragino Lora At 915 Mhz, Victor Lopez 2020 University of North Florida

Performance Evaluation Of Long Range (Lora) Wireless Rf Technology Blue For The Internet Of Things (Iot) Using Dragino Lora At 915 Mhz, Victor Lopez

Showcase of Osprey Advancements in Research and Scholarship (SOARS)

Internet of Things (IoT) is a developing concept that introduces the network of physical sensors which are interconnected to each other. Some sensors are wirelessly connected among themselves and to the internet. Currently, IoT applications demand substantial requirements in terms of Radio Access Network (RAN) such as long-range outdoor coverage, environmental factors, obstructions, interference, power consumption, and many others. Also, the current wireless technologies are not able to satisfy all these requirements simultaneously. Therefore, there is no single wireless standard that would predominate the IoT. However, one relevant wireless radio solution to IoT is known as Long Range Wide Area ...


Vex U Robotics, Kyle Lutterman, Jeffrey Ryan, Sierra Wong, Elizabeth Geiger 2020 Embry-Riddle Aeronautical University

Vex U Robotics, Kyle Lutterman, Jeffrey Ryan, Sierra Wong, Elizabeth Geiger

Discovery Day - Prescott

VEX U is a competition hosted by the REC Foundation for university students to get engaged in hands-on engineering. Each team produces two robots using the VEX provided parts to compete in the VEX U competition. The competition changes every year with the only constants being the size of the field, the tools and parts teams are able to use, and the size constraints of the robots. The teams compete in regional competitions in order to qualify for the World Championship Competition, which is the highest competition a team can compete in for VEX U. The VEX U teams at ...


A Framework To Detect Presentation Attacks, Laeticia Etienne 2020 Kennesaw State University

A Framework To Detect Presentation Attacks, Laeticia Etienne

Master of Science in Information Technology Theses

Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed ...


Tech Comm Eagle Eye-Tracking Control System, Gabiella Lail, Robert Shaw, Hunter Smatla, Matthew Gary 2020 Embry-Riddle Aeronautical University

Tech Comm Eagle Eye-Tracking Control System, Gabiella Lail, Robert Shaw, Hunter Smatla, Matthew Gary

Discovery Day - Prescott

Mobile eye-tracking systems provide usability research support as well as access to a wide range of robotics and technical communication research opportunities. Optical tracking systems are often prohibitively expensive and do not provide the mobility or flexibility needed for a variety of research application possibilities. Our team proposes building a simple mobile eye-tracking system to be used in-house at ERAU for heat-mapping, robotics, control systems, and various technical communication applications in a structured research environment. The mobile eyetracking system will become part of a larger research and hands-on technical communication usability lab and research center. The research team intends to ...


Case Study: Verifying The Safety Of An Autonomous Racing Car With A Neural Network Controller, Radoslav Ivanov, Taylor J. Carpenter, James Weimer, Rajeev Alur, George Pappas, Insup Lee 2020 University of Pennsylvania

Case Study: Verifying The Safety Of An Autonomous Racing Car With A Neural Network Controller, Radoslav Ivanov, Taylor J. Carpenter, James Weimer, Rajeev Alur, George Pappas, Insup Lee

Departmental Papers (CIS)

This paper describes a verification case study on an autonomous racing car with a neural network (NN) controller. Although several verification approaches have been recently proposed, they have only been evaluated on low-dimensional systems or systems with constrained environments. To explore the limits of existing approaches, we present a challenging benchmark in which the NN takes raw LiDAR measurements as input and outputs steering for the car. We train a dozen NNs using reinforcement learning (RL) and show that the state of the art in verification can handle systems with around 40 LiDAR rays. Furthermore, we perform real experiments to ...


Cyber Security Techniques- What Is The Internet?, Amy J. Ramson 2020 CUNY Hostos Community College

Cyber Security Techniques- What Is The Internet?, Amy J. Ramson

Open Educational Resources

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.


Drones Detection Using Smart Sensors, Aishah Moafa 2020 Embry-Riddle Aeronautical University

Drones Detection Using Smart Sensors, Aishah Moafa

Dissertations and Theses

Drones are modern and sophisticated technology that have been used in numerous fields. Nowadays, many countries use them in exploration, reconnaissance operations, and espionage in military operations. Drones also have many uses that are not limited to only daily life. For example, drones are used for home delivery, safety monitoring, and others. However, the use of drones is a double-edged sword. Drones can be used for positive purposes to improve the quality of human lives, but they can also be used for criminal purposes and other detrimental purposes. In fact, many countries have been attacked by terrorists using smart drones ...


Identifying Easy Indicators Of Dementia, Swati Padhee, Tanvi Banerjee, Valerie L. Shalin, Krishnaprasad Thirunarayan 2020 Wright State University - Main Campus

Identifying Easy Indicators Of Dementia, Swati Padhee, Tanvi Banerjee, Valerie L. Shalin, Krishnaprasad Thirunarayan

Symposium of Student Research, Scholarship, and Creative Activities Materials

Alzheimer’s Disease (AD) is a degenerative chronic neurodegenerative disease that affects millions of people and whose care costs billions of dollars. There is growing evidence that variations in speech and language may be early indicators of dementia. One of the most initial symptoms of dementia is speech impairment, including difficulty in finding words and changes to the grammatical structure. These early indicators can be detected by having the patients perform a picture description task, such as the Cookie Theft task from the Boston Diagnostic Aphasia Examination. However, much of the state-of-the-art NLP for dementia has been limited due to ...


Predicting Alcohol Withdrawal In Intensive Care Units, Reza Sadeghi, Tanvi Banerjee, William L. Romine 2020 Wright State University

Predicting Alcohol Withdrawal In Intensive Care Units, Reza Sadeghi, Tanvi Banerjee, William L. Romine

Symposium of Student Research, Scholarship, and Creative Activities Materials

Alcohol use disorder is a common health issue in older adults who are facing depression caused by retirement, loss of a spouse, pain, and sleep problems. The prolonged, heavy alcohol ingestion will lead to high alcohol dependency such that cessation or reduction of using alcohol causes alcohol withdrawal syndrome (AWS) in roughly 4 to 72 hours after the last drink. During the initial 8 hours, patients face anxiety, insomnia, nausea, and abdominal pain. This condition is followed by high blood pressure, increased body temperature, unusual heart rate, and confusion. If this syndrome does not receive any treatment, the patients will ...


A Test Bed For Evaluating The Performance Of Iot Networks, Hope Harvey 2020 Liberty University

A Test Bed For Evaluating The Performance Of Iot Networks, Hope Harvey

Senior Honors Theses

The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used. While RPL provides a low-cost solution for connection, it lacks load balancing mechanisms. Improvements in OF load balancing can be implemented to strengthen network stability. This paper proposes a test bed configuration to show the toll of frequent parent switching on 6LoWPAN. Contiki’s RPL 6LoWPAN software runs on STM32 Nucleo microcontrollers with expansion boards for this test bed ...


Lablineup: An Intuitive Web Application For Queueing Help Requests In Academic Labs, Graham McDonald 2020 University of South Carolina - Columbia

Lablineup: An Intuitive Web Application For Queueing Help Requests In Academic Labs, Graham Mcdonald

Senior Theses

LabLineup is a start-up project designed to address the needs of large, lab-based classes, where teaching assistants (TAs) struggle to assist students in the order in which they request help. LabLineup is a lightweight web application that allows TAs and professors to accept requests for help in order. LabLineup allows professors to view the requests for a lab and see frequently asked questions that can be addressed en masse rather than individually. LabLineup also allows students to provide TA feedback. LabLineup addresses issues arising from requesting help in large, lab-based classes in the most efficient manner possible.


Drone Proximity Detection Via Air Disturbance Analysis, Qian Zhao, Jason Hughes 2020 Fordham University

Drone Proximity Detection Via Air Disturbance Analysis, Qian Zhao, Jason Hughes

Faculty Publications

The use of unmanned aerial vehicles (drones) is expanding to commercial, scientific, and agriculture applications, including surveillance, product deliveries and aerial photography. One challenge for applications of drones is detecting obstacles and avoiding collisions. A typical solution to this issue is the use of camera sensors or ultrasonic sensors for obstacle detection or sometimes just manual control (teleoperation). However, these solutions have costs in battery lifetime, payload, operator skill. We note that there will be an air disturbance in the vicinity of the drone when it’s moving close to obstacles or other drones. Our objective is to detect obstacles ...


Optimization Study Of An Image Classification Deep Neural Network, Rose Ault 2020 Grand Valley State University

Optimization Study Of An Image Classification Deep Neural Network, Rose Ault

Honors Projects

Machine Learning is an important and growing field within Artificial Intelligence. It is particularly useful in situations where developing an algorithm to perform the task in a conventional way would be extremely difficult. Instead of being programmed specifically to complete a task, a program embodies a trained model that can recognize patterns present in given example data, and is able use that model to make predictions on future data. Neural networks are a prominent example of machine learning models used for this purpose. Neural networks are models that are based on how brains work, with massive numbers of connected processing ...


An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr 2020 University of Nebraska-Lincoln

An Anns Based Failure Detection Method For Onos Sdon Controller, Shideh Yavary Mehr

Computer Science and Engineering: Theses, Dissertations, and Student Research

Network reachability is an important factor of an optical telecommunication network. In a wavelength-division-muliplexing (WDM) optical network, any failure can cause a large amount of loss and disruptions in network. Failures can occur in network elements, link, and component inside a node or etc. Since major network disruptions can caused network performance degradations, it is necessary that operators have solutions to prevent such those failures. This work examines a prediction model in optical networks and propose a protection plan using a Machine Learning (ML) algorithm called Artificial Neural Networks (ANN) using Mininet emulator. ANN is one of the best method ...


Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia 2020 CUNY New York City College of Technology

Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia

Publications and Research

This project involves the design, construction and testing of a personal reminder device for elderly who suffer from Alzheimer’s using a clock system and LED wearable technology. The device consists of an RGB LED strip connected to a 7-segment display (which operates as a clock circuit) attached to a microcontroller board. The device uses visual output to alert the user at that certain time the color being emitted represents the reminder the user set for that time. The project involves two phases. In the first phase, an RGB LED strip will be used to make a wearable device and ...


Differentially Private Online Task Assignment In Spatial Crowdsourcing: A Tree-Based Approach, Qian TAO, Yongxin TONG, Zimu ZHOU, Yexuan SHI, Lei CHEN, Ke XU 2020 Singapore Management University

Differentially Private Online Task Assignment In Spatial Crowdsourcing: A Tree-Based Approach, Qian Tao, Yongxin Tong, Zimu Zhou, Yexuan Shi, Lei Chen, Ke Xu

Research Collection School Of Information Systems

With spatial crowdsourcing applications such as Uber and Waze deeply penetrated into everyday life, there is a growing concern to protect user privacy in spatial crowdsourcing. Particularly, locations of workers and tasks should be properly processed via certain privacy mechanism before reporting to the untrusted spatial crowdsourcing server for task assignment. Privacy mechanisms typically permute the location information, which tends to make task assignment ineffective. Prior studies only provide guarantees on privacy protection without assuring the effectiveness of task assignment. In this paper, we investigate privacy protection for online task assignment with the objective of minimizing the total distance, an ...


Digital Commons powered by bepress