Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,577 Full-Text Articles 38,382 Authors 8,340,641 Downloads 263 Institutions

All Articles in Computer Engineering

Faceted Search

23,577 full-text articles. Page 357 of 930.

Heterogeneous Reconfigurable Fabrics For In-Circuit Training And Evaluation Of Neuromorphic Architectures, Ramtin Mohammadizand 2019 University of Central Florida

Heterogeneous Reconfigurable Fabrics For In-Circuit Training And Evaluation Of Neuromorphic Architectures, Ramtin Mohammadizand

Electronic Theses and Dissertations

A heterogeneous device technology reconfigurable logic fabric is proposed which leverages the cooperating advantages of distinct magnetic random access memory (MRAM)-based look-up tables (LUTs) to realize sequential logic circuits, along with conventional SRAM-based LUTs to realize combinational logic paths. The resulting Hybrid Spin/Charge FPGA (HSC-FPGA) using magnetic tunnel junction (MTJ) devices within this topology demonstrates commensurate reductions in area and power consumption over fabrics having LUTs constructed with either individual technology alone. Herein, a hierarchical top-down design approach is used to develop the HSCFPGA starting from the configurable logic block (CLB) and slice structures down to LUT circuits and the …


The Most Powerful Thing, Caitlin Jankiewicz 2019 Andrews University

The Most Powerful Thing, Caitlin Jankiewicz

Lake Union Herald

No abstract provided.


Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer 2019 University of Arkansas, Fayetteville

Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common they …


Optimization Of Ultra-Low Power Application-Specific Asynchronous Deep Learning Integrated Circuit Design, Cole Sherrill 2019 University of Arkansas, Fayetteville

Optimization Of Ultra-Low Power Application-Specific Asynchronous Deep Learning Integrated Circuit Design, Cole Sherrill

Computer Science and Computer Engineering Undergraduate Honors Theses

The Internet of Things (IoT) consists of all devices connected to the internet, including battery-powered devices like surveillance cameras and smart watches. IoT devices are often idle, making leakage power a crucial design constraint. Currently, there are only a few low-power application-specific processors for deep learning. Recently, the Trustable Logic Circuit Design (TruLogic) laboratory at the UofA designed an asynchronous Convolutional Neural Network (CNN) system. However, the original design suffered from delay-sensitivity issues undermining its reliable operation. The aim of this thesis research is to modify the existing CNN circuit to achieve increased reliability and to optimize the improved design …


Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin 2019 University of Arkansas, Fayetteville

Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin

Computer Science and Computer Engineering Undergraduate Honors Theses

Capacitive sensing is a technology that can detect proximity and touch. It can also be utilized to measure position and acceleration of gesture motions. This technology has many applications, such as replacing mechanical buttons in a gaming device interface, detecting respiration rate without direct contact with the skin, and providing gesture sensing capability for rehabilitation devices. In this thesis, an approach to prototype a capacitive gesture sensing device using the Eagle PCB design software is demonstrated. In addition, this paper tested and evaluated the resulting prototype device, validating the effectiveness of the approach.


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He 2019 Fairfield University

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani 2019 Boise State University

Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani

Boise State University Theses and Dissertations

In the development of complex systems, such as user-centric privacy management systems with multiple components and attributes, it is important to formalize the process and develop mathematical models that can be utilized to automatically make decisions on the information sharing actions of users. While valuable, the current state-of-the-art models are mostly based on enterprise/organizational privacy perspectives and leave the main actor, i.e., the user, uninvolved or with limited ability to control information sharing actions. These approaches cannot be applied to a user-centric environment since user privacy policies are dynamic because they change based on the information sharing context and environment. …


Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan 2019 Boise State University

Application-Specific Memory Subsystem Benchmarking, Mahesh Lakshminarasimhan

Boise State University Theses and Dissertations

Application performance often depends on achieved memory bandwidth. Achieved memory bandwidth varies greatly given specific combinations of instruction mix and order, working set size, and access pattern. Achieving good application performance depends on optimizing these characteristics within the constraints of the given application. This task is complicated due to the lack of information about the impact of small changes on the performance. Some information is provided by benchmarks, but most memory benchmarks are confined to simple access patterns that are not representative of patterns found in real applications.

This thesis presents AdaptMemBench, a configurable benchmark framework designed to explore the …


A Survey Of Prediction And Classification Techniques In Multicore Processor Systems, Cristinel Ababei, Milad Ghorbani Moghaddam 2019 Marquette University

A Survey Of Prediction And Classification Techniques In Multicore Processor Systems, Cristinel Ababei, Milad Ghorbani Moghaddam

Electrical and Computer Engineering Faculty Research and Publications

In multicore processor systems, being able to accurately predict the future provides new optimization opportunities, which otherwise could not be exploited. For example, an oracle able to predict a certain application's behavior running on a smart phone could direct the power manager to switch to appropriate dynamic voltage and frequency scaling modes that would guarantee minimum levels of desired performance while saving energy consumption and thereby prolonging battery life. Using predictions enables systems to become proactive rather than continue to operate in a reactive manner. This prediction-based proactive approach has become increasingly popular in the design and optimization of integrated …


Emerging App Issue Identification From User Feedback: Experience On Wechat, Cuiyun GAO, Wujie ZHENG, Yuetang DENG, David LO, Jichuan ZENG, Michael R. LYU, Irwin KING 2019 Singapore Management University

Emerging App Issue Identification From User Feedback: Experience On Wechat, Cuiyun Gao, Wujie Zheng, Yuetang Deng, David Lo, Jichuan Zeng, Michael R. Lyu, Irwin King

Research Collection School Of Computing and Information Systems

It is vital for popular mobile apps with large numbers of users to release updates with rich features while keeping stable user experience. Timely and accurately locating emerging app issues can greatly help developers to maintain and update apps. User feedback (i.e., user reviews) is a crucial channel between app developers and users, delivering a stream of information about bugs and features that concern users. Methods to identify emerging issues based on user feedback have been proposed in the literature, however, their applicability in industry has not been explored. We apply the recent method IDEA to WeChat, a popular messenger …


Incentivizing Collaboration In A Competition, Arunesh SINHA, Michael P. WELLMAN 2019 Singapore Management University

Incentivizing Collaboration In A Competition, Arunesh Sinha, Michael P. Wellman

Research Collection School Of Computing and Information Systems

Research and design competitions aim to promote innovation or creative production, which are often best achieved through collaboration. The nature of a competition, however, typically necessitates sorting by individual performance. This presents tradeoffs for the competition designer, between incentivizing global performance and distinguishing individual capability. We model this situation in terms of an abstract collaboration game, where individual effort also benefits neighboring agents. We propose a scoring mechanism called LSWM that rewards agents based on localized social welfare. We show that LSWM promotes global performance, in that social optima are equilibria of the mechanism. Moreover, we establish conditions under which …


Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo LI, Qiong HUANG, Jian SHEN, Guomin YANG, Willy SUSILO 2019 Singapore Management University

Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo

Research Collection School Of Computing and Information Systems

In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with keyword search (PEKS) is an efficient solution to it. However, PEKS suffers from the complex key management problem in the public key infrastructure. Its variant in the identity-based setting addresses the drawback, however, almost all the schemes does not resist against offline keyword guessing attacks (KGA) by inside adversaries. In this work we introduce the notion of designated-server identity-based authenticated encryption with keyword search (dIBAEKS), in which the email sender authenticates the message while encrypting so that …


Community Discovery In Heterogeneous Social Networks, Lei MENG, Ah-hwee TAN, Donald C. WUNSCH 2019 Nanyang Technological University

Community Discovery In Heterogeneous Social Networks, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch

Research Collection School Of Computing and Information Systems

Discovering social communities of web users through clustering analysis of heterogeneous link associations has drawn much attention. However, existing approaches typically require the number of clusters a priori, do not address the weighting problem for fusing heterogeneous types of links, and have a heavy computational cost. This chapter studies the commonly used social links of users and explores the feasibility of the proposed heterogeneous data co-clustering algorithm GHF-ART, as introduced in Sect. 3.6, for discovering user communities in social networks. Contrary to the existing algorithms proposed for this task, GHF-ART performs real-time matching of patterns and one-pass learning, which guarantees …


3d Printed Smart Mobile, Bingfang Chen 2019 CUNY New York City College of Technology

3d Printed Smart Mobile, Bingfang Chen

Publications and Research

The goal of this research project is to design and build a prototype of a smart mobile robot to participate and compete in IEEE Micro-mouse and similar competitions. The robot has to find its way out of a maze as quickly as possible, by exploring and learning the paths in the maze. 3D printing technology will be used to build a lightweight robot frame so that it can move at a fast speed.


Identifying Fake News Using Emotion Analysis, Brady Gilleran 2019 University of Arkansas, Fayetteville

Identifying Fake News Using Emotion Analysis, Brady Gilleran

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper presents research applying Emotional Analysis to “Fake News” and “Real News” articles to investigate whether or not there is a difference in the emotion used in these two types of news articles. The paper reports on a dataset for Fake and Real News that we created, and the natural language processing techniques employed to process the collected text. We use a lexicon that includes predefined words for eight emotions (anger, anticipation, disgust, fear, surprise, sadness, joy, trust) to measure the emotional impact in each of these eight dimensions. The results of the emotion analysis are used as features …


Applications Of Fog Computing In Video Streaming, Kyle Smith 2019 University of Arkansas, Fayetteville

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …


Multimodal Emotion Classification, Anurag Illendula, Amit Sheth 2019 Indian Institute of Technology Kharagpur

Multimodal Emotion Classification, Anurag Illendula, Amit Sheth

Publications

Most NLP and Computer Vision tasks are limited to scarcity of labelled data. In social media emotion classification and other related tasks, hashtags have been used as indicators to label data. With the rapid increase in emoji usage of social media, emojis are used as an additional feature for major social NLP tasks. However, this is less explored in case of multimedia posts on social media where posts are composed of both image and text. At the same time, w.e have seen a surge in the interest to incorporate domain knowledge to improve machine understanding of text. In this paper, …


Knowledge-Aware Assessment Of Severity Of Suicide Risk For Early Intervention, Manas Gaur, Amanuel Alambo, Joy Prakash Sain, Ugur Kursuncu, Krishnaprasad Thirunarayan, Ramakanth Kavuluru, Amit Sheth, Randon S. Welton, Jyotishman Pathak 2019 Wright State University

Knowledge-Aware Assessment Of Severity Of Suicide Risk For Early Intervention, Manas Gaur, Amanuel Alambo, Joy Prakash Sain, Ugur Kursuncu, Krishnaprasad Thirunarayan, Ramakanth Kavuluru, Amit Sheth, Randon S. Welton, Jyotishman Pathak

Publications

Mental health illness such as depression is a significant risk factor for suicide ideation, behaviors, and attempts. A report by Substance Abuse and Mental Health Services Administration (SAMHSA) shows that 80% of the patients suffering from Borderline Personality Disorder (BPD) have suicidal behavior, 5-10% of whom commit suicide. While multiple initiatives have been developed and implemented for suicide prevention, a key challenge has been the social stigma associated with mental disorders, which deters patients from seeking help or sharing their experiences directly with others including clinicians. This is particularly true for teenagers and younger adults where suicide is the second …


Value-Of-Information Based Data Collection In Underwater Sensor Networks, Fahad Khan 2019 University of Central Florida

Value-Of-Information Based Data Collection In Underwater Sensor Networks, Fahad Khan

Electronic Theses and Dissertations

Underwater sensor networks are deployed in marine environments, presenting specific challenges compared to sensor networks deployed in terrestrial settings. Among the major issues that underwater sensor networks face is communication medium limitations that result in low bandwidth and long latency. This creates problems when these networks need to transmit large amounts of data over long distances. A possible solution to address this issue is to use mobile sinks such as autonomous underwater vehicles (AUVs) to offload these large quantities of data. Such mobile sinks are called data mules. Often it is the case that a sensor network is deployed to …


Leveraging The Intrinsic Switching Behaviors Of Spintronic Devices For Digital And Neuromorphic Circuits, Steven Pyle 2019 University of Central Florida

Leveraging The Intrinsic Switching Behaviors Of Spintronic Devices For Digital And Neuromorphic Circuits, Steven Pyle

Electronic Theses and Dissertations

With semiconductor technology scaling approaching atomic limits, novel approaches utilizing new memory and computation elements are sought in order to realize increased density, enhanced functionality, and new computational paradigms. Spintronic devices offer intriguing avenues to improve digital circuits by leveraging non-volatility to reduce static power dissipation and vertical integration for increased density. Novel hybrid spintronic-CMOS digital circuits are developed herein that illustrate enhanced functionality at reduced static power consumption and area cost. The developed spin-CMOS D Flip-Flop offers improved power-gating strategies by achieving instant store/restore capabilities while using 10 fewer transistors than typical CMOS-only implementations. The spin-CMOS Muller C-Element developed …


Digital Commons powered by bepress