Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

12,310 Full-Text Articles 15,191 Authors 4,117,996 Downloads 197 Institutions

All Articles in Computer Engineering

Faceted Search

12,310 full-text articles. Page 4 of 412.

Spring 2019, 2019 DePaul University

Spring 2019

In The Loop

Lab Life: New and improved School of Computing labs inspire research in robotics and engineering; A Festival to Remember: Students thrive in film festival environments; Next Gen Data Scientists: Data Science Academy introduces high school students to the big world of data; A Well-Designed Design Colloquium; Game Face: "Sausage Sports Club: creator and CDM alumnus Chris Wade shares the story behind his playful Nintendo Switch game: Connected from Afar: Graduate student Sierra Sellman makes the most of her online degree program; Seen and Heard; Bravo! Bravo!


Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof. 2019 Flinders University

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.

MODVIS Workshop

This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts ...


Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey 2019 CUNY Brooklyn College

Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey

Open Educational Resources

User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online ...


Management And Security Of Multi-Cloud Applications, Lav Gupta 2019 Washington University in St. Louis

Management And Security Of Multi-Cloud Applications, Lav Gupta

Engineering and Applied Science Theses & Dissertations

Single cloud management platform technology has reached maturity and is quite successful in information technology applications. Enterprises and application service providers are increasingly adopting a multi-cloud strategy to reduce the risk of cloud service provider lock-in and cloud blackouts and, at the same time, get the benefits like competitive pricing, the flexibility of resource provisioning and better points of presence. Another class of applications that are getting cloud service providers increasingly interested in is the carriers' virtualized network services. However, virtualized carrier services require high levels of availability and performance and impose stringent requirements on cloud services. They necessitate the ...


Your Internet Data Is Rotting, Paul Royster 2019 University of Nebraska-Lincoln

Your Internet Data Is Rotting, Paul Royster

Faculty Publications, UNL Libraries

The internet is growing, but old information continues to disappear daily.

Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.

Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then ...


Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater 2019 SMU

Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater

SMU Data Science Review

Deep Learning has revolutionized Computer Vision, and it is the core technology behind capabilities of a self-driving car. Convolutional Neural Networks (CNNs) are at the heart of this deep learning revolution for improving the task of object detection. A number of successful object detection systems have been proposed in recent years that are based on CNNs. In this paper, an empirical evaluation of three recent meta-architectures: SSD (Single Shot multi-box Detector), R-CNN (Region-based CNN) and R-FCN (Region-based Fully Convolutional Networks) was conducted to measure how fast and accurate they are in identifying objects on the road, such as vehicles, pedestrians ...


Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja 2019 University of Connecticut

Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja

Honors Scholar Theses

Depression prediction is a complicated classification problem because depression diagnosis involves many different social, physical, and mental signals. Traditional classification algorithms can only reach an accuracy of no more than 70% given the complexities of depression. However, a novel approach using Graph Neural Networks (GNN) can be used to reach over 80% accuracy, if a graph can represent the depression data set to capture differentiating features. Building such a graph requires 1) the definition of node features, which must be highly correlated with depression, and 2) the definition for edge metrics, which must also be highly correlated with depression. In ...


Fly-By-Logic: A Tool For Unmanned Aircraft System Fleet Planning Using Temporal Logic, Yash Vardhan Pant, Rhudii A. Quaye, Houssam Abbas, Akarsh Varre, Rahul Mangharam 2019 University of Pennsylvania

Fly-By-Logic: A Tool For Unmanned Aircraft System Fleet Planning Using Temporal Logic, Yash Vardhan Pant, Rhudii A. Quaye, Houssam Abbas, Akarsh Varre, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Safe planning for fleets of Unmaned Aircraft Systems (UAS) performing complex missions in urban environments has typically been a challenging problem. In the United States of America, the National Aeronautics and Space Administration (NASA) and the Federal Aviation Administration (FAA) have been studying the regulation of the airspace when multiple such fleets of autonomous UAS share the same airspace, outlined in the Concept of Operations document (ConOps). While the focus is on the infrastructure and management of the airspace, the Unmanned Aircraft System (UAS) Traffic Management (UTM) ConOps also outline a potential airspace reservation based system for operation where operators ...


A Review On Mixed Criticality Methods, Alex Jenkel 2019 University of Central Florrida

A Review On Mixed Criticality Methods, Alex Jenkel

Recent Advances in Real-Time Systems as of 2019

Within the study of mixed criticality scheduling, there are many different aspects that must be considered—resources, processor speeds, number of processors, etc.—that make scheduling theories difficult to produce. Two papers address specific aspects of mixed criticality scheduling, and this paper compares the two different methods and also builds upon them.


Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Laura Yates, Gina Valentino, Brooke Potter 2019 James Madison University

Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Laura Yates, Gina Valentino, Brooke Potter

Senior Honors Projects, 2010-current

Water quality monitoring traditionally occurs via resource intensive field surveys, such as when a researcher manually collects data in a stream. Limiting factors such as time, money, and accessibility often result in less oversight of impaired water bodies, significantly threatening ecosystemic health and related ecosystem services. According to the United States Environmental Protection Agency, 84% of rivers and streams within the United States remain unassessed, resulting in significant lapses in available data. Such lapses prohibit efficient and effective monitoring, restoration, and conservation efforts throughout the United States. The objective of this project was to employ an unmanned aerial vehicle to ...


Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter 2019 James Madison University

Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter

Senior Honors Projects, 2010-current

Water quality monitoring traditionally occurs via resource intensive field surveys, such as when a researcher manually collects data in a stream. Limiting factors such as time, money, and accessibility often result in less oversight of impaired water bodies, significantly threatening ecosystemic health and related ecosystem services. According to the United States Environmental Protection Agency, 84% of rivers and streams within the United States remain unassessed, resulting in significant lapses in available data. Such lapses prohibit efficient and effective monitoring, restoration, and conservation efforts throughout the United States. The objective of this project was to employ an unmanned aerial vehicle to ...


The School Of Engineering And Computer Science Class Of 2019 Mechanical Engineering Academic Celebration, Cedarville University 2019 Cedarville University

The School Of Engineering And Computer Science Class Of 2019 Mechanical Engineering Academic Celebration, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The School Of Engineering And Computer Science Class Of 2019 Electrical And Computer Engineering Academic Celebration, Cedarville University 2019 Cedarville University

The School Of Engineering And Computer Science Class Of 2019 Electrical And Computer Engineering Academic Celebration, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The School Of Engineering And Computer Science Class Of 2019 Computer Science Academic Celebration, Cedarville University 2019 Cedarville University

The School Of Engineering And Computer Science Class Of 2019 Computer Science Academic Celebration, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Compliance Of Open Source Ehr Applications With Hipaa And Onc Security And Privacy Requirements, Maryam Farhadi, Hisham Haddad, Hossain Shahriar 2019 Kennesaw State University

Compliance Of Open Source Ehr Applications With Hipaa And Onc Security And Privacy Requirements, Maryam Farhadi, Hisham Haddad, Hossain Shahriar

Master of Science in Computer Science Theses

Electronic Health Records (EHRs) are digital versions of paper-based patient's health information. EHR applications are increasingly being adopted in many countries. They have resulted in improved quality in healthcare, convenient access to histories of patient medication and clinic visits, easier follow up of patient treatment plans, and precise medical decision-making process. EHR applications are guided by measures of the Health Insurance Portability and Accountability Act (HIPAA) to ensure confidentiality, integrity, and availability. However, there have been reported breaches of Protected Health Identifier (PHI) data stored by EHR applications. In many reported breaches, improper use of EHRs has resulted in ...


Smart Home Audio Assistant, Xipeng Wang 2019 Washington University in St. Louis

Smart Home Audio Assistant, Xipeng Wang

All Computer Science and Engineering Research

This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.


Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford 2019 University of Arkansas, Fayetteville

Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford

Biological and Agricultural Engineering Undergraduate Honors Theses

Low-Impact Development (LID) is an attempt to sustainably respond to the potential hazards posed by urban expansion. Green roofs are an example of LID design meant to reduce the amount of runoff from storm events that are becoming more intense and less predictable while also providing insulation to buildings. LID has not yet been widely adopted as it is often a more expensive alternative to conventional infrastructure (Bowman et. al., 2009). However, its benefits are apparent. The University of Arkansas Honors College awarded a grant to research the large green roof atop Hillside Auditorium. One part of this grant is ...


Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer 2019 University of Arkansas, Fayetteville

Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common ...


Applications Of Fog Computing In Video Streaming, Kyle Smith 2019 University of Arkansas, Fayetteville

Applications Of Fog Computing In Video Streaming, Kyle Smith

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster ...


Optimization Of Ultra-Low Power Application-Specific Asynchronous Deep Learning Integrated Circuit Design, Cole Sherrill 2019 University of Arkansas, Fayetteville

Optimization Of Ultra-Low Power Application-Specific Asynchronous Deep Learning Integrated Circuit Design, Cole Sherrill

Computer Science and Computer Engineering Undergraduate Honors Theses

The Internet of Things (IoT) consists of all devices connected to the internet, including battery-powered devices like surveillance cameras and smart watches. IoT devices are often idle, making leakage power a crucial design constraint. Currently, there are only a few low-power application-specific processors for deep learning. Recently, the Trustable Logic Circuit Design (TruLogic) laboratory at the UofA designed an asynchronous Convolutional Neural Network (CNN) system. However, the original design suffered from delay-sensitivity issues undermining its reliable operation. The aim of this thesis research is to modify the existing CNN circuit to achieve increased reliability and to optimize the improved design ...


Digital Commons powered by bepress