Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,431 Full-Text Articles 17,119 Authors 4,117,996 Downloads 205 Institutions

All Articles in Computer Engineering

Faceted Search

13,431 full-text articles. Page 4 of 459.

Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan 2020 University of Massachusetts Amherst

Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan

Doctoral Dissertations

Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.

Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...


A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger 2020 Air Force Institute of Technology

A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger

Theses and Dissertations

Traditional frame-based technology continues to suffer from motion blur, low dynamic range, speed limitations and high data storage requirements. Event-based sensors offer a potential solution to these challenges. This research centers around a comparative assessment of frame and event-based object detection and tracking. A basic frame-based algorithm is used to compare against two different event-based algorithms. First event-based pseudo-frames were parsed through standard frame-based algorithms and secondly, target tracks were constructed directly from filtered events. The findings show there is significant value in pursuing the technology further.


Developing A Serious Game To Explore Joint All Domain Command And Control, Nathaniel W. Flack 2020 Air Force Institute of Technology

Developing A Serious Game To Explore Joint All Domain Command And Control, Nathaniel W. Flack

Theses and Dissertations

Changes in the geopolitical landscape and increasing technological complexity have prompted the U.S. Military to coin Multi-Domain Operations (MDO) and Joint All-Domain Command and Control as terms to describe an over-arching strategy that frames the complexity of warfare across both traditional and emerging warfighting domains. Teaching new and advanced concepts associated with these terms requires both innovation as well as distinct education and training tools in order to realize the cultural change advocated by senior military leaders. BSN, a Collectible Card Game, was developed to teach concepts integral to MDO and initiate discussion on military strategy.


Multi-Channel Security Through Data Fragmentation, Micah J. Hayden 2020 Air Force Institute of Technology

Multi-Channel Security Through Data Fragmentation, Micah J. Hayden

Theses and Dissertations

This thesis presents a novel security system developed for a multi-channel communication architecture, which achieves security by distributing the message and its associated message authentication code across the available channels at the bit level, to support systems that require protection from confidentiality and integrity attacks without relying solely on traditional encryption. One contribution of the work is to establish some helpful terminology, present a basic theory for multi-channel communications, describe the services provided by an optimal system, and then implement a proof of concept system to demonstrate the concept's validity. This proof of concept, focused on the splitting and ...


Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness 2020 Air Force Institute of Technology

Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness

Theses and Dissertations

This research introduces SLIVer, a Simulation-based Logic Bomb Identification/Verification methodology, for finding logic bombs hidden within Unmanned Aerial Vehicle (UAV) autopilot code without having access to the device source code. Effectiveness is demonstrated by executing a series of test missions within a high-fidelity software-in-the-loop (SITL) simulator. In the event that a logic bomb is not detected, this methodology defines safe operating areas for UAVs to ensure to a high degree of confidence the UAV operates normally on the defined flight plan. SLIVer uses preplanned flight paths as the baseline input space, greatly reducing the input space that must be ...


Implications And Limitations Of Securing An In Niband Network, Lucas E. Mireles 2020 Air Force Institute of Technology

Implications And Limitations Of Securing An In Niband Network, Lucas E. Mireles

Theses and Dissertations

The InfiniBand Architecture is one of the leading network interconnects used in high performance computing, delivering very high bandwidth and low latency. As the popularity of InfiniBand increases, the possibility for new InfiniBand applications arise outside the domain of high performance computing, thereby creating the opportunity for new security risks. In this work, new security questions are considered and addressed. The study demonstrates that many common traffic analyzing tools cannot monitor or capture InfiniBand traffic transmitted between two hosts. Due to the kernel bypass nature of InfiniBand, many host-based network security systems cannot be executed on InfiniBand applications. Those that ...


A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes 2020 Air Force Institute of Technology

A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes

Theses and Dissertations

To investigate the Data-Oriented Design (DOD) paradigm, in particular, an architecture built off its principles: the Entity-Component-System (ECS). ECS is commonly used by video game engines due to its ability to store data in a way that is optimal for the cache to access. Additionally, the structure of this paradigm produces a code-base that is simple to parallelize as the workload can be distributed across a thread-pool based on the data used with little to no need for data safety measures such as mutexes and locks. A final benefit, although not easily measured, is that the DOD paradigm produces a ...


Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat 2020 University of Massachusetts - Amherst

Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat

Doctoral Dissertations

A prodigious increase in video streaming content along with a simultaneous rise in end system capabilities has led to the proliferation of adaptive bit rate video streaming users in the Internet. Today, video streaming services range from Video-on-Demand services like traditional IP TV to more recent technologies such as immersive 3D experiences for live sports events. In order to meet the demands of these services, the multimedia and networking research community continues to strive toward efficiently delivering high quality content across the Internet while also trying to minimize content storage and delivery costs.

The introduction of flexible and adaptable technologies ...


How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, Lamar Gardere, Allison Plyer, Denice Ross 2020 The Data Center of Southeast Louisiana

How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, Lamar Gardere, Allison Plyer, Denice Ross

New England Journal of Public Policy

Data intermediaries have a symbiotic relationship with government as the source of most of their information. The open-data movement in government and development of software-as-a-service technologies shaped the data landscape after Katrina. Through relationships and talent transfers with The Data Center, the City of New Orleans went from having its chief technology officer in federal prison and its data systems in shambles to being a nationally recognized leader in open and accountable government. To be effective during disasters, an intermediary should be (1) in place and widely respected before the event, (2) ready to respond immediately after the event and ...


Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian 2020 HDR

Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian

Purdue Road School

The BIM for Bridges and Structures initiative, also known as TPF-5(372), is a transportation pooled fund project that is a collaborative effort of 20 states, FHWA, and the AASHTO Committee on Bridges and Structures. The pooled fund objective is to develop an open, national standard for exchanging information necessary for the design, fabrication, and construction of bridges and structures in the United States. The presentation will provide an overview of the project and explain ways in which stakeholders can get involved.


Simultaneous Localization And Mapping Analysis, Jacob Miller, Kurtis Clark, Jeremy Evert 2020 Southwestern Oklahoma State University

Simultaneous Localization And Mapping Analysis, Jacob Miller, Kurtis Clark, Jeremy Evert

Student Research

Objectives

• Simulate virtual robot for test and analysis
• Analyze SLAM solutions using ROS
• Assemble a functional Turtlebot
• Emphasize projects related to current research trajectories for NASA, and general robotics applications


Robot Simulation Analysis, Kurtis Clark, Jacob Miller, Jeremy Evert 2020 Southwestern Oklahoma State University

Robot Simulation Analysis, Kurtis Clark, Jacob Miller, Jeremy Evert

Student Research

Objectives

• Build a tutorial targeted to Middle School and High School Students to get ROS running on a Virtual Machine
• Make ROS and it's simulations approachable to middle school and high school students.


Using Supercomputers To Control Multiple Robots, Andrew Roberts, Jeremy Evert 2020 Southwestern Oklahoma State University

Using Supercomputers To Control Multiple Robots, Andrew Roberts, Jeremy Evert

Student Research

Supercomputers have been a key enabler to many technological advancements. The pipeline to develop capable supercomputer users is years long. Getting started with a supercomputer can be difficult. As a part of the XSEDE EMPOWER Learner program, this research focuses super-computer user development. SWOSU students do not have working code for many of the training modules available for learning supercomputing. This research details the development of these codes based on materials provided by the Nation-al Science Foundation, Shodor Foundation, and National Center for Supercomputing Applications. The result of this research is a better understand-ing of supercomputing training and more tools ...


Super Education For Supercomputers, Ezgi Gursel, Jeremy Evert 2020 Southwestern Oklahoma State University

Super Education For Supercomputers, Ezgi Gursel, Jeremy Evert

Student Research

Supercomputing (1 OOX more powerful than a desktop) allows organizations to solve complex problems that are not easily studied in any other way (ex. Blue Waters to simulate the known universe since the beginning of time for the design of the James Webb telescope). Producing qualified individuals to take advantage of the growing number of supercomputing jobs is a constant struggle. This poster provides an overview of education in supercomputing, explains how training occurs, and describes some of the key players working to educate a taskforce to deal with these highly complex machines.


Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University of Nebraska Online, University of Nebraska Information Technology Services 2020 University of Nebraska - Lincoln

Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services

Zea E-Books

Advancing Technology in Education at the University of Nebraska, May 7, 2019

Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6

Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6

Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6

Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7

5 Ways to Utilize ...


W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel 2020 Deenbandhu Chhotu Ram University of Science and Technology

W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel

Publications

Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the ...


Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong 2020 California Polytechnic State University, San Luis Obispo

Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong

Computer Engineering

There are three main parts of this system: micro-controller, database, and website. Micro-controller detects motion of people walking in and out and It also measures room temperature and humidity in a confined space then updates collected data to the database. Our system’s database contains 6 main columns: room number, room capacity, number of students, temperature in Celsius, humidity in percent and date created. Finally, this database is queried by the website to display the information on the webpage. Users could also navigate on our site to check the most and least occupy rooms, and they can also search for ...


Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, Ali Ahmed Abdulrasool 2020 Embry-Riddle Aeronautical University

Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, Ali Ahmed Abdulrasool

Dissertations and Theses

The hydrodynamic instability of purely oscillating pipe flows is investigated in terms of the quasi-steady formulation assuming the temporal changes of the laminar base flow relative to disturbances are slow. A simple model equation is introduced to compare the exact solution of the current approach with those of the major theories dedicated for unsteady flows. The results of the analysis show that the quasi-steady assumption and the multiple scales method are more efficient and accurate than the formal Floquet theory in predicting the transient instabilities within a period in addition to the long-term growth or decay of disturbances. The most ...


A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, Philip Bal, Damian Lyons, Avishai Shuter 2020 Fordham University

A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, Philip Bal, Damian Lyons, Avishai Shuter

Faculty Publications

The Kihansi spray toad (Nectophrynoides asperginis), classified as Extinct in the Wild by the IUCN, is being bred at the Wildlife Conservation Society’s (WCS) Bronx Zoo as part of an effort to successfully reintroduce the species into the wild. Thousands of toads live at the Bronx Zoo presenting an opportunity to learn more about their behaviors for the first time, at scale. It is impractical to perform manual observations for long periods of time. This paper reports on the development of a RGB-D tracking and analytics approach that allows researchers to accurately and efficiently gather information about the toads ...


Artificial Intelligence Ethics: Governance Through Social Media, Ross Arnold, Jorge Buenfil, Benjamin Abruzzo, Christopher Korpela 2020 U.S. Army CCDC-AC

Artificial Intelligence Ethics: Governance Through Social Media, Ross Arnold, Jorge Buenfil, Benjamin Abruzzo, Christopher Korpela

West Point Research Papers

A proposal is presented to facilitate machine self-learning of ethical behavior via human-curated training using online human behavioral data such as that found on social media and related sites. The proposed training data set is a mixture of human behavioral data found on social media and related sites that exhibit a wide variety of both ethical and unethical behavior which can help an artificially intelligent machine make ethical decisions during the process of solving real-world problems. The rapid proliferation of artificial intelligence (AI) applications worldwide highlights the need for normativity to protect individual rights, such as privacy, and the promotion ...


Digital Commons powered by bepress