Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,656 Full-Text Articles 38,519 Authors 8,340,641 Downloads 266 Institutions

All Articles in Computer Engineering

Faceted Search

23,656 full-text articles. Page 445 of 934.

Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim 2018 King Abdulaziz University, Saudi Arabia

Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim

Articles

Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large data sets, such as system and network data. The intrusion detection system is used …


Human-Centered Design Of A 3d-Augmented Strategic Weather Management System For The Aviation Community, Sébastien Léonce Paul Boulnois 2018 Florida Institute of Technology

Human-Centered Design Of A 3d-Augmented Strategic Weather Management System For The Aviation Community, Sébastien Léonce Paul Boulnois

Theses and Dissertations

Convective weather is one of the main causes of accidents in the National Airspace System according to the Federal Aviation Administration. The purpose of this research, aligned with current NextGen research efforts, was to determine how weather information, presented in 2D and/or 3D, and associated with interaction features, could impact airline pilots’ weather-related situation awareness and decision-making capabilities. Human-Centered Design principles, along with Design Thinking, were used and led to the design of a 3D-Augmented Strategic Weather Management System aiming to satisfy this research question. The system is called “Onboard Weather Situation Awareness System” (OWSAS) in the scope of this …


Inference Framework For Model Update And Development, Xiao Lin 2018 University of South Carolina

Inference Framework For Model Update And Development, Xiao Lin

Theses and Dissertations

Computational models play an important role in scientific discovery and engineering design. However, developing computational models is challenging, since the process always follows a path contaminated with errors and uncertainties. The uncertainties and errors inherent in computational models are the result of many factors, including experimental uncertainties, model structure inadequacies, uncertainties in model parameters and initial conditions, as well as errors due to numerical discretizations. To realize the full potential in applications it is critical to systematically and economically reduce the uncertainties inherent in all computational models.


Improving Stb Devices’ Parental Control, Mahmood Fawzi Alfathe 2018 Florida Institute of Technology

Improving Stb Devices’ Parental Control, Mahmood Fawzi Alfathe

Theses and Dissertations

In this dissertation, an IPTV system was designed with new viewer parental control authentication method. People deal with traditional IPTV systems that use simple authentication numeric passcodes, and this topic did not receive the attention to overcome its security problems. In this dissertation two contributions were introduced, the first one is to design and implement an IPTV system that uses humans’ Biometrics authentication instead of numeric passwords; the second contribution was presented by integrating and testing the efficiency of the suggested solution as an authentication key against traditional numerical passcodes. Also, the characteristics of this new method were tested. In …


Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian 2018 Carnegie Mellon University

Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian

Journal of Public Transportation

This paper introduces a novel transit data analytics platform for public transit planning, assessing service quality and revealing service problems in high spatiotemporal resolution for public transit systems based on Automatic Passenger Counting (APC) and Automatic Vehicle Location (AVL) technologies. The platform offers a systematic way for users and decision makers to understand system performance from many aspects of service quality, including passenger waiting time, stop-skipping frequency, bus bunching level, bus travel time, on-time performance, and bus fullness. The AVL-APC data from September 2012 to March 2016 were archived in a database to support the development of a user-friendly web …


Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan ZHANG, Yongwang ZHAO, David SANAN, Yang LIU, Alwen TIU, Shang-Wei LIN, Jun SUN 2018 Singapore Management University

Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan Zhang, Yongwang Zhao, David Sanan, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Scalable and automatic formal verification for concurrent systems is always demanding. In this paper, we propose a verification framework to support automated compositional reasoning for concurrent programs with shared variables. Our framework models concurrent programs as succinct automata and supports the verification of multiple important properties. Safety verification and simulations of succinct automata are parallel compositional, and safety properties of succinct automata are preserved under refinements. We generate succinct automata from infinite state concurrent programs in an automated manner. Furthermore, we propose the first automated approach to checking rely-guarantee based simulations between infinite state concurrent programs. We have prototyped our …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin LIU, Jinshu SU, Rongmao CHEN, Ximeng LIU, Xiaofeng WANG, Shuhui CHEN, Ho-fung Fung LEUNG 2018 Singapore Management University

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


Design And Simulation Of An Intelligent Self-Adaptive System For A Smart Home, Basman M. Hasan Alhafidh 2018 Florida Institute of Technology

Design And Simulation Of An Intelligent Self-Adaptive System For A Smart Home, Basman M. Hasan Alhafidh

Theses and Dissertations

Home automation and control systems as basic elements of smart cities have played a key role in the development of our homes environments . They have a wide range of applications in many fields at home such as security and monitoring, healthcare, energy, and entertainment applications. The improvement of humans’ living standards make people keep trying to delegate many of their needs to a home automation system. Such a system has been built with capabilities of predicting what the user intends to do in smart home environment. However, there are many issues that need more investigation and solutions, such as: …


Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong 2018 Singapore Management University

Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong

Social Space

y now, most people are aware of Bitcoin and its meteoric rise in value. What is less known, however, is its underpinning technology, blockchain. Blockchain is a distributed ledger that records virtually all types of transactions.This distributed nature is reflected in itsphysical architecture, and is one of the main reasons for its strong resistance to hacking and its immutable nature.


All Systems Go: Building An Internet For Good, Sylvia Cadena 2018 Singapore Management University

All Systems Go: Building An Internet For Good, Sylvia Cadena

Social Space

The Internet has supercharged our ability to achieve development targets. Digital solutions, from both the public and private sectors, can facilitate unprecedented access to government and social services, banking andfinance, telehealth and well-being,education and training, employment opportunities, as well as create business opportunities.


A Unified Approach To Route Planning For Shared Mobility, Yongxin TONG, Yuxiang ZENG, Zimu ZHOU, Lei CHEN, Jieping YE, Ke XU 2018 Singapore Management University

A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu

Research Collection School Of Computing and Information Systems

There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In this …


Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque 2018 Old Dominion University

Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque

Computational Modeling & Simulation Engineering Theses & Dissertations

Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …


Soa Maturity Influence On Digital Banking Transformation, Alan MEGARGEL, Venky SHANKARARAMAN, Terence P. C. FAN 2018 Singapore Management University

Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan

Research Collection School Of Computing and Information Systems

Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the …


A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham 2018 San Jose State University

A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham

Faculty Publications

An integrated circuit implementation of a silicon neuron was designed, manufactured, and tested. The circuit was designed using the Quadratic, Integrate, and Fire (QIF) neuron model in 0.5 µm silicon technology. The neuron implementation was optimized for low current consumption, drawing only 1.56 mA per QIF circuit and utilized hysteretic reset, non-inverting integrator, and voltage-squarer circuits. The final area of each circuit in silicon was 268 µm height × 400 µm width. This design is the first IC of its kind for this neuron model and is successfully able to output true spiking that follows the behaviors of bistability, monotonic, …


Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia NATALI 2018 Singapore Management University

Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali

Dissertations and Theses Collection (Open Access)

The rapid increase in online social networking services over the last decade has pre- sented an unprecedented opportunity to observe users’ behaviour both on a societal and individual level. The insight gained from analysing such data can help foster a deeper understanding of social media users and the flow of information, while also offering valuable business applications. User relationships are among the most studied aspects of online behaviour. These relationships are not homogeneous. Past research has shown that people use social networks to both socialize and source in- formation. Hence, different types of links – used to socialize, gain information, …


Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong 2018 University of Nebraska-Lincoln

Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Two applications of vision processing on a smart camera platform using neighborhood processors are presented. A smart camera application of real-time trajectory calculation for tracking objects and predicting their path of motion by using a single intelligent camera or a dual camera system are designed, simulated and implemented. Another application of object recognition with a key points algorithm for detecting simple shaped objects and locating the camera position within a 3-D coordinate system via imaging by using artificial neural network is applied to provide quick and accurate processing on a neighborhood-level parallel processor or other limited vision chip. For all …


Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai 2018 University of Nebraska - Lincoln

Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Backscatter communication system is a wireless communication system that is used by both academic community and industry circles in recent years. This communication system only requires ultra-low power usage and simple design of the sensors. This project is using backscatter communication system to transmit data with backscatter tags. The method we used is semi-passive backscatter communication. This project focuses on transmitting signals with multiple sensors so there is a problem about distinguishing the signal reflected by different nodes. We modulated the transmitting digital signal with Walsh function to solve the problem of separating the signals between different nodes. By using …


Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan 2018 Old Dominion University

Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system …


Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul 2018 Chulalongkom University

Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul

The International Student Science Fair 2018

The unremitting trends of increasing population, urbanization, diminishing water supply, and continuing climate change have contributed to declining stocks of arable land per person. Land available for farming is shrinking, and the demand for food is growing. All of these lead to food insecurity. For the first version of Smart Vertical Farm System is designed to increase food productions by an automatic system. It built with shelves which support soil and hydroponic system, stacked vertically. The system first shovels the soil in the tray and sews the seeds. There is also additional watering system. The hydroponic parts are on the …


A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt 2018 Florida International University

A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt

FIU Electronic Theses and Dissertations

The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …


Digital Commons powered by bepress