Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,661 Full-Text Articles 38,525 Authors 8,340,641 Downloads 266 Institutions

All Articles in Computer Engineering

Faceted Search

23,661 full-text articles. Page 515 of 934.

Voice Enabled Indoor Localisation, Kieran Harkin, Kevin Curran, Eoghan Furey 2017 Technological University Dublin

Voice Enabled Indoor Localisation, Kieran Harkin, Kevin Curran, Eoghan Furey

The ITB Journal

The ability to track objects in real time offers a wide range of beneficial applications that include safety, security and the supply chain. The problem with location based systems is that they can be inconvenient and time-consuming to locate an object. A user has to access a computer and log onto a location system to locate an object. There are several problems with current location determination interfaces. Firstly a user has to log on to a computer; this can be inconvenient and time consuming as the user may have to locate a computer (which may be in another area of …


Mobile Phone Game Localisation, Leonie Troy, Matt Smith, Richard Gallery 2017 Technological University Dublin

Mobile Phone Game Localisation, Leonie Troy, Matt Smith, Richard Gallery

The ITB Journal

Often, mobile phone games are developed over a short time span. Because of the additional work and complexity that localisation requires, such games are frequently produced without localisation in mind. In recent years automation and standardisation of localisation has been developed and promoted by the Localisation Industry Standard Association (LISA) and Oasis. Mobile phone game localisation involves various types of language transfer on a small scale, which challenges the localisation process carried out on a game. Our work investigated the workflow for the localisation of a mobile phone game into Spanish and German using a LISA Standard TMX (Term Base …


Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney 2017 Technological University Dublin

Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney

The ITB Journal

Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports on a research project that was concerned with the life cycle development for large scale data mining projects. The paper provides a detailed view of the design and development of a generic data mining life cycle called DMLC. The life cycle aims to support all members of data mining project teams as well as IT managers and academic researchers and may improve …


Is Your Wireless Network Being Hacked?, Paul King, Ivan Smyth, Anthony Keane 2017 Technological University Dublin

Is Your Wireless Network Being Hacked?, Paul King, Ivan Smyth, Anthony Keane

The ITB Journal

Wireless networks provide vulnerable gateways for unauthorised entry to networks or even a standalone wireless computer. The independent radio signals that constitute wireless communications have no physical boundary to keep them in check. This allows a third party to easily eavesdrop on communications sessions and by capturing the data packets, they can break the encryption keys and access the data within the network. The public awareness of the insecurity of wireless networks is surprisingly poor despite frequent news media reports of the vulnerabilities of the equipment and the activities of the criminals prepare to exploit it. In this paper we …


Towards Arabic To English Machine Translation, Yasser Salem, Arnold Hensman, Brian Nolan 2017 Institute of Technology, Blanchardstown

Towards Arabic To English Machine Translation, Yasser Salem, Arnold Hensman, Brian Nolan

The ITB Journal

This paper explores how the characteristics of the Arabic language will effect the development of a Machine Translation (MT) tool from Arabic to English. Several distinguishing features of Arabic pertinent to MT will be explored in detail with reference to some potential difficulties that they might present. The paper will conclude with a proposed model incorporating the Role and Reference Grammar (RRG) technique to achieve this end.


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey 2017 Technological University Dublin

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane 2017 Technological University Dublin

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the …


Using Extended Analogy To Teach Fundamental Computing Concepts, Damian Gordon 2017 Technological University Dublin

Using Extended Analogy To Teach Fundamental Computing Concepts, Damian Gordon

The ITB Journal

Using analogies has long been used to help explain complex ideas in teaching. One of the most important ideas that a computing student must understand is the basic architecture of a digital computer. Since the late 1960s the standard teaching approach used to explain computer architecture is the Little Man Computer (LMC) Paradigm. This research seeks to expand upon this standard explanation through the use of a relatively recently developed technique called Extended Analogy. Extended analogy seeks to combine regular analogy with exaggeration or dramatic emphasis. In this case the LMC paradigm is extended by use of Samuel Beckett's play …


A Survey Of Procedural Techniques For City Generation, George Kelly, Hugh McCabe 2017 Technological University Dublin

A Survey Of Procedural Techniques For City Generation, George Kelly, Hugh Mccabe

The ITB Journal

The computer game industry requires a skilled workforce and this combined with the complexity of modern games, means that production costs are extremely high. One of the most time consuming aspects is the creation of game geometry, the virtual world which the players inhabit. Procedural techniques have been used within computer graphics to create natural textures, simulate special effects and generate complex natural models including trees and waterfalls. It is these procedural techniques that we intend to harness to generate geometry and textures suitable for a game situated in an urban environment. Procedural techniques can provide many benefits for computer …


Rapid-Prototyping Emulation System For Embedded System Hardware Verification, Using A Systemc Control System Environment And Reconfigurable Multimedia Hardware Development Platform, Dave Carroll, Richard Gallery 2017 Technological University Dublin

Rapid-Prototyping Emulation System For Embedded System Hardware Verification, Using A Systemc Control System Environment And Reconfigurable Multimedia Hardware Development Platform, Dave Carroll, Richard Gallery

The ITB Journal

This paper describes research into the suitability of using SystemC for rapid prototyping of embedded systems. SystemC[1][2][3] communication interface protocols [4][5] are interfaced with a reconfigurable hardware system platform to provide a real-time emulation environment, allowing SystemC simulations to be directly translated into real-time solutions. The consequent Rapid Prototyping Emulation System Platform1, suitable for the implementation of consumer level multimedia systems, is described, including the system architecture, SystemC Controller model, the FPGA configured MicroBlaze CPU system and additional logic devices implemented on the Multimedia development board used for the hardware in the PESP, illustrated in the context of a typical …


Integration And Communication Of Process Support Tools In An Online Virtual Learning Environment, L. Raeside, B. Busschots, Shen Fei, J. G. Keating 2017 Technological University Dublin

Integration And Communication Of Process Support Tools In An Online Virtual Learning Environment, L. Raeside, B. Busschots, Shen Fei, J. G. Keating

The ITB Journal

The Education through Virtual Experience (EVE) research group based at the National University of Ireland Maynooth have successfully developed an online Virtual Learning Environment (VLE) for Astronomy as part of the Virtual Telescopes in Education (VTIE) project. The VTIE VLE has been developed to provide online software support for the engagement of schoolchildren and their teachers in a scientific process. The development of an online VLE to support a scientific process has brought about complex interactions from the user perspective. This has lead to complex integration and communication challenges from the software implementation perspective. This paper contains a high level …


Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft 2017 Air Force Institute of Technology

Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft

AFIT Patents

An apparatus and method of presenting air traffic data to an air traffic controller are provided. Air traffic data including a two dimensional spatial location and altitude for a plurality of aircraft is received. A disparity value is determined based on the altitude for each aircraft of the plurality of aircraft. Left and right eye images are generated of the plurality of aircraft where at least one of the left and right eye images is based on the determined disparity value. The left and right eye images are simultaneously displayed to the air traffic controller on a display. The simultaneously …


Ben Regoso, Benjamin Regoso 2017 Andrews University

Ben Regoso, Benjamin Regoso

Spring 2017

One of the first people I met when I first arrived on campus in the summer of 2010 was the IT Support “guy.” Based on past experience with IT in other places, my expectations were low. I figured I would pass him my tech gear and he would work everything out. A quick, simple transaction is all that was needed. Ben Regoso’s work ethic reset my expectations and, more importantly, began to shape my own perspective on how to work with others even when the task is “just” transactional.

Ben’s attitude and posture in every “transaction” I’ve had with him …


A Current-Dependent Switching Strategy For Si/Sic Hybrid Switch-Based Power Converters, Jiangbiao He, Ramin Katebi, Nathan Weise 2017 Marquette University

A Current-Dependent Switching Strategy For Si/Sic Hybrid Switch-Based Power Converters, Jiangbiao He, Ramin Katebi, Nathan Weise

Electrical and Computer Engineering Faculty Research and Publications

Abstract: Hybrid switches configured by paralleling Silicon (Si) Insulated Gate Bipolar Transistors (IGBT) and Silicon Carbide (SiC) Metal-Oxide Semiconductor Field-Effect Transistors (MOSFET) have been verified to be a high-efficiency cost-effective device concept. In this paper, a current-dependent switching strategy is introduced and implemented to further improve the performance of Si/SiC hybrid switches. This proposed switching strategy is based on a comprehensive consideration of reducing device losses, reliable operation, and overload capability. Based on the utilization of such Si/SiC hybrid switches and the proposed switching strategy, a 15-kW single-phase H-bridge inverter prototype was implemented and tested in the laboratory. Simulation and …


Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu 2017 University of South Florida

Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu

USF Tampa Graduate Theses and Dissertations

Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret key in a cryptographic circuit in feasible time without the need for expensive measurement equipment. Power analysis attacks (PAA) are a type of SCA that exploit the correlation between the leaked power consumption information and processed/stored data. Differential power analysis (DPA) and leakage power analysis (LPA) attacks are two types of PAA that exploit different characteristics of the side-channel leakage profile. DPA attacks exploit the correlation between the input data and dynamic power consumption of cryptographic circuits. Alternatively, LPA attacks utilize the correlation between the …


Evaluation Of The Efficiency Of An Arm-Based Beowulf Cluster Versus Traditional Desktop Computing For High Performance Computing, Nicholas Addiego 2017 University of San Diego

Evaluation Of The Efficiency Of An Arm-Based Beowulf Cluster Versus Traditional Desktop Computing For High Performance Computing, Nicholas Addiego

Undergraduate Honors Theses

In the realm of scientific computing, it has become increasingly important to focus on results driven growth (Kamil, Shalf and Storhmaier). Doing this enables researchers to continue building the rapidly expanding area of scientific discovery. However, with the growth comes a cost of the amount of resources consumed to accomplish these results. Large supercomputers are consuming power at a rate roughly fourteen thousand times that of a traditional American household (U.S. Energy Information Administration). Parallel to this, public consumers have been driving the mobile industry and the research behind it. The need to have faster and faster mobile devices that …


Perception Of 3d Symmetrical And Near-Symmetrical Shapes, Vijai Jayadevan, Aaron Michaux, Edward Delp, Zygmunt Pizlo 2017 Purdue University

Perception Of 3d Symmetrical And Near-Symmetrical Shapes, Vijai Jayadevan, Aaron Michaux, Edward Delp, Zygmunt Pizlo

MODVIS Workshop

No abstract provided.


Advanced Text Analytics And Machine Learning Approach For Document Classification, Chaitanya Anne 2017 University of New Orleans

Advanced Text Analytics And Machine Learning Approach For Document Classification, Chaitanya Anne

University of New Orleans Theses and Dissertations

Text classification is used in information extraction and retrieval from a given text, and text classification has been considered as an important step to manage a vast number of records given in digital form that is far-reaching and expanding. This thesis addresses patent document classification problem into fifteen different categories or classes, where some classes overlap with other classes for practical reasons. For the development of the classification model using machine learning techniques, useful features have been extracted from the given documents. The features are used to classify patent document as well as to generate useful tag-words. The overall objective …


Improving A Particle Swarm Optimization-Based Clustering Method, Sharif Shahadat 2017 University of New Orleans

Improving A Particle Swarm Optimization-Based Clustering Method, Sharif Shahadat

University of New Orleans Theses and Dissertations

This thesis discusses clustering related works with emphasis on Particle Swarm Optimization (PSO) principles. Specifically, we review in detail the PSO clustering algorithm proposed by Van Der Merwe & Engelbrecht, the particle swarm clustering (PSC) algorithm proposed by Cohen & de Castro, Szabo’s modified PSC (mPSC), and Georgieva & Engelbrecht’s Cooperative-Multi-Population PSO (CMPSO). In this thesis, an improvement over Van Der Merwe & Engelbrecht’s PSO clustering has been proposed and tested for standard datasets. The improvements observed in those experiments vary from slight to moderate, both in terms of minimizing the cost function, and in terms of run time.


Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva 2017 Florida Atlantic University

Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva

MODVIS Workshop

E-Learning is emerging as a convenient and effective learning tool. However, the challenge with eLearning is the lack of effective tools to assess levels of learning. Ability to predict difficult content in real time enables eLearning systems to dynamically provide supplementary content to meet learners’ needs. Recent developments have made possible low-cost eye trackers, which enables a new class of applications based on eye response. In comparison to past attempts using bio-metrics in learning assessments, with eye tracking, we can have access to the exact stimulus that is causing the response. A key aspect of the proposed approach is the …


Digital Commons powered by bepress