Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,871 Full-Text Articles 38,892 Authors 8,340,641 Downloads 269 Institutions

All Articles in Computer Engineering

Faceted Search

23,871 full-text articles. Page 530 of 944.

Influence Of Polyethylene Glycol (Peg) In Cmc-Nh4br Based Polymer Electrolytes: Conductivity And Electrical Study, Nur Khalidah Zainuddin, Ahmad Salihin Samsudin 2017 Advanced Materials Group, Faculty of Industrial Sciences and Technology (FIST), Universiti Malaysia Pahang, 26300 Pahang, Malaysia

Influence Of Polyethylene Glycol (Peg) In Cmc-Nh4br Based Polymer Electrolytes: Conductivity And Electrical Study, Nur Khalidah Zainuddin, Ahmad Salihin Samsudin

Makara Journal of Technology

The present work was carried with new type and promising polymer electrolytes system by development of carboxyl methylcellulose (CMC) doped NH4Br and plasticized with polyethylene glycol (PEG). The sample was successfully prepared via solution casting with no separation phase and good mechanical properties. The electrical conductivity and thermal conductivity of CMC-NH4Br-PEG based PEs system have been measured by the electrical impedance spectroscopy method in the temperature range of 303–373 K. The highest ionic conductivity gained is 2.48 x 10-3 Scm-1 at ambient temperature for sample contain with 8 wt. % PEG. It can be concluded that the plasticized is accountable …


Purification Simulation With Vapor Permeation And Distillation-Adsorption In Bioethanol Plant, Misri Gozan, Mia Sari Setiawan, Kenny Lischer 2017 Biorefinery Engineering Group, Department of Chemical Engineering, Faculty of Engineering, Universitas Indonesia, Depok 16424, Indonesia

Purification Simulation With Vapor Permeation And Distillation-Adsorption In Bioethanol Plant, Misri Gozan, Mia Sari Setiawan, Kenny Lischer

Makara Journal of Technology

High purity of Bioethanol is required in biofuel mixing with gasoline (EXX). In bioethanol production line, the azeotropic property of ethanol-water becomes the barrier for purification process. This study examined two bioethanol separation processes by support of simulation tools, Superpro Designer 9.0 software. Ethanol purity and a low costeconomical process were the major considerations. Purification method of vapor permeation membrane technology was compared with distillation-adsorption method. Data from previous lab experiments and some literatures were used. The results showed that distillation-adsorption method is more economical compared to vapor permeation technology. Payback period of the simulation is 3.9 years and 4.3 …


A Novel Approach To Complex Human Activity Recognition, Md Osman Gani 2017 Marquette University

A Novel Approach To Complex Human Activity Recognition, Md Osman Gani

Dissertations (1934 -)

Human activity recognition is a technology that offers automatic recognition of what a person is doing with respect to body motion and function. The main goal is to recognize a person's activity using different technologies such as cameras, motion sensors, location sensors, and time. Human activity recognition is important in many areas such as pervasive computing, artificial intelligence, human-computer interaction, health care, health outcomes, rehabilitation engineering, occupational science, and social sciences. There are numerous ubiquitous and pervasive computing systems where users' activities play an important role. The human activity carries a lot of information about the context and helps systems …


Nano-Channels Early Formation Investigation On Stainless Steel 316ti After Immersion In Molten Pb-Bi, Abu Khalid Rivai, Mardiyanto Mardiyanto, Annette Heinzel 2017 Center for Science and Technology of Advanced Materials – National Nuclear Energy Agency of Indonesia BATAN, Puspiptek, Tangerang Selatan 15314, Indonesia

Nano-Channels Early Formation Investigation On Stainless Steel 316ti After Immersion In Molten Pb-Bi, Abu Khalid Rivai, Mardiyanto Mardiyanto, Annette Heinzel

Makara Journal of Technology

Development of fuel cladding and structural materials in Pb-Bi environment, especially at high temperature, is a critical issue for the deployment of LFR (Lead alloy-cooled Fast Reactor) and ADS (Accelerator Driven Transmutation System). This is because of the corrosive characteristic of Pb-Bi to metals as constituent materials of fuel cladding and structural of the reactors. Corrosion test of a high-chromium austenitic stainless steel i.e. SS316Ti in molten Pb-Bi at 550 ºC has been carried out for about 300 hours continuously. The characterization using SEM-EDS (Scanning Electron Microscopy - Energy Dispersive X-ray Spectroscopy) showed that an iron oxide as the outer …


Reducing Graphene-Metal Contact Resistance Via Laser Nano-Welding, Kamran Keramatnejad, H. Rabiee Golgir, Y. S. Zhou, D. W. Li, X. Huang, Yongfeng Lu 2017 University of Nebraska-Lincoln

Reducing Graphene-Metal Contact Resistance Via Laser Nano-Welding, Kamran Keramatnejad, H. Rabiee Golgir, Y. S. Zhou, D. W. Li, X. Huang, Yongfeng Lu

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The large graphene-metal contact resistance is a major limitation for development of graphene electronics. graphene behaves as an insulator for out-of-plane carrier transport to metallic contacts.

Laser nano-welding was developed and led to RC reductions of up to 84%.

Localized laser irradiation at the edges of graphene led to the formation of chemically active point defects.

Precise structural modifications and formation of G-M bonding led to improved carrier efficiency in graphene devices.


Cyber Security Risks In Public High Schools, Ion Goran 2017 CUNY John Jay College

Cyber Security Risks In Public High Schools, Ion Goran

Student Theses

Today, just like other organizations, schools are vulnerable to cyber-attacks. This vulnerability has vividly revealed itself in recent years, with the number of attacks on public schools increasing and taking ever-changing forms. Today, the student’s grades, disciplinary notes, learning diagnoses, phone numbers, addresses, and another identifying information is all at risk of being exposed. Moreover, poor network security poses a dire threat to parents of school children whose personal records contain sensitive or dangerous information. The practical implications of these attacks require intervention or remedy to increase cyber security. Cyberattacks may take place when storage facilities or infected devices are …


Neural Collaborative Filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, Tat-Seng CHUA 2017 Singapore Management University

Neural Collaborative Filtering, Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

In recent years, deep neural networks have yielded immense success on speech recognition, computer vision and natural language processing. However, the exploration of deep neural networks on recommender systems has received relatively less scrutiny. In this work, we strive to develop techniques based on neural networks to tackle the key problem in recommendation --- collaborative filtering --- on the basis of implicit feedback.Although some recent work has employed deep learning for recommendation, they primarily used it to model auxiliary information, such as textual descriptions of items and acoustic features of musics. When it comes to model the key factor in …


Pythagorean Approximations For Lego: Merging Educational Robot Construction With Programming And Data Analysis, Ronald I. Greenberg 2017 Loyola University Chicago

Pythagorean Approximations For Lego: Merging Educational Robot Construction With Programming And Data Analysis, Ronald I. Greenberg

Computer Science: Faculty Publications and Other Works

Abstract. This paper can be used in two ways. It can provide reference information for incorporating diagonal elements (for bracing or gear meshing) in educational robots built from standard LEGO kits. Alternatively, it can be used as the basis for an assignment for high school or college students to recreate this information; in the process, students will exercise skills in both computer programming and data analysis. Using the paper in the second way can be an excellent integrative experience to add to an existing course; for example, the Exploring Computer Science high school curriculum concludes with the units “Introduction to …


An Immersive Learning Model, Shamsa Abdulla Salem Al Mazrouei 2017 United Arab Emirates University

An Immersive Learning Model, Shamsa Abdulla Salem Al Mazrouei

Theses

Our overarching goal is to provide children with immersive game-based learning environments to support Arabic linguistic skills acquisition. We postulate that immersion in- creases learning. To investigate this hypothesis, we developed a model and built an implementation of an educational virtual environment (EVE) that supports immersion and thus, induces effective learning. Experimental results confirm our hypothesis.

Our model integrates learning content, learning activities, immersion and gameplay. Based on our analysis of various curricula, specifically the United Arab Emirates grade one curriculum, we identified the nature of the learning content in order to satisfy the curriculum requirements. This content is conceptually …


Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, Dawu GU 2017 Singapore Management University

Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu

Research Collection School Of Computing and Information Systems

As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key attacks are already practical enough to be implemented on cryptographic devices. To avoid cryptographic devices suffering from related-key attacks, it is necessary to design a cryptographic scheme that resists against such attacks. This paper proposes an efficient RKA-secure Key Encapsulation Mechanism (KEM), in which the adversary can modify the secret key sk to any value f(sk), as long as, f is a polynomial …


Memcapacitive Devices In Logic And Crossbar Applications, Dat Tran, Christof Teuscher 2017 Portland State University

Memcapacitive Devices In Logic And Crossbar Applications, Dat Tran, Christof Teuscher

Electrical and Computer Engineering Faculty Publications and Presentations

Over the last decade, memristive devices have been widely adopted in computing for various conventional and unconventional applications. While the integration density, memory property, and nonlinear characteristics have many benefits, reducing the energy consumption is limited by the resistive nature of the devices. Memcapacitors would address that limitation while still having all the benefits of memristors. Recent work has shown that with adjusted parameters during the fabrication process, a metal-oxide device can indeed exhibit a memcapacitive behavior. We introduce novel memcapacitive logic gates and memcapacitive crossbar classifiers as a proof of concept that such applications can outperform memristor-based architectures. The …


Table Of Contents, 2017 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter, 2017 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016), 2017 Embry-Riddle Aeronautical University

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald 2017 University of Erlangen-Nuremberg

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger 2017 University of New Haven

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. 2017 Mississippi State University

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Development Of A Remotely Accessible Wireless Testbed For Performance Evaluation Of Ami Related Protocols, Utku Ozgur 2017 Florida International University

Development Of A Remotely Accessible Wireless Testbed For Performance Evaluation Of Ami Related Protocols, Utku Ozgur

FIU Electronic Theses and Dissertations

Although smart meters are deployed in many countries, the data collection process from smart meters in Smart Grid (SG) still has some challenges related to consumer privacy that needs to be addressed. Referred to as Advanced Metering Infrastructure (AMI), the data collected and transmitted through the AMI can leak sensitive information about the consumers if it is sent as a plaintext.

While many solutions have been proposed in the past, the deployment of these solutions in real-life was not possible since the actual AMIs were not accessible to researchers. Therefore, a lot of solutions relied on simulations which may not …


Research Poster.Pdf, Desiree Dominguez 2017 University of Central Florida

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones …


Ip Flow Mobility In The Industry: From An Economic Perspective, Jun Huang, Fang Fang, Cong-Cong Xing, Yi Qian 2017 Chongqing University of Posts and Telecommunications

Ip Flow Mobility In The Industry: From An Economic Perspective, Jun Huang, Fang Fang, Cong-Cong Xing, Yi Qian

Department of Electrical and Computer Engineering: Faculty Publications

The popularity of social media together with the advancement of mobile Internet applications enabling the uploading of data plays a dominant role in the entire Internet traffic. IP flow mobility (IFOM) is proposed as an effective means to enhance the system capacity by offloading data from the cellular network to WiFi or Femtocells or other complementary networks. Although IFOM has been extensively investigated during the past few years, most of these studies, however, are concerned with IFOM technical issues only; little work regarding the IFOM application has been done from the service providers’ perspective. Unlike previous research, in this paper, …


Digital Commons powered by bepress