Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

12,306 Full-Text Articles 15,186 Authors 4,117,996 Downloads 197 Institutions

All Articles in Computer Engineering

Faceted Search

12,306 full-text articles. Page 7 of 412.

Consensus-Based Robotic Formation Control, Satish Reddy Modugu 2019 University of Nebraska at Omaha

Consensus-Based Robotic Formation Control, Satish Reddy Modugu

Computer Science Graduate Research Workshop

No abstract provided.


Simulator For Qubit Measurement Using Augmented Reality, SAI PRADEEP KONETI 2019 University of Nebraska at Omaha

Simulator For Qubit Measurement Using Augmented Reality, Sai Pradeep Koneti

Computer Science Graduate Research Workshop

No abstract provided.


An Application Of Artificial General Intelligence In Board Games, Nathan Skalka 2019 University of Nebraska at Omaha

An Application Of Artificial General Intelligence In Board Games, Nathan Skalka

Computer Science Graduate Research Workshop

No abstract provided.


Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju 2019 Washington University in St. Louis

Computational Geometry Teaching Tool, Yujie Zhou, Tao Ju

All Computer Science and Engineering Research

When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool.

This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree.

First, this tool is developed by using JavaScript so that users don't need to install any software ...


Aerial Base Station Deployment For Post-Disaster Public Safety Applications, Jose Antonio Matamoros Vargas 2019 University of Nebraska-Lincoln

Aerial Base Station Deployment For Post-Disaster Public Safety Applications, Jose Antonio Matamoros Vargas

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Earthquakes and floods are constant threats to most of the countries in the world. After such catastrophes, a rapid response is needed, which includes communications not only for first responders but also for local civilians. Even though there are technologies and specialized personnel for rapid deployment, it is common that external factors will hinder the arrival of help while communication requirements are urgently required. Such communication technologies would aid tasks regarding organization and information dissemination from authorities to the civilians and vice-versa. This necessity is due to protocols and applications to allocate the number of emergency resources per location and ...


A Strategic Audit Of Microsoft Azure, Lee Fitchett 2019 University of Nebraska - Lincoln

A Strategic Audit Of Microsoft Azure, Lee Fitchett

Honors Theses, University of Nebraska-Lincoln

This paper looks at Microsoft Azure's current strategies and proposes possible options for the future. It looks at several competitors and explores how Azure will affect and react to Microsoft’s vision.


Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn 2019 University of South Carolina - Columbia

Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn

Senior Theses

Bridgr is an iOS application that facilitates long distance carpooling. This application allows drivers to post destinations on an interactable map so that they can be linked with students that need a ride to a location within close proximity of the posted destination. The riders and driver are linked in a common chat board where they can discuss ride details among themselves. The goal of Bridgr is to allow drivers to utilize extra space in their car in turn for fellowship and/or gas money.


Design And Implementation Of Sql Online Practice Platform, Wenhui Zhang 2019 Western Kentucky University

Design And Implementation Of Sql Online Practice Platform, Wenhui Zhang

Masters Theses & Specialist Projects

Database management is a very important subject in computer science education. The study of SQL syntax is the most important part of this course. The traditional teaching method only lets the students practice SQL syntax through the textbook exercise. Students cannot get the query result directly. Moreover, students do not know intuitively what is wrong with the query sentence. In this study, we want to find a better way for the teachers and the students to learn this part of database management. Teacher uploads a SQL file through a web page, it will create a database with several tables and ...


Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan, Hyon-Young Choi, Yuhan Lin, Haoran Li, Chenyang Lu, Insup Lee 2019 University of Pennsylvania

Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan, Hyon-Young Choi, Yuhan Lin, Haoran Li, Chenyang Lu, Insup Lee

Departmental Papers (CIS)

This paper presents CaM, a holistic cache and memory bandwidth resource allocation strategy for multicore real-time systems. CaM is designed for partitioned scheduling, where tasks are mapped onto cores, and the shared cache and memory bandwidth resources are partitioned among cores to reduce resource interferences due to concurrent accesses. Based on our extension of LITMUSRT with Intel’s Cache Allocation Technology and MemGuard, we present an experimental evaluation of the relationship between the allocation of cache and memory bandwidth resources and a task’s WCET. Our resource allocation strategy exploits this relationship to map tasks onto cores, and to ...


A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi 2019 University of Southern Mississippi

A Machine Learning Approach To Network Intrusion Detection System Using K Nearest Neighbor And Random Forest, Ilemona S. Atawodi

Master's Theses

The evolving area of cybersecurity presents a dynamic battlefield for cyber criminals and security experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there has been a need now more than ever to updating the traditional methods from rudimentary approaches such as manually updated blacklists and whitelists. Another method involves manually creating rules, this is usually one of the most common methods to date.

A lot of similar research that involves incorporating machine learning and artificial intelligence into both host and network-based intrusion systems recently. Doing this originally presented ...


The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum 2019 Xavier University of Louisiana

The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum

Faculty and Staff Publications

Abstract. Xavier University of Louisiana (XULA) is a Science, Technology, Engineering, and Mathematics (STEM) university located in New Orleans, Louisiana. As a Historically Black University (HBCU), the university serves a diverse community of students in which many are first-generation, college graduates. Students enrolled in Design courses at XULA are studying in Bachelor of Science and Bachelor of Art programs and majoring in subjects such as Computer Science, Physics, Mass Communication, Art, Business, and Science. The interdisciplinary student environment offers a unique opportunity for collaboration and peer learning, whereby students are able to share diverse perspectives on a topic by relating ...


On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger 2019 CRISP, Center for Research in Security and Privacy

On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In recent years different strategies have been proposed to handle the problem of ever-growing digital forensic databases. One concept to deal with this data overload is data reduction, which essentially means to separate the wheat from the chaff, e.g., to filter in forensically relevant data. A prominent technique in the context of data reduction are hash-based solutions. Data reduction is achieved because hash values (of possibly large data input) are much smaller than the original input. Today's approaches of storing hash-based data fragments reach from large scale multithreaded databases to simple Bloom filter representations. One main focus was ...


Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li 2019 Washington University in St. Louis

Feature Extraction Form Ct Scan Of Plant Root, Chunyuan Li

All Computer Science and Engineering Research

Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.


Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam 2019 Purdue University

Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam

Faculty Publications

In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required derived the degrees of ...


The Applications Of Grid Cells In Computer Vision, Keaton Kraiger 2019 Portland State University

The Applications Of Grid Cells In Computer Vision, Keaton Kraiger

Undergraduate Research & Mentoring Program

In this study we present a novel method for position and scale invariant object representation based on a biologically-inspired framework. Grid cells are neurons in the entorhinal cortex whose multiple firing locations form a periodic triangular array, tiling the surface of an animal’s environment. We propose a model for simple object representation that maintains position and scale invariance, in which grid maps capture the fundamental structure and features of an object. The model provides a mechanism for identifying feature locations in a Cartesian plane and vectors between object features encoded by grid cells. It is shown that key object ...


Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren 2019 William & Mary

Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren

Undergraduate Honors Theses

This paper examines developing machine learning and statistic models to build forecast models for equity returns in an emergent market, with an emphasis on computing. Distributed systems were pared with random search and Bayesian optimization to find good hyperparameters for neural networks. No significant results were found.


Exploring And Visualizing Household Electricity Consumption Patterns In Singapore: A Geospatial Analytics Approach, Yong Ying TAN, Tin Seong KAM 2019 Singapore Management University

Exploring And Visualizing Household Electricity Consumption Patterns In Singapore: A Geospatial Analytics Approach, Yong Ying Tan, Tin Seong Kam

Research Collection School Of Information Systems

Despite being a small country-state, electricity consumption in Singa-pore is said to be non-homogeneous, as exploratory data analysis showed that the distributions of electricity consumption differ across and within administrative boundaries and dwelling types. Local indicators of spatial association (LISA) were calculated for public housing postal codes using June 2016 data to discover local clusters of households based on electricity consumption patterns. A detailed walkthrough of the analytical process is outlined to describe the R packages and framework used in the R environment. The LISA results are visualized on three levels: country level, regional level and planning subzone level. At ...


Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende e Silva 2019 University of Nebraska-Lincoln

Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende E Silva

Computer Science and Engineering: Theses, Dissertations, and Student Research

With the ever-increasing popularity of mobile devices over the last decade, mobile apps and the frameworks upon which they are built frequently change. This rapid evolution leads to a confusing jumble of devices and applications utilizing differing features even within the same framework. For Android apps and devices, representing over 80% of the market share, mismatches between the version of the Android operating system installed on a device and the version of the app installed, can lead to several run-time crashes, providing a poor user experience.

This thesis presents GAINDroid, an analysis approach, backed with a classloader based program analyzer ...


Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia 2019 University of Nebraska-Lincoln

Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia

Computer Science and Engineering: Theses, Dissertations, and Student Research

Smart home Internet-of-Things (IoT) accompanied by smart home apps has witnessed tremendous growth in the past few years. Yet, the security and privacy of the smart home IoT devices and apps have raised serious concerns, as they are getting increasingly complicated each day, expected to store and exchange extremely sensitive personal data, always on and connected, and commonly exposed to any users in a sensitive environment. Nowadays wireless smart home IoT devices rely on electromagnetic wave-based radio-frequency (RF) technology to establish fast and reliable quality network connections. However, RF has its limitations that can negatively affect the smart home user ...


Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg 2019 Loyola University Chicago

Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg

Computer Science: Faculty Publications and Other Works

This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.


Digital Commons powered by bepress