Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 19056

Full-Text Articles in Engineering

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari May 2022

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari

Graduate Research in Engineering and Technology (GRET)

The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients ...


Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo May 2022

Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo

Graduate Research in Engineering and Technology (GRET)

Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures ...


Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar May 2022

Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

Supply chain management system is a centralized system which controls and plans the activities involved from production to delivery of a product. Disruption in treatment and loss of life occurs due to delay in delivery of pharmaceutical products. The objective is to do a model using Machine learning algorithms to determine: Classification to predict which product will be delayed and Regression shows how much time it will be delayed exactly. This study will use publicly available supply chain data which helps to identify primary aspect of predicting whether HIV drugs are delivered in time or not. It will then use ...


Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar May 2022

Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

In recent market, there are several cell phones available, Smart phones differ based on their Operating system. Here we are going to do a comparison between two Operating systems i.e., “IOS and ANDROID”. The comparison starts including the basic features of smart phones. The features are varying from each other. Some of them are categorical and some are numerical. According to these data, classify the smart phones using machine learning classification model. After the classification we are going to analyse which operating system-based Smartphone will be taken for further classification. A “Recommendation system”, will be designed which recommend a ...


Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy May 2022

Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

In the current scenario, the Internet of Things (IoT) is an emerging technology. IoT is a new pattern that has changed the long-established way of living into a modernistic life style. IoT is the network of physical objects, which enables to collect data and exchange it without human intervention. In general, IoT has been established to interlink the latest healthcare resources and to provide smart and efficient healthcare facilities to the people. IoT allows objects to be sensed and controlled remotely across existing network infrastructure. Health maintenance has become a considerable socio-economic concern when it comes to health expenses, need ...


Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy May 2022

Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

Text mining or information discovery is that sub manner of information mining that is extensively being used to find out hidden styles and huge records from the massive amount of unstructured written fabric. Text mining allows accelerate know-how discovery by way of notably growing the amount records that can be analyzed. Rapid development in digital facts acquisition strategies have caused huge extent of facts. More than 80 percentages of these day’s statistics is composed of unstructured or semi-based information. This sort of data cannot be used until or unless particular records or pattern is determined. The discovery of appropriate ...


A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra May 2022

A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra

Graduate Research in Engineering and Technology (GRET)

In today’s digital era healthcare is one among the major core areas of the medical domain. People trying to find suitable health-related information that they are concerned with. The Internet could be a great resource for this kind of data, however you need to take care to avoid getting harmful information. Nowadays, a colossal quantity of clinical information dispersed totally across different websites on the Internet prevents users from finding useful information for their well-being improvement. Errors in medication are one of the foremost severe medical faults that would be a threat to patients’ lives. These problems increases the ...


Benford’S Law For Data Cleaning In Big Data, Prachurya Ray May 2022

Benford’S Law For Data Cleaning In Big Data, Prachurya Ray

Graduate Research in Engineering and Technology (GRET)

With the exponential increase in data, the need to authenticate the integrity accuracy of the data also increases. Regarded as a mysterious law, Benford's Law has seen many use cases over the centuries ranging from detecting fraud in accounting to checking for GAN generated images. This First digit law has helped finding anomalies in various data across many domains. This paper summarizes what this mysterious law is and implements the same to asteroid data to check for the pattern. This law has the potential to handle the growing need for authenticity for the big data revolution. Further research on ...


Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous vehicles, driver assistance systems, and in-vehicle entertainment, these vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question, we study the efficient placement of distributed services on a moving vehicle cluster. We present a macroscopic flow model for an intersection in Dublin, Ireland, using real vehicle density data. We show that such aggregate flows are highly predictable (even though the paths ...


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment ...


Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik May 2022

Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik

Dartmouth College Master’s Theses

The vision of smart homes is rapidly becoming a reality, as the Internet of Things and other smart devices are deployed widely. Although smart devices offer convenience, they also create a significant management problem for home residents. With a large number and variety of devices in the home, residents may find it difficult to monitor, or even locate, devices. A central controller that brings all the home’s smart devices under secure management and a unified interface would help homeowners and residents track and manage their devices.

We envision a solution called the SPLICEcube whose goal is to detect smart ...


Automotive Sensor Fusion Systems For Traffic Aware Adaptive Cruise Control, Jonah T. Gandy May 2022

Automotive Sensor Fusion Systems For Traffic Aware Adaptive Cruise Control, Jonah T. Gandy

Theses and Dissertations

The autonomous driving (AD) industry is advancing at a rapid pace. New sensing technology for tracking vehicles, controlling vehicle behavior, and communicating with infrastructure are being added to commercial vehicles. These new automotive technologies reduce on road fatalities, improve ride quality, and improve vehicle fuel economy. This research explores two types of automotive sensor fusion systems: a novel radar/camera sensor fusion system using a long shortterm memory (LSTM) neural network (NN) to perform data fusion improving tracking capabilities in a simulated environment and a traditional radar/camera sensor fusion system that is deployed in Mississippi State’s entry in ...


The School Of Engineering And Computer Science Class Of 2022 Academic Celebration, Cedarville University May 2022

The School Of Engineering And Computer Science Class Of 2022 Academic Celebration, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy May 2022

Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy

Publications and Research

The main purpose of this project is to create a functional prototype of a multilayered system that incorporates aspects of electrical, mechanical, and computer engineering technology. The main objective of the system is to be able to determine whether a light bulb is working or not. The building blocks of this system are a robotic arm that is able to slide along a rail (for added mobility), a conveyor belt, and an electromechanical device that holds and tests light bulbs. Initially, the robot arm picks up a light bulb and places it into the holder which then tests it. A ...


Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work May 2022

Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work

Military Cyber Affairs

Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to ...


Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner May 2022

Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner

Industrial Engineering Undergraduate Honors Theses

The global investment industry offers a wide variety of investment products especially for individual investors. One such product, index funds, which are younger than actively managed mutual funds, have typically outperformed managed funds. Despite this phenomenon, investors have displayed a tendency to continue investing in actively managed funds. Although only a small percentage of actively managed funds outperform index funds, the costs of actively managed funds are significantly higher. Also, managed fund performances are most often determined by their fund category such as growth or real estate. I wanted to answer the following question for individual investors: can we forecast ...


Low-Latency And Fresh Content Provision In Information-Centric Vehicular Networks, Shan Zhang, Junjie Li, Hongbin Luo, Jie Gao, Lian Zhao, Xuemin Sherman Shen May 2022

Low-Latency And Fresh Content Provision In Information-Centric Vehicular Networks, Shan Zhang, Junjie Li, Hongbin Luo, Jie Gao, Lian Zhao, Xuemin Sherman Shen

Electrical and Computer Engineering Faculty Research and Publications

In this paper, the content service provision of information-centric vehicular networks (ICVNs) is investigated from the aspect of mobile edge caching, considering the dynamic driving-related context information. To provide up-to-date information with low latency, two schemes are designed for cache update and content delivery at the roadside units (RSUs). The roadside unit centric (RSUC) scheme decouples cache update and content delivery through bandwidth splitting, where the cached content items are updated regularly in a round-robin manner. The request adaptive (ReA) scheme updates the cached content items upon user requests with certain probabilities. The performance of both proposed schemes are analyzed ...


Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover May 2022

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked ...


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall May 2022

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move ...


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan May 2022

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine May 2022

The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine

Military Cyber Affairs

Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.

[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague May 2022

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the ...


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover May 2022

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture ...


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao May 2022

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Computer Science and Engineering: Theses, Dissertations, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique ...


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar May 2022

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0 ...


Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber May 2022

Monitoring The M-Dwarf Host Stars Of Tess Exoplanet Candidates: Stellar Flares And Habitability, Ashley Lieber

Physics Undergraduate Honors Theses

In the search for life beyond our solar system, the study of M-dwarfs has become increasingly important due to their unique characteristics including their small size, flaring capabilities, and long lifespans. Their small size allows for exoplanet detection due to observable gravitational interactions, and the stellar flares could potentially trigger prebiotic life on exoplanets in the system. Lastly, their long lifespans may provide the conditions necessary to foster prebiotic life and the development of more complex organisms over time. Flare rate is a critical factor in determining the habitability of the exoplanet due to its potential to damage or incubate ...


Eco: A Sustainability Education Chatbot, Joey Gruber May 2022

Eco: A Sustainability Education Chatbot, Joey Gruber

Theses/Capstones/Creative Projects

There is a lack of access to information about sustainability from what the climate crisis is to how to recycle properly. For both sustainability-informed and uninformed individuals, learning new information about sustainability and reducing their waste in a way that compliments their lifestyle is time-consuming, requires strategic skills, and can cost them money. ECO is an audio and text-based chatbot that teaches users to be more environmentally conscious through waste reduction.


Autonomous Navigator Mobile Robot Upgrade, David Sansoucy Apr 2022

Autonomous Navigator Mobile Robot Upgrade, David Sansoucy

Thinking Matters Symposium

The mobile robot platform has been developed over the course of 10 years at USM. In Spring 2020, Belle-Isle and Werner updated the previous framework by rewriting the software to use the ROS framework running on an on-board Raspberry Pi 3. They also implemented navigation using an A* motion planning algorithm and image processing. In Summer 2021, Ames incorporated Lidar and Kinect sensors onto the robot to improve its real-time navigation capabilities. He also made improvements to the power distribution systems. This project aimed to build on the ROS frameworks developed by the previous 2 teams with the main goal ...


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Computer Science and Engineering: Theses, Dissertations, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a ...