Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2020

Conference

Institution
Keyword
Publication
File Type

Articles 1 - 23 of 23

Full-Text Articles in Engineering

Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah Mckelvey, Rachelle Mclain, Christine Stohn Oct 2020

Resource Discovery In A Changing Content World, Allen Jones, Cynthia R. Schwarz, Hannah Mckelvey, Rachelle Mclain, Christine Stohn

Charleston Library Conference

Discovery services have evolved to include not just books and articles, but databases, website content, research guides, digital and audiovisual collections, and unique local collections that are all important for their users to be able to find. Search and ranking remain at the core of discovery, but advanced tools such as recommendation, virtual browse, ‘look inside‘, and the use of artificial intelligence are also becoming more prevalent. This group of panelists discussed how content in their discovery systems can change based on the context of the user, using as examples Primo and Blacklight, and how content is populated, discovered and …


Research Experience For Undergraduates During Covid-19, Mustafa Akbas Oct 2020

Research Experience For Undergraduates During Covid-19, Mustafa Akbas

Florida Statewide Symposium: Best Practices in Undergraduate Research

This presentation provides the student team interaction and mentorship experience at Embry-Riddle Aeronautical University’s “National Science Foundation (NSF) Research Experiences for Undergraduates (REU) Site: Cybersecurity Research of Unmanned Aerial Vehicles” from the summer semester of 2020. The Site had been planned for a face-of-face research experience under several mentors for an eight-week period. However, due to Covid-19, the teams had to meet, discuss, present and work online, which was both a challenge and an opportunity. Both students and mentors had lessons from this online experience that they will remember and use in the upcoming years. In this presentation, we present …


Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore Aug 2020

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore

Cybersecurity Undergraduate Research Showcase

The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …


Non Infinite Stories: How Digital Allow To Create Infinite Reconformations Of A Text?, David Núñez Jul 2020

Non Infinite Stories: How Digital Allow To Create Infinite Reconformations Of A Text?, David Núñez

Electronic Literature Organization Conference 2020

Last year I presented at ELO, in Ireland, the Artistic piece "Bastard" a digital fiction that combine a fragmented novel to create 10x149 differents texts and optimized in 4 billions coherent stories with narrative structures. In Orlando we want to explain how the system works, theory and functioning, and invited all the members to produce they personal "infinite" fiction.

Non Infinite Stories is an electronic publishing house that creates a dynamic hyperliterature system to give each reader a unique book by using a digital combinatorial processes, specific narrative rules and optimization of fragmented works in chapters of short narrative blocks, …


User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane Jul 2020

User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane

African Conference on Information Systems and Technology

Users belonging to different countries have different exposure and perception to trust the technology to adopt it. Users’ trust and adoption rates are challenging issues in mobile financial services. Thus, the purpose of the research is how to design a trustful user interface. Market research is conducted to collect data. Using the data, personas and use cases developed. The result of personas and use cases used to develop prototypes. Prototype A and B designed differently to give choice to users to investigate users' trust. Prototype A is designed to make it easy to use and clear workflow. Whereas prototype B …


Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke Jul 2020

Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke

African Conference on Information Systems and Technology

The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.

Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data …


A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata Jul 2020

A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata

African Conference on Information Systems and Technology

Several models recently have been addressed in software engineering for requirements transformation. However, such transformation models have encountered many problems due to the nature of requirements. In the classical transformation modeling, some requirements are discovered to be missing or erroneous at later stages, in addition to major assumptions that may affect the quality of the software. This has created a crucial need for new approaches to requirements transformation. In this paper, a comprehensive study is presented in the main modern models of linking requirements to software architectures. An extensive evaluation is conducted to investigate the capabilities of such modern models …


Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw Jul 2020

Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw

African Conference on Information Systems and Technology

The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


Security Camera Using Raspberry Pi, Tejendra Khatri May 2020

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

No abstract provided.


Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling May 2020

Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling

Student Academic Conference

Overview of a predictive analysis regression developed using machine learning alongside ETL process techniques.


Estimating The Tempo Of Audio Files, Parker Ostertag May 2020

Estimating The Tempo Of Audio Files, Parker Ostertag

Student Academic Conference

On the market today, there exists a multitude of software that allows for the detection and prediction of beats per minute (BPM) contained in audio files. There are both free and monetized versions of these programs, but there is one thing that they all have in common: they are inaccurate. This is simply because the science behind beat detection is unfinished, and may never be. In this project, I decided to use a method of audio peak detection to help me detect the tempo that may exist in any audio file. I started by researching existing programs and the science …


Olivet Robotics, Caroline Orndorff, Allann Davidson, Jared Haworth, Nicholas Mills Apr 2020

Olivet Robotics, Caroline Orndorff, Allann Davidson, Jared Haworth, Nicholas Mills

Scholar Week 2016 - present

The VEX Robotics Competition is a challenging event series for elementary to university students. Each year, VEX creates thought provoking games with goals that must be accomplished via robotics. The question ONU Robotics Team must answer is “how can one create the most effective strategies in order to win?” during the 2019-2020 Tower Takeover Game. The ONU Robotics Senior Design Team (ORSeT) will work to answer this question with principles from Electrical Engineering, Mechanical Engineering, and Computer Science. ORSeT will use this opportunity to not only create a winning robot, but also to challenge team members’ creative abilities and engineering …


Analysis And Implementation Of Quantum Computing Algorithms, Caroline Fedele, Asai Asaithambi Ph.D Apr 2020

Analysis And Implementation Of Quantum Computing Algorithms, Caroline Fedele, Asai Asaithambi Ph.D

Showcase of Osprey Advancements in Research and Scholarship (SOARS)

In this research, we investigate the relationships between classical and quantum computing, and the superior time complexity and memory allocation proposed theoretically for quantum algorithms. This is accomplished by building quantum circuits to represent algorithms and test in a quantum computer simulation. Classical circuit components have been continually reducing in size to the point where they are now being impacted by quantum properties, resulting in the need to investigate quantum computing. The inherent parallelism of quantum computing also allows us to solve problems for which classical computers are inept. The class of intractable problems in computing where the solution can …


Performance Evaluation Of Long Range (Lora) Wireless Rf Technology Blue For The Internet Of Things (Iot) Using Dragino Lora At 915 Mhz, Victor Lopez, Hemani Kaushal, Zornitza Prodanoff Apr 2020

Performance Evaluation Of Long Range (Lora) Wireless Rf Technology Blue For The Internet Of Things (Iot) Using Dragino Lora At 915 Mhz, Victor Lopez, Hemani Kaushal, Zornitza Prodanoff

Showcase of Osprey Advancements in Research and Scholarship (SOARS)

Internet of Things (IoT) is a developing concept that introduces the network of physical sensors which are interconnected to each other. Some sensors are wirelessly connected among themselves and to the internet. Currently, IoT applications demand substantial requirements in terms of Radio Access Network (RAN) such as long-range outdoor coverage, environmental factors, obstructions, interference, power consumption, and many others. Also, the current wireless technologies are not able to satisfy all these requirements simultaneously. Therefore, there is no single wireless standard that would predominate the IoT. However, one relevant wireless radio solution to IoT is known as Long Range Wide Area …


Vex U Robotics, Kyle Lutterman, Jeffrey Ryan, Sierra Wong, Elizabeth Geiger Apr 2020

Vex U Robotics, Kyle Lutterman, Jeffrey Ryan, Sierra Wong, Elizabeth Geiger

Discovery Day - Prescott

VEX U is a competition hosted by the REC Foundation for university students to get engaged in hands-on engineering. Each team produces two robots using the VEX provided parts to compete in the VEX U competition. The competition changes every year with the only constants being the size of the field, the tools and parts teams are able to use, and the size constraints of the robots. The teams compete in regional competitions in order to qualify for the World Championship Competition, which is the highest competition a team can compete in for VEX U. The VEX U teams at …


Tech Comm Eagle Eye-Tracking Control System, Gabiella Lail, Robert Shaw, Hunter Smatla, Matthew Gary Apr 2020

Tech Comm Eagle Eye-Tracking Control System, Gabiella Lail, Robert Shaw, Hunter Smatla, Matthew Gary

Discovery Day - Prescott

Mobile eye-tracking systems provide usability research support as well as access to a wide range of robotics and technical communication research opportunities. Optical tracking systems are often prohibitively expensive and do not provide the mobility or flexibility needed for a variety of research application possibilities. Our team proposes building a simple mobile eye-tracking system to be used in-house at ERAU for heat-mapping, robotics, control systems, and various technical communication applications in a structured research environment. The mobile eyetracking system will become part of a larger research and hands-on technical communication usability lab and research center. The research team intends to …


Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian Mar 2020

Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian

Purdue Road School

The BIM for Bridges and Structures initiative, also known as TPF-5(372), is a transportation pooled fund project that is a collaborative effort of 20 states, FHWA, and the AASHTO Committee on Bridges and Structures. The pooled fund objective is to develop an open, national standard for exchanging information necessary for the design, fabrication, and construction of bridges and structures in the United States. The presentation will provide an overview of the project and explain ways in which stakeholders can get involved.


Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D. Mar 2020

Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.

National Training Aircraft Symposium (NTAS)

Many virtual reality (VR)-based flight simulation programs provide pilots the enhanced reality from the 1st person-view to make themselves immersed in the cockpit. Using the VR simulations, pilots can take flight training in many challenging situations that are hard to create in real environments due to its natural entropy and safety concerns such as severe crosswind or engine fire. Mixed reality (MR) technology provides three-dimensional graphics so that users can effectively see all 360 degree-vertical and horizontal aspects of an object while they freely move around to see the graphics maintaining the consciousness of real space. Flight instructors may …


Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D. Mar 2020

Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D.

National Training Aircraft Symposium (NTAS)

Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy and rapid progress is being made in artificial intelligence (AI) engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. Otherwise, the full capabilities of autonomy will not be realized. …


Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman Jan 2020

Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman

Capstone Showcase

  1. A website for a small plumbing business in Scranton, Pennsylvania. The website includes a Home, About Us, Services, Contact Us, and Testimonials page. The home page introduces the company to the website viewer. The About Us page provides information about the company and owner, to the website viewer. The Services page provides the website viewer with all of the services that the company can provide. The Contact Us page allows the website viewer to send the company an email. Finally, the Testimonials page will allow the website viewer to leave a comment about the company’s services. The website also includes …


Iot Devices In The Public Health Sector, Cayla Young Jan 2020

Iot Devices In The Public Health Sector, Cayla Young

Cybersecurity Undergraduate Research Showcase

In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …