Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Technology

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 66

Full-Text Articles in Engineering

Me2b Jul 2018

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


The Viability Of Quantum Computing, Brennan Michael King May 2018

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that electronics may …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Human Performance Modelling For Adaptive Automation, Maria Chiara Leva, M. Wilkins, F. Coster Jan 2018

Human Performance Modelling For Adaptive Automation, Maria Chiara Leva, M. Wilkins, F. Coster

Conference papers

The relentless march of technology is increasingly opening new possibilities for the application of automation and new horizons for human machine interaction. However there is insufficient scientific evidence on human factors for modern socio-technical systems supporting the guidelines currently used to design Human Machine Interfaces (HMI) (ISA 2014). This dearth of knowledge presents a particular risk in safety critical industries. The continuing 60–90% of accidents currently that are rooted in Human Factors (HF) and the rapid developments in the Internet of Things (IoT) and its novel automation archetypes means that the requirements for new interfaces are becoming more demanding, and …


The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa Jan 2018

The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa

School of Computing: Faculty Publications

Nearly thousands of science experiments are performed both on humans and animals every year in the United States (Gregory, 1999). Does Science enormously play a role in the well-beings of individual in the society? Research has found that science education is through motivation and satisfying the needs of humans. The scientific world is part of an elongated human development. This can be substantiated with the use and evolution of TECHNOLOGY and SCIENCE (Minton, 2004). Education of the entities that comprise the need to achieve the goal of TECHNOLOGY and SCIENCE which are important issues of today. Research has shown that …


Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi Oct 2017

Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi

UBT International Conference

As time passes by, we barely see how much time it costs people to stay at work, fixing problems that happen every day. As people we should do more about humanity and technology is the door that opens opportunities for us to do this. Technology today is transforming every human daily life routine and it’s only the beginning of what technology can bring. By 2020 we know that technology will connect the unconnected by introducing the real idea of Internet of Things. Every little, tiny thing all over the world will be connected, but also big and important projects like …


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson Oct 2017

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …


When Big Data Gets Too Big Sep 2017

When Big Data Gets Too Big

SIGNED: The Magazine of The Hong Kong Design Institute

Computer modelling has long been used as a design tool, and big data is a massive resource on which to build these models. But when the datasets get too big for computers to handle, innovative design solutions are needed. And the urge to play has driven technology forward


Greenbin, Jessica Chao Jun 2017

Greenbin, Jessica Chao

Computer Engineering

Greenbin is an iteration of a larger project to implement a zero-waste container tracking system for use in Cal Poly’s dining facilities. The system utilizes a database system as well as passive RFID technologies to track the checking-in and checking-out of plastic reusable food containers. These plastic food containers can be checked out by campus dining patrons, and returned autonomously to collection bins that contain these scanners, allowing the containers to be recollected, re-accounted for, and reused.


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo Oct 2016

Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo

STAR Program Research Presentations

Abstract: Serpentine soils are formed from ultramafic rocks and are represent an extreme environment for plants. Serpentine soils are unique in that they carry high concentrations of heavy metals, are nutrient deficient, particularly in calcium, and have poor water retention capabilities. Although these soils constitute harsh conditions for plant growth, there are a number of species that are adapted and even endemic to serpentine soil. Water retention by commercial potting mix was compared with serpentine soil. Also, serpentine adapted and non-adapted species were grown in both soil treatments and physiological data were collected. We used the Arduino electronic platform to …


Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt Jan 2016

Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt

ETD Archive

This thesis presents the design of an original Intelligent Home Automation Architecture. My work was divided in two phases. The first portion was dedicated to acquiring a thorough understanding of the most successful and diffused Home-Automation commercial architectures. During this phase, I intended to gain a deep appreciation for the variety of organizations, capabilities, limitations, and potential areas of growth of the existing Home-Automation leading systems. In order to acquire this knowledge, I had to use a reverse engineering approach. The reason for using this methodology arises from the fact that all the products considered in this study are commercially …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


How Can We Build A Moral Robot?, Kristen E. Clark Dec 2015

How Can We Build A Moral Robot?, Kristen E. Clark

Capstones

Artificial intelligence is already starting to drive our cars and make choices that affect the world economy. One day soon, we’ll have robots that can take care of our sick and elderly, and even rescue us in rescue us in emergencies. But as robots start to make decisions that matter—it’s raising questions that go far beyond engineering. We’re stating to think about ethics.

Bertram Malle and Matthias Scheutz are part of a team funded by the department of defense. It's their job to answer a question that seems straight out of a sci-fi novel: How can we build a moral …


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Research Project On Biometrics, Alia Hassan, Ingy Nazif Jan 2013

Research Project On Biometrics, Alia Hassan, Ingy Nazif

Papers, Posters, and Presentations

As technology evolves, and our personal details become more and more susceptible to hacking, one of the most important concerns we now have is being sure our phones, computers, networks are secure. We have begun to move on from simple password and motion patterns onto using facial recognition, and other forms of biometric recognition technology to protect our private information. The iPhone 5 for example, now presents features to identify uniquely the owner of the device, in the form of fingerprint detection. So we decided to focus on the topic biometrics for this research paper, which is basically how to …


Combining Multiple, Inexpensive Gps Receivers To Increase Accuracy And Reliability, Daniel Kenneth Schrader Jan 2013

Combining Multiple, Inexpensive Gps Receivers To Increase Accuracy And Reliability, Daniel Kenneth Schrader

Open Access Theses

GPS is a technology that allows for accurate tracking of various parameters, namely speed and location. Many modern systems and tools require a rapidly-refreshing report of their speed and/or location, but the GPS technology available to most users may not be accurate enough for some applications. Methods currently

exist to improve GPS accuracy, but many or all of these methods are expensive, difficult, or simply not available without special technology and permission.

The research presented in this thesis describes an attempt to improve the accuracy and/or reliability of GPS, without using any expensive or restricted methods. The ability for any …


Wireless Medical Sensor Networks: Design Requirements And Enabling Technologies, Cecilia H. Vallejos De Schatz, Henry P. Medeiros, Fabio K. Schneider, Paulo J. Abatti Jun 2012

Wireless Medical Sensor Networks: Design Requirements And Enabling Technologies, Cecilia H. Vallejos De Schatz, Henry P. Medeiros, Fabio K. Schneider, Paulo J. Abatti

Electrical and Computer Engineering Faculty Research and Publications

This article analyzes wireless communication protocols that could be used in healthcare environments (e.g., hospitals and small clinics) to transfer real-time medical information obtained from noninvasive sensors. For this purpose the features of the three currently most widely used protocols—namely, Bluetooth® (IEEE 802.15.1), ZigBee (IEEE 802.15.4), and Wi-Fi (IEEE 802.11)—are evaluated and compared. The important features under consideration include data bandwidth, frequency band, maximum transmission distance, encryption and authentication methods, power consumption, and current applications. In addition, an overview of network requirements with respect to medical sensor features, patient safety and patient data privacy, quality of service, and interoperability …


I Am The Robot. Are You?, Rachel Michelle Feldman Jun 2012

I Am The Robot. Are You?, Rachel Michelle Feldman

Honors Theses

I was originally inspired by a previous project in a 3D modeling class. For my final project, I designed two robots; male and female; who’s naked bodied reflected the presence of technological communications in society and lack of face-to-face interactions. I displayed the robots in a variety of sexual positions, which appear cute or sweet to the viewer because of the toon-shader effect. The toon-shader effect makes the 3D models look like cartoons. I loved combining the idea of technology, robotics, and sex into one. To this day, the poster of the robots in my room always gets a response. …


Construction Of The Next Generation Of Energy Efficient Light Boxes - Sponsored By Bayer Environmental Science, Gregory Keith Bartley Jr. Oct 2011

Construction Of The Next Generation Of Energy Efficient Light Boxes - Sponsored By Bayer Environmental Science, Gregory Keith Bartley Jr.

Gregory Keith Bartley Jr.

This short presentation includes an overview of features that went into constructing a new type of light box technology utilizing low-power usage LEDs and Low Density flexible Polymers. This light box was constructed for digital image analysis of plant health and ground cover using a Canon Powershot G12 camera and Sigma Scan Digital Image Analysis Software.


Construction Of A Mobile Spectrophotometer For Mapping Plant Health: Combining Crop Circle™ And Gps Technology, Gregory Keith Bartley Jr., Brandon J. Horvath Sep 2011

Construction Of A Mobile Spectrophotometer For Mapping Plant Health: Combining Crop Circle™ And Gps Technology, Gregory Keith Bartley Jr., Brandon J. Horvath

Gregory Keith Bartley Jr.

With the introduction of GPS technology, came the ability to produce maps of plant cover and health over large areas. By correlating the reflectance values of a plant with its respective GPS coordinates, we can form a bird’s eye view of relative plant health using different colors. The commercialization of high precision GPS receivers has allowed researchers to plot these maps with increased accuracy, limiting error to less than 1 inch.


Constructing New Technology: The Crop Circle Gps Cart In Pictures, Gregory Keith Bartley Jr., Brandon J. Horvath Sep 2011

Constructing New Technology: The Crop Circle Gps Cart In Pictures, Gregory Keith Bartley Jr., Brandon J. Horvath

Gregory Keith Bartley Jr.

The crop circle spectrometer represents a breakthrough in unbiased sensor data. Unlike traditional passive sensors, it pulses light at a speed of 20,000 times per second. With this comes the ability of these filters to discern reflectance measurements from that of natural sunlight, allowing it to be used in environments of sun, shade, and even darkness. From these various reflectance values at different wavelengths, we get measurements of plant health known as vegetation indices. And different vegetation indices can tell us different things about the health of a plant. Couple this with the recent advances in GPS technology, we can …


Apple Ipad Cart, Gregory Keith Bartley Jr., Brandon J. Horvath Sep 2011

Apple Ipad Cart, Gregory Keith Bartley Jr., Brandon J. Horvath

Gregory Keith Bartley Jr.

Utilizing a Pelican Accessories Case, I was able to construct a power efficient, mobile iPad charging station cart capable of safely charging and transporting up to 10 iPads and 10 iPad Keyboards with additional compartments to accommodate any additional cords and/or devices. The introduction of WiFi Sync in Apple's iOS 5 Update allowed me to more efficiently compartmentalize any cords from being exposed. Compared to commercially-available iPad Sync and Cart Charging Systems which charge $1000+, this unit cost me around $100. It also uses far less power, due to no longer needing a powered USB hub network in order to …


Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison Jan 2011

Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …