Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 84

Full-Text Articles in Engineering

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …


Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho Dec 2015

Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho

Doctoral Dissertations

Current face recognition systems are rife with serious challenges in uncontrolled conditions: e.g., unrestrained lighting, pose variations, accessories, etc. Hyperspectral imaging (HI) is typically employed to counter many of those challenges, by incorporating the spectral information within different bands. Although numerous methods based on hyperspectral imaging have been developed for face recognition with promising results, three fundamental challenges remain: 1) low signal to noise ratios and low intensity values in the bands of the hyperspectral image specifically near blue bands; 2) high dimensionality of hyperspectral data; and 3) inter-band misalignment (IBM) correlated with subject motion during data acquisition.

This dissertation …


Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams Dec 2015

Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams

Computer Engineering

No abstract provided.


Free2play, Corey Lee Wilson Dec 2015

Free2play, Corey Lee Wilson

Computer Engineering

Free2Play is a website based upon the wildly popular PC video game League of Legends created by Riot Gaming. The website contains helpful information for new and old players of the game, such as articles containing the latest League of Legends new, a rune calculator, and recommended item builds for characters. The website uses HTML5, jquery, node.js, MySQL, and PHP to pull data from Riot’s web API and Champion.gg’s website.


Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard Dec 2015

Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard

Computer Engineering

In today’s society, we are seeing incredible improvements in terms of creating smaller technological devices that behave more and more like the personal computers of yesterday. Mobile “Smart” devices, in particular, are becoming incredibly powerful not just in terms of processing power, but in the fact that they are able to provide assistance to users in their everyday lives. Application developers are now able utilize the power and size of these devices, to create and realize ideas that would have been previously viewed as impossible. This project applies the fields of digital signal processing, music, and mobile application development, to …


Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav Dec 2015

Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav

Innovative Research Publications IRP India

Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the …


Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


The Information Of Spam, Sawyer C. Anderson Dec 2015

The Information Of Spam, Sawyer C. Anderson

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper explores the value of information contained in spam tweets as it pertains to prediction accuracy. As a case study, tweets discussing Bitcoin were collected and used to predict the rise and fall of Bitcoin value. Precision of prediction both with and without spam tweets, as identified by a naive Bayesian spam filter, were measured. Results showed a minor increase in accuracy when spam tweets were included, indicating that spam messages likely contain information valuable for prediction of market fluctuations.


Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper Dec 2015

Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper

Electronic Theses and Dissertations

The field of lossless image compression studies the various ways to represent image data in the most compact and efficient manner possible that also allows the image to be reproduced without any loss. One of the most efficient strategies used in lossless compression is to introduce entropy reduction through decorrelation. This study focuses on using the exclusive-or logic operator in a decorrelation filter as the preprocessing phase of lossless image compression of continuous-tone images. The exclusive-or logic operator is simply and reversibly applied to continuous-tone images for the purpose of extracting differences between neighboring pixels. Implementation of the exclusive-or operator …


Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …


Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens Nov 2015

Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens

Space Traffic Management Conference

The Space Data Integrator (SDI) Project is the initial step to satisfy the Federal Aviation Administration (FAA) strategic initiative to integrate commercial space launch and reentry vehicles into the National Airspace System. The project addresses the needs for greater situational awareness and monitoring, and increased response capability during non-nominal and catastrophic incidents during space operations.

The initial phase of this project leverages current FAA systems, and provide an initial demonstration of capability that will provide for state data from a commercial reentry vehicle to be ingested into a the FAA Traffic Flow Management System, and displayed on Traffic Situation Displays. …


Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu Oct 2015

Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu

Electronics Elements

We know trash is an enormous problem in the world since trash does not only affect just humans but it also affects living creatures in general. The biggest contributor of trash in the United States is food waste. Food waste is produced by every human and the amounts of food waste is astonishing. Americans throw away almost half of the food that they buy, which is almost worth $165 billion per year. Food waste which end up in landfills and incinerators produces methane which is a greenhouse gas and can contribute to global warming. Trash in general and food waste …


Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han Sep 2015

Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han

Hyoil Han

Answer Validation is a topic of significant interest within the Question Answering community. In this paper, we propose the use of language modeling methodologies for Answer Validation, using corpus-based methods that do not require the use of external sources. Specifically, we propose a model for Answer Credibility which quantifies the reliability of a source document that contains a candidate answer and the Question’s Context Model.


Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han Sep 2015

Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han

Hyoil Han

Word Sense Disambiguation (WSD) is an important but challenging technique in the area of natural language processing (NLP). Hundreds of WSD algorithms and systems are available, but less work has been done in regard to choosing the optimal WSD algorithms. This paper summarizes the various knowledge sources used for WSD and classifies existing WSD algorithms according to their techniques. The rationale, tasks, performance, knowledge sources used, computational complexity, assumptions, and suitable applications for each class of WSD algorithms are also discussed. This paper will provide users with general knowledge for choosing WSD algorithms for their specific applications or for further …


Rfid Microscope Lab, Patricia Carranza Sep 2015

Rfid Microscope Lab, Patricia Carranza

Computer Engineering

The RFID Microscope Lab is a new exhibit created for the San Luis Obispo Children's Museum. The goal of the project is to create a modern, interactive exhibit that will teach children about different natural specimens through the use of technology. A computer, custom software, and RFID technology, will be used to display facts, microscopic images, and short videos of ten different specimens.


Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande Sep 2015

Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande

Electronic Theses, Projects, and Dissertations

Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program. The …


Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang Aug 2015

Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang

FIU Electronic Theses and Dissertations

Thanks to the advanced technologies and social networks that allow the data to be widely shared among the Internet, there is an explosion of pervasive multimedia data, generating high demands of multimedia services and applications in various areas for people to easily access and manage multimedia data. Towards such demands, multimedia big data analysis has become an emerging hot topic in both industry and academia, which ranges from basic infrastructure, management, search, and mining to security, privacy, and applications. Within the scope of this dissertation, a multimedia big data analysis framework is proposed for semantic information management and retrieval with …


Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii Aug 2015

Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii

Electronic Theses and Dissertations

GPGPUs offer significant computational power for programmers to leverage. This computational power is especially useful when utilized for accelerating scientific models. This thesis analyzes the utilization of GPGPU programming to accelerate scientific computing models.

First the construction of hardware for visualization and computation of scientific models is discussed. Several factors in the construction of the machines focus on the performance impacts related to scientific modeling.

Image processing is an embarrassingly parallel problem well suited for GPGPU acceleration. An image processing library was developed to show the processes of recognizing embarrassingly parallel problems and serves as an excellent example of converting …


Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher Aug 2015

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a …


Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande Aug 2015

Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande

Dissertations and Theses

Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.

The purpose of this dissertation is to investigate how online social networks …


Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li Aug 2015

Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li

Doctoral Dissertations

Compressed Sensing (CS) is an emerging field based on the revelation that a small collection of linear projections of a sparse signal contains enough information for reconstruction. It is promising that CS can be utilized in environments where the signal acquisition process is extremely difficult or costly, e.g., a resource-constrained environment like the smartphone platform, or a band-limited environment like visual sensor network (VSNs). There are several challenges to perform sensing due to the characteristic of these platforms, including, for example, needing active user involvement, computational and storage limitations and lower transmission capabilities. This dissertation focuses on the study of …


Jsish, Ryan Grasell Jul 2015

Jsish, Ryan Grasell

Computer Science and Software Engineering

For my senior project, I implemented Professor Keen’s JSish spec in C++. JSish is a subset of Javascript with support for execution from the command line and files.

I chose this project because I wanted to reinforce my programing language skills, learn C++, and gain a deeper understanding of garbage collection.

I quickly grew familiar with C++. My prior experience with both C and Java was a good enough introduction to let me hit the ground running. The biggest hurdle for me was the lack of garbage collection built into C++. I understood the principles of manual memory management, but …


Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas Jul 2015

Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas

Graduate Theses and Dissertations

The goal of this thesis is to explore the feasibility of a multirotor controller system which can dynamically change the arm configuration of a multirotor. Currently most of the multirotor systems have to be powered down, rewired, and programmed with new firmware, to configure how many arms/motors they use to fly. The focus of our effort is to develop a Field Programmable Gate Array (FPGA) based hardware/software controller which uses dynamic partial hardware reconfiguration to switch the arm/motor configuration of a multirotor during operation. We believe that this will make a multirotor more fault tolerant and adaptive. This thesis explains …


A Maturity Model For Mobile Learning, Muasaad Alrasheedi Jun 2015

A Maturity Model For Mobile Learning, Muasaad Alrasheedi

Electronic Thesis and Dissertation Repository

Higher education is becoming increasingly interested in adopting innovative and modern technologies as a mode of imparting education. Mobile technologies are considered to be the next frontier of educational platforms as they have the capability to provide high-quality learning experiences and to satisfy the increasing demand for mobility and flexibility. In view of the ubiquitous nature of mobile technology and the immense opportunities it offers, there are favorable indications that the technology could be introduced as the next generation of learning platforms. The present research aims to develop a comprehensive framework based on the well-known Capability Maturity Model (CMM) and …


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


Seizure Tracker, Zachary Reardon Jun 2015

Seizure Tracker, Zachary Reardon

Computer Engineering

The goal of this project is to make a Module that enables anyone watching a person with disabilities to record any seizure that this person has under their care. Then when the Doctor/parent receives their patient/kid they are able to download all the seizures that their patient/kid had while they were away. The Doctor/parent then has the exact time, the duration of the seizure, and the type of seizure for all the seizures that have occurred while they were away from their patient/kid. From this data it is possible that the Doctor may see some sort of patterns that enables …


Nutty Adventures, Tony Hsu, Mandy Chan Jun 2015

Nutty Adventures, Tony Hsu, Mandy Chan

Computer Engineering

Nutty Adventures is an Android game. The goal is to gather acorns for day-to-day survival, upgrades, and hoarding. Ultimately, the player must have enough acorns by the time Winter comes to fulfill the squirrel’s quest: providing enough acorns for his squirrel kingdom during the barren Winter season. Throughout the days, the player has to keep track of time and monsters, which might influence player decisions.


Automated Solar-Powered Chicken Coop Door, Brenna Yagade Jun 2015

Automated Solar-Powered Chicken Coop Door, Brenna Yagade

Computer Engineering

The purpose of this project was to plan, design, and build an automated, low power system to open and close a chicken-coop door, which is powered through a solar panel.


Slaps Music Sharing App, Maximillian L. Parelius Jun 2015

Slaps Music Sharing App, Maximillian L. Parelius

Computer Engineering

Slaps is a fun way to share new songs with friends. Users can simply select songs from their personal library of music, select a short sample of the song to share, and then select which friends to share it with. If a user loves a song that he/she receives, they can link directly to iTunes through the app to download the full song.


Wau: Location-Based Photo-Sharing And Friend-Finding Android Application, Tam P. Nguyen Jun 2015

Wau: Location-Based Photo-Sharing And Friend-Finding Android Application, Tam P. Nguyen

Computer Engineering

Wau (Where are u?) is a location-based photo-sharing and friend-finding Android application. The basic concept of my app is to help people avoid the hassle of having to call/text their friends in order to know where they are. The ability to simply tap on a name and visually see their location in reference to your own would be a huge convenience. Another neat feature is that it allows users to take and upload pictures wherever they are, and the only way for anyone to see the picture is to be within the same vicinity that it was taken. I imagine …