Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 263

Full-Text Articles in Computer Engineering

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan Mar 2024

Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan

Research Symposium

Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.

Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …


Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro Jan 2024

Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro

Publications

The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.


Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye Dec 2023

Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye

Electronic Theses and Dissertations

Autoencoders, a type of artificial neural network, have gained recognition by researchers in various fields, especially machine learning due to their vast applications in data representations from inputs. Recently researchers have explored the possibility to extend the application of autoencoders to solve nonlinear differential equations. Algorithms and methods employed in an autoencoder framework include sparse identification of nonlinear dynamics (SINDy), dynamic mode decomposition (DMD), Koopman operator theory and singular value decomposition (SVD). These approaches use matrix multiplication to represent linear transformation. However, machine learning algorithms often use convolution to represent linear transformations. In our work, we modify these approaches to …


Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright Dec 2023

Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright

Electronic Theses, Projects, and Dissertations

This project is an exploration and implementation of an application using Machine Learning (ML) and Artificial Intelligence (AI) techniques which would be capable of automatically tuning Kalman-Filter parameters used in post-flight trajectory estimation software at Edwards Air Force Base (EAFB), CA. The scope of the work in this paper is to design and develop a skeleton application with modular design, where various AI/ML modules could be developed to plug-in to the application for tuning-switch prediction.


Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh Aug 2023

Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh

Engineering Technical Reports

The growing complexity of data-intensive software demands constant innovation in computer hardware design. Performance is a critical factor in rapidly evolving applications such as artificial intelligence (AI). Transaction-level modeling (TLM) is a valuable technique used to represent hardware and software behavior in a simulated environment. However, extracting actionable insights from TLM simulations is not a trivial task. We present Netmemvisual, an interactive, cross-platform visualization tool for exposing memory bottlenecks in TLM simulations. We demonstrate how Netmemvisual helps system designers rapidly analyze complex TLM simulations to find memory contention. We describe the project’s current features, experimental results with two state-of-the-art deep …


One Formula For Non-Prime Numbers: Motivations And Characteristics, Kamal Hassan Prof., Mahmoud Mansour Jul 2023

One Formula For Non-Prime Numbers: Motivations And Characteristics, Kamal Hassan Prof., Mahmoud Mansour

Basic Science Engineering

Abstract: Primes are essential for computer encryption and cryptography, as they are fundamental units of whole numbers and are of the highest importance due to their mathematical qualities. However, identifying a pattern of primes is not easy. Thinking in a different way may get benefits, by considering the opposite side of the problem which means focusing on non-prime numbers. Recently, researchers introduced, the pattern of non-primes in two maximal sets while in this paper, non-primes are presented in one formula. Getting one-way formula for non-primes may pave the way for further applications based on the idea of primes.


Human-Machine Communication: Complete Volume. Volume 6 Jul 2023

Human-Machine Communication: Complete Volume. Volume 6

Human-Machine Communication

This is the complete volume of HMC Volume 6.


Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha Jul 2023

Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha

Doctoral Dissertations and Master's Theses

ABSTRACT

The defect detection problem is of outmost importance in high-tech industries such as aerospace manufacturing and is widely employed using automated industrial quality control systems. In the aerospace manufacturing industry, composite materials are extensively applied as structural components in civilian and military aircraft. To ensure the quality of the product and high reliability, manual inspection and traditional automatic optical inspection have been employed to identify the defects throughout production and maintenance. These inspection techniques have several limitations such as tedious, time- consuming, inconsistent, subjective, labor intensive, expensive, etc. To make the operation effective and efficient, modern automated optical inspection …


Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial May 2023

Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial

Electrical and Computer Engineering ETDs

Radionuclide spectroscopic sensor data is analyzed with minimal power consumption through the use of neuromorphic computing architectures. Memristor crossbars are harnessed as the computational substrate in this non-conventional computing platform and integrated with CMOS-based neurons to mimic the computational dynamics observed in the mammalian brain’s visual cortex. Functional prototypes using spiking sparse locally competitive approximations are presented. The architectures are evaluated for classification accuracy and energy efficiency. The proposed systems achieve a 90% true positive accuracy with a high-resolution detector and 86% with a low-resolution detector.


Explainable Physics-Informed Deep Learning For Rainfall-Runoff Modeling And Uncertainty Assessment Across The Continental United States, Sadegh Sadeghi Tabas May 2023

Explainable Physics-Informed Deep Learning For Rainfall-Runoff Modeling And Uncertainty Assessment Across The Continental United States, Sadegh Sadeghi Tabas

All Dissertations

Hydrologic models provide a comprehensive tool to calibrate streamflow response to environmental variables. Various hydrologic modeling approaches, ranging from physically based to conceptual to entirely data-driven models, have been widely used for hydrologic simulation. During the recent years, however, Deep Learning (DL), a new generation of Machine Learning (ML), has transformed hydrologic simulation research to a new direction. DL methods have recently proposed for rainfall-runoff modeling that complement both distributed and conceptual hydrologic models, particularly in a catchment where data to support a process-based model is scared and limited.

This dissertation investigated the applicability of two advanced probabilistic physics-informed DL …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim May 2023

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen Apr 2023

An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen

Modeling, Simulation and Visualization Student Capstone Conference

This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.


Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz Apr 2023

Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz

Center for Cybersecurity

Technology is a tool that can be used to gain knowledge and for advancements in areas like medicine, machinery, and everyday tasks. It can be used to connect with friends, work from home, and to improve quality of life. But some social media users can use it to hurt others. Cyberbullying is a major issue that has been steadily growing over the past few years. Cyberbullying has also steadily increased the rates of stress, anxiety, depression, violent behavior, low self-esteem and may cause suicide. Cyberbullying is an ongoing problem for social media users, and it is urgent that a solution …


Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou Apr 2023

Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou

Center for Cybersecurity

A Security Operations Center (SOC) is an organizational framework for cybersecurity, staffed by cybersecurity professionals who monitor an organization's security, analyze potential or current breaches, and respond accordingly. The SOC's goal is to diagnose, evaluate, and respond to cybersecurity events using technology solutions and established procedures. SOCs mainly operate 24/7, with security analysts monitoring environmental data for emerging threats and responding as needed. The SOC manages and enhances an organization's overall security posture.


Autonomous 3d Urban And Complex Terrain Geometry Generation And Micro-Climate Modelling Using Cfd And Deep Learning, Tewodros F. Alemayehu Mar 2023

Autonomous 3d Urban And Complex Terrain Geometry Generation And Micro-Climate Modelling Using Cfd And Deep Learning, Tewodros F. Alemayehu

Electronic Thesis and Dissertation Repository

Sustainable building design requires a clear understanding and realistic modelling of the complex interaction between climate and built environment to create safe and comfortable outdoor and indoor spaces. This necessitates unprecedented urban climate modelling at high temporal and spatial resolution. The interaction between complex urban geometries and the microclimate is characterized by complex transport mechanisms. The challenge to generate geometric and physics boundary conditions in an automated manner is hindering the progress of computational methods in urban design. Thus, the challenge of modelling realistic and pragmatic numerical urban micro-climate for wind engineering, environmental, and building energy simulation applications should address …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer Mar 2023

Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer

Master's Theses

Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …


Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha Feb 2023

Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha

Faculty Publications

The rapidly increasing number of drones in the national airspace, including those for recreational and commercial applications, has raised concerns regarding misuse. Autonomous drone detection systems offer a probable solution to overcoming the issue of potential drone misuse, such as drug smuggling, violating people’s privacy, etc. Detecting drones can be difficult, due to similar objects in the sky, such as airplanes and birds. In addition, automated drone detection systems need to be trained with ample amounts of data to provide high accuracy. Real-time detection is also necessary, but this requires highly configured devices such as a graphical processing unit (GPU). …


A Computational Model Of Trust Based On Dynamic Interaction In The Stack Overflow Community, Patrick O’Neill Jan 2023

A Computational Model Of Trust Based On Dynamic Interaction In The Stack Overflow Community, Patrick O’Neill

Dissertations

A member’s reputation in an online community is a quantified representation of their trustworthiness within the community. Reputation is calculated using rules-based algorithms which are primarily tied to the upvotes or downvotes a member receives on posts. The main drawback of this form of reputation calculation is the inability to consider dynamic factors such as a member’s activity (or inactivity) within the community. The research involves the construction of dynamic mathematical models to calculate reputation and then determine to what extent these results compare with rules-based models. This research begins with exploratory research of the existing corpus of knowledge. Constructive …


Aplicación De Un Sistema De Gestión Al Proceso De Contratación, Zuly Dayana Rubiano Rodríguez Jan 2023

Aplicación De Un Sistema De Gestión Al Proceso De Contratación, Zuly Dayana Rubiano Rodríguez

Ingeniería en Automatización

Este proyecto aborda un desafío común en muchas empresas: la ineficiencia en la atracción de talento humano y el proceso de selección y contratación de nuevos empleados. Muchas empresas aún realizan estos procesos de manera manual, lo que conlleva deficiencias y la necesidad de reprocesos debido a la pérdida o falta de documentación. Para abordar esta problemática, el proyecto comienza con un análisis exhaustivo de los procesos existentes relacionados con la selección de candidatos, contratación y evaluación de pruebas. Este análisis proporciona una comprensión profunda de los procedimientos y establece las directrices necesarias para la posible automatización utilizando técnicas de …


Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar Jan 2023

Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar

UNF Graduate Theses and Dissertations

This thesis introduces the Farming Lightweight Protocol (FLP) optimized for energy-restricted environments that depend upon secure communication, such as multi-robot information gathering systems within the vision of ``smart'' agriculture. FLP uses a hash-based message authentication code (HMAC) to achieve data integrity. HMAC implementations, resting upon repeated use of the SHA256 hashing operator, impose additional resource requirements and thus also impact system availability. We address this particular integrity/availability trade-off by proposing an energy-saving algorithmic engineering method on the internal SHA256 hashing operator. The energy-efficient hash is designed to maintain the original security benefits yet reduce the negative effects on system availability. …


Neuromorphic Computing Applications In Robotics, Noah Zins Jan 2023

Neuromorphic Computing Applications In Robotics, Noah Zins

Dissertations, Master's Theses and Master's Reports

Deep learning achieves remarkable success through training using massively labeled datasets. However, the high demands on the datasets impede the feasibility of deep learning in edge computing scenarios and suffer from the data scarcity issue. Rather than relying on labeled data, animals learn by interacting with their surroundings and memorizing the relationships between events and objects. This learning paradigm is referred to as associative learning. The successful implementation of associative learning imitates self-learning schemes analogous to animals which resolve the challenges of deep learning. Current state-of-the-art implementations of associative memory are limited to simulations with small-scale and offline paradigms. Thus, …


Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang Jan 2023

Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang

Graduate Theses, Dissertations, and Problem Reports

Computer Vision (CV) enables computers and systems to derive meaningful information from acquired visual inputs, such as images and videos, and make decisions based on the extracted information. Its goal is to acquire, process, analyze, and understand the information by developing a theoretical and algorithmic model. Biometrics are distinctive and measurable human characteristics used to label or describe individuals by combining computer vision with knowledge of human physiology (e.g., face, iris, fingerprint) and behavior (e.g., gait, gaze, voice). Face is one of the most informative biometric traits. Many studies have investigated the human face from the perspectives of various different …


Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran Jan 2023

Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran

Electronic Theses and Dissertations

Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …


Energy Dissipation In A Sand Damper Under Cyclic Loading, Ehab Sabi Dec 2022

Energy Dissipation In A Sand Damper Under Cyclic Loading, Ehab Sabi

Civil and Environmental Engineering Theses and Dissertations

Various seismic and wind engineering designs and retrofit strategies have been in development to meet structures' proper and safe operation during earthquake and wind excitation. One such method is the addition of fluid and particle dampers, such as sand dampers, in an effort to reduce excessive and dangerous displacements of structures. The present study implements the discrete element method (DEM) to assess the performance of a pressurized sand damper (PSD) and characterize the dissipated energy under cyclic loading. The idea of a PSD is to exploit the increase in shearing resistance of sand under external pressure and the associated ability …


Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li Dec 2022

Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li

Discovery Undergraduate Interdisciplinary Research Internship

Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …


Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong Dec 2022

Panodepth – Panoramic Monocular Depth Perception Model And Framework, Adley K. Wong

Master's Theses

Depth perception has become a heavily researched area as companies and researchers are striving towards the development of self-driving cars. Self-driving cars rely on perceiving the surrounding area, which heavily depends on technology capable of providing the system with depth perception capabilities. In this paper, we explore developing a single camera (monocular) depth prediction model that is trained on panoramic depth images. Our model makes novel use of transfer learning efficient encoder models, pre-training on a larger dataset of flat depth images, and optimizing the model for use with a Jetson Nano. Additionally, we present a training and optimization framework …


Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …