Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Computer Engineering

Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni May 2021

Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni

Honors Scholar Theses

With nearly a third of the world’s population suffering from food-induced chronic diseases such as obesity, the role of food in community health is required now more than ever. While current research underscores food proximity and density, there is a dearth in regard to its nutrition and quality. However, recent research in geospatial data collection and analysis as well as intelligent deep learning will help us study this further.

Employing the efficiency and interconnection of computer vision and geospatial technology, we want to study whether healthy food in the community is attainable. Specifically, with the help of deep learning in …


The Youplanner, Taylor Burgess Jan 2021

The Youplanner, Taylor Burgess

Williams Honors College, Honors Research Projects

Staying organized can be difficult. A four tier web application was created to help in the endeavor. Utilizing software engineering practices, an online notepad was created where users can add, update, and delete notes. The application was a full stack application. For the backend, MySQL was the language and phpMyAdmin was the server. For the front end, PHP and Bootstrap 5.1 was used.


Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub Oct 2020

Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub

Masters Theses & Specialist Projects

Supply chain management is the key success for each business. Having a robust supply chain will help the business to improve service, quality, reduce the costs, improve the speed, and be more flexible. Organizations need to look at data and deploy plans to move the product from operation to logistics to manage a global chain. In this paper we will use E-Comm shipment data to identify the best locations to build a new distribution center (DC).


Minutes & Seconds: The Scientists, Patrick Aievoli Sep 2018

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books Collection

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an interesting …


The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg Jan 2018

The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg

Ronald Greenberg

This paper shows that a fat-pyramid of area Theta(A) built from processors of size lg A requires only O(lg^2 A) slowdown in bit-times to simulate any network of area A under very general conditions. Specifically, there is no restriction on processor size (amount of attached memory) or number of processors in the competing network, nor is the assumption of unit wire delay required. This paper also derives upper bounds on the slowdown required by a fat-pyramid to simulate a network of larger area in the case of unit wire delay.


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Creating A 3d Racing Game In Opengl, Noah Harper Jun 2015

Creating A 3d Racing Game In Opengl, Noah Harper

Computer Science and Software Engineering

No abstract provided.


A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo Jan 2014

A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.

NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


The Evolution Of Successful Service-Learning Courses In The Computing Curriculum: From Infancy To Innovation, Jean F. Coppola Phd, Susan Feather-Gannon, Catharina Daniels, Nancy Lynch Hale, Pauline Mosley Jan 2013

The Evolution Of Successful Service-Learning Courses In The Computing Curriculum: From Infancy To Innovation, Jean F. Coppola Phd, Susan Feather-Gannon, Catharina Daniels, Nancy Lynch Hale, Pauline Mosley

Wilson Center for Social Entrepreneurship

The purpose of this paper is to relate the evolution of successful service-learning courses in a school of computer science and information systems spanning over a 20-year period. The authors share their experiences in developing technology-based service-learning courses for both majors and non-majors. Most recently, these courses have enabled undergraduate first-year students to be exposed to exciting technologies, such as robotics and mobile app development. The challenges, benefits, and lessons learned are discussed.


The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon Jan 2013

The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience. NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit Nov 2011

Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit

George K. Thiruvathukal

For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Nov 2011

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

George K. Thiruvathukal

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal May 2010

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit Jan 2003

Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit

Computer Science: Faculty Publications and Other Works

For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …


The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy Jan 2000

The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy

Theses: Doctorates and Masters

Preliminary structural design is an early stage in building design during which the engineer formulates and assesses a number of different structural schemes. It is conceptual in nature and involves decision making, which relies on heuristics. Whilst preliminary structural design has not been well supported by PC software, recent research has indicated the potential for knowledge-based, object-oriented systems to assist in the area. This thesis explores the issues that arise when object-oriented techniques arc used to develop knowledge-based software. lt reviews certain basic principles of structural design, methods of representing structural design knowledge and earlier approaches to the design of …


The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg Apr 1990

The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg

Computer Science: Faculty Publications and Other Works

This paper shows that a fat-pyramid of area Theta(A) built from processors of size lg A requires only O(lg^2 A) slowdown in bit-times to simulate any network of area A under very general conditions. Specifically, there is no restriction on processor size (amount of attached memory) or number of processors in the competing network, nor is the assumption of unit wire delay required. This paper also derives upper bounds on the slowdown required by a fat-pyramid to simulate a network of larger area in the case of unit wire delay.