Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre Nov 2021

Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre

Symposium of Student Scholars

With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …


Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen Nov 2021

Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen

Cybersecurity Undergraduate Research Showcase

An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh Aug 2021

Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh

Symposium of Student Scholars

Vehicle-2-Everything (V2X) technology can make roads safer by allowing vehicles to communicate with each other. The goal of V2X is to reduce accidents where there is not a line-of-sight of the other vehicle, such as at intersections, in harsh driving conditions, and around curves. Considering that the antenna for V2X will be mounted on the roof, how then should a turned over vehicle communicate reliably with other vehicles if another antenna doesn't also exist on the bottom of the vehicle? We explore using soft-robotics for deploying a spare antenna from under the vehicle. Experiments show that when the antenna is …


Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy Aug 2021

Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy

Symposium of Student Scholars

Intelligent transportation systems (ITS) are being deployed globally to support vehicular safety innovation using wireless communication. The ITS paradigm of vehicle-to-everything communication (V2X) enables vehicles equipped with an on-board unit (OBU) to communicate with a roadside unit (RSU) infrastructure to provide safe intersection movements between similarly equipped vehicles, pedestrians, and animal life. However, the current paradigm relies heavily on the availability of a Global Positioning System (GPS) for ensuring road user safety. In a doomsday scenario where GPS becomes unavailable, collision avoidance services provided through V2X may be rendered unavailable. The proposed solution is to develop a secure and reliable …


Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown Aug 2021

Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown

Symposium of Student Scholars

Title: Design and Test of Novel Vehicle-to-Everything Packet for Sensor Arrays in Under Roadway Deployment

Poster Presentation Undergraduate Student(s): Hakeem Wilson, Marquis Brown Research Mentor(s): Dr. Billy Kihei

Vehicle-to-Everything (V2X) communications is a burgeoning technology that will enable safer, greener, and more productive usage of roadways. In the V2X paradigm, all equipped vehicles and infrastructure can communicate with each other in real-time. By utilizing V2X communications as an Internet-of-Things gateway, a sensor array installed under roadways, allows real-time monitoring of road conditions which increases overall road safety and road maintenance cost. In our research, we have utilized the WAVE Short …


Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson Aug 2021

Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson

Symposium of Student Scholars

Vehicle-to-Everything communications (V2X) is gaining additional ground as an upcoming ad hoc safety network. In V2X, basic safety messages are used for exchanging critical information between vehicles at a set broadcast rate. However, jamming attacks on the safety spectrum could deny V2X radios the ability to save lives on the roadway. This preliminary work analyzes two types of primitive jamming attacks performed on target V2X devices. Lab results reveal that V2X networks are easily susceptible to jamming attacks, due to all V2X standards lacking a requirement to detect/mitigate jamming. To avert this threat and promote safety of life on the …


Long Distance Li-Fi, Adeyemi Fagbemi Aug 2021

Long Distance Li-Fi, Adeyemi Fagbemi

Symposium of Student Scholars

Wi-Fi has been in existence since 1998 providing an increase in the amount of data transmitted and generated by machines. With the growing market demand for network bandwidth, it will make it nearly impossible for typical radio frequency (RF) technologies like Wi-Fi to supply the resources needed for the data transmission. As a complementary solution, Li-Fi was introduced in 2011 as a method of data transfer through the use light of light sources. Li-Fi employs the use of visible light spectrum which has 1000 more times the bandwidth of typical RF spectrums. This study investigates the distance to which this …


Network Health Monitoring System, Zeeshan Siddiqui Aug 2021

Network Health Monitoring System, Zeeshan Siddiqui

Undergraduate Student Research Internships Conference

No abstract provided.


Distributed Parallel Processing, Adrian Wu Aug 2021

Distributed Parallel Processing, Adrian Wu

Undergraduate Student Research Internships Conference

This report summarizes the development of testing new microcontrollers in performing image processing and parallel processing to solve the problem of testing and deploying expensive computer hardware technology in space. The project determined that the I2C communication protocol should be converted to an alternative protocol to maximize data transfer in parallel processing. This report also analyzes the software components and hardware components of the Distributed Parallel Processing project.

This project was to research the alternative protocols for the recently developed project Distributed Parallel Processing with CubeSats. There project was to develop a suitable microcontroller to perform image processing techniques with …


Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore May 2021

Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore

Symposium of Student Scholars

Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job …


Framework For Collecting Data From Iot Device, Md Saiful Islam May 2021

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …


“Looks Like Its Rush Hour Again” – How Botted Users Have Increased The Traffic Of Websites, Ali Shahrokhi Apr 2021

“Looks Like Its Rush Hour Again” – How Botted Users Have Increased The Traffic Of Websites, Ali Shahrokhi

Ramaley Celebration

The main purpose of this paper is to discuss the ideas about how botted users are affecting websites. The problem that comes when bots take over websites is that these botted users cause so much traffic that websites cannot scale well enough. Websites after the holidays see a mass decrease in the number of users on their sites. However, in 2021 and with years to come this has changed where we will see an increase. It is estimated that the number of bots on a website through 2021 is about 35% of all traffic. In this paper, I will discuss …


On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu Jan 2021

On The Usage And Vulnerabilities Of Api Systems, Conner D. Yu

Cybersecurity Undergraduate Research Showcase

To some, Application Programming Interface (API) is one of many buzzwords that seem to be blanketed in obscurity because not many people are overly familiar with this term. This obscurity is unfortunate, as APIs play a crucial role in today’s modern infrastructure by serving as one of the most fundamental communication methods for web services. Many businesses use APIs in some capacity, but one often overlooked aspect is cybersecurity. This aspect is most evident in the 2018 misuse case by Facebook, which led to the leakage of 50 million users’ records.1 During the 2018 Facebook data breach incident, threat actors …