Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci Sep 2023

Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, the use of t-SNE is proposed to embed 3D point clouds of plants into 2D space for plant characterization. It is demonstrated that t-SNE operates as a practical tool to flatten and visualize a complete 3D plant model in 2D space. The perplexity parameter of t-SNE allows 2D rendering of plant structures at various organizational levels. Aside from the promise of serving as a visualization tool for plant scientists, t-SNE also provides a gateway for processing 3D point clouds of plants using their embedded counterparts in 2D. In this paper, simple methods were proposed to perform semantic …


Analysis Of Microscopic Objects Using Computer Vision Methods, Yuan Dao Aug 2021

Analysis Of Microscopic Objects Using Computer Vision Methods, Yuan Dao

UNLV Theses, Dissertations, Professional Papers, and Capstones

As an essential and powerful tool to observe living organisms, three-dimensional fluorescence microscopy is widely used in biological research and diagnosis. The 4D fluorescence microscopy data can be obtained using time-lapsed videos of 3D images. To analyze and extract useful information from the increasingly large and complex biological image dataset, efficient and effective computational tools are in need but still lagging behind. In analyzing biological data, two major challenges are faced. First, time-lapsed fluorescence microscopic images typically have a low SNR. Second, biological objects often change their morphology and internal structure frequently. As such, conventional image processing methods may not …


Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao Jan 2018

Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao

Theses and Dissertations--Computer Science

With exponential growth on a daily basis, there is potentially valuable information hidden in complex electronic medical records (EMR) systems. In this thesis, several efficient data mining algorithms were explored to discover hidden knowledge in insurance claims data. The first aim was to cluster three levels of information overload(IO) groups among chronic rheumatic disease (CRD) patient groups based on their clinical events extracted from insurance claims data. The second aim was to discover hidden patterns using three renowned pattern mining algorithms: Apriori, frequent pattern growth(FP-Growth), and sequential pattern discovery using equivalence classes(SPADE). The SPADE algorithm was found to be the …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera Jan 2016

Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera

Journal of Digital Forensics, Security and Law

Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …


Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty Nov 2014

Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty

Michigan Tech Research Institute Publications

Thermal remote sensing has a wide range of applications, though the extent of its use is inhibited by cost. Robotic and computer components are now widely available to consumers on a scale that makes thermal data a readily accessible resource. In this project, thermal imagery collected via a lightweight remote sensing Unmanned Aerial Vehicle (UAV) was used to create a surface temperature map for the purpose of providing wildland firefighting crews with a cost-effective and time-saving resource. The UAV system proved to be flexible, allowing for customized sensor packages to be designed that could include visible or infrared cameras, GPS, …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo Nov 2010

Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo

Makara Journal of Technology

The visualization of plant growth modeling using computer simulation has rarely been conducted with Lindenmayer System (L-System) approach. L-System generally has been used as framework for improving and designing realistic modeling on plant growth. It is one kind of tools for representing plant growth based on grammar sintax and mathematic formulation. This research aimed to design modeling and visualizing plant growth structure generated using L-System. The environment on modeling design used three dimension graphic on standart OpenGL format. The visualization on system design has been developed by some of L-System grammar, and the output graphic on three dimension reflected on …


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Journal of Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik Jan 2006

A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik

Turkish Journal of Electrical Engineering and Computer Sciences

Engineering is based on practice. The minima of this practice should be given during the university education. This has become more and more comprehensive and expensive parallel to high-technology devices developed and presented to societies. Computers, microprocessor-based devices, programmable systems on Chip (PSoC), etc., make engineering education not only very complex but interdisciplinary as well. Building undergraduate labs has become more and more expensive if only physical experimentation and hands-on training are targeted. On the other hand, simple, comparatively much cheaper software may turn a regular personal computer (PC) into a virtual lab. The key question therefore is, to establish …