Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering

PDF

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 130

Full-Text Articles in Computer Engineering

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi

School of Information Systems and Technology Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi Dec 2021

A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi

Walden Faculty and Staff Publications

This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …


Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr. Dec 2021

Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.

Theses and Dissertations

Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.

This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …


Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila Dec 2021

Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila

Library Philosophy and Practice (e-journal)

Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …


Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku Dec 2021

Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku

Doctoral Dissertations

During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that …


Ahmedabad City App, Rushabh Picha Dec 2021

Ahmedabad City App, Rushabh Picha

Electronic Theses, Projects, and Dissertations

The Ahmedabad City App is a city guide app that provides information on the city's accessible resources. The project's goal is to provide a concrete, one-stop platform for finding information on all of Ahmedabad's accessible resources. The main goal is to simplify the railway's schedule and make it easier for customers to get from one point to another swiftly and safely. Emergency connections such as the blood bank, fire department, police station, and hospitals will be included in the app. Restaurants and picnic areas are also included in the rejuvenation process.

The proposed system uses SQLite as the database and …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Lung Nodules Identification In Ct Scans Using Multiple Instance Learning., Wiem Safta Dec 2021

Lung Nodules Identification In Ct Scans Using Multiple Instance Learning., Wiem Safta

Electronic Theses and Dissertations

Computer Aided Diagnosis (CAD) systems for lung nodules diagnosis aim to classify nodules into benign or malignant based on images obtained from diverse imaging modalities such as Computer Tomography (CT). Automated CAD systems are important in medical domain applications as they assist radiologists in the time-consuming and labor-intensive diagnosis process. However, most available methods require a large collection of nodules that are segmented and annotated by radiologists. This process is labor-intensive and hard to scale to very large datasets. More recently, some CAD systems that are based on deep learning have emerged. These algorithms do not require the nodules to …


An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse Dec 2021

An Analysis Of Camera Configurations And Depth Estimation Algorithms For Triple-Camera Computer Vision Systems, Jared Peter-Contesse

Master's Theses

The ability to accurately map and localize relevant objects surrounding a vehicle is an important task for autonomous vehicle systems. Currently, many of the environmental mapping approaches rely on the expensive LiDAR sensor. Researchers have been attempting to transition to cheaper sensors like the camera, but so far, the mapping accuracy of single-camera and dual-camera systems has not matched the accuracy of LiDAR systems. This thesis examines depth estimation algorithms and camera configurations of a triple-camera system to determine if sensor data from an additional perspective will improve the accuracy of camera-based systems. Using a synthetic dataset, the performance of …


Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian Nov 2021

Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian

Engineering Faculty Articles and Research

Haptic interfaces have great potential for assessing the tactile processing of children with Autism Spectrum Disorder (ASD), an area that has been under-explored due to the lack of tools to assess it. Until now, haptic interfaces for children have mostly been used as a teaching or therapeutic tool, so there are still open questions about how they could be used to assess tactile processing of children with ASD. This article presents the design process that led to the development of Feel and Touch, a mobile game augmented with vibrotactile stimuli to assess tactile processing. Our feasibility evaluation, with 5 children …


Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian Nov 2021

Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian

Engineering Faculty Articles and Research

Hearing children of Deaf adults (CODAs) face many challenges including having difficulty learning spoken languages, experiencing social judgment, and encountering greater responsibilities at home. In this paper, we present a proposal for a smart display application called Let's Read that aims to support CODAs when learning spoken language. We conducted a qualitative analysis using online community content in English to develop the first version of the prototype. Then, we conducted a heuristic evaluation to improve the proposed prototype. As future work, we plan to use this prototype to conduct participatory design sessions with Deaf adults and CODAs to evaluate the …


Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori Nov 2021

Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori

Engineering Faculty Articles and Research

Autism Spectrum Disorder (ASD) is a neurological condition that affects how a people communicate and interact with others. The use of screening tools during childhood is very important to detect those children who need to be referred for a diagnosis of ASD. However, most screening tools are based on parents' responses so the result can be subjective. In addition, most screening tools focus on social and communicative skills leaving aside sensory features, which have shown to have the potential to be ASD markers. Tactile processing has been little explored due to lack of tools to asses it, however with the …


Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager Nov 2021

Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager

Honors College Theses

With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed Nov 2021

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed

Future Computing and Informatics Journal

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …


Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac Nov 2021

Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac

Publications and Research

Increasing usage of Digital Manufacturing (DM) in safety-critical domains is increasing attention on the cybersecurity of the manufacturing process, as malicious third parties might aim to introduce defects in digital designs. In general, the DM process involves creating a digital object (as CAD files) before using a slicer program to convert the models into printing instructions (e.g. g-code) suitable for the target printer. As the g-code is an intermediate machine format, malicious edits may be difficult to detect, especially when the golden (original) models are not available to the manufacturer. In this work we aim to quantify this hypothesis through …


Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour Nov 2021

Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour

LSU Doctoral Dissertations

Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …


A Survey On Various Image Inpainting Techniques, Nermin Mohamed Fawzy Salem Phd Nov 2021

A Survey On Various Image Inpainting Techniques, Nermin Mohamed Fawzy Salem Phd

Future Engineering Journal

Over the decades' researchers have studied the image inpainting problem intensively due to its high significance and effectiveness in various image processing applications such as people and object security, object removal, face editing applications. Image inpainting is defined as the process of completing or removing a missing region in images. It is considered one of the most challenging topics in the image processing field, although, it requires a deep understanding of the image details in terms of texture and structure. In this paper, a survey of most image inpainting techniques is presented and summarized with comparisons including the merits and …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …


Translating Video Recordings Of Mobile App Ui Gestures Into Replayable Scenarios For Native And Hybrid Apps, Madeleine Havranek Nov 2021

Translating Video Recordings Of Mobile App Ui Gestures Into Replayable Scenarios For Native And Hybrid Apps, Madeleine Havranek

Undergraduate Honors Theses

Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly evolving platforms, automated techniques for analyzing all types of rich software artifacts provide benefit to mobile developers. Unfortunately, automatically analyzing screen recordings presents serious challenges, due to their graphical nature, compared to other types of (textual) artifacts. To address these challenges, this …


Recent Advances And Trends Of Predictive Maintenance From Data-Driven Machine Prognostics Perspective, Yuxin Wen, Md. Fashiar Rahman, Honglun Xu, Tzu-Liang Bill Tseng Oct 2021

Recent Advances And Trends Of Predictive Maintenance From Data-Driven Machine Prognostics Perspective, Yuxin Wen, Md. Fashiar Rahman, Honglun Xu, Tzu-Liang Bill Tseng

Engineering Faculty Articles and Research

In the Engineering discipline, prognostics play an essential role in improving system safety, reliability and enabling predictive maintenance decision-making. Due to the adoption of emerging sensing techniques and big data analytics tools, data-driven prognostic approaches are gaining popularity. This paper aims to deliver an extensive review of recent advances and trends of data-driven machine prognostics, with a focus on their applications in practice. The primary purpose of this review is to categorize existing literature and report the latest research progress and directions to support researchers and practitioners in acquiring a clear comprehension of the subject area. This paper first summarizes …


Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu Oct 2021

Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu

Computer Science and Engineering Theses and Dissertations

Measuring moisture dynamics in soil and overlying vegetation is key to understanding ecosystem and agricultural dynamics in many contexts. For many applications, moisture information is demanded at high temporal frequency over large areas. Sentinel-1 C-band radar backscatter satellite images provide a repeating sequence of fine-resolution (10-m) observations that can be used to infer soil and vegetation moisture, but the 12-day interval between satellite observations is infrequent relative to the sensed moisture dynamics. Machine learning approaches have been used to predict soil moisture at higher spatial resolutions than the original satellite images, but little effort has been made to increase the …


Incorporating Virtual Reality Training In An Introductory Public Speaking Course, Kevin Kryston, Henry Goble, Allison Eden Sep 2021

Incorporating Virtual Reality Training In An Introductory Public Speaking Course, Kevin Kryston, Henry Goble, Allison Eden

Journal of Communication Pedagogy

This study presents the results of two studies using a virtual reality (VR) public-speaking training simulation as an instructional aid in a basic communication course. Results from the first study suggest that VR practice was associated with higher subsequent speech delivery grades in the course compared to no practice. However, VR practice did not reduce public speaking anxiety (PSA). In a follow-up study, VR practice was compared with other forms of lab-based practice including in front of a mirror and a recorded video session. All forms of lab practice (VR, mirror, or video) were associated with higher speech grades than …


A New Era Of Education: Incorporating Machine Teachers Into Education, Jihyun Kim Sep 2021

A New Era Of Education: Incorporating Machine Teachers Into Education, Jihyun Kim

Journal of Communication Pedagogy

This editorial briefly discusses the potential of machine agents in education that can assist in creating more positive and meaningful teaching and learning environments. Then, it introduces three articles, two empirical research studies and one research-based instructional activity, compromising a special section on “Machine Teachers in Education” of Journal of Communication Pedagogy. Collectively, these articles help us better understand the role of machines in education and facilitate intellectual dialogues.


Human-Machine Communication: Complete Volume. Volume 3. Diffusion Of Human-Machine Communication During And After The Covid-19 Pandemic Sep 2021

Human-Machine Communication: Complete Volume. Volume 3. Diffusion Of Human-Machine Communication During And After The Covid-19 Pandemic

Human-Machine Communication

This is the complete volume of HMC Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemic


What Will Affect The Diffusion Of Ai Agents?, James W. Dearing Sep 2021

What Will Affect The Diffusion Of Ai Agents?, James W. Dearing

Human-Machine Communication

For billions of people, the threat of the Novel Coronavirus SARS-CoV-2 and its variants has precipitated the adoption of new behaviors. Pandemics are radical events that disrupt the gradual course of societal change, offering the possibility that some rapidly adopted innovations will persist in use past the time period of the event and, thus, diffuse more rapidly than in the absence of such an event. Human-machine communication includes a range of technologies with which many of us have quickly become more familiar due to stay-athome orders, distancing, workplace closures, remote instruction, home-bound entertainment, fear of contracting COVID-19, and boredom. In …


Communicative Development And Diffusion Of Humanoid Ai Robots For The Post-Pandemic Health Care System, Do Kyun David Kim, Gary Kreps, Rukhsana Ahmed Sep 2021

Communicative Development And Diffusion Of Humanoid Ai Robots For The Post-Pandemic Health Care System, Do Kyun David Kim, Gary Kreps, Rukhsana Ahmed

Human-Machine Communication

As humanoid robot technology, anthropomorphized by artificial intelligence (AI), has rapidly advanced to introduce more human-resembling automated robots that can communicate, interact, and work like humans, we have begun to expect active interactions with Humanoid AI Robots (HAIRs) in the near future. Coupled with the HAIR technology development, the COVID-19 pandemic triggered our interest in using health care robots with many substantial advantages that overcome critical human vulnerabilities against the strong infectious COVID-19 virus. Recognizing the tremendous potential for the active application of HAIRs, this article explores feasible ways to implement HAIRs in health care and patient services and suggests …


The Role Of Vidura Chatbot In The Diffusion Of Knowcovid-19 Gateway, Kerk F. Kee, Prasad P. Calyam, Hariharan Regunath Sep 2021

The Role Of Vidura Chatbot In The Diffusion Of Knowcovid-19 Gateway, Kerk F. Kee, Prasad P. Calyam, Hariharan Regunath

Human-Machine Communication

The COVID-19 pandemic is an unprecedented global emergency. Clinicians and medical researchers are suddenly thrown into a situation where they need to keep up with the latest and best evidence for decision-making at work in order to save lives and develop solutions for COVID-19 treatments and preventions. However, a challenge is the overwhelming numbers of online publications with a wide range of quality. We explain a science gateway platform designed to help users to filter the overwhelming amount of literature efficiently (with speed) and effectively (with quality), to find answers to their scientific questions. It is equipped with a chatbot …