Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Data Storage Systems (3)
- Electrical and Computer Engineering (3)
- Computer Sciences (2)
- Digital Communications and Networking (2)
- Physical Sciences and Mathematics (2)
-
- Biomedical (1)
- Business (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Electrical and Electronics (1)
- Engineering Education (1)
- Finance and Financial Management (1)
- Information Security (1)
- Law (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Power and Energy (1)
- Programming Languages and Compilers (1)
- Secured Transactions (1)
- Systems and Communications (1)
- Keyword
-
- APIs (1)
- Alias (1)
- Architecture (1)
- Biomedical imaging (1)
- Cache (1)
-
- Cancer (1)
- Cloud LAMP Stack (1)
- Compiler (1)
- Computer (1)
- Computer vision (1)
- Curricular Analytics (1)
- Cybersecurity (1)
- Deep learning (1)
- Delay Tolerant Network (1)
- Depth enhancement (1)
- Dynamic Spectrum Access (1)
- Fault Tolerant (1)
- Graph Modeling (1)
- Image data collecting (1)
- In-place Carry Look-Ahead Adder (1)
- Machine learning (1)
- Memory (1)
- Mobile development (1)
- Multi-Objective (1)
- Network Architecture (1)
- Network Security (1)
- Optimization (1)
- Out-of-place Carry Look-Ahead Adder (1)
- P2P (1)
- Policy Enforcement (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Engineering
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Theses and Dissertations--Computer Science
Data collecting and preparing is generally considered a crucial process in data science projects. Especially for image data, adding semantic attributes when preparing image data provides much more insights for data scientists. In this project, we aim to implement a general-purpose central image data repository that allows image researchers to collect data with semantic properties as well as data query. One of our researchers has come up with the specific challenge of collecting images with weight data of infants in least developed countries with limited internet access. The rationale is to predict infant weights based on image data by applying …
Depth Enhancement And Surface Reconstruction With Rgb/D Sequence, Xinxin Zuo
Depth Enhancement And Surface Reconstruction With Rgb/D Sequence, Xinxin Zuo
Theses and Dissertations--Computer Science
Surface reconstruction and 3D modeling is a challenging task, which has been explored for decades by the computer vision, computer graphics, and machine learning communities. It is fundamental to many applications such as robot navigation, animation and scene understanding, industrial control and medical diagnosis. In this dissertation, I take advantage of the consumer depth sensors for surface reconstruction. Considering its limited performance on capturing detailed surface geometry, a depth enhancement approach is proposed in the first place to recovery small and rich geometric details with captured depth and color sequence. In addition to enhancing its spatial resolution, I present a …
A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah
A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah
Theses and Dissertations--Computer Science
Ubiquitous connectivity plays an important role in improving the quality of life in terms of economic development, health and well being, social justice and equity, as well as in providing new educational opportunities. However, rural communities which account for 46% of the world's population lacks access to proper connectivity to avail such societal benefits, creating a huge "digital divide" between the urban and rural areas. A primary reason is that the Information and Communication Technologies (ICT) providers have less incentives to invest in rural areas due to lack of promising revenue returns. Existing research and industrial attempts in providing connectivity …
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang
Theses and Dissertations--Computer Science
Technological advances in next-generation sequencing and biomedical imaging have led to a rapid increase in biomedical data dimension and acquisition rate, which is challenging the conventional data analysis strategies. Modern machine learning techniques promise to leverage large data sets for finding hidden patterns within them, and for making accurate predictions. This dissertation aims to design novel machine learning-based models to transform biomedical big data into valuable biological insights. The research presented in this dissertation focuses on three bioinformatics domains: splice junction classification, gene regulatory network reconstruction, and lesion detection in mammograms.
A critical step in defining gene structures and mRNA …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco
Theses and Dissertations--Computer Science
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Theses and Dissertations--Electrical and Computer Engineering
Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.
Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
Theses and Dissertations--Electrical and Computer Engineering
With the emergence of quantum physics and computer science in the 20th century, a new era was born which can solve very difficult problems in a much faster rate or problems that classical computing just can't solve. In the 21st century, quantum computing needs to be used to solve tough problems in engineering, business, medical, and other fields that required results not today but yesterday. To make this dream come true, engineers in the semiconductor industry need to make the quantum circuits a reality.
To realize quantum circuits and make them scalable, they need to be fault tolerant, …
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
Theses and Dissertations--Electrical and Computer Engineering
LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.