Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Engineering

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 30

Full-Text Articles in Computer Engineering

First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego Apr 2024

First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego

Undergraduate Research Events

Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …


A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert Apr 2022

A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert

Student Research

Machine learning is becoming very popular in many technological aspects worldwide, including robotic applications. One of the unique aspects of using machine learning in robotics is that it no longer requires the user to program every situation. The robotic application will be able to learn and adapt from its mistakes. In most situations, robotics using machine learning is designed to fulfill a task better than a human could, and with the machine learning aspect, it can function at the highest level of efficiency and quality. However, creating a machine learning program requires extensive coding and programming knowledge that can be …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D Jul 2021

Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D

Department of Mathematics: Faculty Publications

Abstract
Is it true that we solve problem using techniques in form of formula? Mathematical formulas can be derived through thinking of a problem or situation. Research has shown that we can create formulas by applying theoretical, technical, and applied knowledge. The knowledge derives from brainstorming and actual experience can be represented by formulas. It is intended that this research article is geared by an audience of average knowledge level of solving mathematics and scientific intricacies. This work details an introductory level of simple, at times complex problems in a mathematical epidermis and computability and solvability in a Computer Science. …


The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D Jun 2020

The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …


College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University Jan 2020

College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto Jan 2020

Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto

Engineering Management & Systems Engineering Faculty Publications

The present paper describes an exploratory study of small teams working on a four-month project as part of a graduate engineering program. The research had two primary goals. The first was to utilize the log files from shared repositories used for team collaboration to describe the network structure of the teams. The second was to determine whether the network centrality of any individual team member is associated with their teamwork skills and attitudes towards the collaboration platform. The relationship between teamwork skills, attitudes towards the collaboration technology, and the centrality index was explored using Pearson correlations. A total of 35 …


University Of Rhode Island Course Information Assistant, Daniel Gauthier May 2019

University Of Rhode Island Course Information Assistant, Daniel Gauthier

Senior Honors Projects

Personal voice-interactive systems have become ubiquitous in daily life. There are many of these digital assistants such as Siri, Alexa, and Google Assistant. The chances are high you have access to one right now. This technology has reached a point where the context of a conversation can be maintained, which is a vast improvement over earlier technology. Interactions without conversational context can limit interactions greatly and this was the case for previous digital assistants. Every time someone would say something to an assistant, it was like they were constantly changing operators on a customer service line. The assistants can now …


Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang Jan 2019

Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang

Computer Science Faculty Publications

Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


Innovation Governed By Godly Wisdom, Robert Chasnov Jun 2018

Innovation Governed By Godly Wisdom, Robert Chasnov

Engineering and Computer Science Faculty Publications

No abstract provided.


Data Defenders, Madison Claire Cannon Jun 2018

Data Defenders, Madison Claire Cannon

Alumni Publications

No abstract provided.


The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa Jan 2018

The Rhetoric Of Science Education And Technology, Iwasan D. Kejawa

School of Computing: Faculty Publications

Nearly thousands of science experiments are performed both on humans and animals every year in the United States (Gregory, 1999). Does Science enormously play a role in the well-beings of individual in the society? Research has found that science education is through motivation and satisfying the needs of humans. The scientific world is part of an elongated human development. This can be substantiated with the use and evolution of TECHNOLOGY and SCIENCE (Minton, 2004). Education of the entities that comprise the need to achieve the goal of TECHNOLOGY and SCIENCE which are important issues of today. Research has shown that …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey Dec 2011

Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …


Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey Dec 2011

Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …


Concept Tests For A New Wire Flying Vehicle Designed To Achieve High Horizontal Resolution Profiling In Deep Water, Chris Roman, Dave Hebert Dec 2011

Concept Tests For A New Wire Flying Vehicle Designed To Achieve High Horizontal Resolution Profiling In Deep Water, Chris Roman, Dave Hebert

Graduate School of Oceanography Faculty Publications

Efficiently profiling the water column to achieve both high vertical and horizontal resolution from a moving vessel in deep water is difficult. Current solutions, such as CTD tow-yos, moving vessel profilers, and undulating tow bodies, are limited by ship speed or water depth. As a consequence, it is difficult to obtain oceanographic sections with sufficient resolution to identify many relevant scales over the deeper sections of the water column. This paper presents a new concept for a profiling vehicle that slides up and down a towed wire in a controlled manner using the lift created by wing foils. The wings …


Development Of High Resolution Sea Floor Mapping Tools And Techniques, Gabrielle Inglis, J. Ian Vaughn, Clara Smart, Christopher N. Roman Apr 2011

Development Of High Resolution Sea Floor Mapping Tools And Techniques, Gabrielle Inglis, J. Ian Vaughn, Clara Smart, Christopher N. Roman

Graduate School of Oceanography Faculty Publications

There is a persistent need for high resolution photographic and bathymetric maps of the sea floor for many research areas in marine geology, biology and archaeology. This poster will present recent work using high frequency multibeam sonars, stereo vision and structured light laser imaging techniques to create maps with centimeter resolution for these applications. This research involves the development of new image and sonar processing techniques that combat the typical difficulties of imperfect navigation information, limited sensor ranges and adverse environmental conditions associated with using marine robotic vehicles in the ocean. Data for this work has been collected with the …


Autonomous Underwater Vehicles As Tools For Deep-Submergence Archaeology, Christopher N. Roman, Ian Roderick Mather Nov 2010

Autonomous Underwater Vehicles As Tools For Deep-Submergence Archaeology, Christopher N. Roman, Ian Roderick Mather

Graduate School of Oceanography Faculty Publications

Marine archaeology beyond the capabilities of scuba divers is a technologically enabled field. The tool suite includes ship-based systems such as towed side-scan sonars and remotely operated vehicles, and more recently free-swimming autonomous underwater vehicles (AUVs). Each of these platforms has various imaging and mapping capabilities appropriate for specific scales and tasks. Broadly speaking, AUVs are becoming effective tools for locating, identifying, and surveying archaeological sites. This paper discusses the role of AUVs in this suite of tools, outlines some specific design criteria necessary to maximize their utility in the field, and presents directions for future developments. Results are presented …


Application Of Structured Light Imaging For High Resolution Mapping Of Underwater Archaeological Sites, Chris Roman, Gabrielle Inglis, James Rutter May 2010

Application Of Structured Light Imaging For High Resolution Mapping Of Underwater Archaeological Sites, Chris Roman, Gabrielle Inglis, James Rutter

Graduate School of Oceanography Faculty Publications

This paper presents results from recent work using structured light laser profile imaging to create high resolution bathymetric maps of underwater archaeological sites. Documenting the texture and structure of submerged sites is a difficult task and many applicable acoustic and photographic mapping techniques have recently emerged. This effort was completed to evaluate laser profile imaging in comparison to stereo imaging and high frequency multibeam mapping. A ROV mounted camera and inclined 532 nm sheet laser were used to create profiles of the bottom that were then merged into maps using platform navigation data. These initial results show very promising resolution …


Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki Jan 2010

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki

Department of Electrical Engineering and Computer Science - Daytona Beach

In discussions about the development and use of computer systems and software products, the term “professional software engineer” is used repeatedly. In the last two decades there has been significant effort devoted to enhancing and advancing the state of professional software engineering (SwE) – new software engineering processes, methods, tools, and practices; creation of a software engineering body of knowledge [1]; development of a code of ethics and professional conduct [2], and software certification and licensing programs [3] . In 1989 the Software Engineering Institute (SEI) of Carnegie Mellon University published a landmark report on graduate education in software engineering …


Development Of A New Lagrangian Float For Studying Coastal Marine Ecosystems, Alex Schwithal, Chris Roman May 2009

Development Of A New Lagrangian Float For Studying Coastal Marine Ecosystems, Alex Schwithal, Chris Roman

Graduate School of Oceanography Faculty Publications

This paper presents an overview and initial testing results for a shallow water Lagrangian float designed to operate in coastal settings. The presented effort addresses the two main characteristics of the shallow coastal environment that preclude the direct of use of many successfully deep water floats, namely the higher variation of water densities near the coast compared with the open ocean and the highly varied bathymetry. Our idea is to develop a high capacity dynamic auto-ballasting system that is able to compensate for the expected seawater density variation over a broad range of water temperatures and salinities while using measurements …


C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk Jan 2009

C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Agile Command and Control (C2) requires agile information sharing with an increasingly wide variety of military and non-military partners. While current net-centric approaches may improve information sharing within a particular niche of C2, they do not support information sharing across the larger C2 domain. Although not a silver bullet, the development and application of a C2 domain ontology to improve C2 data and service integration appears to be increasingly realistic. In fact, there are several examples of successful ontology applications in domains such as medicine, biology, and engineering, and the new discipline of Applied Ontology is emerging. C2 data, architecture, …


Deep Sea Underwater Robotic Exploration In The Ice-Covered Arctic Ocean With Auvs, Clayton Kunz, Chris Murphy, Richard Camilli, Hanumant Singh, John Bailey, Ryan M. Eustice, Chris Roman, Michael Jakuba, Claire Willis, Taichi Sato, Ko-Ichi Nakamura, Robert A. Sohn Sep 2008

Deep Sea Underwater Robotic Exploration In The Ice-Covered Arctic Ocean With Auvs, Clayton Kunz, Chris Murphy, Richard Camilli, Hanumant Singh, John Bailey, Ryan M. Eustice, Chris Roman, Michael Jakuba, Claire Willis, Taichi Sato, Ko-Ichi Nakamura, Robert A. Sohn

Graduate School of Oceanography Faculty Publications

The Arctic seafloor remains one of the last unexplored areas on Earth. Exploration of this unique environment using standard remotely operated oceanographic tools has been obstructed by the dense Arctic ice cover. In the summer of 2007 the Arctic Gakkel Vents Expedition (AGAVE) was conducted with the express intention of understanding aspects of the marine biology, chemistry and geology associated with hydrothermal venting on the section of the mid-ocean ridge known as the Gakkel Ridge. Unlike previous research expeditions to the Arctic the focus was on high resolution imaging and sampling of the deep seafloor. To accomplish our goals we …


Byzantium Beneath The Black Sea, Bridget Buxton, Robert Ballard, Michael Brennan, Dwight Coleman, Katy Croff, Christopher Roman, Dan Davis, Dennis Piechota, Sergiy Voronov Jan 2008

Byzantium Beneath The Black Sea, Bridget Buxton, Robert Ballard, Michael Brennan, Dwight Coleman, Katy Croff, Christopher Roman, Dan Davis, Dennis Piechota, Sergiy Voronov

Graduate School of Oceanography Faculty Publications

This poster reports on the August 2007 Black Sea Expedition of the Institute for Archaeological Oceanography at the University of Rhode Island (IAO) and the Institute for Exploration (IFE), in collaboration with the Department of the Underwater Heritage of Ukraine. This year’s work marks a new phase in a multi-year (2000–2012) archaeological and oceanographic survey of the Black Sea. 2007 fieldwork focuses on two Byzantine shipwrecks. The 10th century C.E. shipwreck Chersonesos A (discovered in 2006) lies at 140 m depth in the suboxic zone off the Crimean peninsula. The ship carried a cargo of one-handled jars of a widely …


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto Jan 2005

Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

This paper describes how to enable diverse enterprise customers for voice-data switch to achieve in configuration a balance among users, features, and perceived reliability subject to extremes of traffic. The analysis entailed the simulation of the voice-data switch with embedded priority system, generation of latency times for various configurations and transaction traffic rates, and the development of a framework and theoretical propositions for configuration of super-saturated systems. It was shown that the concept of tolerance levels defined in the risk of extreme events can be applied for embedded priority systems and was the basis for the application of the zone-configuration …


Application Of Wavelets And Principal Component Analysis In Image Query And Mammography, Sol Neeman Ph.D. Jan 2000

Application Of Wavelets And Principal Component Analysis In Image Query And Mammography, Sol Neeman Ph.D.

Engineering Studies Faculty Publications and Creative Works

Breast cancer is currently one of the major causes of death for women in the U.S. Mammography is currently the most effective method for detection of breast cancer and early detection has proven to be an efficient tool to reduce the number of deaths. Mammography is the most demanding of all clinical imaging applications as it requires high contrast, high signal to noise ratio and resolution with minimal x-radiation. According to studies [36], 10% to 30% of women having breast cancer and undergoing mammography, have negative mammograms, i.e. are misdiagnosed. Furthermore, only 20%-40% of the women who undergo biopsy, have …


Robust Course-Boundary Extraction Algorithms For Autonomous Vehicles, Chris Roman, Charles Reinholtz Nov 1998

Robust Course-Boundary Extraction Algorithms For Autonomous Vehicles, Chris Roman, Charles Reinholtz

Graduate School of Oceanography Faculty Publications

Practical autonomous robotic vehicles require dependable methods for accurately identifying course or roadway boundaries. The authors have developed a method to reliably extract the boundary line using simple dynamic thresholding, noise filtering, and blob removal. This article describes their efforts to apply this procedure in developing an autonomous vehicle.