Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (112)
- Computer Sciences (105)
- Electrical and Computer Engineering (74)
- Digital Communications and Networking (49)
- Other Computer Engineering (44)
-
- Robotics (43)
- Computer and Systems Architecture (41)
- Artificial Intelligence and Robotics (27)
- Hardware Systems (25)
- Data Storage Systems (19)
- Mechanical Engineering (18)
- Electrical and Electronics (17)
- VLSI and Circuits, Embedded and Hardware Systems (15)
- Digital Circuits (14)
- Systems and Communications (14)
- Databases and Information Systems (11)
- Business (10)
- Other Electrical and Computer Engineering (9)
- Social and Behavioral Sciences (9)
- Automotive Engineering (8)
- Computational Engineering (8)
- Signal Processing (8)
- Software Engineering (8)
- Aerospace Engineering (7)
- Biomedical Engineering and Bioengineering (7)
- Power and Energy (7)
- Systems Architecture (7)
- Navigation, Guidance, Control, and Dynamics (6)
- Institution
-
- Chulalongkorn University (34)
- Santa Clara University (33)
- California Polytechnic State University, San Luis Obispo (22)
- University of South Florida (19)
- University of Central Florida (18)
-
- Wright State University (15)
- University of Massachusetts Amherst (13)
- Florida Institute of Technology (12)
- New Jersey Institute of Technology (11)
- The University of Akron (11)
- Air Force Institute of Technology (10)
- Louisiana State University (9)
- Western University (9)
- Old Dominion University (8)
- University of Arkansas, Fayetteville (7)
- West Virginia University (7)
- Southern Methodist University (6)
- University of Denver (6)
- University of Mississippi (6)
- University of Nevada, Las Vegas (6)
- American University in Cairo (5)
- Kennesaw State University (5)
- University of Kentucky (5)
- University of South Carolina (5)
- University of Texas at El Paso (5)
- Michigan Technological University (4)
- Universidad de La Salle (4)
- University of New Mexico (4)
- Virginia Commonwealth University (4)
- Central Washington University (3)
- Keyword
-
- Machine learning (21)
- Computer Science (17)
- Department of Computer Science and Engineering (14)
- Security (12)
- Robotics (11)
-
- Deep learning (10)
- FPGA (9)
- Machine Learning (9)
- Computer Engineering (6)
- Daniel Felix Ritchie School of Engineering and Computer Science (6)
- Deep Learning (6)
- Artificial intelligence (5)
- Electrical and Computer Engineering (5)
- IoT (5)
- Optimization (5)
- Blockchain (4)
- Neural network (4)
- Artificial neural network (3)
- Automation (3)
- CNN (3)
- Classification (3)
- Cloud computing (3)
- Computer Vision (3)
- Computer vision (3)
- Convolutional neural networks (3)
- Data science (3)
- Database (3)
- Facial expression recognition (3)
- GAN (3)
- High-level synthesis (3)
- Publication
-
- Theses and Dissertations (38)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (34)
- Computer Science and Engineering Senior Theses (25)
- USF Tampa Graduate Theses and Dissertations (19)
- Electronic Theses and Dissertations, 2020- (18)
-
- Electronic Theses and Dissertations (17)
- Browse all Theses and Dissertations (15)
- Doctoral Dissertations (13)
- Honors Theses (12)
- Dissertations (11)
- Williams Honors College, Honors Research Projects (11)
- Electronic Thesis and Dissertation Repository (9)
- Computer Engineering (8)
- Graduate Theses, Dissertations, and Problem Reports (7)
- Master's Theses (7)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (6)
- Computer Science and Engineering Master's Theses (5)
- Dissertations and Theses (5)
- Electrical & Computer Engineering Theses & Dissertations (5)
- Electrical Engineering Theses and Dissertations (5)
- LSU Master's Theses (5)
- Masters Theses (5)
- Open Access Theses & Dissertations (5)
- Dissertations, Master's Theses and Master's Reports (4)
- Electrical Engineering (4)
- LSU Doctoral Dissertations (4)
- Master of Science in Computer Science Theses (4)
- Doctoral Dissertations and Master's Theses (3)
- Graduate Theses and Dissertations (3)
- Ingeniería en Automatización (3)
Articles 361 - 374 of 374
Full-Text Articles in Computer Engineering
Zips Racing Electric Can Communications, Andrew Jordan, Adam Long, Susanah Kowalewski, Rami Nehme
Zips Racing Electric Can Communications, Andrew Jordan, Adam Long, Susanah Kowalewski, Rami Nehme
Williams Honors College, Honors Research Projects
The CAN protocol has been a standard of electronic communication networks of automotive vehicles since the early 2000s due to its robust reliability in harsh environments. For the 2020 competition year, the Zips Racing Electric design team will be building an entirely new, fully-electric vehicle with CAN communication implemented rather than communicating via pure analog signals. Hardware and software can be utilized to read analog electrical signals from a source, such as accelerator and brake sensors, and encode them into a digital message that meets the CAN 2.0B communication protocol standard. Likewise, software can be used to extract data from …
Smart Collar, Gretchen T. Woodling, Sean Moran, Justen Bischoff, Jacob Sindelar
Smart Collar, Gretchen T. Woodling, Sean Moran, Justen Bischoff, Jacob Sindelar
Williams Honors College, Honors Research Projects
The Smart Collar is a universal pet tracker, designed to be small and exceedingly comfortable for any pet to wear. GPS technology is used to locate the device, allowing the user to track their pet, via a smart phone application. This application can be used to program the device, view maps of their pet’s location and history of travel. Operating primarily on Long Range Wide Area Network (LoRaWAN) for data transfer, the device consumes very little power, allowing for several days of run-time per charge of the battery. Boasting no monthly service fees, The Smart Collar provides pet owner’s an …
Terraria Server On A Raspberry Pi, Bradley Stoldt
Terraria Server On A Raspberry Pi, Bradley Stoldt
Williams Honors College, Honors Research Projects
My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.
Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call
Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call
Williams Honors College, Honors Research Projects
Motor vehicle operators’ attention levels can be monitored to improve driver safety. By recording and analyzing the drivers eye gaze, hand position, vehicle speed and engine rpm the driver’s attention can be determined. A Raspberry Pi will be the main processing unit. Data will be pulled and analyzed from the OBD-II port on vehicle speed and engine rpm. The system will be powered from a 12V, 4A pin on the OBD-II port connected to the car battery. A webcam will be used to track the pupil location and determine when the driver is looking at the road. A battery powered …
Creature Care, Alexander Weber
Creature Care, Alexander Weber
Williams Honors College, Honors Research Projects
Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …
Piezoelectric Energy Harvester Improvement, Nathan Embaugh, Jason Mack, Jeremiah Fitzgerald, Zachary J. Lindsey
Piezoelectric Energy Harvester Improvement, Nathan Embaugh, Jason Mack, Jeremiah Fitzgerald, Zachary J. Lindsey
Williams Honors College, Honors Research Projects
The energy harvester is used to convert a portion of the tire deflection waste energy to power up tire embedded sensors. A piezoelectric energy harvester is designed and some preliminary tests are done on it. So far, it has been shown that this design is sufficient for tire application. The team will need to modify the design of the energy harvester, the measurement setup and add a temperature and a strain senor to the existing setup so that the tire deflection and temperature can be measured and at the same time the energy harvester should be tested to see how …
Tabletop Mechanical Tester, Jamie Dombroski, Brian English, Richard Leffler, Andrew Shirk
Tabletop Mechanical Tester, Jamie Dombroski, Brian English, Richard Leffler, Andrew Shirk
Williams Honors College, Honors Research Projects
The need for hands-on and face-to-face experiences in the engineering classroom is very great. The equations, principles, and concepts can all be learned, but without the visual and tactile application, these don’t always sink in or become concrete. A small-scale tensile test machine was designed, sourced, manufactured, and tested for the purpose of being applied in classroom settings to provide this experience to engineering students. Extensive research was performed concerning tensile machines on the market, the essential elements of which are the load cell, grips, crosshead, extensometer, motor, and frame. The raw materials for the frame were purchased and drawings …
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
University of the Pacific Theses and Dissertations
The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis …
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Theses and Dissertations
Mobile Opportunistic Networks (MSNs) enable the interaction of mobile users in the vicinity through various short-range wireless communication technologies (e.g., Bluetooth, WiFi) and let them discover and exchange information directly or in ad hoc manner. Despite their promise to enable many exciting applications, limited battery capacity of mobile devices has become the biggest impediment to these appli- cations. The recent breakthroughs in the areas of wireless power transfer (WPT) and rechargeable lithium batteries promise the use of peer-to-peer (P2P) energy sharing (i.e., the transfer of energy from the battery of one member of the mobile network to the battery of …
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Theses and Dissertations
With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted …
Understanding Depression During The Covid-19 Pandemic Through Social Media Data, Nusrat Armin
Understanding Depression During The Covid-19 Pandemic Through Social Media Data, Nusrat Armin
Electronic Theses and Dissertations
The COVID-19 pandemic has dramatically affected peoples’ daily lives all over theworld - physically, economically, and emotionally. Due to the virus, many people have died, and many hospitalized. A record number of people have lost their job, and many businesses have closed. The global economy is at risk. People are facing new realities of their lives. Studies have shown that the level of depression is three times higher than before this pandemic. Previous studies have shown that people use social media to express their emotions and feelings. The purpose of this study is to understand the depression during this COVID-19 …
Resource Efficient Design Of Quantum Circuits For Cryptanalysis And Scientific Computing Applications, Edgard Munoz-Coreas
Resource Efficient Design Of Quantum Circuits For Cryptanalysis And Scientific Computing Applications, Edgard Munoz-Coreas
Theses and Dissertations--Electrical and Computer Engineering
Quantum computers offer the potential to extend our abilities to tackle computational problems in fields such as number theory, encryption, search and scientific computation. Up to a superpolynomial speedup has been reported for quantum algorithms in these areas. Motivated by the promise of faster computations, the development of quantum machines has caught the attention of both academics and industry researchers. Quantum machines are now at sizes where implementations of quantum algorithms or their components are now becoming possible. In order to implement quantum algorithms on quantum machines, resource efficient circuits and functional blocks must be designed. In this work, we …
Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga
Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga
All Master's Theses
Tuberculosis (TB) is a disease responsible for the deaths of more than one million people worldwide every year. Even though it is preventable and curable, it remains a major threat to humanity that needs to be taken care of. It is often diagnosed in developed countries using approaches such as sputum smear microscopy and culture methods. However, since these approaches are rather expensive, they are not commonly used in poor regions of the globe such as India, Africa, and Bangladesh. Instead, the well known and affordable chest x-ray (CXR) interpretation by radiologists is the technique employed in those places. Nevertheless, …
Image Forgery Detection With Machine Learning, Lubna Alzamil
Image Forgery Detection With Machine Learning, Lubna Alzamil
All Master's Theses
The issue of forged images is currently a global issue that spreads mainly via social networks. Image forgery has weakened Internet users’ confidence in digital images. In recent years, extensive research has been devoted to the development of new techniques to combat various image forgery attacks. Detecting fake images prevents counterfeit photos from being used to deceive or cause harm to others. In this thesis, we propose methods using the error level analysis algorithm to detect manipulated images. We show that our combination of image pre-processing and machine learning techniques is an efficient approach to detecting image forgery attacks.