Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (430)
- Computer Sciences (404)
- Electrical and Computer Engineering (291)
- Digital Communications and Networking (97)
- Computer and Systems Architecture (85)
-
- Social and Behavioral Sciences (77)
- Electrical and Electronics (61)
- Other Computer Engineering (61)
- Mechanical Engineering (58)
- Robotics (57)
- Information Security (53)
- Law (53)
- Computer Law (46)
- Forensic Science and Technology (46)
- Legal Studies (46)
- Systems and Communications (39)
- Ocean Engineering (37)
- Data Storage Systems (36)
- Civil and Environmental Engineering (34)
- Chemical Engineering (31)
- Civil Engineering (30)
- Materials Science and Engineering (30)
- Metallurgy (30)
- Structural Engineering (30)
- Other Electrical and Computer Engineering (29)
- Hardware Systems (27)
- Computational Engineering (25)
- Digital Circuits (18)
- Institution
-
- Wright State University (162)
- TÜBİTAK (74)
- University of Texas at El Paso (71)
- University of Nebraska - Lincoln (68)
- Selected Works (49)
-
- Embry-Riddle Aeronautical University (44)
- California Polytechnic State University, San Luis Obispo (34)
- Universitas Indonesia (30)
- Air Force Institute of Technology (27)
- SelectedWorks (20)
- Washington University in St. Louis (19)
- Marquette University (18)
- Old Dominion University (18)
- Technological University Dublin (17)
- Clemson University (15)
- University of Massachusetts Amherst (15)
- Portland State University (13)
- Singapore Management University (13)
- University of Dayton (11)
- Institute of Business Administration (9)
- University of Central Florida (9)
- Syracuse University (8)
- University of Arkansas, Fayetteville (8)
- University of Nevada, Las Vegas (8)
- Connecticut College (7)
- University of South Florida (7)
- University of Tennessee, Knoxville (7)
- Western Kentucky University (7)
- Wayne State University (6)
- Cleveland State University (5)
- Keyword
-
- Applied sciences (8)
- Department of Computer Science and Engineering (8)
- Ubiquitous Computing (8)
- #antcenter (7)
- Engineering (7)
-
- Robotics (7)
- Security (7)
- Classification (6)
- Interval computations (6)
- Optimization (6)
- Technology (6)
- Computer science (5)
- Computer vision (5)
- Context-Aware (5)
- GPGPU (5)
- Image processing (5)
- Localization (5)
- Mobile (5)
- Mobility (5)
- Simulation (5)
- Social media (5)
- Wireless sensor networks (5)
- Authentication (4)
- Computer security (4)
- Data mining (4)
- Digital forensics (4)
- Genetic algorithm (4)
- Genetic algorithms (4)
- Oceanography (4)
- Ontology (4)
- Publication
-
- Computer Science & Engineering Syllabi (154)
- Turkish Journal of Electrical Engineering and Computer Sciences (74)
- Departmental Technical Reports (CS) (64)
- Makara Journal of Technology (30)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (28)
-
- Journal of Digital Forensics, Security and Law (28)
- Theses and Dissertations (25)
- All Computer Science and Engineering Research (19)
- Electrical and Computer Engineering Faculty Publications (17)
- Electrical and Computer Engineering Faculty Research and Publications (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Computer Engineering (15)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (14)
- Master's Theses (14)
- All Theses (13)
- Department of Electrical and Computer Engineering: Faculty Publications (13)
- Research Collection School Of Computing and Information Systems (13)
- Computer Science Faculty Publications (11)
- Electronic Theses and Dissertations (11)
- International Conference on Information and Communication Technologies (9)
- Browse all Theses and Dissertations (8)
- Computer Science Faculty Publications and Presentations (8)
- Martin L Griss (8)
- Doctoral Dissertations (7)
- JITP 2011: The Future of Computational Social Science (7)
- Masters Theses 1911 - February 2014 (7)
- Open Access Theses & Dissertations (7)
- USF Tampa Graduate Theses and Dissertations (7)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (6)
- Conference papers (6)
Articles 871 - 888 of 888
Full-Text Articles in Computer Engineering
A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding
A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding
USF Tampa Graduate Theses and Dissertations
A dynamic hierarchical web-based portal was created to house a suite of web-based supply chain management applications. The portal was designed in a hierarchical manner to match the structure of large companies. Administrators of the the portal have the ability to form the portal in such a way to mimic the existing structure of their company. Access rights to the applications in the portal may be granted or denied per division and the users of the portal are placed in these divisions based on their duty in the company. In addition, users are granted roles which dictate their ability to …
Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal
Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal
USF Tampa Graduate Theses and Dissertations
Reversible circuits are similar to conventional logic circuits except that they are built from reversible gates. In reversible gates, there is a unique, one-to-one mapping between the inputs and outputs, not the case with conventional logic. Also, reversible gates require constant ancilla inputs for reconfiguration of gate functions and garbage outputs that help in keeping reversibility. Reversible circuits hold promise in futuristic computing technologies like quantum computing, quantum dot cellular automata, DNA computing, optical computing, etc. Thus, it is important to minimize parameters such as ancilla and garbage bits, quantum cost and delay in the design of reversible circuits.
The …
Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko
Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko
USF Tampa Graduate Theses and Dissertations
Testing gait rehabilitation devices on humans can be a difficult task, due to the effects of the neurological controls of the human body. This thesis advances the use of a passive dynamic walker (PDW) tuned to have asymmetric gait patterns similar to those with physical impairments to test rehabilitation devices. A passive dynamic walker is a multipendulum system that has a stable gait pattern when walking down a slope without any energy inputs except the forces due to gravity. A PDW model is better suited for testing rehabilitation devices because it has been shown to resemble human gait and separates …
Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger
Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger
USF Tampa Graduate Theses and Dissertations
With the rise autonomous and robotic systems in field applications, the need for dexterous, highly adaptable end effectors has become a major research topic. Control mechanisms of robotics hands with a high number independent actuators is recognized as a complex, high dimensional problem, with exponentially complex algorithms. However, recent studies have shown that human hand motion possesses very high joint correlation which translates into a set of predefined postures, or synergies. The hand produces a motion using a complementing contribution of multiple joints, called synergies. The similarities place variables onto a common dimensional space, effectively reducing the number of independent …
Design Of Multi Agent Based Crowd Injury Model, Emin Kugu
Design Of Multi Agent Based Crowd Injury Model, Emin Kugu
Electrical & Computer Engineering Theses & Dissertations
A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary.
In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules …
Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi
Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi
Electrical & Computer Engineering Theses & Dissertations
The explosion of high-data-rate-demanding wireless applications such as smart-phones and wireless Internet access devices, together with growth of existing wireless services, are creating a shortage of the scarce Radio Frequency (RF) spectrum. However, several spectrum measurement campaigns revealed that current spectrum usage across time and frequency is inefficient, creating the artificial shortage of the spectrum because of the traditional exclusive "command-and-control" model of using the spectrum. Therefore, a new concept of Cognitive Radio (CR) has been emerging recently in which unlicensed users temporarily borrow spectrum from the licensed Primary Users (PU) based on the Dynamic Spectrum Access (DSA) technique that …
Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner
Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner
Browse all Theses and Dissertations
This dissertation develops and demonstrates a method to measure the uncertainty of secondary structure of protein sequences using Shannon's information theory. This method is applied to a newly developed large dataset of chameleon sequences and to several protein hinges culled from the Hinge Atlas. The uncertainty of the central residue in each tripeptide is computed for each amino acid in a sequence using Cuff and Barton's CB513 as the reference set. It is shown that while secondary structure uncertainty is relatively high in chameleon regions [avg = 1.27 bits] it is relatively low in the regions 1-7 residues nearest a …
A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer
A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer
Browse all Theses and Dissertations
While mobile reading devices have been on the market and investigated by researchers in recent years, there is still work required to make these devices highly accessible to the visually impaired. A usability test with one such device revealed gaps in the current state of the art devices. These gaps focus mostly on the user interaction and his or her ability to quickly consume written reading material. In this dissertation a voice user interface (VUI) is presented that improves the ability of a blind user of a mobile reading device to interact with written material. The image processing techniques required …
Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire
Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire
Browse all Theses and Dissertations
This thesis investigates the use of an artificial neural network (ANN), in particular a Multi-Layer Perceptron (MLP), to perform function approximation on truth data representing a weapon engagement zone's (WEZ) maximum launch range. The WEZ of an air-to-air missile represents the boundaries and zones of effectiveness for a one-vs-one air-to-air combat engagement [13]. The intent is for the network to fuse table lookup and interpolation functionality into a physically compact and computationally efficient package, while improving approximation accuracy over conventional methods. Data was collected from simulated firings of a notional air-to-air missile model and used to train a two layer …
Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi
Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi
Browse all Theses and Dissertations
Fall related injuries are the leading cause of death and hospitalization among the elderly. Falls among older people become a major problem facing hospitals and nursing homes. In this study we put an effort to design a wireless device capable of detecting falls with the hope that this study will provide a path towards better healthcare monitoring and better independent living for the elderly.
In this project I showed how the fall detection device can be interfaced with different systems to achieve functionality without adding extra cost. For seniors who prefer to stay at their homes and live independently, the …
3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp
3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp
Browse all Theses and Dissertations
A method to automatically characterize and identify 3-D range scans based on intrinsic landmarks is presented. Intrinsic landmarks represent locally unique, intrinsic properties of a scanned surface, regardless of scale or rotation. The number, location, and characteristics of landmarks are used to characterize the scanned models. This method contains a selection process to identify stable, intrinsic landmarks for range scans as well as the identification of those scans. The selection process requires no user interaction or surface assumptions. It uses the principal curvatures at the range points to select the landmarks. First, a large number of landmarks are generated by …
A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha
A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha
Browse all Theses and Dissertations
Computing has changed. Lately, a slew of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources has become available at the disposal of the common man. The latter commonly called Cloud Computing (or just Cloud) is democratizing computing by making large computing power accessible to people and corporations around the world easily and economically.
However, taking full advantage of this computing landscape, especially for the data intensive domains, has been hampered by many factors, the primary one being the complexity in developing applications for the variety of available platforms.
This thesis …
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Todd Sedano
Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Ray Bareiss
This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Hong-Ning Dai
This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Hong-Ning Dai
There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Faith Joel Shimba
Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Faith Joel Shimba
A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …