Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Digital Circuits (2)
- Electrical and Computer Engineering (2)
- Other Electrical and Computer Engineering (2)
-
- VLSI and Circuits, Embedded and Hardware Systems (2)
- Business (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- E-Commerce (1)
- Education (1)
- Electrical and Electronics (1)
- Hardware Systems (1)
- Higher Education (1)
- Operations and Supply Chain Management (1)
- Technology and Innovation (1)
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella
Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella
Publications and Research
Our research project aims to provide a visually impaired person with a superimposed map that will guide the individual to the desired destination through a voice controlled virtual assistant application that integrates Augmented Reality (AR) with Artificial Intelligence (AI) Computer Vision and Natural Language Processing (subfields of AI) will be combined to identify the spatial environment and then create a graphic enhancement that provides the most direct route to the specific destination These technologies will be incorporated into the Microsoft Hololens which will be controlled by the user.
Enginews, Fall 2020, School Of Computer Science & Engineering
Enginews, Fall 2020, School Of Computer Science & Engineering
News, Magazines and Reports
In this issue:
COVID Adjustments • Summer Internship + COVID study with Gabriel Bitencourt • IDEA Lab News with Chelsea Coelho • Recent Publications and Press Releases • Student Quotes.
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Operations Research and Engineering Management Theses and Dissertations
The advent of internet to the public back in 1994 resulted in the 4th industrial revolution disrupting and transforming business and communication models. As much as the transformation changed our lives and experiences, it has resulted in centralized models like Amazon and Facebook. It also resulted in exponential growth of Fraud, Identity theft, and lack of trust. Blockchain is considered an emerging technology of this era, which will trigger the 5th industrial revolution enabling another massive storm of disruptive transformation completely changing the current business models based on trust, security, collaboration and crypto currency. As the evolution of blockchain technology …
A 2.56 Gbps Serial Wireline Transceiver That Supports An Auxiliary Channel And A Hybrid Line Driver To Compensate Large Channel Loss, Xiaoran Wang
Electrical Engineering Theses and Dissertations
Serial transceiver links are widely used for high-speed point-to-point communications. This dissertation describes two transceiver link designs for two different applications.
In serial wireline communications, security is an increasingly important factor to concern. Securing an information processing system at the application and system software layers is regarded as a necessary but incomplete defense against the cyber security threats. In this dissertation, an asynchronous serial transceiver that is capable of transmitting and receiving an auxiliary data stream concurrently with the primary data stream is described. The transceiver instantiates the auxiliary data stream by modulating the phase of the primary data without …
Heuristic-Based Threat Analysis Of Register-Transfer-Level Hardware Designs, Wesley Layton Ellington
Heuristic-Based Threat Analysis Of Register-Transfer-Level Hardware Designs, Wesley Layton Ellington
Electrical Engineering Theses and Dissertations
The development of globalized semiconductor manufacturing processes and supply chains has lead to an increased interest in hardware security as new types of hardware based attacks, called hardware Trojans, are being observed in industrial and military electronics. To combat this, a technique was developed to help analyze hardware designs at the register-transfer-level (RTL) and locate points of interest within a design that might be vulnerable to attack. This method aims to eventually enable the creation of an end-to-end design hardening solution that analyzes existing designs and suggests countermeasures for potential Trojan attacks. The method presented in this work uses a …
Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett
Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett
Browse all Theses and Dissertations
Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.
Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan
Geoaware - A Simulation-Based Framework For Synthetic Trajectory Generation From Mobility Patterns, Jameson D. Morgan
Browse all Theses and Dissertations
Recent advances in location acquisition services have resulted in vast amounts of trajectory data; providing valuable insight into human mobility. The field of trajectory data mining has exploded as a result, with literature detailing algorithms for (pre)processing, map matching, pattern mining, and the like. Unfortunately, obtaining trajectory data for the design and evaluation of such algorithms is problematic due to privacy, ethical, dataset size, researcher access, and sampling frequency concerns. Synthetic trajectories provide a solution to such a problem as they are cheap to produce and are derived from a fully controllable generation procedure. Citing deficiencies in modern synthetic trajectory …
Enabling Static Program Analysis Using A Graph Database, Jialun Liu
Enabling Static Program Analysis Using A Graph Database, Jialun Liu
Browse all Theses and Dissertations
This thesis presents the design, the implementation, and the evaluation of a database-oriented static program analysis engine for the PHP programming language. This engine analyzes PHP programs by representing their semantics using a graph-based data structure, which will be subsequently stored into a graph database. Such scheme will fundamentally facilitate various program analysis tasks such as static taint analysis, visualization, and data mining. Specifically, these complex program analysis tasks can now be translated into built-in declarative graph database operations with rich features. Our engine fundamentally differs from other existing static program analysis systems that mainly leverage intermediate representation (IRs) to …