Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 12031 - 12060 of 23213

Full-Text Articles in Computer Engineering

Table Of Contents Jan 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot Jan 2016

Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot

Journal of Digital Forensics, Security and Law

Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …


Table Of Contents Jan 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Robust Multi-Criteria Optimal Fuzzy Control Of Discrete-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz Jan 2016

Robust Multi-Criteria Optimal Fuzzy Control Of Discrete-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz

Electrical and Computer Engineering Faculty Research and Publications

This paper presents a novel fuzzy control design of discrete-time nonlinear systems with multiple performance criteria. The purpose behind this work is to improve the traditional fuzzy controller performance to satisfy several performance criteria simultaneously to secure quadratic optimality with an inherent stability property together with a dissipativity type of disturbance reduction. The Takagi–Sugeno-type fuzzy model is used in our control system design. By solving a linear matrix inequality at each time step, the optimal control solution can be found to satisfy mixed performance criteria. The effectiveness of the proposed technique is demonstrated by simulation of the control of the …


The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell Jan 2016

The Role Of Uncertainty In Categorical Perception Utilizing Statistical Learning In Robots, Nathaniel V. Powell

Graduate College Dissertations and Theses

At the heart of statistical learning lies the concept of uncertainty.

Similarly, embodied agents such as robots

and animals must likewise address uncertainty, as sensation

is always only a partial reflection of reality. This

thesis addresses the role that uncertainty can play in

a central building block of intelligence: categorization.

Cognitive agents are able to perform tasks like categorical perception

through physical interaction (active categorical perception; ACP),

or passively at a distance (distal categorical perception; DCP).

It is possible that the former scaffolds the learning of

the latter. However, it is unclear whether DCP indeed scaffolds

ACP in humans and …


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee Jan 2016

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee

Electrical & Computer Engineering and Computer Science Faculty Publications

Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set …


Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger Jan 2016

Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Jan 2016

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Saros: A Social-Aware Opportunistic Forwarding Simulator, Soumaia Al Ayyat Jan 2016

Saros: A Social-Aware Opportunistic Forwarding Simulator, Soumaia Al Ayyat

Papers, Posters, and Presentations

Many applications are being developed to leverage the popularity of mobile opportunistic networks. However, building adaptive testbeds can be costly and challenging. This challenge motivates the need for effective opportunistic network simulators to provide a variety of opportunistic environment setups, and evaluate proposed applications and protocols with a comprehensive set of metrics. This paper presents SAROS, a simulator of opportunistic networking environments with a variety of interest distributions, power consumption distributions, imported real traces, and social network integration. The simulator provides a wide variety of evaluation metrics that are not offered by comparable simulators. Finally, SAROS also implements several opportunistic …


A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju Jan 2016

A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju

Business Analytics and Information Systems

This paper proposes that basic ideas from the work system theory (WST) and the work system method (WSM) might serve as a front end to object-oriented analysis and design (OOAD), thereby providing a path from business-oriented descriptions to formal, technical specifications. After describing the background motivation and summarizing work system concepts, the paper uses a hiring system example to show how two tools from WSM can be used as a front end for OOAD, in effect, a step before creating use case diagrams and other types of Unified Modeling Language (UML) artifacts. Potential benefits of this approach stem from a …


3d Immersive Visualization: Expanding Human Sensation, Megan Davis, Francisco Gonzalez, Connor Waters Jan 2016

3d Immersive Visualization: Expanding Human Sensation, Megan Davis, Francisco Gonzalez, Connor Waters

Capstone Design Expo Posters

Unmet Need: The constant push for better and more interactive data visualization aids: the Oculus Rift replaced a two-dimensional fixed monitor with head tracking and a three-dimensional virtual space to explore; the Novint Falcon replaces two-dimensional pointing tools with a haptic sensor with force feedback and three degrees of axial freedom.

Deliverables: A demonstration of the technologies involved, in the form of an Oculus- and Falconenabled physical simulation of a room containing several objects that can be handled and manipulated in three dimensions.

Constraints: The hardware is expensive and difficult to acquire, and it requires a beefy computer to run. …


Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech Jan 2016

Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech

Capstone Design Expo Posters

Data visualization is an essential component of any data analysis. A visual image can aid in more in-depth analysis of any researched data. Although there are data visualization products that already exist on the market, such as Gephi, yEd Graph editor, and OmniGraffle, they are platform-dependent and can be difficult for novice users to install and get started. Data Network Visualization eliminates these weaknesses by being fully accessible through the web, while having a less cluttered user interface. This allows a user to take advantage of a variety of visualization tools without the need to download a program.

To achieve …


Cryptocurrency: Proof Of Purchase, Adam Johnson, Robert Breckenridge, Kara Lucord Jan 2016

Cryptocurrency: Proof Of Purchase, Adam Johnson, Robert Breckenridge, Kara Lucord

Capstone Design Expo Posters

The original purpose of this project was to research the capabilities of a relatively new cryptocurrency platform known as Ethereum. Extensive research brought to light Ethereum’s wide range of developmental capabilities and shifted our focus to the consideration of how the features that Ethereum offers can be used to improve some of the flaws within the world of cryptocurrency. Some cryptocurrency users find these systems useful, because it gives them a means of anonymity. This makes it pretty easy to launder money, make illegal purchases, and double spend. Our solution solves all of these issues, by tying a digital currency …


Swummary: Self-Documenting Code, Keith Herbert, John Goldhamer, Dylan Ilvento Jan 2016

Swummary: Self-Documenting Code, Keith Herbert, John Goldhamer, Dylan Ilvento

Capstone Design Expo Posters

Using Natural Language Summaries of Program Elements to Improve Code Search

There are countless people that are intimidated by reading computer programs, potentially driving away future engineers. Even current software developers, when moving from project to project, face downtime due to acclimating themselves with a new, poorly commented code base. Our project, which we call Swummary, strives to eliminate these problems by providing succinct natural language summaries of source code.

We were tasked with developing a functioning prototype of a natural language source code summarizer, based on the frameworks SrcML and Software Word Usage Model (SWUM), as well as the …


Will Wade’S Team Camp: An Online Registration Service For Will Wade’S Basketball Team Camp At Vcu, William Slattum, Melissa Nierle Jan 2016

Will Wade’S Team Camp: An Online Registration Service For Will Wade’S Basketball Team Camp At Vcu, William Slattum, Melissa Nierle

Capstone Design Expo Posters

Virginia Commonwealth University(VCU) has made a name for its self on the national stage of NCAA Men’s Basketball. Success on the court has brought attention to the many programs VCU has to offer. One of these popular programs is Will Wade’s summer basketball camp. Teams come from all over the Atlantic region to attend the daylong team camp. With such wide-spread interest in the camp and about 50 teams signing up to participate annually and growing, how can VCU Athletics best handle and keep all of the information organized? The project deliverable was an online system that both registers teams …


Tatami: A Productive Work-Based Social Media, Jacob Kreiner, Jacob Holcombe, Minh Nguyen Jan 2016

Tatami: A Productive Work-Based Social Media, Jacob Kreiner, Jacob Holcombe, Minh Nguyen

Capstone Design Expo Posters

Tatami is a collaborative social media app created by Ippon Technologies that focuses on workflow and communication in an industry setting. Ippon wanted a product that allows members of a company to maximize productivity, and have a communal message board that shows what is going on in the company currently. Functionality of this product would allow a user to create an account, set up and edit their profile and be able to post messages to a workplace timeline. For a more specific and personal timeline we need users to be able to create and subscribe to groups and trends corresponding …


Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor Jan 2016

Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor

Capstone Design Expo Posters

As servers move to the cloud, sources for security analysis become more limited. Security teams must make the most of the resources available to them. Our project attempts to fulfill this need by providing a template-based application to analyze and detect security events in logs that are available in cloud environments. We focus on authentication logs, but analysis modules can be added to flag anomalies in any log.

The deliverables include log analysis, including successive repeated failures, location-based anomalies, and excessive failed login attempts across multiple accounts. To present our findings we output the results to a web interface for …


Hybrid Call Center: Amc Technology Llc, Tejas Trivedi, Joshua Stephens, Daniel Kim Jan 2016

Hybrid Call Center: Amc Technology Llc, Tejas Trivedi, Joshua Stephens, Daniel Kim

Capstone Design Expo Posters

AMC Technology wanted to add voice over IP (VoIP) functionality to Salesforce.com (Customer Relationship Management system). As it is currently, Salesforce.com does not have voice functionality, in that you cannot place or receive calls using Salesforce. Adding voice functionality to Salesforce is incredibly useful because it eliminates the need for hardware phones and allows for a more modern and efficient approach to calling for companies that have/rely upon call centers, such as customers of AMC Technology whose products connect CTIs (Computer Telephony Interface) and CRMs. We used a voice service called Twilio to provide functionality with Salesforce. AMC Technology wanted …


Restful Api Framework: Golang Proof Of Concept, Gerard Briones, David Igou, Aaron Throckmorton Jan 2016

Restful Api Framework: Golang Proof Of Concept, Gerard Briones, David Igou, Aaron Throckmorton

Capstone Design Expo Posters

Capital One has embarked on a journey of exposing useful services as RESTful APIs that can be utilized seamlessly by applications and clients. The purpose of this project was to develop an API framework that can be easily molded and deployed to reinforce this endeavor, standardizing the access and use of these services for every developer. This framework was built with a modern programming language, Golang, and excels in performance, scalability, and efficiency. A working prototype and proof of concept serve as the deliverables for this project, with notable constraints in the type of architecture (REST) used for the framework …


Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar Jan 2016

Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar

Capstone Design Expo Posters

The demand for more workers in tech related fields has given students the opportunity of choosing between multiple job offers and students can now be more deliberate about the jobs that they accept. Because of this employers also need to set themselves apart from other companies. Many companies do this is by sending out brochures, PDFs, and other information that may be outdated by the time it goes out. Our solution to this problem was to make an application which would provide relevant data to the user as well as provide insight into the company. The end result is a …


Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li Jan 2016

Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li

Theses and Dissertations--Electrical and Computer Engineering

Ever since the Kinect brought low-cost depth cameras into consumer market, great interest has been invigorated into Red-Green-Blue-Depth (RGBD) sensors. Without calibration, a RGBD camera’s horizontal and vertical field of view (FoV) could help generate 3D reconstruction in camera space naturally on graphics processing unit (GPU), which however is badly deformed by the lens distortions and imperfect depth resolution (depth distortion). The camera’s calibration based on a pinhole-camera model and a high-order distortion removal model requires a lot of calculations in the fragment shader. In order to get rid of both the lens distortion and the depth distortion …


Robot Fish Do Not Need Sentience, Antonio Chella Jan 2016

Robot Fish Do Not Need Sentience, Antonio Chella

Animal Sentience

The target article by Key (2016) discusses the thesis that fish cannot feel pain because of the lack of the necessary neural structure. This commentary suggests the possibility that fish do not need conscious neural processing by taking into account recent results from biomimetic robotics. State-of-the-art biomimetic robot fish are based on a tight interaction between the body and the environment and are typically controlled by behavior-based architectures. Therefore, it can be hypothesized that cognitive architectures are not needed to control a robot fish. This is in line with the thesis proposed by Key: what biomimetic robot fish show is …


Nsu College Engineering And Computing Curriculum 2016, Nova Southeastern University Jan 2016

Nsu College Engineering And Computing Curriculum 2016, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Kinematic Modeling Of An Automated Laser Line Scanning System, Kiran Sunil Deshmukh Jan 2016

Kinematic Modeling Of An Automated Laser Line Scanning System, Kiran Sunil Deshmukh

Wayne State University Theses

This research work describes the geometric coordinate transformation in an automated laser line scanning system caused by movements required for scanning a component surface. The elements of an automated laser scanning system (robot, laser line scanner, and the component coordinate system) function as a mechanical linkage to obtain a trajectory on a component surface. This methodology solves the forward kinematics, derives the component surface, and uses inverse kinematic equations to characterize the movement of the entire automated scanning system on point trajectory. To reach a point on the component, joint angles of robot have been calculated. As a result, trajectory …


Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi Jan 2016

Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi

Electronic Theses and Dissertations

Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is …


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …


Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan Jan 2016

Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan

Electronic Theses and Dissertations

The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …


On The Analytical Formulation Of Excess Noise In Avalanche Photodiodes With Dead Space, Erum Jamil, Jeng Shiuh Cheong, J.P.R. David, Majeed M. Hayat Jan 2016

On The Analytical Formulation Of Excess Noise In Avalanche Photodiodes With Dead Space, Erum Jamil, Jeng Shiuh Cheong, J.P.R. David, Majeed M. Hayat

Electrical and Computer Engineering Faculty Research and Publications

Simple, approximate formulas are developed to calculate the mean gain and excess noise factor for avalanche photodiodes using the dead-space multiplication theory in the regime of small multiplication width and high applied electric field. The accuracy of the approximation is investigated by comparing it to the exact numerical method using recursive coupled integral equations and it is found that it works for dead spaces up to 15% of the multiplication width, which is substantial. The approximation is also tested for real materials such as GaAs, InP and Si for various multiplication widths, and the results found are accurate within ∼ …


Robust Multi-Criteria Optimal Fuzzy Control Of Continuous-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz Jan 2016

Robust Multi-Criteria Optimal Fuzzy Control Of Continuous-Time Nonlinear Systems, Xin Wang, Edwin E. Yaz

Electrical and Computer Engineering Faculty Research and Publications

This paper presents a novel fuzzy control design of continuous-time nonlinear systems with multiple performance criteria. The purpose behind this work is to improve the traditional fuzzy controller performance to satisfy several performance criteria simultaneously to secure quadratic optimality with inherent stability property together with dissipativity type of disturbance reduction. The Takagi– Sugeno fuzzy model is used in our control system design. By solving the linear matrix inequality at each time step, the control solution can be found to satisfy the mixed performance criteria. The effectiveness of the proposed technique is demonstrated by simulation of the control of the inverted …