Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- File Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear
Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear
Undergraduate Research Symposium - Prescott
This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.
Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia …
Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley
Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley
Undergraduate Research Symposium - Prescott
High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small scale …
Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee
Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee
Undergraduate Research Symposium - Prescott
The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online chatbots, …
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
National Training Aircraft Symposium (NTAS)
Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.
Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …