Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Iowa State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 310

Full-Text Articles in Computer Engineering

Mindset For Software Architecture Students, Lotfi Ben Othmane, Monica H. Lamm Jul 2019

Mindset For Software Architecture Students, Lotfi Ben Othmane, Monica H. Lamm

Electrical and Computer Engineering Conference Papers, Posters and Presentations

Software architecture students need to believe that they can change their abilities in order to become proficient with software architecture design. Addressing students’ beliefs about their capabilities introduces the realm of mindset. This paper reports about a survey that we conducted in a large university to study a set of factors associated with the students’ mindset. The study found that the students’ mindsets weakly correlates with their cognitive levels and are associated with their expectations from the course. In addition, it found that the students who prefer practicing software architecture have more open mindset than the ones who prefer quizzes ...


Scalable Subgraph Counting: The Methods Behind The Madness, Comandur Seshadhri, Srikanta Tirthapura May 2019

Scalable Subgraph Counting: The Methods Behind The Madness, Comandur Seshadhri, Srikanta Tirthapura

Electrical and Computer Engineering Conference Papers, Posters and Presentations

Subgraph counting is a fundamental problem in graph analysis that finds use in a wide array of applications. The basic problem is to count or approximate the occurrences of a small subgraph (the pattern) in a large graph (the dataset). Subgraph counting is a computationally challenging problem, and the last few years have seen a rich literature develop around scalable solutions for it. However, these results have thus far appeared as a disconnected set of ideas that are applied separately by different research groups. We observe that there are a few common algorithmic building blocks that most subgraph counting results ...


Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty Jan 2019

Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty

Creative Components

In the past few years, Network Function Virtualization (NFV) has been widely used to reduce the operational and capital costs of implementing network functions with better performance and easier network management. NFV is a network architecture completely built relying on Virtual Network Functions (VNFs). Quite a few developments have been done for the optimization of resource allocation to implement VNFs in various networks. In this report, an algorithm for reducing the cost of placing the VNFs within a Multicast network along with a choice of selecting the precedence of the VNFs is presented. The proposed approach is formulated as a ...


Android Third-Party Library Detection, Brody Concannon Jan 2019

Android Third-Party Library Detection, Brody Concannon

Creative Components

No abstract provided.


Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle Jan 2019

Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle

Creative Components

No abstract provided.


Embedding Runtime Verification Post-Deployment For Real-Time Health Management Of Safety-Critical Systems, Brian Christopher Schwinkendorf Kempa Jan 2019

Embedding Runtime Verification Post-Deployment For Real-Time Health Management Of Safety-Critical Systems, Brian Christopher Schwinkendorf Kempa

Graduate Theses and Dissertations

As cyber-physical systems increase in both complexity and criticality, formal methods have gained traction for design-time verification of safety properties.

A lightweight formal method, runtime verification (RV), embeds checks necessary for safety-critical system health management; however, these techniques have been slow to appear in practice despite repeated calls by both industry and academia to leverage them.

Additionally, the state-of-the-art in RV lacks a best practice approach when a deployed system requires increased flexibility due to a change in mission, or in response to an emergent condition not accounted for at design time.

Human-robot interaction necessitates stringent safety guarantees to protect ...


Analyzing Energy Savings In An Fpga Video Processing System Using Dynamic Partial Reconfiguration, Robert Cole Wernsman Jan 2019

Analyzing Energy Savings In An Fpga Video Processing System Using Dynamic Partial Reconfiguration, Robert Cole Wernsman

Graduate Theses and Dissertations

Dynamic Partial Reconfiguration (DPR) can be a useful tool for maximizing FPGA performance while minimizing power consumption and FPGA size requirements. This work explores the application of the DPR technique in a computer vision application that implements two different edge detection algorithms (FASTX and Sobel). This technique could allow for a similar computer vision system to be realized on a smaller, low-power chipset. Different algorithms can have unique characteristics that yield better performance in certain scenarios; the best algorithm for the current scenario may change during runtime. However, implementing all available algorithms in hardware increases the space and power requirements ...


Incremental And Parallel Algorithms For Dense Subgraph Mining, Apurba Das Jan 2019

Incremental And Parallel Algorithms For Dense Subgraph Mining, Apurba Das

Graduate Theses and Dissertations

The task of maintaining densely connected subgraphs from a continuously evolving graph is important because it solves many practical problems that require constant monitoring over the continuous stream of linked data often represented as a graph. For example, continuous maintenance of a certain group of closely connected nodes can reveal unusual activity over the transaction network, identification, and evolution of active groups in the social network, etc. On the other hand, mining these structures from graph data is often expensive because of the complexity of the computation and the volume of the structures (the number of densely connected structures can ...


An Efficient Framework For Privacy-Preserving Computations On Encrypted Iot Data, Shruthi Ramesh Jan 2019

An Efficient Framework For Privacy-Preserving Computations On Encrypted Iot Data, Shruthi Ramesh

Graduate Theses and Dissertations

There are two fundamental expectations from Cloud-IoT applications using sensitive and personal data: data utility and user privacy. With the complex nature of cloud-IoT ecosystem, there is a growing concern about data utility at the cost of privacy. While the current state-of-the-art encryption schemes protect users’ privacy, they preclude meaningful computations on encrypted data. Thus, the question remains “how to help IoT device users benefit from cloud computing without compromising data confidentiality and user privacy”? Cloud service providers (CSP) can leverage Fully homomorphic encryption (FHE) schemes to deliver privacy-preserving services. However, there are limitations in directly adopting FHE-based solutions for ...


The Use Of Agricultural Robots In Weed Management And Control, Brian L. Steward, Jingyao Gai, Lie Tang Jan 2019

The Use Of Agricultural Robots In Weed Management And Control, Brian L. Steward, Jingyao Gai, Lie Tang

Agricultural and Biosystems Engineering Publications

Weed management and control are essential for the production of high-yielding and high-quality crops, and advances in weed control technology have had a huge impact on agricultural productivity. Any effective weed control technology needs to be both robust and adaptable. Robust weed control technology will successfully control weeds in spite of variability in the field conditions. Adaptable weed control technology has the capacity to change its strategy in the context of evolving weed populations, genetics, and climatic conditions. This chapter focuses on key work in the development of robotic weeders, including weed perception systems and weed control mechanisms. Following an ...


Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani Jan 2019

Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani

Electrical and Computer Engineering Publications

As DRAM technology continues to evolve towards smaller feature sizes and increased densities, faults in DRAM subsystem are becoming more severe. Current servers mostly use CHIPKILL based schemes to tolerate up-to one/two symbol errors per DRAM beat. Multi-symbol errors arising due to faults in multiple data buses and chips may not be detected by these schemes. In this paper, we introduce Single Symbol Correction Multiple Symbol Detection (SSCMSD) - a novel error handling scheme to correct single-symbol errors and detect multi-symbol errors. Our scheme makes use of a hash in combination with Error Correcting Code (ECC) to avoid silent data ...


Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr. Nov 2018

Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr.

Statistics Preprints

Warranty return data from repairable systems, such as vehicles, usually result in recurrent event data. The non-homogeneous Poisson process (NHPP) model is used widely to describe such data. Seasonality in the repair frequencies and other variabilities, however, complicate the modeling of recurrent event data. Not much work has been done to address the seasonality, and this paper provides a general approach for the application of NHPP models with dynamic covariates to predict seasonal warranty returns. A hierarchical clustering method is used to stratify the population into groups that are more homogeneous than the than the overall population. The stratification facilitates ...


An Introduction To Fitting And Evaluating Mixed-Effects Models In R, Charles Nagle Sep 2018

An Introduction To Fitting And Evaluating Mixed-Effects Models In R, Charles Nagle

World Languages and Cultures Conference Papers, Posters and Proceedings

Mixed-effects modeling is a multidimensional statistical analysis capable of modeling complex relationships between predictor and outcome variables while accounting for random variance in various dimensions of the data. Although this technique is gaining popularity in applied linguistics research, learning how to model, and how to do so in R, can be intimidating. This guide provides an introduction to fitting mixed-effects models in R (Version 3.5.3) using RStudio. It includes a written introduction describing the modeling process, a video tutorial that focuses on getting started in RStudio, a sample data set, and an R script containing code to analyze ...


Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli Aug 2018

Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli

Iowa State University Articles and Manuscripts

Learning Analytics in Higher Education provides a foundational understanding of how learning analytics is defined, what barriers and opportunities exist, and how it can be used to improve practice, including strategic planning, course development, teaching pedagogy, and student assessment. Well-known contributors provide empirical, theoretical, and practical perspectives on the current use and future potential of learning analytics for student learning and data-driven decision-making, ways to effectively evaluate and research learning analytics, integration of learning analytics into practice, organizational barriers and opportunities for harnessing Big Data to create and support use of these tools, and ethical considerations related to privacy and ...


Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson Jun 2018

Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson

Natural Resource Ecology and Management Conference Papers, Posters and Presentations

Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes ...


Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen Jan 2018

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen

Finance Conference Papers, Posters, and Proceedings

The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)

Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states

Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)

Main explanatory variable: urban density obtained from the US Census figures

Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population


Sense Of Belonging In Computing: The Role Of Introductory Courses For Women And Underrepresented Minority Students, Linda J. Sax, Jennifer M. Blaney, Kathleen J. Lehman, Sarah L. Rodriguez, Kari L. George, Christina Zavala Jan 2018

Sense Of Belonging In Computing: The Role Of Introductory Courses For Women And Underrepresented Minority Students, Linda J. Sax, Jennifer M. Blaney, Kathleen J. Lehman, Sarah L. Rodriguez, Kari L. George, Christina Zavala

Education Publications

This study examines an aspect of gender and racial/ethnic gaps in undergraduate computing by focusing on sense of belonging among women and underrepresented minority (URM) introductory computing students. We examine change in sense of belonging during the introductory course as well as the predictors of belonging, with attention to conditional effects by gender and URM status. Results show that sense of belonging outcomes are a product of both incoming student characteristics and college environments and experiences, highlighting the important role the computing faculty play in fostering belonging. These and other findings are discussed, focusing on sense of belonging among ...


Investigating The Use Of Bayesian Networks For Small Dataset Problems, Anastacia Maria Macallister Jan 2018

Investigating The Use Of Bayesian Networks For Small Dataset Problems, Anastacia Maria Macallister

Graduate Theses and Dissertations

Benefits associated with machine learning are extensive. Industry is increasingly beginning to recognize the wealth of information stored in the data they are collecting. To sort through and analyze all of this data specialized tools are required to come up with actionable strategies. Often this is done with supervised machine learning algorithms. While these algorithms can be extremely powerful data analysis tools, they require considerable understanding, expertise, and a significant amount of data to use. Selecting the appropriate data analysis method is important to coming up with valid strategies based on the collected data. In addition, a characteristic of machine ...


Variance-Optimal Offline And Streaming Stratified Random Sampling, Trong Duc Nguyen, Ming-Hung Shih, Divesh Srivastava, Srikanta Tirthapura, Bojian Xu Jan 2018

Variance-Optimal Offline And Streaming Stratified Random Sampling, Trong Duc Nguyen, Ming-Hung Shih, Divesh Srivastava, Srikanta Tirthapura, Bojian Xu

Electrical and Computer Engineering Publications

Stratified random sampling (SRS) is a fundamental sampling technique that provides accurate estimates for aggregate queries using a small size sample, and has been used widely for approximate query processing. A key question in SRS is how to partition a target sample size among different strata. While Neyman's allocation provides a solution that minimizes the variance of an estimate using this sample, it works under the assumption that each stratum is abundant, i.e. has a large number of data points to choose from. This assumption may not hold in general: one or more strata may be bounded, and ...


Dynamic And System Agnostic Malware Detection Via Machine Learning, Michael Sgroi, Doug Jacobson Jan 2018

Dynamic And System Agnostic Malware Detection Via Machine Learning, Michael Sgroi, Doug Jacobson

Creative Components

This paper discusses malware detection in personal computers. Current malware detection solutions are static. Antiviruses rely on lists of malicious signatures that are then used in file scanning. These antiviruses are also very dependent on the operating system, requiring different solutions for different systems. This paper presents a solution that detects malware based on runtime attributes. It also emphasizes that these attributes are easily accessible and fairly generic meaning that it functions across systems and without specialized information. The attributes are used in a machine learning system that makes it flexible for retraining if necessary, but capable of handling new ...


Exploration Of Audio Synthesizers, Timothy Lindquist Jan 2018

Exploration Of Audio Synthesizers, Timothy Lindquist

Creative Components

No abstract provided.


Row Hammer Exploit In Cloud Environment, Adithya Venkataraman Jan 2018

Row Hammer Exploit In Cloud Environment, Adithya Venkataraman

Creative Components

The rapid increase in the adoption rate of cloud computing, across numerous businesses, has resulted in extensive use of virtualization tools. Virtualization technology utilizes a software layer (hypervisor) to enable sharing of hardware between multiple tenants that are co-located on the same multi-processor system. This enables the consolidation of servers and user machines into a very small set of physical systems. Physical machines are replaced with virtual machines (VM), running on the same physical system, to achieve better utilization of the hardware. Consequently, cloud users work on and store their data in the same physical machine.

A crucial part of ...


Continuous User Authentication Via Random Forest, Ting-Wei Chang Jan 2018

Continuous User Authentication Via Random Forest, Ting-Wei Chang

Creative Components

No abstract provided.


Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula Jan 2018

Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula

Creative Components

There is an increasing demand to utilize modern technology in the eld of transportation to help decrease congestion on roads so that proper measures can be pursued to facilitate lower travel times and an effective utilization of the transportation network. This project aims to develop a solution for real time detection of traffic congestion on a road. The solution captures images from the live feed of traffic cameras situated at various locations and runs a deep learning algorithm to detect whether an image shows traffic congestion. Using a set of these images and a persistence check, the application identifies the ...


Iseman: A Management And Deployment Interface For Lab-Based Activities Within Iserink, Alex Luehm Jan 2018

Iseman: A Management And Deployment Interface For Lab-Based Activities Within Iserink, Alex Luehm

Creative Components

ISERink is an isolated virtual environment built within the vSphere virtualization platform in which users can safely perform various cyber security exercises without fear of damaging real-world machines. In the past it has been successfully used in cyber defense competitions to provide a network setting similar to that of the real Internet, while safely containing any rogue malicious traffic. Recently the ISERink environment has been deployed within the academic setting alongside ISELab to provide students with a safe and controlled environment in which to practice building, securing, and attacking networks in a structured lab setting in conjunction with guided lectures ...


Chip: Clustering Hotspots In Layout Using Integer Programming, Rohit Reddy Takkala Jan 2018

Chip: Clustering Hotspots In Layout Using Integer Programming, Rohit Reddy Takkala

Creative Components

No abstract provided.


A Simple Moving Target Defense For Power Grid Security Using Network Address Translation, Jacob Ulrich Jan 2018

A Simple Moving Target Defense For Power Grid Security Using Network Address Translation, Jacob Ulrich

Creative Components

No abstract provided.


Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda Jan 2018

Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda

Creative Components

The Department of Residence (DoR) at Iowa State University houses over 13,000 students, and employs over 300 staff members. Department of Residence’s IT team is in charge of taking care of Information systems assets (data, servers, systems, IP Phones, networking devices, VMs and printers) that are used by the students and the staff members. It is imperative for the DoR to reduce total IT spending, and also to secure the infrastructure to keep hackers and cyber criminals at bay. Various cybersecurity solutions were discussed, and we finally decided to implement CIS-Security Framework. It was one of the most ...


Creating A Malware Analysis Lab And Basic Malware Analysis, Joseph Peppers Jan 2018

Creating A Malware Analysis Lab And Basic Malware Analysis, Joseph Peppers

Creative Components

No abstract provided.


Existence Of Dependency-Based Attacks In Nodejs Environment, Prachi R. Patel Jan 2018

Existence Of Dependency-Based Attacks In Nodejs Environment, Prachi R. Patel

Creative Components

Node.js is an open source server-side run-time platform for JavaScript applications. Node.js applications are dependent on several, even hundreds, packages, which in turn have many dependencies. There is always a risk of malicious code hidden in one of these dependencies.

This work analyzes vulnerabilities found in Node.js based applications, discusses basic types of attacks and reports about the assessment of five frequently-used Node.js packages.