Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 199

Full-Text Articles in Computer Engineering

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software ...


Effects Of Control Device And Task Complexity On Performance And Task Shedding During A Robotic Arm Task, Shelby K. Long Apr 2019

Effects Of Control Device And Task Complexity On Performance And Task Shedding During A Robotic Arm Task, Shelby K. Long

Psychology Theses & Dissertations

The use of robotic arms across domains is increasing, but the relationship between control features and performance is not fully understood. The goal of this research was to investigate the difference in task performance when using two different control devices at high and low task complexities when participants can shed tasks to automation. In this experiment, 40 undergraduates (24 females) used two control devices, a Leap Motion controller and an Xbox controller, to teleoperate a robotic arm in a high or low complexity peg placement task. Simultaneously, participants were tasked with scanning images for tanks. During the experiment, participants had ...


Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Disssertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information ...


A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda Apr 2019

A Framework For Test & Evaluation Of Autonomous Systems Along The Virtuality-Reality Spectrum, Nathan D. Gonda

Computational Modeling and Simulation Engineering Theses & Dissertations

Test & Evaluation of autonomous vehicles presents a challenge as the vehicles may have emergent behavior and it is frequently difficult to ascertain the reason for software decisions. Current Test & Evaluation approaches for autonomous systems place the vehicles in various operating scenarios to observe their behavior. However, this introduces dependencies between design and development lifecycle of the autonomous software and physical vehicle hardware. Simulation-based testing can alleviate the necessity to have physical hardware; however, it can be costly when transitioning the autonomous software to and from a simulation testing environment. The objective of this thesis is to develop a reusable framework for testing autonomous software such that testing can be conducted at various levels of mixed reality provided the framework components are sufficient to support data required by the autonomous software. The paper describes the design of the software framework and explores its application through use cases.


Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang Jan 2019

Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang

Computer Science Faculty Publications

Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.


Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs Jan 2019

Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs

Computational Modeling and Simulation Engineering Faculty Publications

Today's web-enabled and virtual approach to medical education is different from the 20th century's Flexner-dominated approach. Now, lectures get less emphasis and more emphasis is placed on learning via early clinical exposure, standardized patients, and other simulations. This article reviews literature on virtual patients (VPs) and their underlying virtual reality technology, examines VPs' potential through the example of psychiatric intake teaching, and identifies promises and perils posed by VP use in medical education.


A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan Dec 2018

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan

Distance Learning Faculty & Staff Books

The official Cisco DCICN book and practice exams are great resources, but this is not an easy exam. This study guide is a companion to those resources and summarizes the subject areas into additional review questions with an answer description for each item. This book is not a "braindump" and it is not bootleg screenshots of the actual exam. Instead, this book provides additional context and examples, serves to complement other study guides, and provides additional examples. If you are getting ready to take the exam for the first time, I hope that this guide provides the extra help to ...


Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu Oct 2018

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan Jul 2018

Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system ...


Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque Jul 2018

Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque

Computational Modeling and Simulation Engineering Theses & Dissertations

Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber ...


Anthropomorphically Inspired Design Of A Tendon-Driven Robotic Prosthesis For Hand Impairments, Manali Bapurao Bhadugale Apr 2018

Anthropomorphically Inspired Design Of A Tendon-Driven Robotic Prosthesis For Hand Impairments, Manali Bapurao Bhadugale

Mechanical & Aerospace Engineering Theses & Dissertations

This thesis presents the design of a robotic prosthesis, which mimics the morphology of a human hand. The primary goal of this work is to develop a systematic methodology that allows a custom-build of the prosthesis to match the specific requirements of a person with hand impairments. Two principal research questions are addressed toward this goal: 1) How do we cater to the large variation in the distribution of overall hand-sizes in the human population? 2) How closely do we mimic the complex morphological aspects of a biological hand in order to maximize the anthropomorphism (human-like appearance) of the robotic ...


Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky Apr 2018

Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky

Mechanical & Aerospace Engineering Theses & Dissertations

Quadrotors offer practical solutions for many applications, such as emergency rescue, surveillance, military operations, videography and many more. For this reason, they have recently attracted the attention of research and industry. Even though they have been intensively studied, quadrotors still suffer from some challenges that limit their use, such as trajectory measurement, attitude estimation, obstacle avoidance, safety precautions, and land cybersecurity. One major problem is flying in a confined environment, such as closed buildings and tunnels, where the aerodynamics around the quadrotor are affected by close proximity objects, which result in tracking performance deterioration, and sometimes instability. To address this ...


To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin Apr 2018

To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin

Computer Science Theses & Dissertations

When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications ...


Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman Jan 2018

Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman

VMASC Publications

We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module ...


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate ...


Humanoid Robots Supporting Children’S Learning In An Early Childhood Setting, Helen Crompton, Kristen Gregory, Diane Burke Jan 2018

Humanoid Robots Supporting Children’S Learning In An Early Childhood Setting, Helen Crompton, Kristen Gregory, Diane Burke

Teaching & Learning Faculty Publications

This qualitative study explored the affordances provided by the integration of the NAO humanoid robot in three preschool classrooms. Using the Head Start Early Learning Outcomes Framework as a lens, the researchers qualitatively analyzed data from focus groups, observations, field notes and student artifacts, using grounded coding to uncover language and communication, physical, cognitive and social–emotional learning experiences for children. The researchers also examined interactions between the robot, children and teachers to identify successes and challenges experienced during the integration. Findings indicate the robot provided opportunities for student development in all learning domains. Students were intellectually curious about the ...


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS ...


Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang Jan 2018

Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang

Computational Modeling and Simulation Engineering Faculty Publications

Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute ...


Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam Jan 2018

Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam

Electrical & Computer Engineering Theses & Disssertations

Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data ...


Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi Jan 2018

Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi

Electrical & Computer Engineering Theses & Disssertations

In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize ...


Characterization Of Language Cortex Activity During Speech Production And Perception, Hassan Baker Jan 2018

Characterization Of Language Cortex Activity During Speech Production And Perception, Hassan Baker

Electrical & Computer Engineering Theses & Disssertations

Millions of people around the world suffer from severe neuromuscular disorders such as spinal cord injury, cerebral palsy, amyotrophic lateral sclerosis (ALS), and others. Many of these individuals cannot perform daily tasks without assistance and depend on caregivers, which adversely impacts their quality of life. A Brain-Computer Interface (BCI) is technology that aims to give these people the ability to interact with their environment and communicate with the outside world. Many recent studies have attempted to decode spoken and imagined speech directly from brain signals toward the development of a natural-speech BCI. However, the current progress has not reached practical ...


Modeling Energy Consumption Of High-Performance Applications On Heterogeneous Computing Platforms, Gary D. Lawson Jr. Oct 2017

Modeling Energy Consumption Of High-Performance Applications On Heterogeneous Computing Platforms, Gary D. Lawson Jr.

Computational Modeling and Simulation Engineering Theses & Dissertations

Achieving Exascale computing is one of the current leading challenges in High Performance Computing (HPC). Obtaining this next level of performance will allow more complex simulations to be run on larger datasets and offer researchers better tools for data processing and analysis. In the dawn of Big Data, the need for supercomputers will only increase. However, these systems are costly to maintain because power is expensive. Thus, a better understanding of power and energy consumption is required such that future hardware can benefit.

Available power models accurately capture the relationship to the number of cores and clock-rate, however the relationship ...


Development Of A Data Acquisition System For Unmanned Aerial Vehicle (Uav) System Identification, Donald Joseph Lear Oct 2017

Development Of A Data Acquisition System For Unmanned Aerial Vehicle (Uav) System Identification, Donald Joseph Lear

Mechanical & Aerospace Engineering Theses & Dissertations

Aircraft system identification techniques are developed for fixed wing Unmanned Aerial Vehicles (UAV). The use of a designed flight experiment with measured system inputs/outputs can be used to derive aircraft stability derivatives. This project set out to develop a methodology to support an experiment to model pitch damping in the longitudinal short-period mode of a UAV. A Central Composite Response Surface Design was formed using angle of attack and power levels as factors to test for the pitching moment coefficient response induced by a multistep pitching maneuver.

Selecting a high-quality data acquisition platform was critical to the success of ...


Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee Jul 2017

Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee

Electrical & Computer Engineering Theses & Disssertations

Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a ...


Design Of A Virtual Laboratory For Automation Control, Zelin Zhu Jul 2017

Design Of A Virtual Laboratory For Automation Control, Zelin Zhu

Computational Modeling and Simulation Engineering Theses & Dissertations

In the past, only students who studied on campus were able to access laboratory equipment in traditional lab courses; distance learning students, enrolled in online courses, were at a disadvantage for they could learn basic lab experiment principles but could never experience hands-on learning. Modeling and simulation can be a powerful tool for generating virtual laboratories for distance learning students. This thesis describes the design and development of a virtual laboratory for automation control using mechanical, electrical, and pneumatic components for an automation and control course at Old Dominion University. This virtual laboratory application was implemented for two platforms — Windows ...


Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu Jun 2017

Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu

Electrical & Computer Engineering Faculty Publications

This work proposes a novel connectivity-based localization algorithm, well suitable for large-scale sensor networks with complex shapes and a non-uniform nodal distribution. In contrast to current state-of-the-art connectivity-based localization methods, the proposed algorithm is highly scalable with linear computation and communication costs with respect to the size of the network; and fully distributed where each node only needs the information of its neighbors without cumbersome partitioning and merging process. The algorithm is theoretically guaranteed and numerically stable. Moreover, the algorithm can be readily extended to the localization of networks with a one-hop transmission range distance measurement, and the propagation of ...


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud ...


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


Impact Of Trucking Network Flow On Preferred Biorefinery Locations In The Southern United States, Timothy M. Young, Lee D. Han, James H. Perdue, Stephanie R. Hargrove, Frank M. Guess, Xia Huang, Chung-Hao Chen Jan 2017

Impact Of Trucking Network Flow On Preferred Biorefinery Locations In The Southern United States, Timothy M. Young, Lee D. Han, James H. Perdue, Stephanie R. Hargrove, Frank M. Guess, Xia Huang, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The impact of the trucking transportation network flow was modeled for the southern United States. The study addresses a gap in existing research by applying a Bayesian logistic regression and Geographic Information System (GIS) geospatial analysis to predict biorefinery site locations. A one-way trucking cost assuming a 128.8 km (80-mile) haul distance was estimated by the Biomass Site Assessment model. The "median family income," "timberland annual growth-to-removal ratio," and "transportation delays" were significant in determining mill location. Transportation delays that directly impacted the costs of trucking are presented. A logistic model with Bayesian inference was used to identify preferred ...


Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li Jan 2017

Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li

Electrical & Computer Engineering Faculty Publications

Task engagement is defined as loadings on energetic arousal (affect), task motivation, and concentration (cognition) [1]. It is usually challenging and expensive to label cognitive state data, and traditional computational models trained with limited label information for engagement assessment do not perform well because of overfitting. In this paper, we proposed two deep models (i.e., a deep classifier and a deep autoencoder) for engagement assessment with scarce label information. We recruited 15 pilots to conduct a 4-h flight simulation from Seattle to Chicago and recorded their electroencephalograph (EEG) signals during the simulation. Experts carefully examined the EEG signals and ...