Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 917

Full-Text Articles in Computer Engineering

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun Oct 2019

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun

Houbing Song

Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.

In this paper, we propose a new CPS design ...


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this ...


Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad Sep 2019

Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad

Houbing Song

Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Sep 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Houbing Song

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more ...


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Sep 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Houbing Song

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results ...


Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen Sep 2019

Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen

David Dampier

The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.

The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques ...


Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen Jul 2019

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen

Ilker Karaca

The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)

Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states

Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)

Main explanatory variable: urban density obtained from the US Census figures

Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population


Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson Jun 2019

Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson

Farzad Hashemi

Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes ...


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jun 2019

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Ilker Karaca

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network ...


Distribution Of Bit Patterns In Binary Sequence Generated Over Sub Extension Field, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza Apr 2019

Distribution Of Bit Patterns In Binary Sequence Generated Over Sub Extension Field, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

Robert Henry Morelos-Zaragoza

The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the sequence generation research area by considering the sub extension field, whereas all our previous works are focused in the prime field. In terms of the distribution of bit patterns property, this research work has notable outcomes more specifically the binary sequence (defined over the sub ...


Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg Apr 2019

Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg

George K. Thiruvathukal

This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.


Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon Feb 2019

Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon

Travis Clamon

Library systems are becoming increasingly open, providing API’s that can deliver data in real-time. ETSU Library staff wanted a way to collect metrics from various systems and present it in one centralized dashboard. This presentation will cover our experiences with the project, including successes, challenges, and future goals.


Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon Feb 2019

Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon

Travis Clamon

OpenAthens is a hosted identity and access management service that provides a streamlined solution for implementing single sign-on authentication. This presentation will outline the steps East Tennessee State University took to configure OpenAthens authentication across the Alma, Primo, and EZproxy platforms. We will give a brief overview of the internal configurations related to LDAP integration, allocating electronic resources, and selectively assigning permissions. Finally, we will share our experiences with OpenAthens including support, vendor adoption, and end user benefits.


Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon Feb 2019

Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon

Travis Clamon

East Tennessee State University recently adopted Alma & Primo and was suprised by the lack of an A-Z database discovery module. Frustrated by having to maintain electronic resources separately on our library website and in Alma, we embarked on a goal to eliminate redundancy and use Alma/Primo exclusively. This presentation will cover our entire workflow in both Alma & Primo and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules ...


A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon Feb 2019

A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon

Travis Clamon

Frustrated by having to maintain an A-Z databases list separately on our library website and in Alma/Primo, East Tennessee State University embarked on a goal to eliminate redundancy by using Alma as our primary source of metadata for eResources. This presentation will cover our entire workflow and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules, scoping, and PNX display. The last section will cover the Alma API ...


Influence Propagation For Social Graph-Based Recommendations, Avni Gulati, Magdalini Eirinaki Jan 2019

Influence Propagation For Social Graph-Based Recommendations, Avni Gulati, Magdalini Eirinaki

Magdalini Eirinaki

Social networking is an inevitable behavior of humans living in a society. In recent years, and with the rise of online social networks, personalized recommendations that leverage the social aspect have become a very intriguing domain for researchers. In this work, we explore how influence propagation and the decay in the cascading effect of influence from influential users can be leveraged to generate social graph-based recommendations. Understanding how influence propagates within a social network is itself a challenging problem. Few researchers have considered influence propagation and even fewer have considered decay in the cascading effect of influence in a social ...


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Jan 2019

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

J. Philip Craiger, Ph.D.

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...


Should Robots Prosecute And Defend?, Stephen E. Henderson Dec 2018

Should Robots Prosecute And Defend?, Stephen E. Henderson

Stephen E Henderson

Even when we achieve the ‘holy grail’ of artificial intelligence—machine intelligence that is at least as smart as a human being in every area of thought—there may be classes of decisions for which it is intrinsically important to retain a human in the loop. On the common account of American criminal adjudication, the role of prosecutor seems to include such decisions given the largely unreviewable declination authority, whereas the role of defense counsel would seem fully susceptible of automation. And even for the prosecutor, the benefits of automation might outweigh the intrinsic decision-making loss, given that the ultimate ...


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco Oct 2018

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer Jul 2018

Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer

Sachin Pawaskar

The IoT communication over our data highways is growing tremendously. In future many device and machine manufacturers will transmit data from customer end-devices to data centers to improve and change the products to the customer’s needs. The focus of the next decades will be on reducing energy consumption and data overhead in order to keep utilization of 4G/5G networks low. This paper analyzes two different communication approaches often used in IoT scenarios. The benchmark compares the protocol MQTT against the RESTful approach which is based on HTTP(s) in terms of energy consumption and performance. The results of ...


A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah Jun 2018

A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah

Magdalini Eirinaki

In this paper we propose a novel, cloud-based framework to support citizens and city officials in the building permit process. The proposed framework is efficient, user-friendly, and transparent with a quick turn-around time for homeowners. Compared to existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of both the end user experience and the permitting and urban planning processes. This is enabled through a data mining-powered permit recommendation engine as well as a data analytics process that allow a gleaning of key ...


Hardware-Based Restricted Boltzmann Machine Implementation Using Probabilistic Spin Logic Devices, Adedoyin Adepegba May 2018

Hardware-Based Restricted Boltzmann Machine Implementation Using Probabilistic Spin Logic Devices, Adedoyin Adepegba

Adedoyin Adepegba

No abstract provided.


Work In Progress: Teaching Game Design And Robotics Together: A Natural Marriage Of Computing And Engineering Design In A First-Year Engineering Course, Adam R. Carberry, Ashish Amresh Apr 2018

Work In Progress: Teaching Game Design And Robotics Together: A Natural Marriage Of Computing And Engineering Design In A First-Year Engineering Course, Adam R. Carberry, Ashish Amresh

Ashish Amresh

The increased dependence on computer programming in engineering has made it essential for engineering students to learn about programming throughout their undergraduate education. In the same vein, computing students benefit when given an opportunity to learn more about engineering design and systematic thinking. This paper discusses how one college embedded computing and engineering into a combined first-year introductory course. The course fuses computing and engineering using game design and robotics as an offering for both cohorts of students to work together in a multidisciplinary environment. Over the course of the semester, students learn introductory computing and engineering design concepts by ...


Scrumtutor: A Web-Based Interactive Tutorial For Scrum Software Development, Sindhura Potineni, Srividya K. Bansal, Ashish Amresh Apr 2018

Scrumtutor: A Web-Based Interactive Tutorial For Scrum Software Development, Sindhura Potineni, Srividya K. Bansal, Ashish Amresh

Ashish Amresh

In a traditional software engineering class, students are typically engaged in theoretical lectures followed by homework assignments or a project. Use of hands-on training and laboratory activities using realworld projects is more likely to produce students with a higher level of achievement and more confidence in the course material. If every topic or technique introduced in the course has a corresponding hands-on activity that demonstrates an application or use of the concept in the industry, students better understand the need for the technique and the learning environment is more interactive, engaging, and interesting to students. This paper presents a project ...


The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister Apr 2018

The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister

Orlando McAllister

No abstract provided.


Social Recommendations For Personalized Fitness Assistance, Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi Mar 2018

Social Recommendations For Personalized Fitness Assistance, Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi

Magdalini Eirinaki

Wearable technology allows users to monitor their activity and pursue a healthy lifestyle through the use of embedded sensors. Such wearables usually connect to a mobile application that allows them to set their profile and keep track of their goals. However, due to the relatively “high maintenance” of such applications, where a significant amount of user feedback is expected, users who are very busy, or not as self-motivated, stop using them after a while. It has been shown that accountability improves commitment to an exercise routine. In this work, we present the PRO-Fit framework, a personalized fitness assistant aiming at ...


An Overview Of Santege Male Enhancement, Mystic Force Feb 2018

An Overview Of Santege Male Enhancement, Mystic Force

mystic force

The audit underneath is about a progressive male upgrade supplement that is known to give gigantic advantages and enhance your execution. You can totally depend on this item as it is made utilizing just the characteristic fixings. It gives you a greater erection size and battles male ripeness issues. Read on and discover more about this stunning item and prepare to encounter the unparalleled statures of euphoria and joy. Santege Male Enhancement isn't a customary item that gives enormous advantages to enhance your sexual coexistence. It is an exceptional equation that uses the intensity of regular herbs to improve ...


An Initial Report On The Impact Of Multiple Technical Degree Programs On Undergraduate Recruitment, Amber Settle, Liz Friedman Jan 2018

An Initial Report On The Impact Of Multiple Technical Degree Programs On Undergraduate Recruitment, Amber Settle, Liz Friedman

Amber Settle

In this paper, we describe initial results of a survey taken by freshman and first-year transfer students at DePaul University during the 2009-2010 academic year. While DePaul is unusual in offering a large number of technically-oriented degree programs and this information is prominent in promotional literature, no study of the impact of multiple degree programs on the recruitment of first-year students had been conducted. The results of this initial study show that while a large majority of students indicate that the number of degree programs is a positive factor for application and enrollment at DePaul, more important factors include the ...


What’S Motivation Got To Do With It? A Survey Of Recursion In The Computing Education Literature, Amber Settle Jan 2018

What’S Motivation Got To Do With It? A Survey Of Recursion In The Computing Education Literature, Amber Settle

Amber Settle

One of the most challenging topics for both computing educators and students is recursion. Pedagogical approaches for teaching recursion have appeared in the computing education literature for over 30 years, and the topic has generated a significant body of work. Given its persistence, relatively little attention has been paid to student motivation. This article summarizes results on teaching and learning recursion explored by the computing education community, noting the relative lack of interest in motivation. It concludes by briefly discussing an approach to teaching recursion is appealing for students interested in web development.