Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (366)
- Electrical and Computer Engineering (331)
- Systems and Communications (186)
- Digital Communications and Networking (184)
- Computer Sciences (183)
-
- Computer and Systems Architecture (167)
- Electrical and Electronics (156)
- Other Electrical and Computer Engineering (147)
- Physics (129)
- Robotics (126)
- Optics (122)
- Electromagnetics and Photonics (115)
- Other Computer Engineering (85)
- Mechanical Engineering (75)
- Hardware Systems (71)
- Data Storage Systems (64)
- Social and Behavioral Sciences (59)
- VLSI and Circuits, Embedded and Hardware Systems (48)
- Ocean Engineering (47)
- Education (47)
- Oceanography (45)
- Operations Research, Systems Engineering and Industrial Engineering (45)
- Oceanography and Atmospheric Sciences and Meteorology (45)
- Business (44)
- Engineering Science and Materials (40)
- Power and Energy (37)
- Other Engineering (34)
- Digital Circuits (32)
- Keyword
-
- Security (16)
- Conference Papers (15)
- Presented Posters and Abstracts (14)
- Articles (14)
- My PHD. Dissertation (2006) (14)
-
- Robotics (14)
- Conference Proceedings (14)
- Wireless Networks (12)
- Information Retrieval (11)
- My Research (11)
- Software Testing & Formal Methods (11)
- Computer science (10)
- Remotely operated vehicles (10)
- Performance of Wireless Networks (10)
- Directional Antennas (10)
- Ubiquitous Computing (10)
- Underwater vehicles (9)
- Cyber-Physical Systems (9)
- Patents (9)
- Mobility (9)
- Manufacturing Interoperability (9)
- Software Methods (9)
- Network Control Systems (8)
- Cloud computing (8)
- Software Architecture (7)
- Security of Wireless Networks (7)
- Cyber Security (7)
- Renewable Energy Source (7)
- Inventive Problem Solving (7)
- Dependable Systems (7)
- Publication Year
- Publication
-
- Monish R. Chatterjee (47)
- Christopher N. Roman (46)
- Partha Banerjee (35)
- Dr. Adel A. Elbaset (31)
- Patrick Tague (26)
-
- Cécile Péraire (26)
- Oleg Sokolsky (25)
- Hong-Ning Dai (22)
- Russell C. Hardie (19)
- Steven R Ray (16)
- Pradeep K Khosla (16)
- George J. Pappas (14)
- Robert A Iannucci (13)
- Professor Aditya K. Ghose (12)
- Robert Oddy (12)
- Rahul Mangharam (12)
- Umakant Mishra (12)
- Professor Djilali IDOUGHI (11)
- Robert Henry Morelos-Zaragoza (11)
- Jerry C Schnepp (10)
- Aaron M. Hoover (10)
- Zheng Sun (10)
- Martin L Griss (10)
- Ronald Greenberg (9)
- Heather M Brotherton (9)
- Matt Schultz (9)
- Maurice Dawson (9)
- Jia Zhang (8)
- Magdalini Eirinaki (8)
- Fei Gao (8)
Articles 1 - 30 of 917
Full-Text Articles in Computer Engineering
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Houbing Song
Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.
In this paper, we propose a new CPS design ...
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
David Dampier
The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this ...
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Houbing Song
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Houbing Song
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more ...
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Houbing Song
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results ...
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
David Dampier
The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.
The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques ...
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Ilker Karaca
The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)
Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states
Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)
Main explanatory variable: urban density obtained from the US Census figures
Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Farzad Hashemi
Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes ...
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Ilker Karaca
This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network ...
Distribution Of Bit Patterns In Binary Sequence Generated Over Sub Extension Field, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza
Distribution Of Bit Patterns In Binary Sequence Generated Over Sub Extension Field, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza
Robert Henry Morelos-Zaragoza
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
George K. Thiruvathukal
This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.
Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon
Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon
Travis Clamon
Library systems are becoming increasingly open, providing API’s that can deliver data in real-time. ETSU Library staff wanted a way to collect metrics from various systems and present it in one centralized dashboard. This presentation will cover our experiences with the project, including successes, challenges, and future goals.
Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon
Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon
Travis Clamon
OpenAthens is a hosted identity and access management service that provides a streamlined solution for implementing single sign-on authentication. This presentation will outline the steps East Tennessee State University took to configure OpenAthens authentication across the Alma, Primo, and EZproxy platforms. We will give a brief overview of the internal configurations related to LDAP integration, allocating electronic resources, and selectively assigning permissions. Finally, we will share our experiences with OpenAthens including support, vendor adoption, and end user benefits.
Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon
Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon
Travis Clamon
East Tennessee State University recently adopted Alma & Primo and was suprised by the lack of an A-Z database discovery module. Frustrated by having to maintain electronic resources separately on our library website and in Alma, we embarked on a goal to eliminate redundancy and use Alma/Primo exclusively. This presentation will cover our entire workflow in both Alma & Primo and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules ...
A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon
A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon
Travis Clamon
Frustrated by having to maintain an A-Z databases list separately on our library website and in Alma/Primo, East Tennessee State University embarked on a goal to eliminate redundancy by using Alma as our primary source of metadata for eResources. This presentation will cover our entire workflow and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules, scoping, and PNX display. The last section will cover the Alma API ...
Influence Propagation For Social Graph-Based Recommendations, Avni Gulati, Magdalini Eirinaki
Influence Propagation For Social Graph-Based Recommendations, Avni Gulati, Magdalini Eirinaki
Magdalini Eirinaki
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
J. Philip Craiger, Ph.D.
Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.
Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...
Should Robots Prosecute And Defend?, Stephen E. Henderson
Should Robots Prosecute And Defend?, Stephen E. Henderson
Stephen E Henderson
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2018, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2017, Buenaventura "Ven" Basco
Buenaventura "Ven" Basco
No abstract provided.
Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer
Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer
Sachin Pawaskar
A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah
A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah
Magdalini Eirinaki
Hardware-Based Restricted Boltzmann Machine Implementation Using Probabilistic Spin Logic Devices, Adedoyin Adepegba
Hardware-Based Restricted Boltzmann Machine Implementation Using Probabilistic Spin Logic Devices, Adedoyin Adepegba
Adedoyin Adepegba
No abstract provided.
Work In Progress: Teaching Game Design And Robotics Together: A Natural Marriage Of Computing And Engineering Design In A First-Year Engineering Course, Adam R. Carberry, Ashish Amresh
Work In Progress: Teaching Game Design And Robotics Together: A Natural Marriage Of Computing And Engineering Design In A First-Year Engineering Course, Adam R. Carberry, Ashish Amresh
Ashish Amresh
The increased dependence on computer programming in engineering has made it essential for engineering students to learn about programming throughout their undergraduate education. In the same vein, computing students benefit when given an opportunity to learn more about engineering design and systematic thinking. This paper discusses how one college embedded computing and engineering into a combined first-year introductory course. The course fuses computing and engineering using game design and robotics as an offering for both cohorts of students to work together in a multidisciplinary environment. Over the course of the semester, students learn introductory computing and engineering design concepts by ...
Scrumtutor: A Web-Based Interactive Tutorial For Scrum Software Development, Sindhura Potineni, Srividya K. Bansal, Ashish Amresh
Scrumtutor: A Web-Based Interactive Tutorial For Scrum Software Development, Sindhura Potineni, Srividya K. Bansal, Ashish Amresh
Ashish Amresh
In a traditional software engineering class, students are typically engaged in theoretical lectures followed by homework assignments or a project. Use of hands-on training and laboratory activities using realworld projects is more likely to produce students with a higher level of achievement and more confidence in the course material. If every topic or technique introduced in the course has a corresponding hands-on activity that demonstrates an application or use of the concept in the industry, students better understand the need for the technique and the learning environment is more interactive, engaging, and interesting to students. This paper presents a project ...
The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister
The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister
Orlando McAllister
No abstract provided.
Social Recommendations For Personalized Fitness Assistance, Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi
Social Recommendations For Personalized Fitness Assistance, Saumil Dharia, Magdalini Eirinaki, Vijesh Jain, Jvalant Patel, Iraklis Varlamis, Jainikkumar Vora, Rizen Yamauchi
Magdalini Eirinaki
An Overview Of Santege Male Enhancement, Mystic Force
An Overview Of Santege Male Enhancement, Mystic Force
mystic force
An Initial Report On The Impact Of Multiple Technical Degree Programs On Undergraduate Recruitment, Amber Settle, Liz Friedman
An Initial Report On The Impact Of Multiple Technical Degree Programs On Undergraduate Recruitment, Amber Settle, Liz Friedman
Amber Settle
In this paper, we describe initial results of a survey taken by freshman and first-year transfer students at DePaul University during the 2009-2010 academic year. While DePaul is unusual in offering a large number of technically-oriented degree programs and this information is prominent in promotional literature, no study of the impact of multiple degree programs on the recruitment of first-year students had been conducted. The results of this initial study show that while a large majority of students indicate that the number of degree programs is a positive factor for application and enrollment at DePaul, more important factors include the ...
What’S Motivation Got To Do With It? A Survey Of Recursion In The Computing Education Literature, Amber Settle
What’S Motivation Got To Do With It? A Survey Of Recursion In The Computing Education Literature, Amber Settle
Amber Settle
One of the most challenging topics for both computing educators and students is recursion. Pedagogical approaches for teaching recursion have appeared in the computing education literature for over 30 years, and the topic has generated a significant body of work. Given its persistence, relatively little attention has been paid to student motivation. This article summarizes results on teaching and learning recursion explored by the computing education community, noting the relative lack of interest in motivation. It concludes by briefly discussing an approach to teaching recursion is appealing for students interested in web development.