Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi Dec 2016

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi

Electronic Theses and Dissertations

Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by ongoing problems in social interaction and communication, and engagement in repetitive behaviors. According to Centers for Disease Control and Prevention, an estimated 1 in 68 children in the United States has ASD. Mounting evidence shows that many of these individuals display an interest in social interaction with computers and robots and, in general, feel comfortable spending time in such environments. It is known that the subtlety and unpredictability of people’s social behavior are intimidating and confusing for many individuals with ASD. Computerized learning environments and robots, however, prepare a ...


A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki Dec 2016

A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki

Electronic Theses and Dissertations

Stream processing frameworks are designed to process the streaming data that arrives in time. An example of such data is stream of emails that a user receives every day. Most of the real world data streams are also imbalanced as is in the stream of emails, which contains few spam emails compared to a lot of legitimate emails. The classification of the imbalanced data stream is challenging due to the several reasons: First of all, data streams are huge and they can not be stored in the memory for one time processing. Second, if the data is imbalanced, the accuracy ...


Design And Development Of The Ebear: A Socially Assistive Robot For Elderly People With Depression, Amirhossein Kargarbideh Jan 2016

Design And Development Of The Ebear: A Socially Assistive Robot For Elderly People With Depression, Amirhossein Kargarbideh

Electronic Theses and Dissertations

There has been tremendous progress in the field of robotics in the past decade and especially developing humanoid robots with social abilities that can assist human at a socio-emotional level. The objective of this thesis is to develop and study a perceptive and expressive animal-like robot equipped with artificial intelligence in assisting the elderly people with depression. We investigated how social robots can become companions of elderly individuals with depression and improve their mood and increase their happiness and well-being. The robotic platform built in this thesis is a bear-like robot called the eBear. The eBear can show facial expression ...


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.


Dynamic Thermal Management Of Vertically Stacked Heterogeneous Processors, Ajay Sharma Jan 2016

Dynamic Thermal Management Of Vertically Stacked Heterogeneous Processors, Ajay Sharma

Electronic Theses and Dissertations

No abstract provided.


Localization And Mapping Of Unknown Locations And Tunnels With Unmanned Ground Vehicles, Doris Turnage Jan 2016

Localization And Mapping Of Unknown Locations And Tunnels With Unmanned Ground Vehicles, Doris Turnage

Electronic Theses and Dissertations

The main goals of this research were to enhance a commercial off the shelf (COTS) software platform to support unmanned ground vehicles (UGVs) exploring the complex environment of tunnels, to test the platform within a simulation environment, and to validate the architecture through field testing. Developing this platform will enhance the U. S. Army Engineering Research and Development Center’s (ERDC’s) current capabilities and create a safe and efficient autonomous vehicle to perform the following functions within tunnels: (1) localization (e.g., position tracking) and mapping of its environment, (2) traversing varied terrains, (3) sensing the environment for objects ...


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID ...


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved ...


Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan Jan 2016

Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan

Electronic Theses and Dissertations

The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other ...


Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi Jan 2016

Sickle Blood Cell Detection Based On Image Segmentation, Kholoud Alotaibi

Electronic Theses and Dissertations

Red blood cells have a vital role in human health. Red blood cells have a circular shape and a concave surface and exchange the gasses between the inside and outside of the body. However, at times, these normally round cells become sickle shaped, which is an indication of sickle cell disease. This paper introduces a unique approach to detect sickle blood cells in blood samples using image segmentation and shape detection. This method is based on calculating the max axis and min axis of the cell. The form factor is computed using these properties to determine whether the cell is ...


Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao Jan 2016

Game Theoretical Approach For Joint Relay Selection And Resource Allocation In Mobile Device Networks, Runan Yao

Electronic Theses and Dissertations

With the improvement of hardware, more and more multimedia applications are allowed to run in the mobile device. However, due to the limited radio bandwidth, wireless network performance becomes a critical issue. Common mobile solutions are based on the centralized structure, which require an access point to handle all the communication requirement in the work area. The transmission performance of centralized framework relies on the density of access points. But increasing the number of access points will cost lot of money and the interference between access point will reduce the transmission quality. Thanks to the wireless sensor network implementations, the ...