Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2018

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 35

Full-Text Articles in Computer Engineering

3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock Nov 2018

3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock

Posters-at-the-Capitol

Everyone in a college environment is immersed in their electronic devices. Whether it be in the quad, the classroom, the library or their favorite nook by the windows, they all need a reliable Wi-Fi signal to get their work done. In this era most of the tasks that has to be completed require some sort of connection between electronic devices especially if the individuals require information located on the internet. The main method of accessing the internet is using Wifi technology which uses electromagnetic waves to propagate information across a certain area. Considering the properties of these electromagnetic frequencies it …


Cloud Oriented Additive Technology Use For Fast Prototype Development, Betim Shabani, Vladimir Dukovski Oct 2018

Cloud Oriented Additive Technology Use For Fast Prototype Development, Betim Shabani, Vladimir Dukovski

UBT International Conference

Digitalization has already affected every segment of the industry and especially manufacturing. Based on market requires that are more specific and faster than ever, there is a need to use some of the online platform packages called Cloud Manufacturing (CM). CM operate through the digital data then here comes the expression CAD models or in particular STL files that are currently adequate for Additive Technologies (AT). On the other hand, there is a rapid increase in the measurement aspects via non-contact forms (3D scanners) where their data are stored in various digital formats: IGES, OBJ, PLY, etc.). Those formats can …


Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati Oct 2018

Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati

UBT International Conference

A comparison of an application’s performance, when a program is executed through multiple threads and only a thread to complete a specified task by using Java techniques. In this paper will be expounded how a Java programmer can profit by technology facilities. How to create a program that executes in a parallel way, that solves independent tasks not one after the other, but all at the same time. The application that is developed(the environment used is Eclipse) aims to speed up the time needed to download images from a specific website, but it is flexible for downloading images also from …


Performance Analysis Of Java Persistence Api Providers, Besart Pllana Oct 2018

Performance Analysis Of Java Persistence Api Providers, Besart Pllana

UBT International Conference

Nowadays, fast and accurate access to data is very important. Usually data is managed and processed through software applications. In recent years, the most preferred programming model by most application developers is Object Oriented Programming (OOP) where data is represented through objects. These data must be persistent and therefore needs to be stored, and storage can be done on a variety of databases. The most common databases are Relational Database Management Systems (RDBMS). While persistence of objects in RDBMS is limited by object-relational mismatch which is the inconsistency of the direct interaction between two components based on different approaches, OOP …


The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica Oct 2018

The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica

UBT International Conference

Digital image processing is an area that finds many applications in three-dimensional graphics. One of the subjects considered in image processing is detection of moving objects. In this paper, we have analyzed the performance of an algorithm that detects a moving object. The performance relates to the speed of moving object during a pre-determined time interval. The methodology supports Matlab integrated with built-in functions. Specifically, as input of the simulation model is a video material containing moving objects. The model reads a video file presenting moving objects; after the model is executed in Matlab, the output emits moving objects associated …


The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku Oct 2018

The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku

UBT International Conference

Computer Aided Design (CAD) and Computer Aided Engineering (CAE) are the most important technology tools that today designers are using in development of product (design and in process of optimization). Thus, this study is carried out to present the importance of CAD/CAE system on process of design and process of optimization of spur gear. The paper presents the usage of CAD system for modeling parts and CAE software for analysis of stress-strain of spur gear and the results of calculation of pair spur-gears that it used in the gearbox transmission of the bucket wheel excavator located in “Bardhi i Madh …


Designing A Controller Via Simulated Annealing, Zemerart Asani, Selvet Rexhepi Oct 2018

Designing A Controller Via Simulated Annealing, Zemerart Asani, Selvet Rexhepi

UBT International Conference

With Proportional-Integral-Derivative (PID) controllers being widely used in industry for optimum solutions. Optimization of the PID controller is an important problem in Control Engineering. Therefore, in this paper work we have implemented Simulated Annealing to tune the controller parameters. Optimizing the controller parameters on the basis of the Simulated Annealing algorithm, based on criteria defined using an objective function, allows us to find optimal solutions for the controller parameters that give us minimum error. In terms of performance, the PID controller designed with Simulated Annealing gives us great results with regard to the rise time, settling time, overshoot and steady-state …


Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi Oct 2018

Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi

UBT International Conference

Network virtualisation is a concept that has been around for some time now, but the concept of network slicing is more recent and only started to be mentioned in the context of 5G. In essence, network slicing is a specific form of network virtualisation that enables sharing of physical resources by multiple logical network slices used to serve different applications and use cases. One such a use case would be to allocate network resources to small things, e.g. sensors and very low power consumption objects. To allow these small objects access to network resources or to a slice of such …


Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti Oct 2018

Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti

UBT International Conference

Companies are addressing the Cloud Computing issue more actively recently, as a part of a move towards a more agile and flexible IT infrastructure since benefitting from an IT infrastructure that is flexible, scalable, high-performance and up-to-date is no longer a luxury or the exception to a rule. The issue they address is “Which is the best strategy?” Of course, this is not a simple issue given that the cloud can impact an organization’s application picture across several dimensions. When an organizations made the decision to consider cloud services for its application or infrastructure deployment, it’s important to understand the …


Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia Oct 2018

Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia

UBT International Conference

Paper presents the simulation models built within an airport ground crew scheduling automatization project at a regional airport. Our goal was to develop robust ground crew task scheduling and shift generation algorithms that would improve on existing heuristic rules. We have utilized simulation modeling to develop and validate the algorithms, starting with a model of the existing scheduling process coded and visualized in spreadsheet software and ending with a hybrid Discrete Event and Agent Based model used for the visualization and verification of the optimized processes. Explicit and tacit expert knowledge was recorded through meetings with airport personnel managers and …


An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic Oct 2018

An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic

UBT International Conference

This paper presents some advantages of using social media and social networks as an efficient way of Central Banks communication with target audience. The statistics given in this paper presents some leading banks based on number of followers on Twitter in 2018, showing that Indonesia’s Central Bank has more Twitter followers than any other monetary authority, beating out the Banco de Mexico, Federal Reserve, European Central Bank and Reserve Bank of India. In this paper some prediction of number of Twitter followers in Central Bank communication is also contributed, based on Weighted Least Squares method. An algorithm is implemented in …


Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini Oct 2018

Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini

UBT International Conference

Euclid’s algorithm remains to be the most efficient method for finding greatest common divisor of two full numbers. By using the meaning of congruences this research paper will make a modification in the note of the Euclid’s algorithm. Here are discussed both classic and modified methods, by putting appropriate codes and observe the duration of the calculation through the computer.


Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson Oct 2018

Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson

UBT International Conference

According to a vision for eHealth that was launched in 2016 by the Swedish Government, Sweden will be leading the way in using the potential of digitalization and eHealth to help people achieve a good and equal health. To achieve this vision, we argue that initiatives in eHealth need to augment the traditional health perspective. This implies a more preventive approach that transforms the health concept to a continuous participative process over the life course. A stronger emphasis is needed to develop high quality mobile and web based systems in order to empower people to pursue a healthy lifestyle. A …


Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo Oct 2018

Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo

UBT International Conference

There are so many applications and data that flow during our daily activities, either personal or institutional ones. Also the companies and business do transactions or their real operations through the Web and other Internet facilities. Security breaches are costing individuals or companies millions so information security has to be a major priority. There are several forms of security technology available, but encryption is one that everyday computer users should know about. Encryption and the performance of cryptographic algorithms are variable according to implemented platforms, software and hardware components or application scenarios. According to specific security metrics and requirements we …


Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear Oct 2018

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia …


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley Oct 2018

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small scale …


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee Oct 2018

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online chatbots, …


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Aug 2018

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

National Training Aircraft Symposium (NTAS)

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …


Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor Aug 2018

Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor

The Summer Undergraduate Research Fellowship (SURF) Symposium

There is a global lack of a means for monitoring air pollutant levels at a local level due to expensive and bulky instrument requirements. It is important to monitor toxic gas levels, as well as particulate matter levels, in the atmosphere to study their effects on human health and to further develop city- and community-level air pollution solutions. In this study, with the means of a Raspberry Pi, low-cost Alphasense Optical Particle Counter and gas sensors, and methodical calibration techniques, we built a portable 3-D printed module powered by clean electricity generated by an on-board Voltaic solar cell that measures …


Remote Sensing Using I-Band And S-Band Signals Of Opportunity, Kadir Efecik, Benjamin R. Nold, James L. Garrison Aug 2018

Remote Sensing Using I-Band And S-Band Signals Of Opportunity, Kadir Efecik, Benjamin R. Nold, James L. Garrison

The Summer Undergraduate Research Fellowship (SURF) Symposium

Measurement of soil moisture, especially the root zone soil moisture, is important in agriculture, meteorology, and hydrology. Root zone soil moisture is concerned with the first meter down the soil. Active and passive remote sensing methods used today utilizing L-band(1-2GHz) are physically limited to a sensing depth of about 5 cm or less. To remotely sense the soil moisture in the deeper parts of the soil, the frequency should be lowered. Lower frequencies cannot be used in active spaceborne instruments because of their need for larger antennas, radio frequency interference (RFI), and frequency spectrum allocations. Ground-based passive remote sensing using …


Micro-Manipulation Using Learned Model, Matthew A. Lyng, Benjamin V. Johnson, David J. Cappelleri Aug 2018

Micro-Manipulation Using Learned Model, Matthew A. Lyng, Benjamin V. Johnson, David J. Cappelleri

The Summer Undergraduate Research Fellowship (SURF) Symposium

Microscale devices can be found in applications ranging from sensors to structural components. The dominance of surface forces at the microscale hinders the assembly processes through nonlinear interactions that are difficult to model for automation, limiting designs of microsystems to primarily monolithic structures. Methods for modeling surface forces must be presented for viable manufacturing of devices consisting of multiple microparts. This paper proposes the implementation of supervised machine learning models to aid in automated micromanipulation tasks for advanced manufacturing applications. The developed models use sets of training data to implicitly model surface interactions and predict end-effector placement and paths that …


Virtual Reality For Baseball Batting, Fengchen Gong, Tianjie Jia, Hong Tan, Casey Kohr Aug 2018

Virtual Reality For Baseball Batting, Fengchen Gong, Tianjie Jia, Hong Tan, Casey Kohr

The Summer Undergraduate Research Fellowship (SURF) Symposium

Nowadays, researchers explore the applications of Virtual Reality in different aspects of people’s lives. A few studies of Virtual Reality focus on applications in sports training. In this research area, one of the most important benefits is that athletes can focus on the training of one specific skill at one time. This SURF project focuses on the development of the virtual reality environment by designing targeted training for baseball batters, with the goal to achieve sufficient realism as judged by the Purdue baseball coaches. With the Virtual Reality training, baseball batters can practice and perfect a specific skill without a …


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick Aug 2018

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – …


Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal Aug 2018

Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal

The Summer Undergraduate Research Fellowship (SURF) Symposium

In this work, we investigate the application of Principal Component Analysis to the task of wireless signal modulation recognition using deep neural network architectures. Sampling signals at the Nyquist rate, which is often very high, requires a large amount of energy and space to collect and store the samples. Moreover, the time taken to train neural networks for the task of modulation classification is large due to the large number of samples. These problems can be drastically reduced using Principal Component Analysis, which is a technique that allows us to reduce the dimensionality or number of features of the samples …


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin Aug 2018

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join …


Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, Zhao Xing Lim, Mohammad Jahanshahi, Tarutal Ghosh Mondal, Da Cheng, Shutao Wang, Mohammad K. Sweidan, Aanis Ahmad, Omar Hesham Abouhussein, Xi Chen Aug 2018

Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, Zhao Xing Lim, Mohammad Jahanshahi, Tarutal Ghosh Mondal, Da Cheng, Shutao Wang, Mohammad K. Sweidan, Aanis Ahmad, Omar Hesham Abouhussein, Xi Chen

The Summer Undergraduate Research Fellowship (SURF) Symposium

Road defects such as potholes, humps, and road cracks have become one of the main concerns for road and traffic safety worldwide. Pavement defect detection is crucial to ensure road safety. However, current solutions to this problem are either too time-consuming or too expensive to be employed large-scale. We propose a novel approach which has the ability to autonomously detect potholes in real-time using cost-effective sensors. Inexpensive sensors are mounted on a vehicle and a deep learning algorithm is used to identify road defects. The detection system is paired with a GPS and positional sensors to map the location of …


Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul Jun 2018

Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul

The International Student Science Fair 2018

The unremitting trends of increasing population, urbanization, diminishing water supply, and continuing climate change have contributed to declining stocks of arable land per person. Land available for farming is shrinking, and the demand for food is growing. All of these lead to food insecurity. For the first version of Smart Vertical Farm System is designed to increase food productions by an automatic system. It built with shelves which support soil and hydroponic system, stacked vertically. The system first shovels the soil in the tray and sews the seeds. There is also additional watering system. The hydroponic parts are on the …


Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul Jun 2018

Smart Vertical Farm System (Svfs), Sarasit Sirawattanakul

The International Student Science Fair 2018

The unremitting trends of increasing population, urbanization, diminishing water supply, and continuing climate change have contributed to declining stocks of arable land per person. Land available for farming is shrinking, and the demand for food is growing. All of these lead to food insecurity. For the first version of Smart Vertical Farm System is designed to increase food productions by an automatic system. It built with shelves which support soil and hydroponic system, stacked vertically. The system first shovels the soil in the tray and sews the seeds. There is also additional watering system. The hydroponic parts are on the …


Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González May 2018

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …