Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 151 - 180 of 1164

Full-Text Articles in Computer Engineering

Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D. Mar 2020

Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.

National Training Aircraft Symposium (NTAS)

Many virtual reality (VR)-based flight simulation programs provide pilots the enhanced reality from the 1st person-view to make themselves immersed in the cockpit. Using the VR simulations, pilots can take flight training in many challenging situations that are hard to create in real environments due to its natural entropy and safety concerns such as severe crosswind or engine fire. Mixed reality (MR) technology provides three-dimensional graphics so that users can effectively see all 360 degree-vertical and horizontal aspects of an object while they freely move around to see the graphics maintaining the consciousness of real space. Flight instructors may …


Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D. Mar 2020

Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D.

National Training Aircraft Symposium (NTAS)

Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy and rapid progress is being made in artificial intelligence (AI) engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. Otherwise, the full capabilities of autonomy will not be realized. …


Iot Devices In The Public Health Sector, Cayla Young Jan 2020

Iot Devices In The Public Health Sector, Cayla Young

Cybersecurity Undergraduate Research Showcase

In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …


Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman Jan 2020

Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman

Capstone Showcase

  1. A website for a small plumbing business in Scranton, Pennsylvania. The website includes a Home, About Us, Services, Contact Us, and Testimonials page. The home page introduces the company to the website viewer. The About Us page provides information about the company and owner, to the website viewer. The Services page provides the website viewer with all of the services that the company can provide. The Contact Us page allows the website viewer to send the company an email. Finally, the Testimonials page will allow the website viewer to leave a comment about the company’s services. The website also includes …


Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong Dec 2019

Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong

Yale Day of Data

Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products. There is, however, much concern about sensitive data being processed on these low-end devices which have limited protection mechanisms in place. This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time. It also enables implicit hardware authentication. Thus, the software will execute correctly only on an authorized device and if the timing of the software, e.g., control flow, was not changed through malicious modifications. The proposed ideas are based on …


Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao Oct 2019

Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao

Posters-at-the-Capitol

Abstract

The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.


Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew Aug 2019

Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew

African Conference on Information Systems and Technology

Technology makes life easy. People contact banks in their day to day life activity. And also the banks are committed to serve their customers with the help of currently advanced technology. The aim of a bank is to give consistent and satisfactory banking services for the customers. The use of advanced technology in banking requires sophisticated knowledge of the technology and expertise and a large number of employees are required for implementation and management of that system.

Cloud computing makes easy the management of IT infrastructure and the bank sector systems. Cloud service providers provide three basic types of services: …


Model-Driven Engineering For Big Data, Belachew Regane Aug 2019

Model-Driven Engineering For Big Data, Belachew Regane

African Conference on Information Systems and Technology

Accessing heterogeneous and huge amount of data through different sources heavily impacts users of data nowadays worldwide. Thus, Big Data has now become a hot emerging paradigm in computing environments. Issues in scalability, interoperability, platform independency, adaptability and reusability in big data systems are considered the main current challenges. This raises the need for appropriate software engineering approaches to develop effective and efficient Big Data system models, i.e. an approach which reduce investment cost and development time. Today, software engineering has emerged advanced methodologies to solve problems from different perspectives, while still further research is needed to overcome new challenges …


Nonlinear Observer For Visual-Inertial Navigation Using Intermittent Landmark Measurements, Miaomiao Wang Jun 2019

Nonlinear Observer For Visual-Inertial Navigation Using Intermittent Landmark Measurements, Miaomiao Wang

Western Research Forum

The development of reliable orientation, position and linear velocity estimation algorithms for the 3D visual-inertial navigation system (VINS) is instrumental in many applications, such as autonomous underwater vehicles (AUVs), and unmanned aerial vehicles (UAVs). It is extremely important when the global position system (GPS) is not available in GPS-denied environments. Recently, observers design for VINS using landmark position measurements from Kinect sensors or stereo cameras has been increasingly investigated in the literature.

The aim of this work is to design a nonlinear observer for VINS under the assumption that landmark position measurements are intermittent. In practice, the landmark measurements are …


Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof. May 2019

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.

MODVIS Workshop

This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts …


Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado Apr 2019

Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado

Creative Activity and Research Day - CARD

As the amount of publicly shared data increases,

developing a robust pipeline to stream, store and process data is

critical, as the casual user often lacks the technology, hardware

and/or skills needed to work with such voluminous data. In

this research, the authors employ Amazon EC2 and EMR,

MongoDB, and Spark MLlib to explore 28.5 gigabytes of CMS

Open Payments data in an attempt to identify physicians who

may have a high propensity to act unethically, owing to significant

transfers of wealth from medical companies. A Random Forest

Classifier is employed to predict the top decile of physicians who

have …


Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan Apr 2019

Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan

Creative Activity and Research Day - CARD

Quantum Criticism scrapes data from the News Articles and performs Sentiment Analysis.


Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal Apr 2019

Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal

Creative Activity and Research Day - CARD

Neuro-radiologists currently use qualitative volumetric change of brain ventricles after surgery to assess the safety of removing a ventriculoperitoneal (VP) shunt which is a medical device that relieves pressure on the brain caused by fluid accumulation. Following safe removal of the VP shunt, patients can be released from the hospital. The need for accurate and quick measurement of brain ventricular volumetric change makes automatic 3D segmentation software an ideal candidate to aid decisions after surgery. In this paper, we propose an approach to estimate the ventricular volume variation using segmentation in brain MRI and CT images. Our approach consists of …


Autonomous Watercraft Simulation And Programming, Nicholas J. Savino Apr 2019

Autonomous Watercraft Simulation And Programming, Nicholas J. Savino

Student Scholar Showcase

Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades, advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats, and an increasing popularity of self-driving cars. We predicted the motion of an autonomous vehicle using simulations in Python. The simulation models the motion of a small scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as …


Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade Apr 2019

Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade

Kansas State University Undergraduate Research Conference

The overall goal of this research is to effectively extract steps for performing a specified procedure from published text descriptions, producing a recipe listing the materials, operations, and conditions required to perform the procedure. For example, if the procedure is to create a nanomaterial, and relevant source text consists of peer-reviewed scientific publications, a recipe should include raw materials and unit operations, among other specifications of a chemical engineering process. This project focuses on developing performance measures to evaluate recipe steps, by gauging their correctness, completeness, and non-redundancy. This is done by comparing manually annotated documents that conveyed desired results …


Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra Apr 2019

Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra

Computer Science Graduate Research Workshop

No abstract provided.


Consensus-Based Robotic Formation Control, Satish Reddy Modugu Apr 2019

Consensus-Based Robotic Formation Control, Satish Reddy Modugu

Computer Science Graduate Research Workshop

No abstract provided.


Simulator For Qubit Measurement Using Augmented Reality, Sai Pradeep Koneti Apr 2019

Simulator For Qubit Measurement Using Augmented Reality, Sai Pradeep Koneti

Computer Science Graduate Research Workshop

No abstract provided.


An Application Of Artificial General Intelligence In Board Games, Nathan Skalka Apr 2019

An Application Of Artificial General Intelligence In Board Games, Nathan Skalka

Computer Science Graduate Research Workshop

No abstract provided.


Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear Mar 2019

Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear

UNO Student Research and Creative Activity Fair

User acceptance is a measure that contributes to technology feasibility which is a decision point that entrepreneurs use to help make better investment decisions (Hoffer, 2011). User acceptance testing is part of a design strategy where the system designer attempts to minimize risks and provide design information that an entrepreneur can use to make better investment decisions (Hoffer, 2011). A user acceptance testing instruments can range from a low-cost coffeeshop review to expensive lab-based user testing (Shneiderman, 2017). This study builds upon the User Acceptance of Information Technology (UTAUT) model to measure user acceptance for the system being evaluated (Venkatesh, …


Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi Mar 2019

Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi

UNO Student Research and Creative Activity Fair

Indirect calorimetry provides the average cost of a stride cycle and prevents from identifying which part of the gait cycle causes increased metabolic cost in patients, however, recent simulation methods allow estimating the time profile of metabolic cost within the stride cycle. In this study, we compare the estimations of the time profile of the metabolic cost of two simulation methods for level and uphill walking. We used kinematic, kinetic and electromyography data from level and uphill walking (one participant) to estimate the time profiles of metabolic cost using the muscle-level metabolic model of Umberger using electromyography and kinematic data …


A Correlation Network Model For Managing Safety And Performance Issues In Bridges And Civil Infrastructures, Prasad Chetti Mar 2019

A Correlation Network Model For Managing Safety And Performance Issues In Bridges And Civil Infrastructures, Prasad Chetti

UNO Student Research and Creative Activity Fair

Many recent studies have shown that a large percentage of bridges in many parts of the world have low safety rating. National Bridge Inventory (NBI) database contains the information of more than 600,000 bridges, where each bridge has 116 parameters. Current safety inspections require bridge inspectors to manually inspect each bridge every few years. Manpower and budget constraints limit such approach from inspecting the bridges more frequently. Clearly, more efficient approaches need to be developed to improve the process of bridge inspection and increase the overall safety of bridges and civil infrastructures. In this study, we propose a Correlation Network …


A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan Mar 2019

A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan

UNO Student Research and Creative Activity Fair

In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed from scratch each …


Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari Mar 2019

Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari

UNO Student Research and Creative Activity Fair

Functional ability has been always considered as one of the important determining factors of individuals’ health and quality of life. Traditional movement analysis systems require expensive facilities and frequent visits for patients to specialized laboratories. Portability and affordability of wearable sensors along with their improved accuracy and capability of monitoring movement during daily activities make them a potential alternative for analyzing mobility patterns for clinical and health assessment purposes. Wearable-based movement data, when combined with other relevant clinical or laboratory data, could enhance evidence-based healthcare and data-driven Clinical Decision Support Systems (CDSS). Utilizing the data from wearable devices, many researchers …


Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling Feb 2019

Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling

Space Traffic Management Conference

Space Traffic Management (STM) has already demonstrated its potential to be extremely data-intensive. The large number of objects on orbit today, if observed constantly throughout their lifetimes, could produce a staggeringly large number of observations that might in turn generate large numbers of orbits. Orbit data with a lengthy time history can be used to produce estimates of maneuver frequency, susceptibility to natural forces such as drag, and (if combined with photometric data) assessments of behavioral patterns of life.

A future of mega-constellations and a growing number of nations and organizations with assets on orbit would make it likely that …


Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga Feb 2019

Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga

Space Traffic Management Conference

The exponential rise in small-satellites and CubeSats in Low Earth Orbit (LEO) poses important challenges for future space traffic management. At altitudes of 600 km and lower, aerodynamic drag accelerates de-orbiting of satellites. However, placement of satellites at higher altitudes required for constellations pose important challenges. The satellites will require on-board propulsion to lower their orbits to 600 km and let aerodynamic drag take-over. In this work we analyze solutions for de-orbiting satellites at altitudes of up to 3000 km. We consider a modular robotic de-orbit device that has stowed volume of a regular CubeSat. The de-orbit device would be …


End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga Feb 2019

End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga

Space Traffic Management Conference

There is growing demand for satellite swarms and constellations for global positioning, remote sensing and relay communication in higher LEO orbits. This will result in many obsolete, damaged and abandoned satellites that will remain on-orbit beyond 25 years. These abandoned satellites and space debris maybe economically valuable orbital real-estate and resources that can be reused, repaired or upgraded for future use. Space traffic management is critical to repair damaged satellites, divert satellites into warehouse orbits and effectively deorbit satellites and space debris that are beyond repair and salvage. Current methods for on-orbit capture, servicing and repair require a large service …


The Comparison Of Verbalized Feedback In Human To Computer Interfacing Versus Human To Human Interaction, Kea Francis Feb 2019

The Comparison Of Verbalized Feedback In Human To Computer Interfacing Versus Human To Human Interaction, Kea Francis

EURēCA: Exhibition of Undergraduate Research and Creative Achievement

The project evaluates response to social robots for purposeful tasks. The study uses a social robot, Rapiro, along with a smartphone that serves as a visual interface for the robot system. My role was to design a program on a Raspberry Pi that allows simultaneous control of Rapiro’s actions and a response from a phone application. The phone app is downloaded to an Android phone and designed using MIT App Inventor software. This allows pre-programmed and real-time control of the robot. The user inputs what they want the robot to say through the terminal of the Raspberry Pi. Through serial …


3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock Nov 2018

3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock

Posters-at-the-Capitol

Everyone in a college environment is immersed in their electronic devices. Whether it be in the quad, the classroom, the library or their favorite nook by the windows, they all need a reliable Wi-Fi signal to get their work done. In this era most of the tasks that has to be completed require some sort of connection between electronic devices especially if the individuals require information located on the internet. The main method of accessing the internet is using Wifi technology which uses electromagnetic waves to propagate information across a certain area. Considering the properties of these electromagnetic frequencies it …


The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku Oct 2018

The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku

UBT International Conference

Computer Aided Design (CAD) and Computer Aided Engineering (CAE) are the most important technology tools that today designers are using in development of product (design and in process of optimization). Thus, this study is carried out to present the importance of CAD/CAE system on process of design and process of optimization of spur gear. The paper presents the usage of CAD system for modeling parts and CAE software for analysis of stress-strain of spur gear and the results of calculation of pair spur-gears that it used in the gearbox transmission of the bucket wheel excavator located in “Bardhi i Madh …