Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Data Storage Systems (676)
- Civil and Environmental Engineering (639)
- Civil Engineering (633)
- Other Civil and Environmental Engineering (632)
- Environmental Engineering (631)
-
- Hydraulic Engineering (573)
- Physical Sciences and Mathematics (260)
- Computer Sciences (250)
- Digital Communications and Networking (163)
- Social and Behavioral Sciences (162)
- Electrical and Computer Engineering (158)
- Information Security (130)
- Law (110)
- Computer Law (104)
- Forensic Science and Technology (104)
- Legal Studies (104)
- Computer and Systems Architecture (68)
- Other Computer Engineering (66)
- Robotics (66)
- Business (28)
- Hardware Systems (28)
- Library and Information Science (28)
- Technology and Innovation (23)
- Mechanical Engineering (22)
- Artificial Intelligence and Robotics (21)
- Cataloging and Metadata (21)
- Archival Science (19)
- OS and Networks (18)
- Institution
-
- Brigham Young University (630)
- Embry-Riddle Aeronautical University (120)
- University for Business and Technology in Kosovo (63)
- Purdue University (53)
- Kennesaw State University (42)
-
- Old Dominion University (38)
- Institute of Business Administration (25)
- University of Nevada, Las Vegas (17)
- Kansas State University Libraries (15)
- University of Nebraska at Omaha (15)
- Murray State University (11)
- University of Georgia School of Law (11)
- Arkansas Tech University (8)
- Portland State University (8)
- DePaul University (7)
- University of South Florida (7)
- Cedarville University (5)
- Minnesota State University Moorhead (5)
- Olivet Nazarene University (5)
- San Jose State University (5)
- Southern Illinois University Carbondale (5)
- Western University (5)
- Florida International University (3)
- Illinois Math and Science Academy (3)
- The University of San Francisco (3)
- University of North Florida (3)
- University of Tennessee, Knoxville (3)
- Vocational Training Council (3)
- Arcadia University (2)
- CCT College Dublin (2)
- Keyword
-
- Climate change (11)
- Cloud computing (7)
- Crowdsourcing (6)
- Data mining (6)
- Database (6)
-
- Ecosystem services (6)
- Machine learning (6)
- Sensitivity analysis (6)
- Uncertainty (6)
- Big data (5)
- Collaboration (5)
- Education (5)
- Modelling (5)
- Ontologies (5)
- Remote sensing (5)
- Sustainability (5)
- Agriculture (4)
- Data management (4)
- Digital preservation (4)
- Engineering (4)
- GIS (4)
- Integrated modelling (4)
- Metadata (4)
- Modeling (4)
- Sensors (4)
- Virtual environment (4)
- Water management (4)
- Web application (4)
- Agent-based model (3)
- Bandwidth (3)
- Publication Year
- Publication
-
- International Congress on Environmental Modelling and Software (630)
- Annual ADFSL Conference on Digital Forensics, Security and Law (105)
- UBT International Conference (63)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (37)
- Symposium of Student Scholars (26)
-
- International Conference on Information and Communication Technologies (25)
- Cybersecurity Undergraduate Research Showcase (23)
- Modeling, Simulation and Visualization Student Capstone Conference (15)
- Central Plains Network for Digital Asset Management (14)
- African Conference on Information Systems and Technology (12)
- Continuing Legal Education Presentations (11)
- Posters-at-the-Capitol (10)
- UNO Student Research and Creative Activity Fair (10)
- College of Engineering: Graduate Celebration Programs (9)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (8)
- ATU Research Symposium (8)
- 2017 Academic High Altitude Conference (7)
- 36th Florida Conference on Recent Advances in Robotics (7)
- MODVIS Workshop (6)
- ASA Multidisciplinary Research Symposium (5)
- Computer Science Graduate Research Workshop (5)
- Inaugural CSU IR Conference, 2015 (5)
- Scholar Week 2016 - present (5)
- Student Academic Conference (5)
- Student Research Symposium (5)
- The Research and Scholarship Symposium (2013-2019) (5)
- National Training Aircraft Symposium (NTAS) (4)
- Space Traffic Management Conference (4)
- Undergraduate Student Research Internships Conference (4)
- Creative Activity and Research Day - CARD (3)
- File Type
Articles 151 - 180 of 1164
Full-Text Articles in Computer Engineering
Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.
Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.
National Training Aircraft Symposium (NTAS)
Many virtual reality (VR)-based flight simulation programs provide pilots the enhanced reality from the 1st person-view to make themselves immersed in the cockpit. Using the VR simulations, pilots can take flight training in many challenging situations that are hard to create in real environments due to its natural entropy and safety concerns such as severe crosswind or engine fire. Mixed reality (MR) technology provides three-dimensional graphics so that users can effectively see all 360 degree-vertical and horizontal aspects of an object while they freely move around to see the graphics maintaining the consciousness of real space. Flight instructors may …
Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D.
Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D.
National Training Aircraft Symposium (NTAS)
Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy and rapid progress is being made in artificial intelligence (AI) engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. Otherwise, the full capabilities of autonomy will not be realized. …
Iot Devices In The Public Health Sector, Cayla Young
Iot Devices In The Public Health Sector, Cayla Young
Cybersecurity Undergraduate Research Showcase
In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …
Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman
Jc Drain And Sewer Website, Jarod Pichler, Nathan Houman
Capstone Showcase
-
A website for a small plumbing business in Scranton, Pennsylvania. The website includes a Home, About Us, Services, Contact Us, and Testimonials page. The home page introduces the company to the website viewer. The About Us page provides information about the company and owner, to the website viewer. The Services page provides the website viewer with all of the services that the company can provide. The Contact Us page allows the website viewer to send the company an email. Finally, the Testimonials page will allow the website viewer to leave a comment about the company’s services. The website also includes …
Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong
Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong
Yale Day of Data
Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products. There is, however, much concern about sensitive data being processed on these low-end devices which have limited protection mechanisms in place. This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time. It also enables implicit hardware authentication. Thus, the software will execute correctly only on an authorized device and if the timing of the software, e.g., control flow, was not changed through malicious modifications. The proposed ideas are based on …
Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao
Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao
Posters-at-the-Capitol
Abstract
The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.
Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew
Designing Cloud Computing Architecture For Bank Industry The Case Of Dashen Bank, Melaku Yenew
African Conference on Information Systems and Technology
Technology makes life easy. People contact banks in their day to day life activity. And also the banks are committed to serve their customers with the help of currently advanced technology. The aim of a bank is to give consistent and satisfactory banking services for the customers. The use of advanced technology in banking requires sophisticated knowledge of the technology and expertise and a large number of employees are required for implementation and management of that system.
Cloud computing makes easy the management of IT infrastructure and the bank sector systems. Cloud service providers provide three basic types of services: …
Model-Driven Engineering For Big Data, Belachew Regane
Model-Driven Engineering For Big Data, Belachew Regane
African Conference on Information Systems and Technology
Accessing heterogeneous and huge amount of data through different sources heavily impacts users of data nowadays worldwide. Thus, Big Data has now become a hot emerging paradigm in computing environments. Issues in scalability, interoperability, platform independency, adaptability and reusability in big data systems are considered the main current challenges. This raises the need for appropriate software engineering approaches to develop effective and efficient Big Data system models, i.e. an approach which reduce investment cost and development time. Today, software engineering has emerged advanced methodologies to solve problems from different perspectives, while still further research is needed to overcome new challenges …
Nonlinear Observer For Visual-Inertial Navigation Using Intermittent Landmark Measurements, Miaomiao Wang
Nonlinear Observer For Visual-Inertial Navigation Using Intermittent Landmark Measurements, Miaomiao Wang
Western Research Forum
The development of reliable orientation, position and linear velocity estimation algorithms for the 3D visual-inertial navigation system (VINS) is instrumental in many applications, such as autonomous underwater vehicles (AUVs), and unmanned aerial vehicles (UAVs). It is extremely important when the global position system (GPS) is not available in GPS-denied environments. Recently, observers design for VINS using landmark position measurements from Kinect sensors or stereo cameras has been increasingly investigated in the literature.
The aim of this work is to design a nonlinear observer for VINS under the assumption that landmark position measurements are intermittent. In practice, the landmark measurements are …
Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.
Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.
MODVIS Workshop
This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts …
Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado
Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado
Creative Activity and Research Day - CARD
As the amount of publicly shared data increases,
developing a robust pipeline to stream, store and process data is
critical, as the casual user often lacks the technology, hardware
and/or skills needed to work with such voluminous data. In
this research, the authors employ Amazon EC2 and EMR,
MongoDB, and Spark MLlib to explore 28.5 gigabytes of CMS
Open Payments data in an attempt to identify physicians who
may have a high propensity to act unethically, owing to significant
transfers of wealth from medical companies. A Random Forest
Classifier is employed to predict the top decile of physicians who
have …
Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan
Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan
Creative Activity and Research Day - CARD
Quantum Criticism scrapes data from the News Articles and performs Sentiment Analysis.
Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal
Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal
Creative Activity and Research Day - CARD
Neuro-radiologists currently use qualitative volumetric change of brain ventricles after surgery to assess the safety of removing a ventriculoperitoneal (VP) shunt which is a medical device that relieves pressure on the brain caused by fluid accumulation. Following safe removal of the VP shunt, patients can be released from the hospital. The need for accurate and quick measurement of brain ventricular volumetric change makes automatic 3D segmentation software an ideal candidate to aid decisions after surgery. In this paper, we propose an approach to estimate the ventricular volume variation using segmentation in brain MRI and CT images. Our approach consists of …
Autonomous Watercraft Simulation And Programming, Nicholas J. Savino
Autonomous Watercraft Simulation And Programming, Nicholas J. Savino
Student Scholar Showcase
Automation of various modes of transportation is thought to make travel more safe and efficient. Over the past several decades, advances to semi-autonomous and autonomous vehicles have led to advanced autopilot systems on planes and boats, and an increasing popularity of self-driving cars. We predicted the motion of an autonomous vehicle using simulations in Python. The simulation models the motion of a small scale watercraft, which can then be built and programmed using an Arduino Microcontroller. We examined different control methods for a simulated rescue craft to reach a target. We also examined the effects of different factors, such as …
Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade
Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade
Kansas State University Undergraduate Research Conference
The overall goal of this research is to effectively extract steps for performing a specified procedure from published text descriptions, producing a recipe listing the materials, operations, and conditions required to perform the procedure. For example, if the procedure is to create a nanomaterial, and relevant source text consists of peer-reviewed scientific publications, a recipe should include raw materials and unit operations, among other specifications of a chemical engineering process. This project focuses on developing performance measures to evaluate recipe steps, by gauging their correctness, completeness, and non-redundancy. This is done by comparing manually annotated documents that conveyed desired results …
Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra
Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra
Computer Science Graduate Research Workshop
No abstract provided.
Consensus-Based Robotic Formation Control, Satish Reddy Modugu
Consensus-Based Robotic Formation Control, Satish Reddy Modugu
Computer Science Graduate Research Workshop
No abstract provided.
Simulator For Qubit Measurement Using Augmented Reality, Sai Pradeep Koneti
Simulator For Qubit Measurement Using Augmented Reality, Sai Pradeep Koneti
Computer Science Graduate Research Workshop
No abstract provided.
An Application Of Artificial General Intelligence In Board Games, Nathan Skalka
An Application Of Artificial General Intelligence In Board Games, Nathan Skalka
Computer Science Graduate Research Workshop
No abstract provided.
Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear
Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear
UNO Student Research and Creative Activity Fair
User acceptance is a measure that contributes to technology feasibility which is a decision point that entrepreneurs use to help make better investment decisions (Hoffer, 2011). User acceptance testing is part of a design strategy where the system designer attempts to minimize risks and provide design information that an entrepreneur can use to make better investment decisions (Hoffer, 2011). A user acceptance testing instruments can range from a low-cost coffeeshop review to expensive lab-based user testing (Shneiderman, 2017). This study builds upon the User Acceptance of Information Technology (UTAUT) model to measure user acceptance for the system being evaluated (Venkatesh, …
Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi
Estimating Variations In Metabolic Cost Within The Stride Cycle During Level And Uphill Walking, Arash Mohammadzadeh Gonabadi
UNO Student Research and Creative Activity Fair
Indirect calorimetry provides the average cost of a stride cycle and prevents from identifying which part of the gait cycle causes increased metabolic cost in patients, however, recent simulation methods allow estimating the time profile of metabolic cost within the stride cycle. In this study, we compare the estimations of the time profile of the metabolic cost of two simulation methods for level and uphill walking. We used kinematic, kinetic and electromyography data from level and uphill walking (one participant) to estimate the time profiles of metabolic cost using the muscle-level metabolic model of Umberger using electromyography and kinematic data …
A Correlation Network Model For Managing Safety And Performance Issues In Bridges And Civil Infrastructures, Prasad Chetti
A Correlation Network Model For Managing Safety And Performance Issues In Bridges And Civil Infrastructures, Prasad Chetti
UNO Student Research and Creative Activity Fair
Many recent studies have shown that a large percentage of bridges in many parts of the world have low safety rating. National Bridge Inventory (NBI) database contains the information of more than 600,000 bridges, where each bridge has 116 parameters. Current safety inspections require bridge inspectors to manually inspect each bridge every few years. Manpower and budget constraints limit such approach from inspecting the bridges more frequently. Clearly, more efficient approaches need to be developed to improve the process of bridge inspection and increase the overall safety of bridges and civil infrastructures. In this study, we propose a Correlation Network …
A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan
A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan
UNO Student Research and Creative Activity Fair
In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed from scratch each …
Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari
Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari
UNO Student Research and Creative Activity Fair
Functional ability has been always considered as one of the important determining factors of individuals’ health and quality of life. Traditional movement analysis systems require expensive facilities and frequent visits for patients to specialized laboratories. Portability and affordability of wearable sensors along with their improved accuracy and capability of monitoring movement during daily activities make them a potential alternative for analyzing mobility patterns for clinical and health assessment purposes. Wearable-based movement data, when combined with other relevant clinical or laboratory data, could enhance evidence-based healthcare and data-driven Clinical Decision Support Systems (CDSS). Utilizing the data from wearable devices, many researchers …
Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling
Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling
Space Traffic Management Conference
Space Traffic Management (STM) has already demonstrated its potential to be extremely data-intensive. The large number of objects on orbit today, if observed constantly throughout their lifetimes, could produce a staggeringly large number of observations that might in turn generate large numbers of orbits. Orbit data with a lengthy time history can be used to produce estimates of maneuver frequency, susceptibility to natural forces such as drag, and (if combined with photometric data) assessments of behavioral patterns of life.
A future of mega-constellations and a growing number of nations and organizations with assets on orbit would make it likely that …
Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga
Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga
Space Traffic Management Conference
The exponential rise in small-satellites and CubeSats in Low Earth Orbit (LEO) poses important challenges for future space traffic management. At altitudes of 600 km and lower, aerodynamic drag accelerates de-orbiting of satellites. However, placement of satellites at higher altitudes required for constellations pose important challenges. The satellites will require on-board propulsion to lower their orbits to 600 km and let aerodynamic drag take-over. In this work we analyze solutions for de-orbiting satellites at altitudes of up to 3000 km. We consider a modular robotic de-orbit device that has stowed volume of a regular CubeSat. The de-orbit device would be …
End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga
End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga
Space Traffic Management Conference
There is growing demand for satellite swarms and constellations for global positioning, remote sensing and relay communication in higher LEO orbits. This will result in many obsolete, damaged and abandoned satellites that will remain on-orbit beyond 25 years. These abandoned satellites and space debris maybe economically valuable orbital real-estate and resources that can be reused, repaired or upgraded for future use. Space traffic management is critical to repair damaged satellites, divert satellites into warehouse orbits and effectively deorbit satellites and space debris that are beyond repair and salvage. Current methods for on-orbit capture, servicing and repair require a large service …
The Comparison Of Verbalized Feedback In Human To Computer Interfacing Versus Human To Human Interaction, Kea Francis
The Comparison Of Verbalized Feedback In Human To Computer Interfacing Versus Human To Human Interaction, Kea Francis
EURēCA: Exhibition of Undergraduate Research and Creative Achievement
The project evaluates response to social robots for purposeful tasks. The study uses a social robot, Rapiro, along with a smartphone that serves as a visual interface for the robot system. My role was to design a program on a Raspberry Pi that allows simultaneous control of Rapiro’s actions and a response from a phone application. The phone app is downloaded to an Android phone and designed using MIT App Inventor software. This allows pre-programmed and real-time control of the robot. The user inputs what they want the robot to say through the terminal of the Raspberry Pi. Through serial …
3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock
3d Wi-Fi Campus Coverage: Flying A Drone, Richard Thompson, Tyler Williams, Seth Pritchett, Tracy Whitlock
Posters-at-the-Capitol
Everyone in a college environment is immersed in their electronic devices. Whether it be in the quad, the classroom, the library or their favorite nook by the windows, they all need a reliable Wi-Fi signal to get their work done. In this era most of the tasks that has to be completed require some sort of connection between electronic devices especially if the individuals require information located on the internet. The main method of accessing the internet is using Wifi technology which uses electromagnetic waves to propagate information across a certain area. Considering the properties of these electromagnetic frequencies it …
The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku
The Importance Of Cad/Cae Systems In Development Of Product Design And Process Of Optimization, Fatmir Azemi, Xhemajl Mehmeti, Bekim Maloku
UBT International Conference
Computer Aided Design (CAD) and Computer Aided Engineering (CAE) are the most important technology tools that today designers are using in development of product (design and in process of optimization). Thus, this study is carried out to present the importance of CAD/CAE system on process of design and process of optimization of spur gear. The paper presents the usage of CAD system for modeling parts and CAE software for analysis of stress-strain of spur gear and the results of calculation of pair spur-gears that it used in the gearbox transmission of the bucket wheel excavator located in “Bardhi i Madh …