Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 543

Full-Text Articles in Computer Engineering

Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley Aug 2019

Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley

Minnesota Journal of Law, Science & Technology

No abstract provided.


Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord Aug 2019

Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord

Minnesota Journal of Law, Science & Technology

No abstract provided.


A Systematic Review Of Studies On Educational Robotics, Saira Anwar, Nicholas Alexander Bascou, Muhsin Menekse, Asefeh Kardgar Jul 2019

A Systematic Review Of Studies On Educational Robotics, Saira Anwar, Nicholas Alexander Bascou, Muhsin Menekse, Asefeh Kardgar

Journal of Pre-College Engineering Education Research (J-PEER)

There has been a steady increase in the number of studies investigating educational robotics and its impact on academic and social skills of young learners. Educational robots are used both in and out of school environments to enhance K–12 students’ interest, engagement, and academic achievement in various fields of STEM education. Some prior studies show evidence for the general benefits of educational robotics as being effective in providing impactful learning experiences. However, there appears to be a need to determine the specific benefits which have been achieved through robotics implementation in K–12 formal and informal learning settings. In ...


Features Of Designing The Architecture Of Intelligent Transport Systems, Jaffar Daeibal, Vyacheslav Lapshin, Dmitry Elkin, Sergey A. Kucherov Jul 2019

Features Of Designing The Architecture Of Intelligent Transport Systems, Jaffar Daeibal, Vyacheslav Lapshin, Dmitry Elkin, Sergey A. Kucherov

Karbala International Journal of Modern Science

In the global experience, intelligent transport systems (ITS) are recognized as a general transport ideology for integrating the achievements of telematics in all types of transport activities to solve economic and social problems: reducing accidents, improving the efficiency of public transport and cargo transportation, ensuring overall transport security, and improving environmental performance. Considering the design features of the intelligent transport system (ITS), there is a need to develop requirements for the functional and physical architecture as the main part of the ITS development. The creation of functional and physical architecture touches upon issues such as: the scheme of interaction between ...


The Perils And Promises Of Artificial General Intelligence, Brian S. Haney Jun 2019

The Perils And Promises Of Artificial General Intelligence, Brian S. Haney

Journal of Legislation

No abstract provided.


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software ...


Spring 2019 May 2019

Spring 2019

In The Loop

Lab Life: New and improved School of Computing labs inspire research in robotics and engineering; A Festival to Remember: Students thrive in film festival environments; Next Gen Data Scientists: Data Science Academy introduces high school students to the big world of data; A Well-Designed Design Colloquium; Game Face: "Sausage Sports Club: creator and CDM alumnus Chris Wade shares the story behind his playful Nintendo Switch game: Connected from Afar: Graduate student Sierra Sellman makes the most of her online degree program; Seen and Heard; Bravo! Bravo!


Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater May 2019

Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater

SMU Data Science Review

Deep Learning has revolutionized Computer Vision, and it is the core technology behind capabilities of a self-driving car. Convolutional Neural Networks (CNNs) are at the heart of this deep learning revolution for improving the task of object detection. A number of successful object detection systems have been proposed in recent years that are based on CNNs. In this paper, an empirical evaluation of three recent meta-architectures: SSD (Single Shot multi-box Detector), R-CNN (Region-based CNN) and R-FCN (Region-based Fully Convolutional Networks) was conducted to measure how fast and accurate they are in identifying objects on the road, such as vehicles, pedestrians ...


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative ...


College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch May 2019

College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch

Journal of International Technology and Information Management

College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished ...


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and ...


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only devices cannot communicate directly with IPv6-only devices and vice-versa. Consequently, organizations wishing to take full advantage of the ...


The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun May 2019

The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun

Journal of International Technology and Information Management

This article discusses generic scripting, a useful scripting technology for developing applications. In its simplest use, generic scripting can be used as a documentation tool to replace flowcharting or pseudocode. in certain situations, generic scripting can lead directly to a working application without the need to write, compile and test a new program. Generic scripting is discussed as a tool which can be used in logical design, detailed design and implementation of a new application. An example is presented to show how generic scripting can be used by non-programmers to simplify the development of applications. This example is used to ...


Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel Mar 2019

Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel

Journal of International Technology and Information Management

The skills related to the use of information and communication technologies (ICT) were examined in this study within the context of eight communities with a high degree of vulnerability and diversity. The objectives of the study were: a) to conduct a diagnosis of thirteen competencies related to the use of ICT in eight Mayan-speaking communities in the state of Yucatan, Mexico, and b) to examine such variables as gender, marital status, and the education level of their parents. in relation to the degree of ICT among these youth.

The findings indicate that there are differences in the use of technology ...


Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell Feb 2019

Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists ...


State Feedback Of Complex Systems Using Fuzzy Cognitive Maps, Vassiliki Mpelogianni, Ioannis Arvanitakis, Peter P. Groumpos Feb 2019

State Feedback Of Complex Systems Using Fuzzy Cognitive Maps, Vassiliki Mpelogianni, Ioannis Arvanitakis, Peter P. Groumpos

International Journal of Business and Technology

Complex systems have become a research area with increasing interest over the last years. The emergence of new technologies, the increase in computational power with reduced resources and cost, the integration of the physical world with computer based systems has created the possibility of significantly improving the quality of life of humans. While a significant degree of automation within these systems exists and has been provided in the past decade with examples of the smart homes and energy efficient buildings, a paradigm shift towards autonomy has been noted. The need for autonomy requires the extraction of a model; while a ...


Maturity Level Of Kosovo Manufacturing Industry With Regard To Industry 4.0, Fatmir Azemi, Edmond Hajrizi, Bekim Maloku Feb 2019

Maturity Level Of Kosovo Manufacturing Industry With Regard To Industry 4.0, Fatmir Azemi, Edmond Hajrizi, Bekim Maloku

International Journal of Business and Technology

In this paper the concept of Maturity Level of Kosovo Industry will be presented according to the Industry 4.0. Digitalization of factory has impact the entire business environment and lead to Smart Enterprises. To create a model of Smart Factory, first we have analyzed the existing situation of Kosovo Manufacturing Industry with regard to revolution of Industry. In this paper we will describe the results of a recent research at the Kosovo manufacturing companies and are included metalworking and furniture industry, where is developed a Maturity Level for Kosovo Industry. To describe the Maturity Level of Kosovo Industry we ...


Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu Feb 2019

Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu

International Journal of Business and Technology

Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order ...


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol ...


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Feb 2019

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

International Journal of Business and Technology

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s ...


A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani Feb 2019

A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani

International Journal of Business and Technology

State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers ...


Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez Feb 2019

Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez

The University of Louisville Journal of Respiratory Infections

No abstract provided.


Towards Multi-Lingual Pneumonia Research Data Collection Using The Community-Acquired Pneumonia International Cohort Study Database, William A. Mattingly, Kimberley A. Buckner, Senen Pena Feb 2019

Towards Multi-Lingual Pneumonia Research Data Collection Using The Community-Acquired Pneumonia International Cohort Study Database, William A. Mattingly, Kimberley A. Buckner, Senen Pena

The University of Louisville Journal of Respiratory Infections

Background: Although multilingual interfaces are preferred by most users when they have a choice, organizations are often unable to support and troubleshoot problems involving multiple user languages. Software that has been structured with multiple languages and data interlinking considerations early in its development is more likely to be easily maintained. We describe the process of adding multilingual support to the CAPO international Cohort study database using REDCap.

Methods: Using Google Translate API we extend the supported Spanish language version of REDCap to the most recent version used by CAPO, 8.1.4. We then translate the English data dictionary for ...


Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels Jan 2019

Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels

SMU Data Science Review

As the digital age creates new ways of spreading news, fake stories are propagated to widen audiences. A majority of people obtain both fake and truthful news without knowing which is which. There is not currently a reliable and efficient method to identify “fake news”. Several ways of detecting fake news have been produced, but the various algorithms have low accuracy of detection and the definition of what makes a news item ‘fake’ remains unclear. In this paper, we propose a new method of detecting on of fake news through comparison to other news items on the same topic, as ...


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal Jan 2019

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern ...


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater Jan 2019

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche Jan 2019

Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche

SMU Data Science Review

In this paper, we disambiguate risky activity corporate users are propagating with their software in real time by creating an enterprise security visualization solution for system administrators. The current problem in this domain is the lag in cyber intelligence that inhibits preventative security measure execution. This is partially due to the overemphasis of network activity, which is a nonfinite dataset and is difficult to comprehensively ingest with analytics. We address these concerns by elaborating on the beta of a software called "Insight" created by Felix Security. The overall solution leverages endpoint data along with preexisting whitelist/blacklist designations to unambiguously ...


The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales Jan 2019

The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales

Manuscript Studies

This paper presents a software framework for the registration and visualization of layered image sets. To demonstrate the utility of these tools, we apply them to the St. Chad Gospels manuscript, relying on images of each page of the document as it appeared over time. An automated pipeline is used to perform non-rigid registration on each series of images. To visualize the differences between copies of the same page, a registered image viewer is constructed that enables direct comparisons of registered images. The registration pipeline and viewer for the resulting aligned images are generalized for use with other data sets.


Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles Jan 2019

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework ...


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.