Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Other Computer Engineering

Institution
Keyword
Publication Year
Publication

Articles 1 - 27 of 27

Full-Text Articles in Computer Engineering

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We then propose three ...


Aws Ec2 Instance Spot Price Forecasting Using Lstm Networks, Jeffrey Lancon, Yejur Kunwar, David Stroud, Monnie Mcgee, Robert Slater Aug 2019

Aws Ec2 Instance Spot Price Forecasting Using Lstm Networks, Jeffrey Lancon, Yejur Kunwar, David Stroud, Monnie Mcgee, Robert Slater

SMU Data Science Review

Cloud computing is a network of remote computing resources hosted on the Internet that allow users to utilize cloud resources on demand. As such, it represents a paradigm shift in the way businesses and industries think about digital infrastructure. With the shift from IT resources being a capital expenditure to a managed service, companies must rethink how they approach utilizing and optimizing these resources in order to maximize productivity and minimize costs. With proper resource management, cloud resources can be instrumental in reducing computing expenses.

Cloud resources are perishable commodities; therefore, cloud service providers have developed strategies to maximize utilization ...


Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater May 2019

Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater

SMU Data Science Review

Deep Learning has revolutionized Computer Vision, and it is the core technology behind capabilities of a self-driving car. Convolutional Neural Networks (CNNs) are at the heart of this deep learning revolution for improving the task of object detection. A number of successful object detection systems have been proposed in recent years that are based on CNNs. In this paper, an empirical evaluation of three recent meta-architectures: SSD (Single Shot multi-box Detector), R-CNN (Region-based CNN) and R-FCN (Region-based Fully Convolutional Networks) was conducted to measure how fast and accurate they are in identifying objects on the road, such as vehicles, pedestrians ...


Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels Jan 2019

Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels

SMU Data Science Review

As the digital age creates new ways of spreading news, fake stories are propagated to widen audiences. A majority of people obtain both fake and truthful news without knowing which is which. There is not currently a reliable and efficient method to identify “fake news”. Several ways of detecting fake news have been produced, but the various algorithms have low accuracy of detection and the definition of what makes a news item ‘fake’ remains unclear. In this paper, we propose a new method of detecting on of fake news through comparison to other news items on the same topic, as ...


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal Jan 2019

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern ...


The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales Jan 2019

The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales

Manuscript Studies

This paper presents a software framework for the registration and visualization of layered image sets. To demonstrate the utility of these tools, we apply them to the St. Chad Gospels manuscript, relying on images of each page of the document as it appeared over time. An automated pipeline is used to perform non-rigid registration on each series of images. To visualize the differences between copies of the same page, a registered image viewer is constructed that enables direct comparisons of registered images. The registration pipeline and viewer for the resulting aligned images are generalized for use with other data sets.


Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin Jan 2019

Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin

Journal of International Technology and Information Management

Today, many critical information systems have safety-critical and non-safety-critical functions executed on the same platform in order to reduce design and implementation costs. The set of safety-critical functionality is subject to certification requirements and the rest of the functionality does not need to be certified, or is certified to a lower level. The resulting mixed-criticality systems bring challenges in designing such systems, especially when the critical tasks are required to complete with a timing constraint. This paper studies a problem of scheduling a mixed-criticality system with fault tolerance. A fault-recovery technique called checkpointing is used where a program can go ...


Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn Oct 2018

Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn

Communications of the IIMA

In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.


How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels Jul 2018

How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels

SMU Data Science Review

In this paper, we present a case study evaluating the level of information available about an individual through public, Internet-accessible sources. Privacy is a basic tenet of democratic society, but technological advances have made access to information and the identification of individuals much easier through Internet-accessible databases and information stores. To determine the potential level of privacy available to an individual in today’s interconnected world, we sought to develop a detailed history of Marc Mezvinsky, a semi-public figure, husband of Chelsea Clinton, and son of two former members of the United States House of Representatives. By utilizing only publicly ...


Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian Mcmanus, Terry W. Fenger Jul 2018

Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian Mcmanus, Terry W. Fenger

Journal of Applied Digital Evidence

The analysis of mobile devices and hard drives has been the focus of the digital forensics world for years, but there is another source of potential evidence not often considered: vehicles. Many of today’s “connected cars” have systems that function like computers, storing information they process including user data from devices synced to the system. There has been little to no research done regarding what types of user artifacts can be found on the system, how long these artifacts remain, whether or not the user can remove those artifacts, and whether certain systems provide more information than others. For ...


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels Apr 2018

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short ...


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two ...


A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou Mar 2018

A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou

Journal of Digital Forensics, Security and Law

The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our ...


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types ...


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random ...


A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber Apr 2017

A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber

International Journal of Aviation, Aeronautics, and Aerospace

The proliferation of mobile technology has prompted the use of tablet devices in the cockpit and during ground operations in general aviation. Due to the increase in affordable and reliable hardware (i.e. iPads etc.), the development of pilot-specific software has led to the creation of a commercial-of-the-shelf (COTS), electronic flight bag (EFB) market. EFBs have many advantages, such as reducing the space requirements for flight documents, enabling faster searching and indexing of files, providing useful tools for flight planning, and providing automatic updates. The increase in availability of mobile technology and flight applications has allowed general aviation enthusiast and ...


Harmonic Scale Transformations, John H. Chalmers Nov 2016

Harmonic Scale Transformations, John H. Chalmers

The STEAM Journal

My artwork derives from a project to delineate the transformations certain types of harmonic musical scales undergo as the sizes of their generating intervals vary over the space of the octave.


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to ...


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy ...


Story Guided Virtual Cultural Heritage Applications, Selma Rizvic Jun 2014

Story Guided Virtual Cultural Heritage Applications, Selma Rizvic

Journal of Interactive Humanities

Virtual cultural heritage applications, particularly virtual museums, nowadays include various forms of storytelling. Every object, site or artifact is better perceived and understood through the adjoining story. Interactive applications naturally request the storytelling to become interactive as well. This paper describes the concepts of interactive digital storytelling in our virtual museums and cultural heritage presentations and discusses their advantages and drawbacks recognized through user evaluation. We used digital stories not only to introduce visitors with the context and information on the objects, but also to enhance their navigation through virtual environments with purpose of learning and perceiving maximum amount of ...


Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


Cybersecurity: Growing Like Topsy!, Editor Oct 2010

Cybersecurity: Growing Like Topsy!, Editor

International Bulletin of Political Psychology

This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.


The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch Jan 2008

The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch

Undergraduate Review

Many transit systems around the U.S. are using global positioning systems to track their buses. Some of these systems provide bus locations in real-time on web maps. With internet integration becoming common in portable electronics, this research project analyzed the opportunity to utilize mass market devices to assist the general public and persons with disabilities to access and navigate fixed route bus services. This study has taken advantage of the state of the art automatic vehicle location systems aboard the Cape Cod Regional Transit Authority and MetroWest (Boston) Regional Transit Authority bus services, Microsoft Virtual Earth mapping services and ...


Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar Jan 2003

Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar

Journal of the Arkansas Academy of Science

The use of finite difference schemes in computational aeroacoustics requires the use of structured grids incomputational space. Complex geometries in the physical space can be modeled using multiple overlapping grids that are transformed into computational space. In this work, finite difference schemes are used that necessitate the addition of psuedo- or ghost-points in the overlap region of the grids for closure of the difference stencil. The functional values at these ghost points must be approximated from the values at the original grid points. This paper investigates interpolation techniques for these overset grids. An n th order interpolation scheme using Lagrange ...


The Other Information Warfare: A Mind Full Of Macedonia, Editor Mar 2001

The Other Information Warfare: A Mind Full Of Macedonia, Editor

International Bulletin of Political Psychology

This article highlights ongoing aspects of psychological warfare in Macedonia between government and rebel forces.


A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Editor Oct 1997

A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Editor

International Bulletin of Political Psychology

This paper describes a number of sequelae stemming from virtual reality (VR) and VR technology (VRT) based on theoretical and empirical research in the behavioral sciences, social sciences, humanities.