Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

City University of New York (CUNY)

2020

Discipline
Keyword
Publication
File Type

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella Dec 2020

Object Recognition And Voice Assistant With Augmented Reality, Juan Estrella

Publications and Research

Our research project aims to provide a visually impaired person with a superimposed map that will guide the individual to the desired destination through a voice controlled virtual assistant application that integrates Augmented Reality (AR) with Artificial Intelligence (AI) Computer Vision and Natural Language Processing (subfields of AI) will be combined to identify the spatial environment and then create a graphic enhancement that provides the most direct route to the specific destination These technologies will be incorporated into the Microsoft Hololens which will be controlled by the user.


Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil Dec 2020

Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil

Publications and Research

Diffuse Optical Tomography (DOT) and Optical Spectroscopy using near-infrared (NIR) diffused light has demonstrated great potential for the initial diagnosis of tumors and in the assessment of tumor vasculature response to neoadjuvant chemotherapy. The aims of this project are 1) to test the different types of LEDs in the near-infrared range, and design the driving circuit, and test the modulation of LEDs at different frequencies; 2) to test the APDs as a detector, and build the receiver system and compare efficiency with pre-built systems. In this project, we are focusing on creating a low-cost infrared transmission system for tumor and …


Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon Dec 2020

Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon

Publications and Research

Feature selection of NSL-KDD data set is usually done by finding co-relationships among features, irrespective of target prediction. We aim to determine the relationship between features and target goals to facilitate different target detection goals regardless of the correlated feature selection. The unbalanced data structure in NSL-KDD data can be relaxed by Proportional Representation (PR). However, adopting PR would deny the notion of winner-take-all by attracting a majority of the vote and also provide a fairly proportional share for any grouping of like-minded data. Furthermore, minorities and majorities would get a fair share of power and representation in data structure …


Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump Sep 2020

Sharing And Organizing Research Products As R Packages, Matti Vuorre, Matthew J. C. Crump

Publications and Research

A consensus on the importance of open data and reproducible code is emerging. How should data and code be shared to maximize the key desiderata of reproducibility, permanence, and accessibility? Research assets should be stored persistently in formats that are not software restrictive, and documented so that others can reproduce and extend the required computations. The sharing method should be easy to adopt by already busy researchers. We suggest the R package standard as a solution for creating, curating, and communicating research assets. The R package standard, with extensions discussed herein, provides a format for assets and metadata that satisfies …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan Aug 2020

Cooperative Target Tracking In Balanced Circular And Elliptical Formations, Lili Ma, Naira Hovakimyan

Publications and Research

This paper extends our earlier results on cooperative target tracking in cyclic pursuit using a group of mobile robots by further prescribing the formation radius and achieving an elliptical formation pattern. Prescribing the formation radius of a balanced circular formation is achieved by adjusting a parameter in the existing control input to each robot. The new elliptical formation pattern is obtained via a transformation matrix. Both single-integrator and double-integrator robot models are considered. The effectiveness of the proposed schemes is demonstrated by simulation examples.


Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner Jul 2020

Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner

Publications and Research

Autonomous unmanned aerial vehicles (UAVs) operating as a swarm can be deployed in austere environments, where cyber electromagnetic activities often require speedy and dynamic adjustments to swarm operations. Use of central controllers, UAV synchronization mechanisms or pre-planned set of actions to control a swarm in such deployments would hinder its ability to deliver expected services. We introduce artificial intelligence and game theory based flight control algorithms to be run by each autonomous UAV to determine its actions in near real-time, while relying only on local spatial, temporal and electromagnetic (EM) information. Each UAV using our flight control algorithms positions itself …


Cyber Security Techniques- What Is The Internet?, Amy J. Ramson Apr 2020

Cyber Security Techniques- What Is The Internet?, Amy J. Ramson

Open Educational Resources

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.


Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia Apr 2020

Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia

Publications and Research

This project involves the design, construction and testing of a personal reminder device for elderly who suffer from Alzheimer’s using a clock system and LED wearable technology. The device consists of an RGB LED strip connected to a 7-segment display (which operates as a clock circuit) attached to a microcontroller board. The device uses visual output to alert the user at that certain time the color being emitted represents the reminder the user set for that time. The project involves two phases. In the first phase, an RGB LED strip will be used to make a wearable device and tested …


Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza Jan 2020

Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza

Publications and Research

This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …