Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Computer Engineering

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla Aug 2023

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla

Computer Science Theses & Dissertations

The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …


Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny May 2022

Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny

Civil & Environmental Engineering Theses & Dissertations

Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …


Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah Dec 2021

Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah

Electrical & Computer Engineering Theses & Dissertations

The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to …


Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma Dec 2021

Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma

Computational Modeling & Simulation Engineering Theses & Dissertations

The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.

Perceiving the growth of such a micro-mobility …


Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz Oct 2019

Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz

Computational Modeling & Simulation Engineering Theses & Dissertations

Learning is the process of acquiring or modifying knowledge, behavior, or skills. The ability to learn is inherent to humans, animals, and plants, and even machines are provided with algorithms that could mimic in a restricted way the processes of learning. Humans learn from the time they are born until they die because of a continuous process of interaction between them and their environment. Behavioral Psychology Theories and Social Learning Theories study behavior learned from the environment and social interactions through stimulus-response. Some computer approaches to modeling human behavior attempted to represent the learning and decision-making processes using agent-based models. …


Effects Of Control Device And Task Complexity On Performance And Task Shedding During A Robotic Arm Task, Shelby K. Long Apr 2019

Effects Of Control Device And Task Complexity On Performance And Task Shedding During A Robotic Arm Task, Shelby K. Long

Psychology Theses & Dissertations

The use of robotic arms across domains is increasing, but the relationship between control features and performance is not fully understood. The goal of this research was to investigate the difference in task performance when using two different control devices at high and low task complexities when participants can shed tasks to automation. In this experiment, 40 undergraduates (24 females) used two control devices, a Leap Motion controller and an Xbox controller, to teleoperate a robotic arm in a high or low complexity peg placement task. Simultaneously, participants were tasked with scanning images for tanks. During the experiment, participants had …


Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan Apr 2019

Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan

Engineering Management & Systems Engineering Theses & Dissertations

Stakeholder analysis is the first step in the planning of most infrastructure projects. Selecting and then applying the best method for a project’s stakeholder analysis is extremely important for correctly assessing stakeholder opinions. Social media platforms allow stakeholders to participate directly in analysis. However, as with most other analysis methods, social media introduces inherent biases.

Social media is a powerful tool for communication and networking, and it also provides a valuable source of information for analyzing user opinions about infrastructure projects. By using data collected from Twitter, analysts can create networks to represent connections among users, quantify their similarities, and …


Design Of A Virtual Laboratory For Automation Control, Zelin Zhu Jul 2017

Design Of A Virtual Laboratory For Automation Control, Zelin Zhu

Computational Modeling & Simulation Engineering Theses & Dissertations

In the past, only students who studied on campus were able to access laboratory equipment in traditional lab courses; distance learning students, enrolled in online courses, were at a disadvantage for they could learn basic lab experiment principles but could never experience hands-on learning. Modeling and simulation can be a powerful tool for generating virtual laboratories for distance learning students. This thesis describes the design and development of a virtual laboratory for automation control using mechanical, electrical, and pneumatic components for an automation and control course at Old Dominion University. This virtual laboratory application was implemented for two platforms — …


Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad Jul 2016

Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad

Electrical & Computer Engineering Theses & Dissertations

This dissertation proposes novel computational modeling and computer vision methods for the analysis and discovery of differential traits in subjects with Autism Spectrum Disorders (ASD) using video and three-dimensional (3D) images of face and facial expressions. ASD is a neurodevelopmental disorder that impairs an individual’s nonverbal communication skills. This work studies ASD from the pathophysiology of facial expressions which may manifest atypical responses in the face. State-of-the-art psychophysical studies mostly employ na¨ıve human raters to visually score atypical facial responses of individuals with ASD, which may be subjective, tedious, and error prone. A few quantitative studies use intrusive sensors on …


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …


Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens Apr 2014

Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens

Electrical & Computer Engineering Theses & Dissertations

The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …


The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske Apr 2013

The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske

Engineering Management & Systems Engineering Projects for D. Eng. Degree

Computer facilitated Social Networking (SN) is becoming more prevalent in our society, both in our personal and professional lives. As its use grows, there is a desire to determine how it will impact an organization. If it can positively impact an organization then it is an initiative that could be embraced and leveraged for any number of business related activities from marketing to engineering. This project develops and implements a social networking treatment for an engineering organization in order to determine how it impacts the responsiveness and performance of the organization. The treatment includes an online tool, a training package, …


Automatic High-Fidelity 3d Road Network Modeling, Jie Wang Jul 2011

Automatic High-Fidelity 3d Road Network Modeling, Jie Wang

Computational Modeling & Simulation Engineering Theses & Dissertations

Many computer applications such as racing games and driving simulations frequently make use of 3D high-fidelity road network models for a variety of purposes. However, there are very few existing methods for automatic generation of 3D realistic road networks, especially for those in the real world. On the other hand, vast road network GIS data have been collected in the past and used by a wide range of applications, such as navigation and evaluation. A method that can automatically produce 3D high-fidelity road network models from 2D real road GIS data will significantly reduce both the labor and time needed …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …


Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Architectural Optimization Of Digital Libraries, Aileen O. Biser Aug 1998

Architectural Optimization Of Digital Libraries, Aileen O. Biser

Computer Science Theses & Dissertations

This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …


Computer Networks And The Teaching Of English As A Second Language: How Networks Affect Second Language Acquisition, Kirstin J. Reed-Perez Dec 1994

Computer Networks And The Teaching Of English As A Second Language: How Networks Affect Second Language Acquisition, Kirstin J. Reed-Perez

English Theses & Dissertations

No abstract provided.