Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Selected Works

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 30

Full-Text Articles in Computer Engineering

Analysis Of Gait Characteristics In Mentally Handicapped Individuals, Prakriti Parijat, Jian Liu, Thurmon E. Lockhart, Courtney Haynes Nov 2017

Analysis Of Gait Characteristics In Mentally Handicapped Individuals, Prakriti Parijat, Jian Liu, Thurmon E. Lockhart, Courtney Haynes

Jian Liu

Physical and motor dysfunctions in mentally handicapped individuals predispose them to a higher risk of slip and fall accidents. It is estimated that over 60 million people are currently suffering with some level of developmentally related cognitive impairment (American Disability Act ADA, 2000). Mental retardation occurs in 2.5-3% of the general population. About 6-7.5 million mentally retarded individuals live in the United States alone (ADA, 2000). Slip induced fall accidents are a primary source of injury in people with mental retardation (MR). Often, the incidence of falls among this population is compounded by other disabilities such as autism, seizure, and …


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Nov 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …


Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward Oct 2017

Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward

Nicholas Hayward

Software metrics are a critical tool which provide continuous insight to products and processes and help build reliable software in mission critical environments. Using software metrics we can perform calculations that help assess the effectiveness of the underlying software or process. The two types of metrics relevant to our work is complexity metrics and in-process metrics. Complexity metrics tend to focus on intrinsic code properties like code complexity. In-process metrics focus on a higher-level view of software quality, measuring information that can provide insight into the underlying software development process.

Our aim is to develop and evaluate a metrics dashboard …


Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig Oct 2017

Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig

William L Honig

In this talk I will introduce the importance of metrics, or measures, and the role they play in the development of high quality computer systems. I will review some key mega trends in computer science over the last three decades and then explain why I believe the trend to small networked systems, along with metrics and software engineering will define the future of high technology computer based systems. I first learned about metrics at the Bell System where everything was measured. Metrics can be understood easily if you think of them as measures, for example of calories or salt in …


Introduction To Atomic Requirements, William L. Honig Oct 2017

Introduction To Atomic Requirements, William L. Honig

William L Honig

An introduction to requirements and the importance of making single atomic requirements statements. Atomic requirements have advantages and improve the requirements process, support requirement verification and validation, enable traceability, support testability of systems, and provide management advantages. Why has there been so little emphasis on atomic requirements?


Requirements Quick Notes, William L. Honig, Shingo Takada Oct 2017

Requirements Quick Notes, William L. Honig, Shingo Takada

William L Honig

A short introduction to requirements and their role in system development. Includes industry definition of requirements, overview of basic requirements process including numbering of requirements, ties to testing, and traceability. An introduction to requirements quality attributes (correct, unambiguous, etc.) Includes references to requirements process, numbering, and quality papers.


An Example Of Atomic Requirements - Login Screen, William L. Honig Oct 2017

An Example Of Atomic Requirements - Login Screen, William L. Honig

William L Honig

A simple example of what an atomic or individual or singular requirement statement should be. Using the example of the familiar login screen, shows the evolution from a low quality initial attempt at requirements to a complete atomic requirement statement. Introduces the idea of a system glossary to support the atomic requirement.


Requirements Metrics - Definitions Of A Working List Of Possible Metrics For Requirements Quality, William L. Honig Oct 2017

Requirements Metrics - Definitions Of A Working List Of Possible Metrics For Requirements Quality, William L. Honig

William L Honig

A work in progress to define a metrics set for requirements. Metrics are defined that apply to either the entire requirements set (requirements document as a whole) or individual atomic (or singular, individual) requirements statements. Requirements are identified with standard names and a identification scheme and include both subjective and objective measures. An example metric for the full set of requirements: Rd2 - Requirements Consistency, Is the set of atomic requirements internally consistent, with no contradictions, no duplication between individual requirements? An example of a metric for a single requirement: Ra4 - Requirement Verifiability, How adequately can this requirement be …


Atomic Requirements Quick Notes, William L. Honig, Shingo Takada Oct 2017

Atomic Requirements Quick Notes, William L. Honig, Shingo Takada

William L Honig

Working paper on atomic requirements for systems development and the importance of singular, cohesive, individual requirements statements. Covers possible definitions of atomic requirements, and their characteristics. Atomic requirements improve many parts of the development process from requirements to testing and contracting.


Building A Data “Deep State” @Gvsu, Matt Schultz Oct 2017

Building A Data “Deep State” @Gvsu, Matt Schultz

Matt Schultz

GVSU Libraries is advancing an agenda to evolve its data management support from that of ad-hoc faculty consultations to enacting a suite of new collaborative and dependable library services. This presentation will share details and lessons-learned from experimentations that range from liaison training to repository software developments.


Web Archiving At Gvsu, Annie Benefiel, Matt Schultz Oct 2017

Web Archiving At Gvsu, Annie Benefiel, Matt Schultz

Matt Schultz

In 2017, GVSU Libraries began a web archiving initiative to capture our public-facing administrative, academic, arts, university publications and other websites and documents. In this presentation, Annie Benefiel (Archivist for Collection Management) and Matt Schultz (Metadata & Digital Curation Librarian) described the policy development process, the use of Archive-It as the web archiving solution, and the internal workflows followed to accomplish this important activity of capturing GVSU's institutional record.


Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward Oct 2017

Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward

Konstantin Läufer

Software metrics are a critical tool which provide continuous insight to products and processes and help build reliable software in mission critical environments. Using software metrics we can perform calculations that help assess the effectiveness of the underlying software or process. The two types of metrics relevant to our work is complexity metrics and in-process metrics. Complexity metrics tend to focus on intrinsic code properties like code complexity. In-process metrics focus on a higher-level view of software quality, measuring information that can provide insight into the underlying software development process.

Our aim is to develop and evaluate a metrics dashboard …


Access Update For Gvsu, Matt Schultz, Kyle Felker Oct 2017

Access Update For Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

By Fall 2016, GVSU Libraries began making a major strategic and technology shift toward the use of open source technologies versus commercial vendor solutions for digital preservation and access. In this presentation to the Mid-Michigan Digital Practitioners (MMDP) community, Matt Schultz (Metadata & Digital Curation Librarian) and Kyle Felker (Digital Initiatives Librarian) provide updates on these new directions.


One Model Per Entity: Using Hundreds Of Machine Learning Models To Recognize And Normalize Biomedical Names In Text, Victor Bellon, Raul Rodriguez-Esteban Sep 2017

One Model Per Entity: Using Hundreds Of Machine Learning Models To Recognize And Normalize Biomedical Names In Text, Victor Bellon, Raul Rodriguez-Esteban

alex savov

We explored a new approach to named entity recognition based on hundreds of machine learning models, each trained to distinguish a single entity, and showed its application to gene name identification (GNI). The rationale for our approach, which we named “one model per entity” (OMPE), was that increasing the number of models would make the learning task easier for each individual model. Our training strategy leveraged freelyavailable database annotations instead of manually-annotated corpora. While its performance in our proof-of-concept was disappointing, we believe that there is enough room for improvement that such approaches could reach competitive performance while eliminating the …


Effects Of Anthropomorphism On Trust In Human-Robot Interaction, Keith R. Macarthur, William T. Shugars, Tracy L. Sanders, Peter A. Hancock Aug 2017

Effects Of Anthropomorphism On Trust In Human-Robot Interaction, Keith R. Macarthur, William T. Shugars, Tracy L. Sanders, Peter A. Hancock

Keith Reid MacArthur

Robots are being integrated into everyday use, making the evaluation of trust in human-robot interactions (HRI) important to ensure their acceptance and correct usage (Lee & See, 2004; Parasuraman & Riley, 1997). Goetz, Kiesler, and Powers (2003) found that participants preferred robots with an anthropomorphic appearance appropriate for the social context of the task. This preference for robots with human-like appearance may be indicative of increased levels of trust and therefore, the present research evaluates the effects of anthropomorphism on trust.
Eighteen participants (Mage = 34.22, SDage = 10.55, n = 8 male, n =10 female) with …


Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, Barath Narayanan Narayanan, Russell C. Hardie, Temesguen Messay Jun 2017

Analysis Of Various Classification Techniques For Computer Aided Detection System Of Pulmonary Nodules In Ct, Barath Narayanan Narayanan, Russell C. Hardie, Temesguen Messay

Russell C. Hardie

Lung cancer is the leading cause of cancer death in the United States. It usually exhibits its presence with the formation of pulmonary nodules. Nodules are round or oval-shaped growth present in the lung. Computed Tomography (CT) scans are used by radiologists to detect such nodules. Computer Aided Detection (CAD) of such nodules would aid in providing a second opinion to the radiologists and would be of valuable help in lung cancer screening. In this research, we study various feature selection methods for the CAD system framework proposed in FlyerScan. Algorithmic steps of FlyerScan include (i) local contrast enhancement (ii) …


On The Simulation And Mitigation Of Anisoplanatic Optical Turbulence For Long Range Imaging, Russell C. Hardie, Daniel A. Lemaster Jun 2017

On The Simulation And Mitigation Of Anisoplanatic Optical Turbulence For Long Range Imaging, Russell C. Hardie, Daniel A. Lemaster

Russell C. Hardie

We describe a numerical wave propagation method for simulating long range imaging of an extended scene under anisoplanatic conditions. Our approach computes an array of point spread functions (PSFs) for a 2D grid on the object plane. The PSFs are then used in a spatially varying weighted sum operation, with an ideal image, to produce a simulated image with realistic optical turbulence degradation. To validate the simulation we compare simulated outputs with the theoretical anisoplanatic tilt correlation and differential tilt variance. This is in addition to comparing the long- and short-exposure PSFs, and isoplanatic angle. Our validation analysis shows an …


Differential Tilt Variance Effects Of Turbulence In Imagery: Comparing Simulation With Theory, Daniel A. Lemaster, Russell C. Hardie, Szymon Gladysz, Matthew D. Howard, Michael Armand Rucci, Matthew E. Trippel, Jonathan D. Power, Barry K. Karch Jun 2017

Differential Tilt Variance Effects Of Turbulence In Imagery: Comparing Simulation With Theory, Daniel A. Lemaster, Russell C. Hardie, Szymon Gladysz, Matthew D. Howard, Michael Armand Rucci, Matthew E. Trippel, Jonathan D. Power, Barry K. Karch

Russell C. Hardie

Differential tilt variance is a useful metric for interpreting the distorting effects of turbulence in incoherent imaging systems. In this paper, we compare the theoretical model of differential tilt variance to simulations. Simulation is based on a Monte Carlo wave optics approach with split step propagation. Results show that the simulation closely matches theory. The results also show that care must be taken when selecting a method to estimate tilts.


Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger Jun 2017

Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger

Randall Geiger

Structural Health Monitoring (SHM) of transportation infrastructures is a complex task, typically conducted by visual inspection due to the technical and economical constrains of existing health monitoring technologies. It results that health monitoring is highly dependent on scheduling and on the judgment of the inspectors, which can be costly and ineffective. Thus, it is fundamental to automate the SHM process to allow timely inspection, maintenance, and management of transportation infrastructure. The authors propose a flexible membrane that can be deployed over large surfaces, at low cost, for automatic and continuous monitoring of strains. The membrane, termed sensing skin, is constituted …


Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen Jun 2017

Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen

Johnny Wong

Colonoscopy has contributed to a marked decline in the number of colorectal cancer related deaths. However, recent data suggest that there is a significant (4-12%) miss-rate for the detection of even large polyps and cancers. To address this, we have been investigating an ‘automated feedback system’ which informs the endoscopist of possible sub-optimal inspection during colonoscopy. A fundamental step of this system is to distinguish non-informative frames from informative ones. Existing methods for this cannot classify water/bubble frames as non-informative even though they do not carry any useful visual information of the colon mucosa. In this paper, we propose a …


Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh Jun 2017

Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh

Johnny Wong

We propose a new fast spatio-temporal technique that detects an operation scene---a video segment corresponding to a single purpose diagnosis action or a single purpose therapeutic action. The technique utilizes (1) color contrast of the cable region and the background, (2) the new area-based coordinate system to compute spatial features, and (3) the history of locations of detected cables of the instrument in a video to discard false regions. The proposed technique and software are useful for (1) automatic documentation of diagnostic or therapeutic operations at the end of the procedure, (2) a second review for causes of complications due …


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Jun 2017

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in …


The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover Jun 2017

The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover

Diane Rover

This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed …


Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad May 2017

Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad

Zubair Ahmad

The Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. Peering plays a significant part in driving the economic growth of ASes and is contributing to a variety of structural changes in the Internet. IXPs are a primary component of this peering ecosystem and are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In this dissertation we study and analyze the overall affects of peering and IXP infrastructure on the Internet. We observe IXP peering is enabling …


Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce May 2017

Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce

Joshua M. Pearce

Although theoretically the patent system is meant to bolster innovation, the current United States Patent and Trademark Office (USPTO) is cumbersome and involves a significant time investment to locate inactive patents less than 20 years old. This article reports on the development of an open source database to find these public domain ideas. First, a search strategy is explained. Then the operation and use of free and open source software are detailed to meet the needs of open hardware innovators. Finally, a case study is presented to demonstrate the utility of the approach with 3-D printing. The results showed how …


Research Poster.Pdf, Desiree Dominguez Mar 2017

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones …


Swarm Engineering, S. Kazadi '90 Mar 2017

Swarm Engineering, S. Kazadi '90

Sanza Kazadi

Swarm engineering is the natural evolution of the use of swarm-based techniques in the accomplishment of high level tasks using a number of simple robots. In this approach, one seeks not to generate a class of behaviors designed to accomplish a given global goal, as is the approach typically found in mainstream robotics. Once the class of behaviors has been understood and decided upon, specific behaviors designed to accomplish this goal may be generated that will complete the desired task without any concern about whether or not the final goal will actually be completed. As long as the generated behaviors …


Augmented Reality Engine In Classroom_Hololens.Jpg, Lori Brown Jan 2017

Augmented Reality Engine In Classroom_Hololens.Jpg, Lori Brown

Lori Brown

Transformative aviation training using augmented reality in the classroom for pilot training.


Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi Dec 2016

Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi

Zhengyu Yang

Hypervisor-based virtualization technology has been successfully used to deploy high-performance and scalable infrastructure for Hadoop, and now Spark applications. Container-based virtualization techniques are becoming an important option, which is increasingly used due to their lightweight operation and better scaling when compared to Virtual Machines (VM). With containerization techniques such as Docker becoming mature and promising better performance, we can use Docker to speed-up big data applications. However, as applications have different behaviors and resource requirements, before replacing traditional hypervisor-based virtual machines with Docker, it is important to analyze and compare performance of applications running in the cloud with VMs and …


Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim Dec 2016

Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Named data networking (NDN) resolves the traditional TCP/IP based Internet problems (i.e., location dependent, complex usage, scalability, poor resource utilization etc.) and is considered as an eligible candidate for futuristic Internet paradigm. In NDN-based mobile ad hoc networks (MANETs), the participating nodes are operated in highly dynamic and challenge able environment such as low battery power, channel fluctuations, intermittent connectivity and so on. Due to the broadcast nature of the wireless channel, the NDN-based MANETs highlight severe issues (e.g., packet collisions, flooding, data redundancy, packet retransmissions), which further degrade the network performance. In this paper, to cope with these problems, …