Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 94

Full-Text Articles in Computer Engineering

Sc-Fuse: A Feature Fusion Approach For Unpaved Road Detection From Remotely Sensed Images, Aniruddh Saxena Dec 2023

Sc-Fuse: A Feature Fusion Approach For Unpaved Road Detection From Remotely Sensed Images, Aniruddh Saxena

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Road network extraction from remote sensing imagery is crucial for numerous applications, ranging from autonomous navigation to urban and rural planning. A particularly challenging aspect is the detection of unpaved roads, often underrepresented in research and data. These roads display variability in texture, width, shape, and surroundings, making their detection quite complex. This thesis addresses these challenges by creating a specialized dataset and introducing the SC-Fuse model.

Our custom dataset comprises high resolution remote sensing imagery which primarily targets unpaved roads of the American Midwest. To capture the diverse seasonal variation and their impact, the dataset includes images from different …


The School Of Engineering And Computer Science Class Of 2023 Academic Celebration Program, Cedarville University May 2023

The School Of Engineering And Computer Science Class Of 2023 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong Jan 2023

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen May 2022

Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen

Honors Theses

This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …


The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University May 2022

The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii Dec 2021

Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii

Publications and Research

The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.

Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …


Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni May 2021

Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni

Honors Scholar Theses

With nearly a third of the world’s population suffering from food-induced chronic diseases such as obesity, the role of food in community health is required now more than ever. While current research underscores food proximity and density, there is a dearth in regard to its nutrition and quality. However, recent research in geospatial data collection and analysis as well as intelligent deep learning will help us study this further.

Employing the efficiency and interconnection of computer vision and geospatial technology, we want to study whether healthy food in the community is attainable. Specifically, with the help of deep learning in …


The Future Of Artificial Intelligence, Alex Guerra May 2021

The Future Of Artificial Intelligence, Alex Guerra

Emerging Writers

Whether we like it or not Artificial Intelligence (AI) is coming, and we are not ready for it. AI has unimaginable potential and will revolutionize the world over the next few decades, but with this great potential we are faced with choices that could prove detrimental to humanity. This article examines the challenges AI presents and explores possible solutions to make AI align with human interests.


The School Of Engineering And Computer Science Class Of 2021 Computer Science Academic Celebration Program, Cedarville University Apr 2021

The School Of Engineering And Computer Science Class Of 2021 Computer Science Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Automated Test Generation For Validating Systemc Designs, Bin Lin Jan 2021

Automated Test Generation For Validating Systemc Designs, Bin Lin

Dissertations and Theses

Modern system design involves integration of all components of a system on a single chip, namely System-on-a-Chip (SoC). The ever-increasing complexity of SoCs and rapidly decreasing time-to-market have pushed the design abstraction to the electronic system level (ESL), in order to increase design productivity. SystemC is a widely used ESL modeling language that plays a central role in modern SoCs design process. ESL SystemC designs usually serve as executable specifications for the subsequent SoCs design flow. Therefore, undetected bugs in ESL SystemC designs may propagate to low-level implementations or even final silicon products. In addition, modern SoCs design often involves …


The Youplanner, Taylor Burgess Jan 2021

The Youplanner, Taylor Burgess

Williams Honors College, Honors Research Projects

Staying organized can be difficult. A four tier web application was created to help in the endeavor. Utilizing software engineering practices, an online notepad was created where users can add, update, and delete notes. The application was a full stack application. For the backend, MySQL was the language and phpMyAdmin was the server. For the front end, PHP and Bootstrap 5.1 was used.


Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey Jan 2021

Computational Simulation And Analysis Of Neuroplasticity, Madison E. Yancey

Browse all Theses and Dissertations

Homeostatic synaptic plasticity is the process by which neurons alter their activity in response to changes in network activity. Neuroscientists attempting to understand homeostatic synaptic plasticity have developed three different mathematical methods to analyze collections of event recordings from neurons acting as a proxy for neuronal activity. These collections of events are from control data and treatment data, referring to the treatment of neuron cultures with pharmacological agents that augment or inhibit network activity. If the distribution of control events can be functionally mapped to the distribution of treatment events, a better understanding of the biological processes underlying homeostatic synaptic …


Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub Oct 2020

Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub

Masters Theses & Specialist Projects

Supply chain management is the key success for each business. Having a robust supply chain will help the business to improve service, quality, reduce the costs, improve the speed, and be more flexible. Organizations need to look at data and deploy plans to move the product from operation to logistics to manage a global chain. In this paper we will use E-Comm shipment data to identify the best locations to build a new distribution center (DC).


Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt Jan 2020

Identifying Knowledge Gaps Using A Graph-Based Knowledge Representation, Daniel P. Schmidt

Browse all Theses and Dissertations

Knowledge integration and knowledge bases are becoming more and more prevalent in the systems we use every day. When developing these knowledge bases, it is important to ensure the correctness of the information upon entry, as well as allow queries of all sorts; for this, understanding where the gaps in knowledge can arise is critical. This thesis proposes a descriptive taxonomy of knowledge gaps, along with a framework for automated detection and resolution of some of those gaps. Additionally, the effectiveness of this framework is evaluated in terms of successful responses to queries on a knowledge base constructed from a …


Applications Of Cloud-Based Quantum Computers With Cognitive Computing Algorithms In Automated, Evidence-Based Virginia Geriatric Healthcare, Henry Childs Jan 2020

Applications Of Cloud-Based Quantum Computers With Cognitive Computing Algorithms In Automated, Evidence-Based Virginia Geriatric Healthcare, Henry Childs

Auctus: The Journal of Undergraduate Research and Creative Scholarship

Quantum computers have recently headlined IBM’s next generation of products promoting computational evolution. After the successful release of the cloud-streaming quantum computer IBM Watson Q, the company has released projections for future development of quantum devices. Because of the incredible processing power of these machines and the expected integration into everyday life in the near future, what implications can this have in the healthcare field?

I am studying cloud-based quantum computers with natural language processing (NLP) algorithms and patient health record data because I want to understand automated, evidenced-based co-optimized treatment of home-bound geriatric patients in order to help my …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow Jan 2020

An Adversarial Framework For Deep 3d Target Template Generation, Walter E. Waldow

Browse all Theses and Dissertations

This paper presents a framework for the generation of 3D models. This is an important problem for many reasons. For example, 3D models are important for systems that are involved in target recognition. These systems use 3D models to train up accuracy on identifying real world object. Traditional means of gathering 3D models have limitations that the generation of 3D models can help overcome. The framework uses a novel generative adversarial network (GAN) that learns latent representations of two dimensional views of a model to bootstrap the network’s ability to learn to generate three dimensional objects. The novel architecture is …


The School Of Engineering And Computer Science Class Of 2019 Computer Science Academic Celebration Program, Cedarville University May 2019

The School Of Engineering And Computer Science Class Of 2019 Computer Science Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


Minutes & Seconds: The Scientists, Patrick Aievoli Sep 2018

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books Collection

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an interesting …


The School Of Engineering And Computer Science Class Of 2018 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University May 2018

The School Of Engineering And Computer Science Class Of 2018 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


An Investigation Of Low Frequency Noise In Server Rooms, Ahmed Al Naami Apr 2018

An Investigation Of Low Frequency Noise In Server Rooms, Ahmed Al Naami

Theses & Dissertations

Noise in a server room can have a major impact on the performance and well-being of the occupants. Sound level and low frequency noise are considered factors that influence the hearing ability of workers. This thesis is an investigation of low-frequency noise in server rooms. We conducted the field study in a server room for a large financial institution. Some employees in this study indicated that they experienced headaches from the noise and requested an analysis of the sound to determine if there were any potential adverse health effects. Attributes of the noise were investigated by evaluating the sound pressure …


The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg Jan 2018

The Fat-Pyramid: A Robust Network For Parallel Computation, Ronald I. Greenberg

Ronald Greenberg

This paper shows that a fat-pyramid of area Theta(A) built from processors of size lg A requires only O(lg^2 A) slowdown in bit-times to simulate any network of area A under very general conditions. Specifically, there is no restriction on processor size (amount of attached memory) or number of processors in the competing network, nor is the assumption of unit wire delay required. This paper also derives upper bounds on the slowdown required by a fat-pyramid to simulate a network of larger area in the case of unit wire delay.


A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla Jan 2018

A Twitter-Based Study For Understanding Public Reaction On Zika Virus, Roopteja Muppalla

Browse all Theses and Dissertations

In recent times, social media platforms like Twitter have become more popular and people have become more interactive and responsive than before. People often react to every news in real-time and within no-time, the information spreads rapidly. Even with viral diseases like Zika, people tend to share their opinions and concerns on social media. This can be leveraged by the health officials to track the disease in real-time thereby reducing the time lag due to traditional surveys. A faster and accurate detection of the disease can allow health officials to understand people's opinion of the disease and take necessary precautions …


The School Of Engineering And Computer Science Class Of 2017 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University May 2017

The School Of Engineering And Computer Science Class Of 2017 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley Apr 2017

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley

The Research and Scholarship Symposium (2013-2019)

The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a …


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon Jan 2017

Visualization Of Carbon Monoxide Particles Released From Firearms, Sadan Suneesh Menon

Browse all Theses and Dissertations

A number of soldiers have come forward to report discomfort, irritation and respiratory problems after taking part in a live firing session. These problems are caused due to the fumes and particulates emitted from the gun upon firing. There exists substantial research work focused on lead and other harmful metallic particulates expelled from a firearm, since they are the most harmful among the other emissions. However, our research focuses on visualizing the carbon monoxide (CO) particles released from a firearm in order to help understand adverse effects they may have on the human body. We use data provided by researchers …


Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu Jan 2017

Rendering Owl In Latex For Improved Readability: Extensions To The Owlapi, Cogan M. Shimizu

Browse all Theses and Dissertations

As ontology engineering is inherently a multidisciplinary process, it is necessary to utilize multiple vehicles to present an ontology to a user. In order to examine the content of an ontology, formal logic renderings of the axioms appear to be a very helpful approach for some. This thesis introduces a number of incremental improvements to the OWLAPI's \LaTeX{} rendering framework in order to improve the readability, concision, and correctness of OWL files translated into Description Logic and First Order Logic. In addition, we examine the efficacy of these renderings as vehicles for understanding an ontology.


Spectrochet: A Game, Lucas Gnos Jun 2016

Spectrochet: A Game, Lucas Gnos

Computer Engineering

No abstract provided.