Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computers

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 19 of 19

Full-Text Articles in Computer Engineering

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Ontological Boundaries Between Humans And Computers And The Implications For Human-Machine Communication, Andrea L. Guzman Feb 2020

Ontological Boundaries Between Humans And Computers And The Implications For Human-Machine Communication, Andrea L. Guzman

Human-Machine Communication

In human-machine communication, people interact with a communication partner that is of a different ontological nature from themselves. This study examines how people conceptualize ontological differences between humans and computers and the implications of these differences for human-machine communication. Findings based on data from qualitative interviews with 73 U.S. adults regarding disembodied artificial intelligence (AI) technologies (voice-based AI assistants, automated-writing software) show that people differentiate between humans and computers based on origin of being, degree of autonomy, status as tool/tool-user, level of intelligence, emotional capabilities, and inherent flaws. In addition, these ontological boundaries are becoming increasingly blurred as technologies emulate …


Investigation Of Lstm Based Prediction For Dynamic Energy Management In Chip Multiprocessors, Milad Ghorbani Moghaddam, Wenkai Guan, Cristinel Ababei Mar 2018

Investigation Of Lstm Based Prediction For Dynamic Energy Management In Chip Multiprocessors, Milad Ghorbani Moghaddam, Wenkai Guan, Cristinel Ababei

Electrical and Computer Engineering Faculty Research and Publications

In this paper, we investigate the effectiveness of using long short-term memory (LSTM) instead of Kalman filtering to do prediction for the purpose of constructing dynamic energy management (DEM) algorithms in chip multi-processors (CMPs). Either of the two prediction methods is employed to estimate the workload in the next control period for each of the processor cores. These estimates are then used to select voltage-frequency (VF) pairs for each core of the CMP during the next control period as part of a dynamic voltage and frequency scaling (DVFS) technique. The objective of the DVFS technique is to reduce energy consumption …


Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr. May 2017

Hardware Design Theory (Using Raspberry Pi), Anthony Kelly, Thomas Blum Dr.

Undergraduate Research

The concept for this research proposal is focused on achieving three main objectives:

1) To understand the logic and design behind the Raspberry Pi (RbP) mini-computer model, including: all hardware components and their functions, the capabilities [and limits] of the RbP, and the circuit engineering for these components.

2) To be able to, using the Python high-level language, duplicate, manipulate, and create RbP projects ranging from basic user-input and response systems to the theories behind more intricate and complicated observatory sensors.

3) Simultaneously, in order to combine a mutual shared interest of History and to blend in work done within …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Standardized Testing Of Non-Standard Photovoltaic Pavement Surfaces, John H. Nussbaum, Robert A. Lake, Ronald A. Coutu Jr. Jul 2016

Standardized Testing Of Non-Standard Photovoltaic Pavement Surfaces, John H. Nussbaum, Robert A. Lake, Ronald A. Coutu Jr.

Electrical and Computer Engineering Faculty Research and Publications

Emerging photovoltaic products have expanded the applications for the technologies into markets previously unconsidered for what was thought to be a delicate electronic product. One company leading this effort, Solar Roadways, Incorporated, is producing pavement replacing photovoltaic systems and proposing their use in everything from sidewalks to runways. Current pavement testing methods cannot be applied to these non-homogenous structures to identify if they can support the required loads. However, the standards called out specifically for pavements may be able to be translated to these products and their non-homogenous structures and non-standard materials to identify if they are able to perform …


Fast Multi-Objective Cmode-Type Optimization Of Pm Machines Using Multicore Desktop Computers, Alireza Fatemi, Dan M. Ionel, Nabeel Demerdash, Thomas W. Nehl Jul 2016

Fast Multi-Objective Cmode-Type Optimization Of Pm Machines Using Multicore Desktop Computers, Alireza Fatemi, Dan M. Ionel, Nabeel Demerdash, Thomas W. Nehl

Electrical and Computer Engineering Faculty Research and Publications

Large-scale design optimization of electric machines is oftentimes practiced to achieve a set of objectives, such as the minimization of cost and power loss, under a set of constraints, such as maximum permissible torque ripple. Accordingly, the design optimization of electric machines can be regarded as a constrained optimization problem (COP). Evolutionary algorithms (EAs) used in the design optimization of electric machines including differential evolution (DE), which has received considerable attention during recent years, are unconstrained optimization methods that need additional mechanisms to handle COPs. In this paper, a new optimization algorithm that features combined multi-objective optimization with differential evolution …


The Fcc And The “Pre-Internet”, John Blevins Jul 2016

The Fcc And The “Pre-Internet”, John Blevins

Indiana Law Journal

Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.

This Article, however, argues that …


Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson Jun 2016

Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson

Computer Engineering

This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Effective Entity Resolution Methodology For Improving Data Quality And Reliability Of Service-Oriented Applications, Ewa Musial Jan 2014

Effective Entity Resolution Methodology For Improving Data Quality And Reliability Of Service-Oriented Applications, Ewa Musial

Legacy Theses & Dissertations (2009 - 2024)

This dissertation proposes new paradigms for improving the testing, reliability of service-oriented applications as well as the quality of data. Since it is difficult to track information flowing through the multiple tiers of an application, testing service-oriented systems can be very challenging. We present a methodology for testing service-oriented applications that takes into account all the components, including services, external services, and data components. The results of our experiments demonstrate that this approach greatly improves the effectiveness of testing service-oriented applications.


High-Performance, Scalable Optical Network-On-Chip Architectures, Xianfang Tan Aug 2013

High-Performance, Scalable Optical Network-On-Chip Architectures, Xianfang Tan

UNLV Theses, Dissertations, Professional Papers, and Capstones

The rapid advance of technology enables a large number of processing cores to be integrated into a single chip which is called a Chip Multiprocessor (CMP) or a Multiprocessor System-on-Chip (MPSoC) design. The on-chip interconnection network, which is the communication infrastructure for these processing cores, plays a central role in a many-core system. With the continuously increasing complexity of many-core systems, traditional metallic wired electronic networks-on-chip (NoC) became a bottleneck because of the unbearable latency in data transmission and extremely high energy consumption on chip. Optical networks-on-chip (ONoC) has been proposed as a promising alternative paradigm for electronic NoC with …


Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao Jun 2013

Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao

Dissertations and Theses

The rapidly increasing complexities of hardware designs are forcing design methodologies and tools to move to the Electronic System Level (ESL), a higher abstraction level with better productivity than the state-of-the-art Register Transfer Level (RTL). Behavioral synthesis, which automatically synthesizes ESL behavioral specifications to RTL implementations, plays a central role in this transition. However, since behavioral synthesis is a complex and error-prone translation process, the lack of designers' confidence in its correctness becomes a major barrier to its wide adoption. Therefore, techniques for establishing equivalence between an ESL specification and its synthesized RTL implementation are critical to bring behavioral synthesis …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


A Meta Analysis Of Critical Success Factors For Computer Technology Projects, Ross A. Baker Jan 2008

A Meta Analysis Of Critical Success Factors For Computer Technology Projects, Ross A. Baker

Theses

Project managers are continually in pursuit of a magic formula that will deliver a successful project. Companies arc interested in formulas for project success because billions of dollars arc wasted each year, in U.S.A. Information Technology projects alone. through poorly managed or failed projects. Failing projects arc not only bad for the individual project team members, but a failed project's impacts emanate outward to cause companies to decline or die. In addition, the targeted customers who receive inferior products, late products, or no products at all (due to project failures) are significantly impacted as well. Because failed computer technology projects …


Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez May 2007

Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez

Theses

Modem processors are designed to achieve greater amounts of instruction level parallelism (ILP) and thread level parallelism (TLP). Simultaneous multithreading (SMT) is an architecture that exploits both LLP and TLP. It improves the utilization of the processor resources by allowing multiple independent threads to reside in the pipeline and dynamically scheduling the available resources among the threads.

The first part of this thesis presents the development of a simultaneous multithreading processor simulator. The SMT simulator is derived from SimpleScalar, a superscalar processor simulator widely used in the computer architecture research field. The basic pipeline is expanded to allow multiple threads …


Trends. Supercomputer Sales And Nuclear Proliferation: The Surrealist Top Ten, Ibpp Editor Jul 1997

Trends. Supercomputer Sales And Nuclear Proliferation: The Surrealist Top Ten, Ibpp Editor

International Bulletin of Political Psychology

The author discusses supercomputers in conjunction with nuclear weapons.


Computers And Robotics, Wayne Tinga Jun 1985

Computers And Robotics, Wayne Tinga

Pro Rege

No abstract provided.