Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Software

PDF

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 49

Full-Text Articles in Computer Engineering

University Of Rhode Island Course Information Assistant, Daniel Gauthier May 2019

University Of Rhode Island Course Information Assistant, Daniel Gauthier

Senior Honors Projects

Personal voice-interactive systems have become ubiquitous in daily life. There are many of these digital assistants such as Siri, Alexa, and Google Assistant. The chances are high you have access to one right now. This technology has reached a point where the context of a conversation can be maintained, which is a vast improvement over earlier technology. Interactions without conversational context can limit interactions greatly and this was the case for previous digital assistants. Every time someone would say something to an assistant, it was like they were constantly changing operators on a customer service line. The assistants can now ...


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly ...


Hardware And Software (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li Oct 2018

Hardware And Software (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li

Computer Science and Information Technology Grants Collections

This Grants Collection for Hardware and Software was created under a Round Eleven ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


User's Manual For Tardigrade Risk Assessment, Alexis M. Shook May 2018

User's Manual For Tardigrade Risk Assessment, Alexis M. Shook

University of New Orleans Theses and Dissertations

This user-guide provides instructions for operating Tardigrade 1.1.3, a cybersecurity software for Nollysoft, LLC. This guide instructs users step-by-step on how to set security controls, risk assessments, and administrative maintenance. Tardigrade 1.1.3 is a Risk Assessment Enterprise that evaluates the risk level of corporations and offers solutions to any security gaps within an organization. Tardigrade 1.1.3 is a role-based software that operates through three modules, Cybersecurity Assessment, Internal Control, and Security Requirement Traceability Matrix.


Behavior-Based Authentication System, Taylor Means, Jared Frank Apr 2018

Behavior-Based Authentication System, Taylor Means, Jared Frank

Honors Theses AY 17/18

All current forms of authentication are exploitable via social engineering, theft, hacking, or replication. Due to this, a new form of authentication should be explored: behavioral. A solution to this problem would result in more secure digital environment, including physical access to computers as well as software access. The maze-solving approach presented by this project allows for multiple variables to be observed within a user, presenting many facets of behavior that can be analyzed. In order to solve this problem, enough parameters must be collected and contrasted against one another in order to tell different humans apart from each other ...


An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon Mar 2018

An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon

Honors Theses, University of Nebraska-Lincoln

The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.

Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.


Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos Jan 2018

Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos

Computational Medicine Center Faculty Papers

MINTbase is a repository that comprises nuclear and mitochondrial tRNA-derived fragments ('tRFs') found in multiple human tissues. The original version of MINTbase comprised tRFs obtained from 768 transcriptomic datasets. We used our deterministic and exhaustive tRF mining pipeline to process all of The Cancer Genome Atlas datasets (TCGA). We identified 23 413 tRFs with abundance of ≥ 1.0 reads-per-million (RPM). To facilitate further studies of tRFs by the community, we just released version 2.0 of MINTbase that contains information about 26 531 distinct human tRFs from 11 719 human datasets as of October 2017. Key new elements include: the ...


Exploration Of Audio Synthesizers, Timothy Lindquist Jan 2018

Exploration Of Audio Synthesizers, Timothy Lindquist

Creative Components

In this creative component, I explore how synthesizers originated as well as the various techniques available for complex signal generation. The primary synthesis techniques researched were Additive, Subtractive, Frequency Modulation, and Sample-Based Synthesis. After extensive background information was examined, a series of MATLAB scripts were created to verify the synthesis implementation and demonstrate understanding. Following this, I set out to design my own hybrid synthesizer using a combination of the various techniques learned. The synthesizer created is a polyphonic composition device capable of audio generation as well as audio manipulation. It demonstrates core principles from each of the researched techniques ...


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell Jun 2017

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was ...


Poly Drop, Zachary T. Scott, Lilly J. Paul Jun 2017

Poly Drop, Zachary T. Scott, Lilly J. Paul

Computer Engineering

Poly Drop is a software interface to control an Open Drop digital micro-fluidics system. We obtained a hardware system from Gaudi labs. Our task was to create a Graphical User Interface that made the control of the device easier and more automated for better testing. We created software that had 3 parts: a control GUI, arduino code to control the hardware, and Image Analysis that gives the user information such as location and color of liquid drops as they move across the electrode grid of the Open Drop system. The GUI was developed using Java Swing. The communication between the ...


A Survey Of Addictive Software Design, Chauncey J. Neyman Jun 2017

A Survey Of Addictive Software Design, Chauncey J. Neyman

Computer Science and Software Engineering

The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases ...


Evergreen: A Senior Project, Ashley Grover Mar 2017

Evergreen: A Senior Project, Ashley Grover

Computer Engineering

No abstract provided.


A Practical Framework For Finding Software Vulnerabilities In Sdn Controllers, Walid Sharif Jan 2017

A Practical Framework For Finding Software Vulnerabilities In Sdn Controllers, Walid Sharif

Interdisciplinary Telecommunications Graduate Theses & Dissertations

Software-defined networking (SDN) has the potential to greatly reduce the cost and increase the manageability of large networks. However, there are multiple security concerns holding back its wide-scale adoption. While previous research has mainly examined securing the data and application planes of SDN, we argue that the controller itself is the most vulnerable component in the SDN architecture because it is both the most central and the most software-reliant component. Therefore, research into better securing the controller is central to any effort at securing the SDN architecture. This paper examines the question of how to better secure the controller by ...


Forget-Me-Not, Daniel Barber-Cironi, Shawn Nicholson, Jake Kruse, Nicole Dent Jan 2017

Forget-Me-Not, Daniel Barber-Cironi, Shawn Nicholson, Jake Kruse, Nicole Dent

Williams Honors College, Honors Research Projects

The purpose of Forget-Me-Not is to provide another level of care and comfort to those suffering from mild dementia, as well as provide further assistance for a friend, family member, or caretaker who may look after them. Research shows that timely reminders and persistent information can greatly improve the quality of life for those afflicted with mild dementia (Mokhtari et al.). Forget-Me-Not’s persistent display and wearable smart-bracelet offer a customizable and well connected system to provide these reminders. For the caretaker, a mobile application is provided in order to maintain the display and notify them of emergencies or critical ...


Activist: A New Framework For Dataset Labelling, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee Sep 2016

Activist: A New Framework For Dataset Labelling, Jack O'Neill, Sarah Jane Delany, Brian Mac Namee

Conference papers

Acquiring labels for large datasets can be a costly and time-consuming process. This has motivated the development of the semi-supervised learning problem domain, which makes use of unlabelled data — in conjunction with a small amount of labelled data — to infer the correct labels of a partially labelled dataset. Active Learning is one of the most successful approaches to semi-supervised learning, and has been shown to reduce the cost and time taken to produce a fully labelled dataset. In this paper we present Activist; a free, online, state-of-the-art platform which leverages active learning techniques to improve the efficiency of dataset labelling ...


Activist: A New Framework For Dataset Labelling, Jack O'Neill, Sarah Jane Delany, Brian Macnamee Sep 2016

Activist: A New Framework For Dataset Labelling, Jack O'Neill, Sarah Jane Delany, Brian Macnamee

Conference papers

Acquiring labels for large datasets can be a costly and time-consuming process. This has motivated the development of the semi-supervised learning problem domain, which makes use of unlabelled data — in conjunction with a small amount of labelled data — to infer the correct labels of a partially labelled dataset. Active Learning is one of the most successful approaches to semi-supervised learning, and has been shown to reduce the cost and time taken to produce a fully labelled dataset. In this paper we present Activist; a free, online, state-of-the-art platform which leverages active learning techniques to improve the efficiency of dataset labelling ...


Eventflowslicer: A Goal-Based Test Case Generation Strategy For Graphical User Interfaces, Jonathan Saddler Aug 2016

Eventflowslicer: A Goal-Based Test Case Generation Strategy For Graphical User Interfaces, Jonathan Saddler

Computer Science and Engineering: Theses, Dissertations, and Student Research

Automated test generation techniques for graphical user interfaces include model-based approaches that generate tests from a graph or state machine model of the interface, capture-replay methods that require the user to specify and demonstrate each test case individually, and modeling-language approaches that provide templates for abstract test cases. There has been little work, however, in automated goal-based testing, where the goal is a realistic user task, a function, or an abstract behavior. Recent work in human performance regression testing (HPRT) has shown that there is a need for generating multiple test cases that execute the same user task in different ...


Cloud-Based Secure Logger For Medical Devices, Hung Nguyen, Bipeen Acharya, Radoslav Ivanov, Andreas Haeberlen, Linh T.X. Phan, Oleg Sokolsky, Jesse Walker, James Weimer, C. William Hanson Iii, Insup Lee Jun 2016

Cloud-Based Secure Logger For Medical Devices, Hung Nguyen, Bipeen Acharya, Radoslav Ivanov, Andreas Haeberlen, Linh T.X. Phan, Oleg Sokolsky, Jesse Walker, James Weimer, C. William Hanson Iii, Insup Lee

Departmental Papers (CIS)

A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medical device and patient information allows efficient forensic analysis in cases of adverse events or attacks on interoperable medical devices. A secure logger as such must meet requirements of confidentiality and integrity of message logs and provide tamper-detection and tamper-evidence. In this paper, we propose a design for such a cloud-based secure logger using the Intel Software Guard Extensions (SGX) and the Trusted Platform Module (TPM). The proposed logger receives medical device information from a dongle attached to a medical device. The logger relies on ...


Tournament Wizard: Simple And Lightweight Software For Running Fencing Tournaments, John Ryan Daley Jun 2016

Tournament Wizard: Simple And Lightweight Software For Running Fencing Tournaments, John Ryan Daley

Computer Science and Software Engineering

Many sports use technology to assist in officiating and administration. Fencing tournament organizers use specialized software to help determine how their matches occur, and to help them administer a tournament. However, the software most commonly used to run these tournaments has some significant limitations, and is not well-suited for use with small events. As a former President of Cal Poly’s Fencing Club, I have had a chance to interact with one popular application for running fencing tournaments a number of times, and made note of its shortcomings. These included issues with operating system compatibility, license transference, and amount of ...


Control System For 3d Printable Robotic Hand, Htoo Wai Htet Jun 2016

Control System For 3d Printable Robotic Hand, Htoo Wai Htet

Honors Theses

Humanoid robotics is a growing area of research due to its potential applications in orthosis and prosthesis for human beings. With the currently available technologies, the most advanced robotic hands used in prosthetics or robotics can cost from $11,000 to $90,000, making it inaccessible to the general population of amputees and robotics hobbyists. Most of the features provided by these expensive technologies are superfluous to many users, creating a great gap in cost and services between users and technology. Using the emerging 3D printing technology, my project is to construct a 3D printed robotic hand that can reproduce ...


Campusbookshare, Aditya Varkhedi May 2016

Campusbookshare, Aditya Varkhedi

Computer Science and Software Engineering

Every few months, students in the US and abroad face the expensive and time consuming task of buying textbooks for the classes they are enrolled in. Despite the advent of the internet and social networking websites the ability for peer to peer textbook exchange is still limited. There are few if any dedicated websites for general purpose peer to peer textbook transfer for every university and college.

The project I have created for my Senior Project is a peer to peer solution for buying and selling textbooks on US college campuses. The underlying idea is to create an authentication system ...


The Development Of Project Grade-Up, Dalin Glenn Williams Jan 2016

The Development Of Project Grade-Up, Dalin Glenn Williams

MS in Computer Science Theses

The university classroom has greatly evolved from a simple syllabus and in class discussion to the modern online documentation and virtual classrooms. These developments have changed the way students review their grades and balance their workloads. With the plethora of new technologies, students are often burdened with a full school schedule, work, and social events, with few tools to help them effectively understand their grades or manage their time. Current solutions addressing this issue do not present data in an organized way that allows the student to easily comprehend their past performance or up coming work load. Our solution builds ...


Measuring The Effectiveness Of Software-Based Training To Improve The Spatial Visualization Skills Of Students In Stem Disciplines In Higher Education Institutions, Peter Cole Jan 2016

Measuring The Effectiveness Of Software-Based Training To Improve The Spatial Visualization Skills Of Students In Stem Disciplines In Higher Education Institutions, Peter Cole

Dissertations

This research investigates how software can be used to teach spatial skills leading to greater success in Science, Technology, Engineering, and Mathematical (STEM) fields. Existing research indicates that spatial skills can be taught and that good spatial skills are common to people who succeed in STEM fields. In this work, a software-only testing system with a direct targeted, training intervention module was implemented to measure and teach spatial skills using mental rotations, which are believed to be one of the most significant indicators of success in STEM fields. Spatial skills were tested using a standardized and validated test that measures ...


Flexc: Protein Flexibility Prediction Using Context-Based Statistics, Predicted Structural Features, And Sequence Information, Ashraf Yaseen, Mais Nijim, Brandon Williams, Lei Qian, Min Li, Jianxin Wang, Yaohang Li Jan 2016

Flexc: Protein Flexibility Prediction Using Context-Based Statistics, Predicted Structural Features, And Sequence Information, Ashraf Yaseen, Mais Nijim, Brandon Williams, Lei Qian, Min Li, Jianxin Wang, Yaohang Li

Computer Science Faculty Publications

The fluctuation of atoms around their average positions in protein structures provides important information regarding protein dynamics. This flexibility of protein structures is associated with various biological processes. Predicting flexibility of residues from protein sequences is significant for analyzing the dynamic properties of proteins which will be helpful in predicting their functions.


Hardware/Software Codesign, Richard Gallery Nov 2015

Hardware/Software Codesign, Richard Gallery

The ITB Journal

The current state of the art technology in integrated circuits allows the incorporation of multiple processor cores and memory arrays, in addition to application specific hardware, on a single substrate. As silicon technology has become more advanced, allowing the implementation of more complex designs, systems have begun to incorporate considerable amounts of embedded software [3]. Thus it becomes increasingly necessary for the system designers to have knowledge on both hardware and software to make efficient design tradeoffs. This is where hardware/software codesign comes into existence.


Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan Nov 2015

Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan

The ITB Journal

Since McCullough and Pitts first published their work on the Binary Decision Neuron much research has been accumulated in the area of neural networks. This work has for the most part centred on network topologies and learning algorithms. The neural networks that have found their way into devices such as handheld PC’s are the fruit of NN research that has spanned 57 years. There is a simplistic beauty in the way that artificial neural networks model the biological foundations of the human thought process, but one piece of the jigsaw puzzle is still missing. We have so far been ...


Skyrim Survival Needs Modification, Sheng-Han Chen Jun 2015

Skyrim Survival Needs Modification, Sheng-Han Chen

Computer Engineering

A survival needs system implemented within Skyrim's modification framework using Bethesda Softwork's Skyrim Creation Kit.


Roborodentia Robot, Jordan Dykstra, Anibal Hernandez, Robert Prosser Jun 2015

Roborodentia Robot, Jordan Dykstra, Anibal Hernandez, Robert Prosser

Computer Engineering

This report provides details on the design and implementation of a robot for the Spring 2015 Roborodentia competition. The system is described from a software perspective, a hardware perspective, and a mechanical design perspective.


Cloud Rtr: Cloud Infrastructure For Apps With Hardware, Ali Yasser Ismail Apr 2015

Cloud Rtr: Cloud Infrastructure For Apps With Hardware, Ali Yasser Ismail

Electrical, Computer & Energy Engineering Graduate Theses & Dissertations

There has been a great deal of innovation in the software space for smart phones, however, there has been virtually no room to innovate in the architecture space. By introducing a Field Programmable Gate Array (FPGA) on mobile phone platforms, developers are able to produce hardware that their applications can use. We call re-programmable hardware on mobile phones mobware. In order to introduce mobware to mobile platforms, we leverage technology that contains a processor (ARM) coupled with FPGA so we can introduce reconfigurable logic to smart phones, expose the hardware to applications, and extend a mobile operating system to allow ...


Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim Apr 2015

Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim

Research Collection School Of Information Systems

Context data, collected either from mobile devices or from user-generated social media content, can help identify abnormal behavioural patterns in public spaces (e.g., shopping malls, college campuses or downtown city areas). Spatiotemporal analysis of such data streams provides a compelling new approach towards automatically creating real-time urban situational awareness, especially about events that are unanticipated or that evolve very rapidly. In this work, we use real-life datasets collected via SMU's LiveLabs testbed or via SMU's Palanteer software, to explore various discriminative features (both spatial and temporal - e.g., occupancy volumes, rate of change in topic{specific tweets ...