Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 631 - 660 of 23568

Full-Text Articles in Computer Engineering

Sensitive And Makeable Computational Materials For The Creation Of Smart Everyday Objects, Te-Yen Wu Mr May 2023

Sensitive And Makeable Computational Materials For The Creation Of Smart Everyday Objects, Te-Yen Wu Mr

Dartmouth College Ph.D Dissertations

The vision of computational materials is to create smart everyday objects using the materi- als that have sensing and computational capabilities embedded into them. However, today’s development of computational materials is limited because its interfaces (i.e. sensors) are unable to support wide ranges of human interactions , and withstand the fabrication meth- ods of everyday objects (e.g. cutting and assembling). These barriers hinder citizens from creating smart every day objects using computational materials on a large scale.

To overcome the barriers, this dissertation presents the approaches to develop compu- tational materials to be 1) sensitive to a wide variety of …


Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal May 2023

Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal

Master of Science in Computer Science Theses

The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …


When Ai Moves Downstream, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf May 2023

When Ai Moves Downstream, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf

School of Computer Science & Engineering Faculty Publications

After computing professionals design, develop, and deploy software, what is their responsibility for subsequent uses of that software “downstream” by others? Furthermore, does it matter ethically if the software in question is considered to be artificial intelligent (AI)? The authors have previously developed a model to explore downstream accountability, called the Software Responsibility Attribution System (SRAS). In this paper, we explore three recent publications relevant to downstream accountability, and focus particularly on examples of AI software. Based on our understanding of the three papers, we suggest refinements of SRAS.


Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty May 2023

Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty

Minnesota Journal of Law, Science & Technology

No abstract provided.


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez May 2023

An Investigation On The Resilience Of Long Short-Term Memory Deep Neural Networks, Christopher Vasquez

LSU Master's Theses

In a world of continuously advancing technology, the reliance on these technologies continues to increase. Recently, transformer networks [22] have been implemented through various projects such as ChatGPT. These networks are extremely computationally demanding and require cutting-edge hardware to explore. However, with the growing increase and popularity of these neural networks, a question of reliability and resilience comes about, especially as the dependency and research on these networks grow. Given the computational demand of transformer networks, we investigate the resilience of the weights and biases of the predecessor of these networks, i.e. the Long Short-Term (LSTM) neural network, through four …


Osmosis: Asymmetries In Telematic Performance, Matthias Ziegler May 2023

Osmosis: Asymmetries In Telematic Performance, Matthias Ziegler

Journal of Network Music and Arts

For the 2022 edition of the NowNet Arts Conference on October 31st, the telematic research team of the Zurich University of the Arts (ZHdK) presented a project entitled OSMOSIS. OSMOSIS was a concert event, highlighting how telematically connected spaces always confront each other asymmetrically. Their telematic connection is part of a continuous space in which information is fragmented and selectively reassembled. Like the biochemical process of osmosis in which molecules diffuse across a cell membrane from one level of concentration to another, in telematic connections certain elements such as sound, physicality, movement, and empathy are diffused across spaces, each being …


Synthesis: Works Of Sarah Weaver And Collaborations (2020-2022), Sarah Weaver May 2023

Synthesis: Works Of Sarah Weaver And Collaborations (2020-2022), Sarah Weaver

Journal of Network Music and Arts

Synthesis Series is a set of contemplative contemporary network arts works for solo, chamber, and large ensemble performance. The works are my compositions and collaborations from the years 2020 to 2022. The concept of synthesis is conceived as an activation of synchrony. Synthesis Series follows my prior works in Synchrony Series and Source Series as sequences of compositions since 1998 proliferating into a networked system of artistic realization. In Synchrony Series I defined synchrony as the perceptual alignment of distributed time and space components. Synthesis builds on this to activate the alignment as a networked state of composite resultants, networked …


Distributed Networks Of Listening And Sounding: 20 Years Of Telematic Musicking, Doug Van Nort May 2023

Distributed Networks Of Listening And Sounding: 20 Years Of Telematic Musicking, Doug Van Nort

Journal of Network Music and Arts

This paper traces a twenty-year arc of my performance and compositional practice in the medium of telematic music, focusing on a distinct approach to fostering interdependence and emergence through the integration of listening strategies, electroacoustic improvisation, pre-composed structures, blended real/virtual acoustics, networked mutual-influence, shared signal transformations, gesture-concepts and machine agencies. Communities of collaboration and exchange over this time period are discussed, which span both pre- and post-pandemic approaches to the medium that range from metaphors of immersion and dispersion to diffraction.


An Overview Of Immersive Virtual Reality Music Experiences In Online Platforms, Ben Loveridge May 2023

An Overview Of Immersive Virtual Reality Music Experiences In Online Platforms, Ben Loveridge

Journal of Network Music and Arts

As the field of Virtual Reality (VR) continues to mature, so too does the potential for creative and immersive musical experiences in the medium. However, of the thousands of applications now available across the major VR platforms, only a small number of titles focus on the ability to create or explore musical content. This article outlines the current state of music games, experiences, and creative applications across the current VR ecosystem. Firstly, it surveys the quantity of commercial titles currently available across the major VR platforms with a music-related focus. Secondly, the article classifies music applications into the following subcategories: …


Musical Time In Network Interaction: The Case Of Unfinished Line, Silvio Ferraz, William Teixeira May 2023

Musical Time In Network Interaction: The Case Of Unfinished Line, Silvio Ferraz, William Teixeira

Journal of Network Music and Arts

Considering recent world events, art and music could not be unmoved by the dramatic turn of directions in both the way people relate and the place of technology in their lives. An ongoing project of both the authors in writing a new piece for cello and Disklavier operated by interactions in real-time gave place to a new kind of composition, mixing written music to improvisation and replacing real-time for something we are calling remote time. This paper presents such walking of resilience, first reviewing some relevant points of view about musical interaction in real-time and the importance of synchrony for …


The Entanglement: Volumetric Music Performances In A Virtual Metaverse Environment, Damian Dziwis, Henrik Von Coler May 2023

The Entanglement: Volumetric Music Performances In A Virtual Metaverse Environment, Damian Dziwis, Henrik Von Coler

Journal of Network Music and Arts

Telematic music performances are an established performance practice in contemporary music. Performing music pieces with geographically distributed musicians is both a technological challenge and an artistic one. These challenges and the resulting possibilities can lead to innovative aesthetic realizations. This paper presents the implementation and realization of “The Entanglement,” a telematic concert performance in a metaverse environment. The system is realized using web-based frameworks to implement a platform-independent online multi-user environment with volumetric, three- dimensional, streaming of audio and video. This allows live performance of this improvisation piece based on an algorithmic quantum computer composition within a freely explorational virtual …


Adventures In [A]Synchrony: Tools And Strategies For The Network Arts-Curious Music Educator, Seth Adams May 2023

Adventures In [A]Synchrony: Tools And Strategies For The Network Arts-Curious Music Educator, Seth Adams

Journal of Network Music and Arts

Networked Music Performance (NMP) is ensemble music mediated by a network such as the internet. NMP can be usefully divided into asynchronous and synchronous formats. Prototypical examples of the asynchronous format familiar to music educators are Eric Whitacre’s virtual choirs that began in 2009. A decade later, the virtual ensemble format exploded in popularity due to the COVID-19 pandemic. Although the format does not allow participants to interact with one another, virtual ensembles nonetheless provide ample opportunities for both musical and nonmusical benefits. Synchronous NMP is, by comparison, little known and rarely practiced by music educators. However, both types of …


Editorial, Sarah Weaver May 2023

Editorial, Sarah Weaver

Journal of Network Music and Arts

No abstract provided.


The School Of Engineering And Computer Science Class Of 2023 Academic Celebration Program, Cedarville University May 2023

The School Of Engineering And Computer Science Class Of 2023 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave May 2023

Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave

Honors Capstones

The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO­­­­­2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …


Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce May 2023

Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

When applying machine learning to clinical practice, a major hurdle that will be encountered is the lack of available data. While the data collected in clinical therapies is suitable for the types of analysis that are needed to measure and track clinical outcomes, it may not be suitable for other types of analysis. For instance, video data may have poor alignment with behavioral data, making it impossible to extract the videos frames that directly correlate with the observed behavior. Alternatively, clinicians may be exploring new data modalities, such as physiological signal collection, to research methods of improving clinical outcomes that …


Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha May 2023

Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha

Mansoura Engineering Journal

This work proposes a slotted microstrip patch antenna with an inset feed and defective ground structure (DGS). The proposed antenna is built with Roger-RT/5880 (Ԑr=2.2) as the substrate material for X-band application with a resonant frequency of 10 GHz. The proposed design has been simulated using Finite Element Method (FEM) and the results of bandwidth and gain read about 700MHz and 8dB; respectively. The suggested design is compared with previously published equivalent designs in light of the most recent research. The comparison reveal that that the suggested design with tuned dimensions offers higher gain and wider bandwidth than what has …


Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe May 2023

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …


Anticancer Activities Of Tetra-, Penta-, And Hexacyclic Phenothiazines Modified With Quinoline Moiety., Małgorzata Jel, Beata Morak-Młodawska, Rafał Korlacki May 2023

Anticancer Activities Of Tetra-, Penta-, And Hexacyclic Phenothiazines Modified With Quinoline Moiety., Małgorzata Jel, Beata Morak-Młodawska, Rafał Korlacki

Department of Electrical and Computer Engineering: Faculty Publications

The quinoline molecule is a chemical motif showing a highly promising pharmacological potential. Its numerous derivatives introduced into medicine revolutionized in the treatment of many entities of disease. The presence of the quinoline system in the structure of phenothiazines made it possible to obtain new aza- and diazaphenothiazine derivatives that show promising anticancer potential. The aza-analogs of the phenothiazines are structurally modified phenothiazines by the substitution of one or both benzene rings in the phenothiazine ring system with various azine rings. This approach to the strategy of obtaining new substances with biological potential can be classified as molecular hybridization methods …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Toward Generating Efficient Deep Neural Networks, Chengcheng Li May 2023

Toward Generating Efficient Deep Neural Networks, Chengcheng Li

Doctoral Dissertations

Recent advances in deep neural networks have led to tremendous applications in various tasks, such as object classification and detection, image synthesis, natural language processing, game playing, and biological imaging. However, deploying these pre-trained networks on resource-limited devices poses a challenge, as most state-of- the-art networks contain millions of parameters, making them cumbersome and slow in real-world applications. To address this problem, numerous network compression and acceleration approaches, also known as efficient deep neural networks or efficient deep learning, have been investigated, in terms of hardware and software (algorithms), training, and inference. The aim of this dissertation is to study …


Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian May 2023

Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian

Electronic Theses, Projects, and Dissertations

Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …


Acat 2.0: An Ai Transformer-Based Approach To Predictive Speech Generation, Kairan Quazi May 2023

Acat 2.0: An Ai Transformer-Based Approach To Predictive Speech Generation, Kairan Quazi

Computer Science and Engineering Senior Theses

While constituting a rare family of diseases that afflicts 268,000 people worldwide, motor neuron diseases carry a high fatality rate with one-third of people dying within a year of diagnosis and 50% of people dying within two years (MND Association, 2022). MNDs rapidly and progressively impair muscle movement, making everyday activities like walking, chewing, and speaking almost impossible. In collaboration with famed physicist Dr. Stephen Hawking, Intel Labs developed an assistive communications platform known as ACAT to simulate speech and facilitate electronic tasks. However, the original ACAT can be slow to use, leading to awkward pauses in conversations. This paper …


Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni May 2023

Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni

UNLV Theses, Dissertations, Professional Papers, and Capstones

Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …


Green Hpc: Optimizing Software Stack Energy Efficiency Of Large Data Systems, Grant Wilkins May 2023

Green Hpc: Optimizing Software Stack Energy Efficiency Of Large Data Systems, Grant Wilkins

Honors College Theses

High-performance computing (HPC) is indispensable in modern scientific research and industry applications, but its energy consumption is a growing concern. This thesis presents two novel approaches to optimize energy consumption in large data systems. The first chapter of the thesis will discuss the use of Dynamic Voltage and Frequency Scaling (DVFS) to optimize the energy efficiency of two popular lossy compression algorithms: SZ and ZFP. By adjusting the voltage and frequency levels of computing resources, DVFS can reduce energy consumption while maintaining the desired level of performance and accuracy. The second chapter of the thesis will focus on a detailed …


Big Data Analysis And Programming For Engineers, Josh Steimel May 2023

Big Data Analysis And Programming For Engineers, Josh Steimel

Pacific Open Texts

This text serves to cover critical programming, data analysis, statistical analysis, and mathematical skills for engineers. In particular fundamental programming skills are demonstrated using Mathematica specifically the importing of data sets, loop structures, plotting and statistically analyzing data, image analysis, and machine learning. Critical engineering topics such as solid mechanics, vibrations, and engineering problems which require solving ODEs and PDEs are covered.