Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 729

Full-Text Articles in Other Computer Engineering

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof. May 2019

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.

MODVIS Workshop

This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts ...


Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater May 2019

Self-Driving Cars: Evaluation Of Deep Learning Techniques For Object Detection In Different Driving Conditions, Ramesh Simhambhatla, Kevin Okiah, Shravan Kuchkula, Robert Slater

SMU Data Science Review

Deep Learning has revolutionized Computer Vision, and it is the core technology behind capabilities of a self-driving car. Convolutional Neural Networks (CNNs) are at the heart of this deep learning revolution for improving the task of object detection. A number of successful object detection systems have been proposed in recent years that are based on CNNs. In this paper, an empirical evaluation of three recent meta-architectures: SSD (Single Shot multi-box Detector), R-CNN (Region-based CNN) and R-FCN (Region-based Fully Convolutional Networks) was conducted to measure how fast and accurate they are in identifying objects on the road, such as vehicles, pedestrians ...


A Review On Mixed Criticality Methods, Alex Jenkel May 2019

A Review On Mixed Criticality Methods, Alex Jenkel

Recent Advances in Real-Time Systems as of 2019

Within the study of mixed criticality scheduling, there are many different aspects that must be considered—resources, processor speeds, number of processors, etc.—that make scheduling theories difficult to produce. Two papers address specific aspects of mixed criticality scheduling, and this paper compares the two different methods and also builds upon them.


Granny Pod Virtual Assistant, David Connolly, Bing Chen May 2019

Granny Pod Virtual Assistant, David Connolly, Bing Chen

Theses/Capstones/Creative Projects

Dr. Chen is working on a sustainable small house (SSH) project, sometimes called the “Granny Pod”. Regulations will soon allow homeowners to house their parents on their property, which can be an opportunity live independently in a cheap, sustainable, and convenient alternative to a retirement community. To help achieve this vision, a Virtual Assistant system for the SSH was developed. The system uses a Google Home or Amazon Echo to respond to the voice command “Hey Google (or Alexa), I need help” by contacting the nearby homeowner or caretaker. It alerts the resident who is at the door when the ...


A Purely Defeasible Argumentation Framework, Zimi Li May 2019

A Purely Defeasible Argumentation Framework, Zimi Li

All Dissertations, Theses, and Capstone Projects

Argumentation theory is concerned with the way that intelligent agents discuss whether some statement holds. It is a claim-based theory that is widely used in many areas, such as law, linguistics and computer science. In the past few years, formal argumentation frameworks have been heavily studied and applications have been proposed in fields such as natural language processing, the semantic web and multi-agent systems. Studying argumentation provides results which help in developing tools and applications in these areas. Argumentation is interesting as a logic-based approach to deal with inconsistent information. Arguments are constructed using a process like logical inference, with ...


Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer May 2019

Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common ...


Paper Prototyping Comfortable Vr Play For Diverse Sensory Needs, Louanne E. Boyd, Kendra Day, Ben Wasserman, Kaitlyn Abdo, Gillian Hayes, Erik J. Linstead May 2019

Paper Prototyping Comfortable Vr Play For Diverse Sensory Needs, Louanne E. Boyd, Kendra Day, Ben Wasserman, Kaitlyn Abdo, Gillian Hayes, Erik J. Linstead

Engineering Faculty Articles and Research

We co-designed paper prototype dashboards for virtual environments for three children with diverse sensory needs. Our goal was to determine individual interaction styles in order to enable comfortable and inclusive play. As a first step towards an inclusive virtual world, we began with designing for three sensory-diverse children who have labels of neurotypical, ADHD, and autism respectively. We focused on their leisure interests and their individual sensory profiles. We present the results of co-design with family members and paper prototyping sessions conducted by family members with the children. The results contribute preliminary empirical findings for accommodating different levels of engagement ...


Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado Apr 2019

Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado

Creative Activity and Research Day - CARD

As the amount of publicly shared data increases,

developing a robust pipeline to stream, store and process data is

critical, as the casual user often lacks the technology, hardware

and/or skills needed to work with such voluminous data. In

this research, the authors employ Amazon EC2 and EMR,

MongoDB, and Spark MLlib to explore 28.5 gigabytes of CMS

Open Payments data in an attempt to identify physicians who

may have a high propensity to act unethically, owing to significant

transfers of wealth from medical companies. A Random Forest

Classifier is employed to predict the top decile of physicians ...


Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan Apr 2019

Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan

Creative Activity and Research Day - CARD

Quantum Criticism scrapes data from the News Articles and performs Sentiment Analysis.


Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade Apr 2019

Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade

Kansas State University Undergraduate Research Conference

The overall goal of this research is to effectively extract steps for performing a specified procedure from published text descriptions, producing a recipe listing the materials, operations, and conditions required to perform the procedure. For example, if the procedure is to create a nanomaterial, and relevant source text consists of peer-reviewed scientific publications, a recipe should include raw materials and unit operations, among other specifications of a chemical engineering process. This project focuses on developing performance measures to evaluate recipe steps, by gauging their correctness, completeness, and non-redundancy. This is done by comparing manually annotated documents that conveyed desired results ...


An Application Of Artificial General Intelligence In Board Games, Nathan Skalka Apr 2019

An Application Of Artificial General Intelligence In Board Games, Nathan Skalka

Computer Science Graduate Research Workshop

No abstract provided.


A Strategic Audit Of Microsoft Azure, Lee Fitchett Apr 2019

A Strategic Audit Of Microsoft Azure, Lee Fitchett

Honors Theses, University of Nebraska-Lincoln

This paper looks at Microsoft Azure's current strategies and proposes possible options for the future. It looks at several competitors and explores how Azure will affect and react to Microsoft’s vision.


Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn Apr 2019

Bridgr: An Ios Application For Organizing And Discussing Long-Distance Carpooling, Harrison Engoren, Erik Zorn

Senior Theses

Bridgr is an iOS application that facilitates long distance carpooling. This application allows drivers to post destinations on an interactable map so that they can be linked with students that need a ride to a location within close proximity of the posted destination. The riders and driver are linked in a common chat board where they can discuss ride details among themselves. The goal of Bridgr is to allow drivers to utilize extra space in their car in turn for fellowship and/or gas money.


Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren Apr 2019

Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren

Undergraduate Honors Theses

This paper examines developing machine learning and statistic models to build forecast models for equity returns in an emergent market, with an emphasis on computing. Distributed systems were pared with random search and Bayesian optimization to find good hyperparameters for neural networks. No significant results were found.


A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan Mar 2019

A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan

Student Research and Creative Activity Fair

In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed ...


Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels Jan 2019

Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels

SMU Data Science Review

As the digital age creates new ways of spreading news, fake stories are propagated to widen audiences. A majority of people obtain both fake and truthful news without knowing which is which. There is not currently a reliable and efficient method to identify “fake news”. Several ways of detecting fake news have been produced, but the various algorithms have low accuracy of detection and the definition of what makes a news item ‘fake’ remains unclear. In this paper, we propose a new method of detecting on of fake news through comparison to other news items on the same topic, as ...


Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal Jan 2019

Comparative Study Of Sentiment Analysis With Product Reviews Using Machine Learning And Lexicon-Based Approaches, Heidi Nguyen, Aravind Veluchamy, Mamadou Diop, Rashed Iqbal

SMU Data Science Review

In this paper, we present a comparative study of text sentiment classification models using term frequency inverse document frequency vectorization in both supervised machine learning and lexicon-based techniques. There have been multiple promising machine learning and lexicon-based techniques, but the relative goodness of each approach on specific types of problems is not well understood. In order to offer researchers comprehensive insights, we compare a total of six algorithms to each other. The three machine learning algorithms are: Logistic Regression (LR), Support Vector Machine (SVM), and Gradient Boosting. The three lexicon-based algorithms are: Valence Aware Dictionary and Sentiment Reasoner (VADER), Pattern ...


The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales Jan 2019

The St. Chad Gospels: Diachronic Manuscript Registration And Visualization, Stephen Parsons, C. Seth Parker, W. Brent Seales

Manuscript Studies

This paper presents a software framework for the registration and visualization of layered image sets. To demonstrate the utility of these tools, we apply them to the St. Chad Gospels manuscript, relying on images of each page of the document as it appeared over time. An automated pipeline is used to perform non-rigid registration on each series of images. To visualize the differences between copies of the same page, a registered image viewer is constructed that enables direct comparisons of registered images. The registration pipeline and viewer for the resulting aligned images are generalized for use with other data sets.


Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin Jan 2019

Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin

Journal of International Technology and Information Management

Today, many critical information systems have safety-critical and non-safety-critical functions executed on the same platform in order to reduce design and implementation costs. The set of safety-critical functionality is subject to certification requirements and the rest of the functionality does not need to be certified, or is certified to a lower level. The resulting mixed-criticality systems bring challenges in designing such systems, especially when the critical tasks are required to complete with a timing constraint. This paper studies a problem of scheduling a mixed-criticality system with fault tolerance. A fault-recovery technique called checkpointing is used where a program can go ...


Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh Jan 2019

Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh

Graduate Theses, Dissertations, and Problem Reports

Lung cancer is the leading cause of cancer-related death in the world. Lung cancer can be categorized as non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). NSCLC makes up about 80% to 85% of lung cancer cases diagnosed, whereas SCLC is responsible for 10% to 15% of the cases. It remains a challenge for physicians to identify patients who shall benefit from chemotherapy. In such a scenario, identifying genes that can facilitate therapeutic target discoveries and better understanding disease mechanisms and their regulation in different stages of lung cancer, remains an important topic of research.

In this ...


Machine Learning And Neural Networks For Real-Time Scheduling, Daniel Hureira, Christian Vartanian Jan 2019

Machine Learning And Neural Networks For Real-Time Scheduling, Daniel Hureira, Christian Vartanian

Recent Advances in Real-Time Systems as of 2019

This paper aims to serve as an efficient survey of the processes, problems, and methodologies surrounding the use of Neural Networks, specifically Hopfield-Type, in order to solve Hard-Real-Time Scheduling problems. Our primary goal is to demystify the field of Neural Networks research and properly describe the methods in which Real-Time scheduling problems may be approached when using neural networks. Furthermore, to give an introduction of sorts on this niche topic in a niche field. This survey is derived from four main papers, namely: “A Neurodynamic Approach for Real-Time Scheduling via Maximizing Piecewise Linear Utility” and “Scheduling Multiprocessor Job with Resource ...


On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa Jan 2019

On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa

UNF Graduate Theses and Dissertations

Preferences are very important in research fields such as decision making, recommendersystemsandmarketing. The focus of this thesis is on preferences over combinatorial domains, which are domains of objects configured with categorical attributes. For example, the domain of cars includes car objects that are constructed withvaluesforattributes, such as ‘make’, ‘year’, ‘model’, ‘color’, ‘body type’ and ‘transmission’.Different values can instantiate an attribute. For instance, values for attribute ‘make’canbeHonda, Toyota, Tesla or BMW, and attribute ‘transmission’ can haveautomaticormanual. To this end,thisthesis studiesproblemsonpreference visualization and learning for lexicographic preference trees, graphical preference models that often are compact over complex domains of ...


Trapping Aco Applied To Mri Of The Heart, Shannon Lloyd Birchell Jan 2019

Trapping Aco Applied To Mri Of The Heart, Shannon Lloyd Birchell

UNF Graduate Theses and Dissertations

The research presented here supports the ongoing need for automatic heart volume calculation through the identification of the left and right ventricles in MRI images. The need for automated heart volume calculation stems from the amount of time it takes to manually processes MRI images and required esoteric skill set. There are several methods for region detection such as Deep Neural Networks, Support Vector Machines and Ant Colony Optimization. In this research Ant Colony Optimization (ACO) will be the method of choice due to its efficiency and flexibility. There are many types of ACO algorithms using a variety of heuristics ...


Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey Jan 2019

Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey

Dissertations, Master's Theses and Master's Reports

The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.

A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To ...


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order ...


Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage Dec 2018

Modeling And Simulation Methodologies For Spinal Cord Stimulation., Saliya Kumara Kirigeeganage

Electronic Theses and Dissertations

The use of neural prostheses to improve health of paraplegics has been a prime interest of neuroscientists over the last few decades. Scientists have performed experiments with spinal cord stimulation (SCS) to enable voluntary motor function of paralyzed patients. However, the experimentation on the human spinal cord is not a trivial task. Therefore, modeling and simulation techniques play a significant role in understanding the underlying concepts and mechanics of the spinal cord stimulation. In this work, simulation and modeling techniques related to spinal cord stimulation were investigated. The initial work was intended to visualize the electric field distribution patterns in ...


Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist Dec 2018

Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist

Architectural Engineering

Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic ...


A Survey Of Virtual Network Architectures, Lenoy Avidan Dec 2018

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures ...


Localization Using Convolutional Neural Networks, Shannon D. Fong Dec 2018

Localization Using Convolutional Neural Networks, Shannon D. Fong

Computer Engineering

With the increased accessibility to powerful GPUs, ability to develop machine learning algorithms has increased significantly. Coupled with open source deep learning frameworks, average users are now able to experiment with convolutional neural networks (CNNs) to solve novel problems. This project sought to train a CNN capable of classifying between various locations within a building. A single continuous video was taken while standing at each desired location so that every class in the neural network was represented by a single video. Each location was given a number to be used for classification and the video was subsequently titled locX. These ...


Exploring Photo Privacy Protection On Smartphones, David Darling Dec 2018

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence ...