Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 691 - 720 of 1355

Full-Text Articles in Other Computer Engineering

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …


Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez Jan 2018

Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez

Department of Anthropology: Faculty Publications

The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans Jan 2018

Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans

ETD Archive

In recent years, researchers had been inquisitive about the use of technology to enhance the healthcare and wellness of patients with dementia. Dementia symptoms are associated with the decline in thinking skills and memory severe enough to reduce a person’s ability to pay attention and perform daily activities. Progression of dementia can be assessed by monitoring the daily activities of the patients. This thesis encompasses continuous localization and behavioral analysis of patient’s motion pattern over a wide area indoor living space using multiple calibrated Kinect sensors connected over the network. The skeleton data from all the sensor is transferred to …


Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez Jan 2018

Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez

Other resources

As research on hate speech becomes more and more relevant every day, most of it is still focused on hate speech detection. By attempting to replicate a hate speech detection experiment performed on an existing Twitter corpus annotated for hate speech, we highlight some issues that arise from doing research in the field of hate speech, which is essentially still in its infancy. We take a critical look at the training corpus in order to understand its biases, while also using it to venture beyond hate speech detection and investigate whether it can be used to shed light on other …


A Deep Learning Agent For Games With Hidden Information, Robert A. Mills Jan 2018

A Deep Learning Agent For Games With Hidden Information, Robert A. Mills

Senior Projects Spring 2018

The goal of this project is to develop an agent capable of playing a particular game at an above average human level. In order to do so we investigated reinforcement and deep learning techniques for making decisions in discrete action spaces with hidden information. The methods we used to accomplish this goal include a standard word2vec implementation, an alpha-beta minimax tree search, and an LSTM network to evaluate game states. Given just the rules of the game and a vector representation of the game states, the agent learned to play the game by competitive self play. The emergent behavior from …


Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez Jan 2018

Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophy is a new branch of philosophy which studies the origin, nature and scope of neutralities. This has formed the basis for a series of mathematical theories that generalize the classical and fuzzy theories such as the neutrosophic sets and the neutrosophic logic. In the paper, the fundamental concepts related to neutrosophy and its antecedents are presented. Additionally, fundamental concepts of artificial intelligence will be defined and how neutrosophy has come to strengthen this discipline.


Is It Worth It? Budget-Related Evaluation Metrics For Model Selection, Filip Klubicka, Giancarlo Salton, John D. Kelleher Jan 2018

Is It Worth It? Budget-Related Evaluation Metrics For Model Selection, Filip Klubicka, Giancarlo Salton, John D. Kelleher

Conference papers

Projects that set out to create a linguistic resource often do so by using a machine learning model that pre-annotates or filters the content that goes through to a human annotator, before going into the final version of the resource. However, available budgets are often limited, and the amount of data that is available exceeds the amount of annotation that can be done. Thus, in order to optimize the benefit from the invested human work, we argue that the decision on which predictive model one should employ depends not only on generalized evaluation metrics, such as accuracy and F-score, but …


Blockchain Scalability And Security, Tuyet Duong Jan 2018

Blockchain Scalability And Security, Tuyet Duong

Theses and Dissertations

Cryptocurrencies like Bitcoin have proven to be a phenomenal success. The underlying techniques hold huge promise to change the future of financial transactions, and eventually the way people and companies compute, collaborate, and interact. At the same time, the current Bitcoin-like proof-of-work based blockchain systems are facing many challenges. In more detail, a huge amount of energy/electricity is needed for maintaining the Bitcoin blockchain. In addition, their security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption is …


Adapt At Semeval-2018 Task 9: Skip-Gram Word Embeddings For Unsupervised Hypernym Discovery In Specialised Corpora, Alfredo Maldonado, Filip Klubicka Jan 2018

Adapt At Semeval-2018 Task 9: Skip-Gram Word Embeddings For Unsupervised Hypernym Discovery In Specialised Corpora, Alfredo Maldonado, Filip Klubicka

Other resources

This paper describes a simple but competitive unsupervised system for hypernym discovery. The system uses skip-gram word embeddings with negative sampling, trained on specialised corpora. Candidate hypernyms for an input word are predicted based on cosine similar- ity scores. Two sets of word embedding mod- els were trained separately on two specialised corpora: a medical corpus and a music indus- try corpus. Our system scored highest in the medical domain among the competing unsu- pervised systems but performed poorly on the music industry domain. Our approach does not depend on any external data other than raw specialised corpora.


Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang Jan 2018

Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang

Dissertations, Master's Theses and Master's Reports

Harnessing the heterogeneous data sets would improve system observability. While the current metering infrastructure in distribution network has been utilized for the operational purpose to tackle abnormal events, such as weather-related disturbance, the new normal we face today can be at a greater magnitude. Strengthening the inter-dependencies as well as incorporating new crowd-sourced information can enhance operational aspects such as system reconfigurability under extreme conditions. Such resilience is crucial to the recovery of any catastrophic events. In this dissertation, it is focused on the anomaly of potential foul play within an electrical distribution system, both primary and secondary networks as …


Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan Jan 2018

Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan

CMC Senior Theses

Sentiment analysis has taken on various machine learning approaches in order to optimize accuracy, precision, and recall. However, Long Short-Term Memory (LSTM) Recurrent Neural Networks (RNNs) account for the context of a sentence by using previous predictions as additional input for future sentence predictions. Our approach focused on developing an LSTM RNN that could perform binary sentiment analysis for positively and negatively labeled sentences. In collaboration with Mariam Salloum, I developed a collection of programs to classify individual sentences as either positive or negative. This paper additionally looks into machine learning, neural networks, data preprocessing, implementation, and resulting comparisons.


Quantitative Fine-Grained Human Evaluation Of Machine Translation Systems: A Case Study On English To Croatian, Filip Klubicka, Antonio Toral, Victor Manuel Sanchez-Cartagena Jan 2018

Quantitative Fine-Grained Human Evaluation Of Machine Translation Systems: A Case Study On English To Croatian, Filip Klubicka, Antonio Toral, Victor Manuel Sanchez-Cartagena

Articles

This paper presents a quantitative fine-grained manual evaluation approach to comparing the performance of different machine translation (MT) systems. We build upon the well-established Multidimensional Quality Metrics (MQM) error taxonomy and implement a novel method that assesses whether the differences in performance for MQM error types between different MT systems are statistically significant. We conduct a case study for English-to- Croatian, a language direction that involves translating into a morphologically rich language, for which we compare three MT systems belonging to different paradigms: pure phrase-based, factored phrase-based and neural. First, we design an MQM-compliant error taxonomy tailored to the relevant …


Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour Jan 2018

Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour

UNF Graduate Theses and Dissertations

Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow …


Modelo De Recomendación Basado En Conocimiento Y Números Svn, Maykel Leyva-Vazquez, Florentin Smarandache Jan 2018

Modelo De Recomendación Basado En Conocimiento Y Números Svn, Maykel Leyva-Vazquez, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

Recommendation models are useful in the decision-making process that allow the user a set of options that are expected to meet their expectations. Recommendation models are useful in the decision-making process that offer the user a set of options that are expected to meet their SVN expectations to express linguistic terms.


Some Aggregation Operators For Bipolar-Valued Hesitant Fuzzy Information, Florentin Smarandache, Tahir Mahmood, Kifayat Ullah, Qaisar Khan Jan 2018

Some Aggregation Operators For Bipolar-Valued Hesitant Fuzzy Information, Florentin Smarandache, Tahir Mahmood, Kifayat Ullah, Qaisar Khan

Branch Mathematics and Statistics Faculty and Staff Publications

In this article we define some aggregation operators for bipolar-valued hesitant fuzzy sets. These operations include bipolar-valued hesitant fuzzy ordered weighted averaging (BPVHFOWA) operator, bipolar-valued hesitant fuzzy ordered weighted geometric (BPVHFOWG) operator and their generalized forms. We also define hybrid aggregation operators and their generalized forms and solved a decision-making problem on these operation.


Application For Position And Load Reference Generation Of A Simulated Mechatronic Chain, Florentin Smarandache, V. Vladareanu, S.B. Cononovici, M. Migdalovici, H. Wang, Y. Feng Jan 2018

Application For Position And Load Reference Generation Of A Simulated Mechatronic Chain, Florentin Smarandache, V. Vladareanu, S.B. Cononovici, M. Migdalovici, H. Wang, Y. Feng

Branch Mathematics and Statistics Faculty and Staff Publications

The paper presents the position and load reference generation for a motor stand simulating a mechatronic chain, in this case a three degree of freedom robot leg. The task is accomplished using three PLC controlled motors in position as the robot joint actuators coupled with three controlled in torque, simulating the load at each simulation time-step. The paper briefly discusses the mathematical model and presents the visual interface used in the simulation, which is then to be further integrated into a virtual environment robot control application.


Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang Dec 2017

Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang

Electronic Thesis and Dissertation Repository

An ordered labeled tree is a tree where the left-to-right order among siblings is significant. Given two ordered labeled trees, the edit distance between them is the minimum cost edit operations that convert one tree to the other.

In this thesis, we present an algorithm for the tree edit distance problem by using the optimal tree decomposition strategy. By combining the vertical compression of trees with optimal decomposition we can significantly reduce the running time of the algorithm. We compare our method with other methods both theoretically and experimentally. The test results show that our strategies on compressed trees are …


Streaming Mysql Database Activity To Aws Kinesis, Chris I. Voncina Dec 2017

Streaming Mysql Database Activity To Aws Kinesis, Chris I. Voncina

Computer Engineering

Connecting Amazon RDS MySQL engine with AWS Kinesis is a feature that RDS customers have often requested. A good example indicating customer demand is demonstrated on AWS’ forum post at https://forums.aws.amazon.com/thread.jspa?messageID=697516.

Upon completion, my project will enable Amazon RDS to pick up the MySQL open source project, integrate the MySQL plugin with Amazon RDS MySQL and deliver this feature to Amazon RDS MySQL customers. Other open source engine projects can follow and build upon my project.

Amazon Aurora delivered similar capability to the project. See details at https://aws.amazon.com/about-aws/whats-new/2016/10/amazon-aurora-new-features-aws-lambda-integration-and-data-load-from-amazon-s3-to-aurora-tables/


Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall Dec 2017

Real Time And High Fidelity Quadcopter Tracking System, Tyler Mckay Hall

Computer Engineering

This project was conceived as a desired to have an affordable, flexible and physically compact tracking system for high accuracy spatial and orientation tracking. Specifically, this implementation is focused on providing a low cost motion capture system for future research. It is a tool to enable the further creation of systems that would require the use of accurate placement of landing pads, payload acquires and delivery. This system will provide the quadcopter platform a coordinate system that can be used in addition to GPS.

Field research with quadcopter manufacturers, photographers, agriculture and research organizations were contact and interviewed for information …


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …


Pubwc Bathroom Review App, Clay Jacobs Dec 2017

Pubwc Bathroom Review App, Clay Jacobs

Computer Science and Software Engineering

For my senior project, I developed an iOS application to allow users to find, rate, and review nearby public restrooms. The app takes advantage of crowdsourced data to collect bathroom and review information. I also created a REST API to interface with the backend database that could be used to port the application to other platforms.


Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee Dec 2017

Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

Smart Grids are the next generation electrical grid system that utilizes smart meter-ing devices and sensors to manage the grid operations. Grid management includes the prediction of load and and classification of the load patterns and consumer usage behav-iors. These predictions can be performed using machine learning methods which are often supervised. Supervised machine learning signifies that the algorithm trains the model to efficiently predict decisions based on the previously available data.

Smart grids are employed with numerous smart meters that send user statistics to a central server. The data can be accumulated and processed using data mining and machine …


Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly Dec 2017

Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly

Boise State University Theses and Dissertations

Virtualized cloud computing services are a crucial facet in the software industry today, with clear evidence of its usage quickly accelerating. Market research forecasts an increase in cloud workloads by more than triple, 3.3-fold, from 2014 to 2019 [33]. Integrating system security is then an intrinsic concern of cloud platform system administrators that with the growth of cloud usage, is becoming increasingly relevant. People working in the cloud demand security more than ever. In this paper, we take an offensive, malicious approach at targeting such cloud environments as we hope both cloud platform system administrators and software developers of these …


Applied Deep Learning: Automated Segmentation Of White Matter Hyperintensities (Wmh) On Brain Mr Images, Matt Berseth Nov 2017

Applied Deep Learning: Automated Segmentation Of White Matter Hyperintensities (Wmh) On Brain Mr Images, Matt Berseth

DHI Digital Projects Showcase

Small vessel disease plays a crucial role in stroke, dementia, and ageing. White matter hyperintensities (WMH) of vascular origin are one of the main consequences of small vessel disease and well visible on brain MR images. Quantification of WMH volume, location, and shape is of key importance in clinical research studies and likely to find its way into clinical practice; supporting diagnosis, prognosis, and monitoring of treatment for dementia and other neurodegenerative diseases. It has been noted that visual rating of WMH has important limitations and hence a more detailed segmentation of WMH is preferred. Various automated WMH segmentation techniques …


2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris Nov 2017

2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris

ASA Multidisciplinary Research Symposium

Evaluating the capabilities of Raspberry Pi computers to be used in embedded glass cockpit applications for experimental aircraft. This includes details of what is required for these applications as well as how well the Raspberry Pi 3B can perform in this role.


Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding Oct 2017

Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding

Masters Theses

According to World Health Survey, there are 785 million (15.6%) people in the world that live with a disability. It is a well-known fact that lack of access to public transportation is a barrier for people with disabilities in seeking work or accessing health care. In this research, we seek to increase access to public transportation by introducing a virtual pre-travel training system that enables people with disabilities to get familiar with a public transportation venue prior to arriving at the venue. Using this system, users establish a mental map of the target environment prior to their arrival to the …


Efficient Scaling Of A Web Proxy Cluster, Hao Zhang Oct 2017

Efficient Scaling Of A Web Proxy Cluster, Hao Zhang

Masters Theses

With the continuing growth in network traffic and increasing diversity in web content, web caching, together with various network functions (NFs), has been introduced to enhance security, optimize network performance, and save expenses. In a large enterprise network with more than tens of thousands of users, a single proxy server is not enough to handle a large number of requests and turns to group processing. When multiple web cache proxies are working as a cluster, they talk with each other and share cached objects by using internet cache protocol (ICP). This leads to poor scalability.

This thesis describes the development …


Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu Oct 2017

Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu

Masters Theses

The dramatic popularity of graph database has resulted in a growing interest in graph queries. Two major topics are included in graph queries. One is based on structural relationship to find meaningful results, such as subgraph pattern match and shortest-path query. The other one focuses on semantic-based query to find question answering from knowledge bases. However, most of these queries take knowledge graphs as flat forms and use only normal relationship to mine these graphs, which may lead to mistakes in the query results. In this thesis, we find hierarchical relationship in the knowledge on their semantic relations and make …


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …