Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 79

Full-Text Articles in Other Computer Engineering

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Jan 2019

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

J. Philip Craiger, Ph.D.

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …


The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister Apr 2018

The Computer Modeling Of A Space Habitat: The City College Experience, Orlando Mcallister

Orlando McAllister

No abstract provided.


Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger Jun 2017

Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger

Randall Geiger

Structural Health Monitoring (SHM) of transportation infrastructures is a complex task, typically conducted by visual inspection due to the technical and economical constrains of existing health monitoring technologies. It results that health monitoring is highly dependent on scheduling and on the judgment of the inspectors, which can be costly and ineffective. Thus, it is fundamental to automate the SHM process to allow timely inspection, maintenance, and management of transportation infrastructure. The authors propose a flexible membrane that can be deployed over large surfaces, at low cost, for automatic and continuous monitoring of strains. The membrane, termed sensing skin, is constituted …


The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover Jun 2017

The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover

Diane Rover

This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed …


Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce May 2017

Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce

Joshua M. Pearce

Although theoretically the patent system is meant to bolster innovation, the current United States Patent and Trademark Office (USPTO) is cumbersome and involves a significant time investment to locate inactive patents less than 20 years old. This article reports on the development of an open source database to find these public domain ideas. First, a search strategy is explained. Then the operation and use of free and open source software are detailed to meet the needs of open hardware innovators. Finally, a case study is presented to demonstrate the utility of the approach with 3-D printing. The results showed how …


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …


Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han Sep 2015

Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han

Hyoil Han

Answer Validation is a topic of significant interest within the Question Answering community. In this paper, we propose the use of language modeling methodologies for Answer Validation, using corpus-based methods that do not require the use of external sources. Specifically, we propose a model for Answer Credibility which quantifies the reliability of a source document that contains a candidate answer and the Question’s Context Model.


Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han Sep 2015

Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han

Hyoil Han

Word Sense Disambiguation (WSD) is an important but challenging technique in the area of natural language processing (NLP). Hundreds of WSD algorithms and systems are available, but less work has been done in regard to choosing the optimal WSD algorithms. This paper summarizes the various knowledge sources used for WSD and classifies existing WSD algorithms according to their techniques. The rationale, tasks, performance, knowledge sources used, computational complexity, assumptions, and suitable applications for each class of WSD algorithms are also discussed. This paper will provide users with general knowledge for choosing WSD algorithms for their specific applications or for further …


Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner May 2015

Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner

Russell C. Hardie

In many undersampled imaging systems, spatial integration from the individual detector elements is the dominant component of the system point spread function (PSF). Conventional focal plane arrays (FPAs) utilize square detector elements with a nearly 100% fill factor, where fill factor is defined as the fraction of the detector element area that is active in light detection. A large fill factor is generally considered to be desirable because more photons are collected for a given pitch, and this leads to a higher signal-to-noise-ratio (SNR). However, the large active area works against super-resolution (SR) image restoration by acting as an additional …


A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell Hardie, Douglas Droege Mar 2015

A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell Hardie, Douglas Droege

Russell C. Hardie

During digital video acquisition, imagery may be degraded by a number of phenomena including undersampling, blur, and noise. Many systems, particularly those containing infrared focal plane array (FPA) sensors, are also subject to detector nonuniformity. Nonuniformity, or fixed pattern noise, results from nonuniform responsivity of the photodetectors that make up the FPA. Here we propose a maximuma posteriori (MAP) estimation framework for simultaneously addressing undersampling, linear blur, additive noise, and bias nonuniformity. In particular, we jointly estimate a superresolution (SR) image and detector bias nonuniformity parameters from a sequence of observed frames. This algorithm can be applied to video in …


Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis Dec 2014

Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis

Ivan M. Jorrín Abellán

Different approaches have explored how to provide seamless learning across multiple ICT-enabled physical and virtual spaces, including three-dimensional virtual worlds (3DVW). However, these approaches present limitations that may reduce their acceptance in authentic educational practice: The difficulties of authoring and sharing teacher-created designs across different 3DVW platforms, or the lack of integration of 3DVWs with existing technologies in the classroom ecosystem (e.g., widespread web-based learning platforms such as Moodle, or mobile augmented reality applications). Focusing on a specific kind of 3DVW (virtual globes, such as Google Earth, used like 3DVWs), we propose a system that enables teachers to deploy across-spaces …


Cloud Enabled Attack Vectors, Ryan Jasper Dec 2014

Cloud Enabled Attack Vectors, Ryan Jasper

Ryan Jasper

The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a

documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.

The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …


Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li, Juan Wachs Nov 2014

Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li, Juan Wachs

Yu-Ting Li

Paraphrasing the theory of embodied cognition, all aspects of our cognition are determined primarily by the contextual information and the means of physical interaction with data and information. In hybrid human-machine systems involving complex decision making, continuously maintaining a high level of attention while employing a deep understanding concerning the task performed as well as its context are essential. Utilizing embodied interaction to interact with machines has the potential to promote thinking and learning according to the theory of embodied cognition proposed by Lakoff. Additionally, the hybrid human-machine system utilizing natural and intuitive communication channels (e.g., gestures, speech, and body …


From Verification To Implementation: A Model Translation Tool And A Pacemaker Case Study, Miroslav Pajic, Zhihao Jiang, Insup Lee, Oleg Sokolsky, Rahul Mangharam Jun 2014

From Verification To Implementation: A Model Translation Tool And A Pacemaker Case Study, Miroslav Pajic, Zhihao Jiang, Insup Lee, Oleg Sokolsky, Rahul Mangharam

Oleg Sokolsky

Model-Driven Design (MDD) of cyber-physical systems advocates for design procedures that start with formal modeling of the real-time system, followed by the model’s verification at an early stage. The verified model must then be translated to a more detailed model for simulation-based testing and finally translated into executable code in a physical implementation. As later stages build on the same core model, it is essential that models used earlier in the pipeline are valid approximations of the more detailed models developed downstream. The focus of this effort is on the design and development of a model translation tool, UPP2SF, and …


Openorbiter Operating Software, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh Mar 2014

Openorbiter Operating Software, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

The operating software team of the OpenOrbiter project has been tasked with developing software for general spacecraft maintenance, performing mission tasks and the monitoring of system critical aspects of the spacecraft. To do so, the team is developing an autonomous system that will be able to continuously check sensors for data, and schedule tasks that pertain to the current mission and general maintenance of the onboard systems. Development in support of these objectives is ongoing with work focusing on the completion of the development of a stable system. This poster will present an overview of current work on the project …


Intelligent Firefly Algorithm For Global Optimization, Seif-Eddeen K. Fateen, Adrian Bonilla-Petriciolet Dec 2013

Intelligent Firefly Algorithm For Global Optimization, Seif-Eddeen K. Fateen, Adrian Bonilla-Petriciolet

Adrian Bonilla-Petriciolet

Intelligent firefly algorithm (IFA) is a novel global optimization algorithm that aims to improve the performance of the firefly algorithm (FA), which was inspired by the flashing communication signals among firefly swarms. This chapter introduces the IFA modification and evaluates its performance in comparison with the original algorithm in twenty multi-dimensional benchmark problems. The results of those numerical experiments show that IFA outperformed FA in terms of reliability and effectiveness in all tested benchmark problems. In some cases, the global minimum could not have been successfully identified via the firefly algorithm, except with the proposed modification for FA.


Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, Liang-Jie Zhang, Jia Zhang Sep 2013

Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, Liang-Jie Zhang, Jia Zhang

Jia Zhang

In spite of the widely recognized benefits of applying Service Oriented Architecture (SOA) to design enterprise-scale software systems, its actual application practice is not always a success. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a new method of architectural building blocks (ABB)-based SOA solution design and it is applicable to any layered or tiered infrastructure. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables event-based variation notification and propagation analysis. The goal is to provide architecture-level support …


Cyber-Physical Modeling Of Implantable Cardiac Medical Devices, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam Oct 2012

Cyber-Physical Modeling Of Implantable Cardiac Medical Devices, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

The design of bug-free and safe medical device software is challenging, especially in complex implantable devices that control and actuate organs in unanticipated contexts. Safety recalls of pacemakers and implantable cardioverter defibrillators between 1990 and 2000 affected over 600,000 devices. Of these, 200,000 or 41%, were due to firmware issues and their effect continues to increase in frequency. There is currently no formal methodology or open experimental platform to test and verify the correct operation of medical device software within the closed-loop context of the patient. To this effect, a real-time Virtual Heart Model (VHM) has been developed to model …


From Verification To Implementation: A Model Translation Tool And A Pacemaker Case Study, Miroslav Pajic, Zhihao Jiang, Insup Lee, Oleg Sokolsky, Rahul Mangharam Oct 2012

From Verification To Implementation: A Model Translation Tool And A Pacemaker Case Study, Miroslav Pajic, Zhihao Jiang, Insup Lee, Oleg Sokolsky, Rahul Mangharam

Rahul Mangharam

Model-Driven Design (MDD) of cyber-physical systems advocates for design procedures that start with formal modeling of the real-time system, followed by the model’s verification at an early stage. The verified model must then be translated to a more detailed model for simulation-based testing and finally translated into executable code in a physical implementation. As later stages build on the same core model, it is essential that models used earlier in the pipeline are valid approximations of the more detailed models developed downstream. The focus of this effort is on the design and development of a model translation tool, UPP2SF, and …


Modeling Cardiac Pacemaker Malfunctions With The Virtual Heart Model, Zhihao Jiang, Rahul Mangharam Oct 2012

Modeling Cardiac Pacemaker Malfunctions With The Virtual Heart Model, Zhihao Jiang, Rahul Mangharam

Rahul Mangharam

Implantable cardiac devices such as artificial pacemakers deliver therapies according to the timing information from the heart. Such devices work under the assumptions of perfect sensing, which are: (a) the pacemaker leads remain in place, and (b) the pacing therapy in one chamber (e.g. atrium) is insulated from the other chambers (e.g. ventricles). But there are common cases which violate these assumptions and the mechanisms for imperfect sensing cannot be captured by a simple signal generator. In this paper we use the Penn Virtual Heart Model (VHM) to investigate the spatial and temporal aspects of the electrical conduction system of …


Model-Based Closed-Loop Testing Of Implantable Pacemakers, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam Oct 2012

Model-Based Closed-Loop Testing Of Implantable Pacemakers, Zhihao Jiang, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

The increasing complexity of software in implantable medical devices such as cardiac pacemakers and defibrillators accounts for over 40% of device recalls. Testing remains the principal means of verification in the medical device certification regime. Traditional software test generation techniques, where the tests are generated independently of the operational environment, are not effective as the device must be tested within the context of the patient's condition and the current state of the heart. It is necessary for the testing system to observe the system state and conditionally generate the next input to advance the purpose of the test. To this …


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss Sep 2012

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss

Martin L Griss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


A Critical Perfomance Analysis Of Thin Client Platforms, Faith J. Shimba, Renatus Michael May 2012

A Critical Perfomance Analysis Of Thin Client Platforms, Faith J. Shimba, Renatus Michael

Faith Joel Shimba

The nature of operation of Thin Client computing makes their performance to be affected by both the quality of the network and the terminals. For the past few years, there are few analyses on the performance of Thin Clients that can produce reliable, valid, and up-to-date results collected in a well designed and evaluated experiment based research. This paper analyses the performance of Thin Clients through experiment based research. The approach is to use benchmark application which is designed specifically for measurement of desktop computers by inserting delays in the visual elements of such benchmark application. In this technique, packet’s …


Solving Problems Of Virus Definition Files - A Triz Perspective, Umakant Mishra Dec 2011

Solving Problems Of Virus Definition Files - A Triz Perspective, Umakant Mishra

Umakant Mishra

Signature scanning is the most popular method of virus scanning and is adopted by all anti-virus programs. Signature scanning is capable of detecting more than 80% of viruses. It uses a simple logic and uses less memory and system resources. Although it has a lot of advantages, it has one big disadvantage. It requires the virus signature to be extracted by the experts and stored in a database called “virus signature database”. This virus signature database has to be updated by the anti-virus developers and the end users periodically in order to deal with the latest viruses.

A typical virus …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba Jul 2011

Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba

Faith Joel Shimba

Academic Institutions are heavily investing in ICT in order to improve delivery and quality of education. But the process of introducing and applying ICT in Higher learning institutions is not effective to enable higher learning Institutions to reap fully the benefits offered by ICT. This book describes a number of factors that hindered the introduction and application of ICT at Ardhi University, which are limited ICT infrastructure, inadequate ICT personnel, inadequate training provided to staff, limited support services, inadequate financial resources,and insufficient budget for ICT infrastructure. Further it recommends among other things, improvement of ICT infrastructure, increasing the number of …


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.