Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 35

Full-Text Articles in Other Computer Engineering

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof. May 2019

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.

MODVIS Workshop

This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts ...


Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado Apr 2019

Predicting Unethical Physician Behavior At Scale: A Distributed Computing Framework, Quinn Keck, Robert Sandor, Miguel Romero, Diane Woodbridge, Paul Intrevado

Creative Activity and Research Day - CARD

As the amount of publicly shared data increases,

developing a robust pipeline to stream, store and process data is

critical, as the casual user often lacks the technology, hardware

and/or skills needed to work with such voluminous data. In

this research, the authors employ Amazon EC2 and EMR,

MongoDB, and Spark MLlib to explore 28.5 gigabytes of CMS

Open Payments data in an attempt to identify physicians who

may have a high propensity to act unethically, owing to significant

transfers of wealth from medical companies. A Random Forest

Classifier is employed to predict the top decile of physicians ...


Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan Apr 2019

Quantum Criticism, Ashwini Badgujar, Paul Intrevado, Andrew Wang, Kai Yu, David Guy Brizan

Creative Activity and Research Day - CARD

Quantum Criticism scrapes data from the News Articles and performs Sentiment Analysis.


Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal Apr 2019

Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal

Creative Activity and Research Day - CARD

Neuro-radiologists currently use qualitative volumetric change of brain ventricles after surgery to assess the safety of removing a ventriculoperitoneal (VP) shunt which is a medical device that relieves pressure on the brain caused by fluid accumulation. Following safe removal of the VP shunt, patients can be released from the hospital. The need for accurate and quick measurement of brain ventricular volumetric change makes automatic 3D segmentation software an ideal candidate to aid decisions after surgery. In this paper, we propose an approach to estimate the ventricular volume variation using segmentation in brain MRI and CT images. Our approach consists of ...


Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade Apr 2019

Extraction Of Recipe Steps From Scientific Papers: The Nanomaterials Synthesis Domain, Richard Carmona-Andrade

Kansas State University Undergraduate Research Conference

The overall goal of this research is to effectively extract steps for performing a specified procedure from published text descriptions, producing a recipe listing the materials, operations, and conditions required to perform the procedure. For example, if the procedure is to create a nanomaterial, and relevant source text consists of peer-reviewed scientific publications, a recipe should include raw materials and unit operations, among other specifications of a chemical engineering process. This project focuses on developing performance measures to evaluate recipe steps, by gauging their correctness, completeness, and non-redundancy. This is done by comparing manually annotated documents that conveyed desired results ...


An Application Of Artificial General Intelligence In Board Games, Nathan Skalka Apr 2019

An Application Of Artificial General Intelligence In Board Games, Nathan Skalka

Computer Science Graduate Research Workshop

No abstract provided.


Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari Mar 2019

Mobility-Based Models For Advancing Diagnostic/Predictive Healthcare, Elham Rastegari

Student Research and Creative Activity Fair

Functional ability has been always considered as one of the important determining factors of individuals’ health and quality of life. Traditional movement analysis systems require expensive facilities and frequent visits for patients to specialized laboratories. Portability and affordability of wearable sensors along with their improved accuracy and capability of monitoring movement during daily activities make them a potential alternative for analyzing mobility patterns for clinical and health assessment purposes. Wearable-based movement data, when combined with other relevant clinical or laboratory data, could enhance evidence-based healthcare and data-driven Clinical Decision Support Systems (CDSS). Utilizing the data from wearable devices, many researchers ...


A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan Mar 2019

A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan

Student Research and Creative Activity Fair

In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed ...


Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear Oct 2018

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia was ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley Oct 2018

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee Oct 2018

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online ...


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Aug 2018

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

National Training Aircraft Symposium (NTAS)

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick Aug 2018

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – such as ...


Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González May 2018

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


Gradel, Emily R. Wolf, Christopher D. Brauns Ii, Timothy G. Smith Ii, Emmett Z. Budd Apr 2018

Gradel, Emily R. Wolf, Christopher D. Brauns Ii, Timothy G. Smith Ii, Emmett Z. Budd

The Research and Scholarship Symposium

A major problem facing Computer Science faculty members at Cedarville University is grading student assignments. Specifically, grading programming assignments can be a repetitive, time-consuming process which makes it prime for automation. Professors need a web application that takes student code, compiles it, and compares the output to what the professors provides as correct. Gradel, a senior design project, allows students to submit their code online and receive instant feedback based on professor-designed test cases. Furthermore, professors need to be able to keep track of what grades students earn on their projects, which is functionality Gradel provides. In addition to allowing ...


Applied Deep Learning: Automated Segmentation Of White Matter Hyperintensities (Wmh) On Brain Mr Images, Matt Berseth Nov 2017

Applied Deep Learning: Automated Segmentation Of White Matter Hyperintensities (Wmh) On Brain Mr Images, Matt Berseth

DHI Digital Projects Showcase

Small vessel disease plays a crucial role in stroke, dementia, and ageing. White matter hyperintensities (WMH) of vascular origin are one of the main consequences of small vessel disease and well visible on brain MR images. Quantification of WMH volume, location, and shape is of key importance in clinical research studies and likely to find its way into clinical practice; supporting diagnosis, prognosis, and monitoring of treatment for dementia and other neurodegenerative diseases. It has been noted that visual rating of WMH has important limitations and hence a more detailed segmentation of WMH is preferred. Various automated WMH segmentation techniques ...


2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris Nov 2017

2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris

ASA Multidisciplinary Research Symposium

Evaluating the capabilities of Raspberry Pi computers to be used in embedded glass cockpit applications for experimental aircraft. This includes details of what is required for these applications as well as how well the Raspberry Pi 3B can perform in this role.


Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva May 2017

Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva

MODVIS Workshop

E-Learning is emerging as a convenient and effective learning tool. However, the challenge with eLearning is the lack of effective tools to assess levels of learning. Ability to predict difficult content in real time enables eLearning systems to dynamically provide supplementary content to meet learners’ needs. Recent developments have made possible low-cost eye trackers, which enables a new class of applications based on eye response. In comparison to past attempts using bio-metrics in learning assessments, with eye tracking, we can have access to the exact stimulus that is causing the response. A key aspect of the proposed approach is the ...


Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan May 2017

Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan

Annual ADFSL Conference on Digital Forensics, Security and Law

A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique ...


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Cusigns: A Dynamic Solution For Digital Signage, Jonathan Easterday, Wesley Kelly, Todd Landis, Nicole D. Perez Apr 2017

Cusigns: A Dynamic Solution For Digital Signage, Jonathan Easterday, Wesley Kelly, Todd Landis, Nicole D. Perez

The Research and Scholarship Symposium

Cedarville University has computer monitors located throughout campus in order to show advertisements and important information to students, faculty, and staff. The slides shown on these displays are scheduled using Concerto: web-based software which manages digital signage. Though the Concerto software is currently used to manage digital signage, Cedarville University’s IT department desires features which Concerto does not provide, including the ability to play videos, a better slide randomization algorithm, emergency broadcasting features, and an intuitive user interface. We have created a new solution for digital signage called CUSigns with the goal of providing the existing functionality of Concerto ...


"Horse," A Composition For Solo Snare Drum And Live Electronics, Zachary Benator Apr 2017

"Horse," A Composition For Solo Snare Drum And Live Electronics, Zachary Benator

Georgia State Undergraduate Research Conference

No abstract provided.


A Hierarchical Learning Model For Extracting Public Health Data From Social Media, Elham Rastegari Mar 2017

A Hierarchical Learning Model For Extracting Public Health Data From Social Media, Elham Rastegari

Student Research and Creative Activity Fair

In decision making processes, particularly when it comes to health-related decisions, each relevant piece of information is important. This is particularly important when it comes to health conditions for which there remains a high degree of non-determinism as far as diagnosis and treatment. Online social media, are places in which people feel free to share their opinions about numerous topics, including public health issues and how individuals have responded to different types of treatments associated with diseases. social media could represent a secondary source that can be used as a supplement to other data sources. This would allow individuals as ...


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang Oct 2016

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu Oct 2016

Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens Nov 2015

Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens

Space Traffic Management Conference

The Space Data Integrator (SDI) Project is the initial step to satisfy the Federal Aviation Administration (FAA) strategic initiative to integrate commercial space launch and reentry vehicles into the National Airspace System. The project addresses the needs for greater situational awareness and monitoring, and increased response capability during non-nominal and catastrophic incidents during space operations.

The initial phase of this project leverages current FAA systems, and provide an initial demonstration of capability that will provide for state data from a commercial reentry vehicle to be ingested into a the FAA Traffic Flow Management System, and displayed on Traffic Situation Displays ...


Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher Aug 2015

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a ...


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout May 2015

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group ...


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images ...


Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello Aug 2014

Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello

The Summer Undergraduate Research Fellowship (SURF) Symposium

There has been success in recent years for neural networks in applications requiring high level intelligence such as categorization and assessment. In this work, we present a neural network model to learn control policies using reinforcement learning. It takes a raw pixel representation of the current state and outputs an approximation of a Q value function made with a neural network that represents the expected reward for each possible state-action pair. The action is chosen an \epsilon-greedy policy, choosing the highest expected reward with a small chance of random action. We used gradient descent to update the weights and biases ...