Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2015

Articles 1 - 10 of 10

Full-Text Articles in Other Computer Engineering

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …


Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav Dec 2015

Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav

Innovative Research Publications IRP India

Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the …


Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu Oct 2015

Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu

Electronics Elements

We know trash is an enormous problem in the world since trash does not only affect just humans but it also affects living creatures in general. The biggest contributor of trash in the United States is food waste. Food waste is produced by every human and the amounts of food waste is astonishing. Americans throw away almost half of the food that they buy, which is almost worth $165 billion per year. Food waste which end up in landfills and incinerators produces methane which is a greenhouse gas and can contribute to global warming. Trash in general and food waste …


Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han Sep 2015

Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han

Hyoil Han

Answer Validation is a topic of significant interest within the Question Answering community. In this paper, we propose the use of language modeling methodologies for Answer Validation, using corpus-based methods that do not require the use of external sources. Specifically, we propose a model for Answer Credibility which quantifies the reliability of a source document that contains a candidate answer and the Question’s Context Model.


Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han Sep 2015

Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han

Hyoil Han

Word Sense Disambiguation (WSD) is an important but challenging technique in the area of natural language processing (NLP). Hundreds of WSD algorithms and systems are available, but less work has been done in regard to choosing the optimal WSD algorithms. This paper summarizes the various knowledge sources used for WSD and classifies existing WSD algorithms according to their techniques. The rationale, tasks, performance, knowledge sources used, computational complexity, assumptions, and suitable applications for each class of WSD algorithms are also discussed. This paper will provide users with general knowledge for choosing WSD algorithms for their specific applications or for further …


Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner May 2015

Impact Of Detector-Element Active-Area Shape And Fill Factor On Image Sampling, Restoration, And Super-Resolution, Russell C. Hardie, Douglas R. Droege, Alexander J. Dapore, Mark E. Greiner

Russell C. Hardie

In many undersampled imaging systems, spatial integration from the individual detector elements is the dominant component of the system point spread function (PSF). Conventional focal plane arrays (FPAs) utilize square detector elements with a nearly 100% fill factor, where fill factor is defined as the fraction of the detector element area that is active in light detection. A large fill factor is generally considered to be desirable because more photons are collected for a given pitch, and this leads to a higher signal-to-noise-ratio (SNR). However, the large active area works against super-resolution (SR) image restoration by acting as an additional …


A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell Hardie, Douglas Droege Mar 2015

A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell Hardie, Douglas Droege

Russell C. Hardie

During digital video acquisition, imagery may be degraded by a number of phenomena including undersampling, blur, and noise. Many systems, particularly those containing infrared focal plane array (FPA) sensors, are also subject to detector nonuniformity. Nonuniformity, or fixed pattern noise, results from nonuniform responsivity of the photodetectors that make up the FPA. Here we propose a maximuma posteriori (MAP) estimation framework for simultaneously addressing undersampling, linear blur, additive noise, and bias nonuniformity. In particular, we jointly estimate a superresolution (SR) image and detector bias nonuniformity parameters from a sequence of observed frames. This algorithm can be applied to video in …


Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis Dec 2014

Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis

Ivan M. Jorrín Abellán

Different approaches have explored how to provide seamless learning across multiple ICT-enabled physical and virtual spaces, including three-dimensional virtual worlds (3DVW). However, these approaches present limitations that may reduce their acceptance in authentic educational practice: The difficulties of authoring and sharing teacher-created designs across different 3DVW platforms, or the lack of integration of 3DVWs with existing technologies in the classroom ecosystem (e.g., widespread web-based learning platforms such as Moodle, or mobile augmented reality applications). Focusing on a specific kind of 3DVW (virtual globes, such as Google Earth, used like 3DVWs), we propose a system that enables teachers to deploy across-spaces …


Cloud Enabled Attack Vectors, Ryan Jasper Dec 2014

Cloud Enabled Attack Vectors, Ryan Jasper

Ryan Jasper

The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a

documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.

The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …