Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 85

Full-Text Articles in Other Computer Engineering

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY ...


Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav Dec 2015

Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav

Innovative Research Publications IRP India

Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the ...


Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams Dec 2015

Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams

Computer Engineering

No abstract provided.


Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper Dec 2015

Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper

Electronic Theses and Dissertations

The field of lossless image compression studies the various ways to represent image data in the most compact and efficient manner possible that also allows the image to be reproduced without any loss. One of the most efficient strategies used in lossless compression is to introduce entropy reduction through decorrelation. This study focuses on using the exclusive-or logic operator in a decorrelation filter as the preprocessing phase of lossless image compression of continuous-tone images. The exclusive-or logic operator is simply and reversibly applied to continuous-tone images for the purpose of extracting differences between neighboring pixels. Implementation of the exclusive-or operator ...


Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho Dec 2015

Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho

Doctoral Dissertations

Current face recognition systems are rife with serious challenges in uncontrolled conditions: e.g., unrestrained lighting, pose variations, accessories, etc. Hyperspectral imaging (HI) is typically employed to counter many of those challenges, by incorporating the spectral information within different bands. Although numerous methods based on hyperspectral imaging have been developed for face recognition with promising results, three fundamental challenges remain: 1) low signal to noise ratios and low intensity values in the bands of the hyperspectral image specifically near blue bands; 2) high dimensionality of hyperspectral data; and 3) inter-band misalignment (IBM) correlated with subject motion during data acquisition.

This ...


Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard Dec 2015

Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard

Computer Engineering

In today’s society, we are seeing incredible improvements in terms of creating smaller technological devices that behave more and more like the personal computers of yesterday. Mobile “Smart” devices, in particular, are becoming incredibly powerful not just in terms of processing power, but in the fact that they are able to provide assistance to users in their everyday lives. Application developers are now able utilize the power and size of these devices, to create and realize ideas that would have been previously viewed as impossible. This project applies the fields of digital signal processing, music, and mobile application development ...


Free2play, Corey Lee Wilson Dec 2015

Free2play, Corey Lee Wilson

Computer Engineering

Free2Play is a website based upon the wildly popular PC video game League of Legends created by Riot Gaming. The website contains helpful information for new and old players of the game, such as articles containing the latest League of Legends new, a rune calculator, and recommended item builds for characters. The website uses HTML5, jquery, node.js, MySQL, and PHP to pull data from Riot’s web API and Champion.gg’s website.


The Information Of Spam, Sawyer C. Anderson Dec 2015

The Information Of Spam, Sawyer C. Anderson

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper explores the value of information contained in spam tweets as it pertains to prediction accuracy. As a case study, tweets discussing Bitcoin were collected and used to predict the rise and fall of Bitcoin value. Precision of prediction both with and without spam tweets, as identified by a naive Bayesian spam filter, were measured. Results showed a minor increase in accuracy when spam tweets were included, indicating that spam messages likely contain information valuable for prediction of market fluctuations.


Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is ...


Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens Nov 2015

Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens

Space Traffic Management Conference

The Space Data Integrator (SDI) Project is the initial step to satisfy the Federal Aviation Administration (FAA) strategic initiative to integrate commercial space launch and reentry vehicles into the National Airspace System. The project addresses the needs for greater situational awareness and monitoring, and increased response capability during non-nominal and catastrophic incidents during space operations.

The initial phase of this project leverages current FAA systems, and provide an initial demonstration of capability that will provide for state data from a commercial reentry vehicle to be ingested into a the FAA Traffic Flow Management System, and displayed on Traffic Situation Displays ...


Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu Oct 2015

Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu

Electronics Elements

We know trash is an enormous problem in the world since trash does not only affect just humans but it also affects living creatures in general. The biggest contributor of trash in the United States is food waste. Food waste is produced by every human and the amounts of food waste is astonishing. Americans throw away almost half of the food that they buy, which is almost worth $165 billion per year. Food waste which end up in landfills and incinerators produces methane which is a greenhouse gas and can contribute to global warming. Trash in general and food waste ...


Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han Sep 2015

Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han

Hyoil Han

Answer Validation is a topic of significant interest within the Question Answering community. In this paper, we propose the use of language modeling methodologies for Answer Validation, using corpus-based methods that do not require the use of external sources. Specifically, we propose a model for Answer Credibility which quantifies the reliability of a source document that contains a candidate answer and the Question’s Context Model.


Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han Sep 2015

Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han

Hyoil Han

Word Sense Disambiguation (WSD) is an important but challenging technique in the area of natural language processing (NLP). Hundreds of WSD algorithms and systems are available, but less work has been done in regard to choosing the optimal WSD algorithms. This paper summarizes the various knowledge sources used for WSD and classifies existing WSD algorithms according to their techniques. The rationale, tasks, performance, knowledge sources used, computational complexity, assumptions, and suitable applications for each class of WSD algorithms are also discussed. This paper will provide users with general knowledge for choosing WSD algorithms for their specific applications or for further ...


Rfid Microscope Lab, Patricia Carranza Sep 2015

Rfid Microscope Lab, Patricia Carranza

Computer Engineering

The RFID Microscope Lab is a new exhibit created for the San Luis Obispo Children's Museum. The goal of the project is to create a modern, interactive exhibit that will teach children about different natural specimens through the use of technology. A computer, custom software, and RFID technology, will be used to display facts, microscopic images, and short videos of ten different specimens.


Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande Sep 2015

Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande

Electronic Theses, Projects, and Dissertations

Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program ...


Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang Aug 2015

Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang

FIU Electronic Theses and Dissertations

Thanks to the advanced technologies and social networks that allow the data to be widely shared among the Internet, there is an explosion of pervasive multimedia data, generating high demands of multimedia services and applications in various areas for people to easily access and manage multimedia data. Towards such demands, multimedia big data analysis has become an emerging hot topic in both industry and academia, which ranges from basic infrastructure, management, search, and mining to security, privacy, and applications. Within the scope of this dissertation, a multimedia big data analysis framework is proposed for semantic information management and retrieval with ...


Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii Aug 2015

Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii

Electronic Theses and Dissertations

GPGPUs offer significant computational power for programmers to leverage. This computational power is especially useful when utilized for accelerating scientific models. This thesis analyzes the utilization of GPGPU programming to accelerate scientific computing models.

First the construction of hardware for visualization and computation of scientific models is discussed. Several factors in the construction of the machines focus on the performance impacts related to scientific modeling.

Image processing is an embarrassingly parallel problem well suited for GPGPU acceleration. An image processing library was developed to show the processes of recognizing embarrassingly parallel problems and serves as an excellent example of converting ...


Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher Aug 2015

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a ...


Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande Aug 2015

Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande

Dissertations and Theses

Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.

The purpose of this dissertation is to investigate how online social networks ...


Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li Aug 2015

Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li

Doctoral Dissertations

Compressed Sensing (CS) is an emerging field based on the revelation that a small collection of linear projections of a sparse signal contains enough information for reconstruction. It is promising that CS can be utilized in environments where the signal acquisition process is extremely difficult or costly, e.g., a resource-constrained environment like the smartphone platform, or a band-limited environment like visual sensor network (VSNs). There are several challenges to perform sensing due to the characteristic of these platforms, including, for example, needing active user involvement, computational and storage limitations and lower transmission capabilities. This dissertation focuses on the study ...


Jsish, Ryan Grasell Jul 2015

Jsish, Ryan Grasell

Computer Science

For my senior project, I implemented Professor Keen’s JSish spec in C++. JSish is a subset of Javascript with support for execution from the command line and files.

I chose this project because I wanted to reinforce my programing language skills, learn C++, and gain a deeper understanding of garbage collection.

I quickly grew familiar with C++. My prior experience with both C and Java was a good enough introduction to let me hit the ground running. The biggest hurdle for me was the lack of garbage collection built into C++. I understood the principles of manual memory management ...


Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas Jul 2015

Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas

Theses and Dissertations

The goal of this thesis is to explore the feasibility of a multirotor controller system which can dynamically change the arm configuration of a multirotor. Currently most of the multirotor systems have to be powered down, rewired, and programmed with new firmware, to configure how many arms/motors they use to fly. The focus of our effort is to develop a Field Programmable Gate Array (FPGA) based hardware/software controller which uses dynamic partial hardware reconfiguration to switch the arm/motor configuration of a multirotor during operation. We believe that this will make a multirotor more fault tolerant and adaptive ...


A Maturity Model For Mobile Learning, Muasaad Alrasheedi Jun 2015

A Maturity Model For Mobile Learning, Muasaad Alrasheedi

Electronic Thesis and Dissertation Repository

Higher education is becoming increasingly interested in adopting innovative and modern technologies as a mode of imparting education. Mobile technologies are considered to be the next frontier of educational platforms as they have the capability to provide high-quality learning experiences and to satisfy the increasing demand for mobility and flexibility. In view of the ubiquitous nature of mobile technology and the immense opportunities it offers, there are favorable indications that the technology could be introduced as the next generation of learning platforms. The present research aims to develop a comprehensive framework based on the well-known Capability Maturity Model (CMM) and ...


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy ...


X264 Video Encoding Frontend, Alvin Lam Jun 2015

X264 Video Encoding Frontend, Alvin Lam

Computer Science

x264 is a free video codec for encoding video streams into the H.264/MPEG-4 AVC format. It has become the new standard for video encoding, providing higher quality with a higher compression than that of XviD. x264 provides a command line interface as well as an API and is used in popular applications such as HandBrake and FFmpeg. Advanced Audio Coding (AAC) is a very popular audio coding standard for lossy digital audio compression. AAC provides a higher sound quality than MP3 at similar bitrates. This senior project describes the design and implementation of a x264 video encoding frontend ...


Nutty Adventures, Tony Hsu, Mandy Chan Jun 2015

Nutty Adventures, Tony Hsu, Mandy Chan

Computer Engineering

Nutty Adventures is an Android game. The goal is to gather acorns for day-to-day survival, upgrades, and hoarding. Ultimately, the player must have enough acorns by the time Winter comes to fulfill the squirrel’s quest: providing enough acorns for his squirrel kingdom during the barren Winter season. Throughout the days, the player has to keep track of time and monsters, which might influence player decisions.


G Boots: A Real-Time 3d Puzzle Video Game Graphics Senior Project, Zachary Glazer Jun 2015

G Boots: A Real-Time 3d Puzzle Video Game Graphics Senior Project, Zachary Glazer

Computer Science

G Boots is a real-time 3D puzzle video game. It uses OpenGL, using GLSL for shaders, in order to implement cross platform support of advanced rendering and shading techniques. A level editing system was implemented so that anyone can make or edit levels that can then be played in the game. At the end of two quarters of development by a single developer, one polished proof of concept level was created using the level editing system in order to show the feasibility of the project.


Slaps Music Sharing App, Maximillian L. Parelius Jun 2015

Slaps Music Sharing App, Maximillian L. Parelius

Computer Engineering

Slaps is a fun way to share new songs with friends. Users can simply select songs from their personal library of music, select a short sample of the song to share, and then select which friends to share it with. If a user loves a song that he/she receives, they can link directly to iTunes through the app to download the full song.


Project Llama: Making A Cappella Arranging Easier, Jason Lu Jun 2015

Project Llama: Making A Cappella Arranging Easier, Jason Lu

Liberal Arts and Engineering Studies

This project was intended to improve the current state of a cappella arranging. It explains the problems with current tools and explores other options.