Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,745 Full-Text Articles 38,669 Authors 8,340,641 Downloads 268 Institutions

All Articles in Computer Engineering

Faceted Search

23,745 full-text articles. Page 1 of 938.

Signer-Independent Sign Language Recognition With Feature Disentanglement, İNCİ MELİHA BAYTAŞ, İpek ERDOĞAN 2024 Bogazici University: Bogazici Universitesi

Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan

Turkish Journal of Electrical Engineering and Computer Sciences

Learning a robust and invariant representation of various unwanted factors in sign language recognition (SLR) applications is essential. One of the factors that might degrade the sign recognition performance is the lack of signer diversity in the training datasets, causing a dependence on the singer’s identity during representation learning. Consequently, capturing signer-specific features hinders the generalizability of SLR systems. This study proposes a feature disentanglement framework comprising a convolutional neural network (CNN) and a long short-term memory (LSTM) network based on adversarial training to learn a signer-independent sign language representation that might enhance the recognition of signs. We aim to …


Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla BAĞBAŞI, Ali Emre TURGUT, Kutluk Bilge ARIKAN 2024 TÜBİTAK

Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla Bağbaşi, Ali Emre Turgut, Kutluk Bilge Arikan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel control framework for the collaboration of an aerial robot and a ground vehicle that is connected via a taut tether is proposed. The framework is based on a leader-follower paradigm. The leader follows a desired trajectory while the motion of the follower is controlled by an admittance controller using an extended state observer to estimate the tether force. Additionally, a velocity estimator is also incorporated to accurately assess the leader’s velocity. An essential feature of our system is its adaptability, enabling role switching between the robots when needed. Furthermore, the synchronization performance of the robots …


Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, EMRE GÜNGÖR, AHMET ÖZMEN 2024 Sakarya University

Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, Emre Güngör, Ahmet Özmen

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, vision systems have become essential in the development of advanced driver assistance systems or autonomous vehicles. Although deep learning methods have been the center of focus in recent years to develop fast and reliable obstacle detection solutions, they face difficulties in complex and unknown environments where objects of varying types and shapes are present. In this study, a novel non-AI approach is presented for finding the ground-line and detecting the obstacles in roads using v-disparity data. The main motivation behind the study is that the ground-line estimation errors cause greater deviations at the output. Hence, a novel …


Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin EREN, Feyza YILDIRIM OKAY, Suat ÖZDEMİR 2024 TÜBİTAK

Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the rapid growth of the Internet of Things (IoT) has raised concerns about the security and reliability of IoT systems. Anomaly detection is vital for recognizing potential risks and ensuring the optimal functionality of IoT networks. However, traditional anomaly detection methods often lack transparency and interpretability, hindering the understanding of their decisions. As a solution, Explainable Artificial Intelligence (XAI) techniques have emerged to provide human-understandable explanations for the decisions made by anomaly detection models. In this study, we present a comprehensive survey of XAI-based anomaly detection methods for IoT. We review and analyze various XAI techniques, including …


Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın KARAGÖZ, Özkan Ufuk NALBANTOĞLU, Derviş KARABOĞA, Bahriye AKAY, Alper BAŞTÜRK, Halil ULUTABANCA, Serap DOĞAN, Damla COŞKUN, Osman DEMİR 2024 TÜBİTAK

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is the most prevalent and crucial cancer type that should be diagnosed early to reduce mortality. Therefore, mammography is essential for early diagnosis owing to high-resolution imaging and appropriate visualization. However, the major problem of mammography screening is the high false positive recall rate for breast cancer diagnosis. High false positive recall rates psychologically affect patients, leading to anxiety, depression, and stress. Moreover, false positive recalls increase costs and create an unnecessary expert workload. Thus, this study proposes a deep learning based breast cancer diagnosis model to reduce false positive and false negative rates. The proposed model has …


Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra KANBUROĞLU, Faik Boray TEK 2024 TÜBİTAK

Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek

Turkish Journal of Electrical Engineering and Computer Sciences

This survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English …


Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, BIN ZHOU 2024 TÜBİTAK

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei POKUAA, Adeboya Felix ADEKOYA, Benjamin Asubam WEYORI, Owusu NYARKO-BOATENG 2024 TÜBİTAK

Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models have performed tremendously well in image classification. This good performance can be attributed to the availability of massive data in most domains. However, some domains are known to have few datasets, especially the health sector. This makes it difficult to develop domain-specific high-performing DL algorithms for these fields. The field of health is critical and requires accurate detection of diseases. In the United States Gastrointestinal diseases are prevalent and affect 60 to 70 million people. Ulcerative colitis, polyps, and esophagitis are some gastrointestinal diseases. Colorectal polyps is the third most diagnosed malignancy in the world. This …


Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela 2024 Louisiana State University and Agricultural and Mechanical College

Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela

LSU Doctoral Dissertations

In networks consisting of agents communicating with a central coordinator and working together to solve a global optimization problem in a distributed manner, the agents are often required to solve private proximal minimization subproblems. Such a setting often requires a further decomposition method to solve the global distributed problem, resulting in extensive communication overhead. In networks where communication is expensive, it is crucial to reduce the communication overhead of the distributed optimization scheme. Integrating Gaussian processes (GP) as a learning component to the Alternating Direction Method of Multipliers (ADMM) has proven effective in learning each agent's local proximal operator to …


Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D. 2024 Kennesaw State University

Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.

Symposium of Student Scholars

As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …


Mosaic Swarm Robotics: Emulating Natural Collective Behaviors For Efficient Task Execution With Custom Mobile Robots, Jonathan Ridley, Arielle Charles, Charles Koduru, Muhammad Hassan Tanveer, Razvan Voicu 2024 Kennesaw State University

Mosaic Swarm Robotics: Emulating Natural Collective Behaviors For Efficient Task Execution With Custom Mobile Robots, Jonathan Ridley, Arielle Charles, Charles Koduru, Muhammad Hassan Tanveer, Razvan Voicu

Symposium of Student Scholars

Mosaics, as an artistic expression, involves the meticulous arrangement of diverse tiles to form a unified composition. Drawing inspiration from this concept, the field of swarm robotics seeks to emulate nature’s collective behaviors observed in ant colonies, fish schools, and bird flocks, employing multiple agents to accomplish tasks efficiently. Our research explores the concept of mosaic swarm robotics, where numerous nodes with specialized functions are deployed across various domains, including applications for outdoor data capture and environment mapping. We utilized custom mobile robots operated by Raspberry Pi microcontrollers. By establishing an elaborate web of client-to-client communications to enable true localized …


Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker 2024 CUNY College of Staten Island

Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker

Open Educational Resources

This is a basic experiment for all students of all majors to explore Computer Security. Each instruction included in this experiment is conducted online via a Web Browser; Firefox or Chrome is recommended. Software does not need to be downloaded nor installed. The step by step instructions in this experiment include interactive questions and observations which are then included in the (student's) final report.


Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu 2024 Kennesaw State University

Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu

Master's Theses

The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.

In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …


Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton 2024 Georgia Southern University

Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton

Honors College Theses

This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …


Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert 2024 Portland State University

Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert

Student Research Symposium

This work presents a novel approach to real-time length sensing for biomimetic Braided Pneumatic Actuators (BPAs) as artificial muscles in soft robotics applications. The use of artificial muscles enables the development of more interesting robotic designs that no longer depend on single rotation joints controlled by motors. Developing robots with these capabilities, however, produces more complexities in control and sensing. Joint encoders, the mainstay of robotic feedback, can no longer be used, so new methods of sensing are needed to get feedback on muscle behavior to implement intelligent controls. To address this need, flexible strain gauge sensors from Portland company, …


Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan 2024 Kennesaw State University

Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan

Master's Theses

This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …


Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei 2024 Embry-Riddle Aeronautical University

Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei

Doctoral Dissertations and Master's Theses

Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel 2024 University at Albany, SUNY

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie 2024 Washington State University

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, LTC Ekzhin Ear, Dr. Shouhuai Xu 2024 University of Colorado, Colorado Springs (UCCS)

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Digital Commons powered by bepress