Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

20,052 Full-Text Articles 30,585 Authors 7,290,223 Downloads 245 Institutions

All Articles in Computer Engineering

Faceted Search

20,052 full-text articles. Page 1 of 760.

When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway 2023 Stanford University

When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway

Publications

The learning sciences community is currently exploring new ways to enact productive and equitable co-design research-practice partnerships that are sensitive to all the concerns and needs of stakeholders. The paper contributes to that still-growing literature through an interaction analysis of a co-design discussion involving school district partners that unfolded about cultural relevance and sensitivity in relation to the use of a specific image in an elementary school coding lesson. The episode involved looking moment-by-moment at how district educators recognized and acknowledged that a specific design decision could be harmful for a minoritized population of students enrolled in the district. However, …


Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung 2023 SEAS, University of Pennsylvania

Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung

Lab Papers (GRASP)

We propose a novel design for a lightweight and compact tunable stiffness actuator capable of stiffness changes up to 20x. The design is based on the concept of a coiled spring, where changes in the number of layers in the spring change the bulk stiffness in a near-linear fashion. We present an elastica nested rings model for the deformation of the proposed actuator and empirically verify that the designed stiffness-changing spring abides by this model. Using the resulting model, we design a physical prototype of the tunable-stiffness coiled-spring actuator and discuss the effect of design choices on the resulting achievable …


Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly 2023 University of Nebraska-Lincoln

Leveraging Aruco Fiducial Marker System For Bridge Displacement Estimation Using Unmanned Aerial Vehicles, Mohamed Aly

Computer Science and Engineering: Theses, Dissertations, and Student Research

The use of unmanned aerial vehicles (UAVs) in construction sites has been widely growing for surveying and inspection purposes. Their mobility and agility have enabled engineers to use UAVs in Structural Health Monitoring (SHM) applications to overcome the limitations of traditional approaches that require labor-intensive installation, extended time, and long-term maintenance. One of the critical applications of SHM is measuring bridge deflections during the bridge operation period. Due to the complex remote sites of bridges, remote sensing techniques, such as camera-equipped drones, can facilitate measuring bridge deflections. This work takes a step to build a pipeline using the state-of-the-art computer …


Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu 2023 Western Kentucky University

Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu

Masters Theses & Specialist Projects

Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …


Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan 2023 California State University, San Bernardino

Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan

Electronic Theses, Projects, and Dissertations

Almost half of all people have sleep interruptions at some point in their lives, making sleep disorders a common issue that affects a sizeable section of the population. Both their physical and emotional well-being may suffer as a result of this.Insomnia, which is a prevalent sleep disorder, is identified by symptoms including insufficient sleep duration and quality, trouble initiating sleep, multiple nighttime awakenings, early morning awakenings, and non-restorative sleep. It is essential to employ sleep monitoring systems to detect sleeping disorders as soon as possible for prompt diagnosis and treatment. To avoid sleep related health issues, there are plenty of …


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers 2023 Old Dominion University

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic


Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr 2023 Southern Adventist University

Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr

Campus Research Day

Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …


Machine Learning Based Software Fault Prediction Models, Gurmeet Kaur, Jyoti Pruthi, Parul Gandhi 2023 Research Scholar CST, MRU, India

Machine Learning Based Software Fault Prediction Models, Gurmeet Kaur, Jyoti Pruthi, Parul Gandhi

Karbala International Journal of Modern Science

The study aims to identify soft-computing-based software fault prediction models that assist in resolving issues related to the quality, reliability, and cost of the software projects. It proposes models for implementation of software fault prediction using decision-tree regression and the K-nearest neighbor technique of machine learning. The proposed models have been designed and implemented in Python using designed metric suites as input, and the predicted-faults as output, for the real-time, wider dataset from the Promise repository. By comparing the prediction and validation results of the proposed models for the same dataset, it has been concluded that the decision-tree regression-based fault …


Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng WANG, Weidong LI 2023 School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan 430074, China

Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …


From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu ZHUANG, Cheng ZHOU 2023 Department of Philosophy, Peking University, Beijing 100871, China; Peking University Third Hospital, Beijing 100191, China

From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …


Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston 2023 Old Dominion University

Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston

Cybersecurity Undergraduate Research

Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan 2023 Old Dominion University

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


A Comprehensive Study On Crypto-Algorithms, Sucheta Panda, Sushree Bibhuprada B. Priyadarshini 2023 Siksha O Anusandhan Deemed to be University

A Comprehensive Study On Crypto-Algorithms, Sucheta Panda, Sushree Bibhuprada B. Priyadarshini

International Journal of Smart Sensor and Adhoc Network

In the field of computer network and security, cryptography plays a vital role for secure data transmission as it follows the principle of data confidentiality, integrity, non-repudiation, authentication. By using several cryptographic algorithms, a user can deliver and receive the message in more convenient way. In this paper, we have collaborated on various cryptographic algorithms, several types of cryptographic techniques along with different types of security attacks prevailing in case of cryptography. During the exchanging of any sort of information, the key generation, encryption and decryption processes are examined in more details in the current paper. We have discussed regarding …


Open Resources For Teaching Iot Physical Security, Maria Valero 2023 Kennesaw State University

Open Resources For Teaching Iot Physical Security, Maria Valero

All Things Open

The Internet of Things (IoT) and physical devices are around us all the time. From a simple watch that measures your heartbeat to an advanced voice assistant that turns on your light, IoT devices are everywhere. Teaching security in this type of physical device is a new topic, and finding good quality resources for teaching is also a complicated task. In this project, the instructor took the best online open-source materials and created 15 modules with hands-on activities that teach students about the interaction with IoT devices and their security. The materials include labs with emulators of physical devices like …


Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand 2023 Louisiana State University and Agricultural and Mechanical College

Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand

LSU Doctoral Dissertations

Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng 2023 Old Dominion University

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


Assessing The Ability Of Arduino-Based Sensor Systems To Monitor Changes In Water Quality, Josiah Hacker 2023 Georgia Southern University

Assessing The Ability Of Arduino-Based Sensor Systems To Monitor Changes In Water Quality, Josiah Hacker

Honors College Theses

Access to safe water is vital to public health. While developed countries like the United States are recognized as having reliable and safe water, many small water utilities struggle with supplying consistent water quality. Technicians of these utilities will periodically test water samples from the influent and throughout the distribution system. However, this laborious and costly process does not capture sudden changes in influent water quality due to environmental conditions or pipes breaking in the distribution system. Here I show how an Arduino-based sensor can be used as a real-time, low-cost monitor of water quality parameters. Specifically, I developed a …


The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil 2023 Department of Computer Engineering, K.J. Somaiya College of Engineering, Ramrao Adik Institute of Technology, Mumbai, Maharashtra, India

The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil

Library Philosophy and Practice (e-journal)

In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …


Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe 2023 Belmont University

Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe

Belmont University Research Symposium (BURS)

Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …


Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan 2023 Hadramout university

Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan

Hadhramout University Journal of Natural & Applied Sciences

Abstract

The demand for navigation systems is rapidly increasing, especially in indoor environments which the signal of GPS is not available. Therefore the Inertial Measurement Unit (IMU) system is a suitable navigation system in such indoor environments. It usually consists of three accelerometers and three gyroscopes to determine position, velocity and attitude information, respectively, without need of any external source. But this type of navigation systems has errors growth with time due to accelerometers and gyroscopes drifts. This paper introduces indoor navigation system based on integrated IMU navigation system with proposed system called Landmarks Points-Map Matching (LP-MM) system using Kalman …


Digital Commons powered by bepress