Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

20,276 Full-Text Articles 30,953 Authors 7,488,105 Downloads 251 Institutions

All Articles in Computer Engineering

Faceted Search

20,276 full-text articles. Page 1 of 770.

Drag Coefficient Characterization Of The Origami Magic Ball (Inproceedings), Guanyu Chen, Dongsheng Chen, Jessica Weakly, Cynthia Sung 2023 University of Pennsylvania

Drag Coefficient Characterization Of The Origami Magic Ball (Inproceedings), Guanyu Chen, Dongsheng Chen, Jessica Weakly, Cynthia Sung

Lab Papers (GRASP)

The drag coefficient plays a vital role in the design and optimization of robots that move through fluids. From aircraft to underwater vehicles, their geometries are specially engineered so that the drag coefficients are as low as possible to achieve energy-efficient performances. Origami magic balls are 3-dimensional reconfigurable geometries composed of repeated simple waterbomb units. Their volumes can change as their geometries vary and we have used this concept in a recent underwater robot design. This paper characterizes the drag coefficient of an origami magic ball in a wind tunnel. Through dimensional analysis, the scenario where the robot swims underwater …


User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed ElHussiny 2023 American University in Cairo

User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny

Theses and Dissertations

With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …


Model-Driven Analysis Of Ecg Using Reinforcement Learning, Christian O'Reilly, Sai Durga Rithvik Oruganti, Deepa Tilwani, Jessica Bradshaw 2023 University of South Carolina

Model-Driven Analysis Of Ecg Using Reinforcement Learning, Christian O'Reilly, Sai Durga Rithvik Oruganti, Deepa Tilwani, Jessica Bradshaw

Publications

Modeling is essential to better understand the generative mechanisms responsible for experimental observations gathered from complex systems. In this work, we are using such an approach to analyze the electrocardiogram (ECG). We present a systematic framework to decompose ECG signals into sums of overlapping lognormal components. We use reinforcement learning to train a deep neural network to estimate the modeling parameters from an ECG recorded in babies from 1 to 24 months of age. We demonstrate this model-driven approach by showing how the extracted parameters vary with age. From the 751,510 PQRST complexes modeled, 82.7% provided a signal-to-noise ratio that …


A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee 2023 Macalester College

A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee

Macalester Journal of Physics and Astronomy

A portable component model (PCM) of a ground source heat pump system was developed and used as a test case in the creating of a PCM development framework. By developing this framework, new building energy simulation models will be able to be easily integrated into existing simulation software such as EnergyPlus and the Modelica Buildings Library. Our model uses a time responsive g-function and numerical methods to simulate ground source heat pumps for single time steps as well as long time scales. We validated our model against GHESim and GLHEPro and found that our model agrees with these two standards …


When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway 2023 Stanford University

When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway

Publications

The learning sciences community is currently exploring new ways to enact productive and equitable co-design research-practice partnerships that are sensitive to all the concerns and needs of stakeholders. The paper contributes to that still-growing literature through an interaction analysis of a co-design discussion involving school district partners that unfolded about cultural relevance and sensitivity in relation to the use of a specific image in an elementary school coding lesson. The episode involved looking moment-by-moment at how district educators recognized and acknowledged that a specific design decision could be harmful for a minoritized population of students enrolled in the district. However, …


In-Situ Mechanical Tester, Andrrew Murach, Gustavo Marquez, Kosimo Tonn, Jake Vormbaum 2023 California Polytechnic State University, San Luis Obispo

In-Situ Mechanical Tester, Andrrew Murach, Gustavo Marquez, Kosimo Tonn, Jake Vormbaum

Mechanical Engineering

Over the course of the 2022-23 Cal Poly SLO school year, a small tensile tester device was developed specifically for Dr. Long Wang to test thin film materials under a microscope and generate accurate force versus displacement graphs. A tensile tester was manufactured using purchased and machined components, electronics were consolidated in a separate box and connected, and a program and user interface were written to control the motion, provide custom inputs, and organize useful data for the researcher. Tests were conducted to compare the performance of the device to universal tensile testers available in the Composites lab. The device …


Vr Force Feedback Gloves, Mark Wu, Claire Chen 2023 California Polytechnic State University, San Luis Obispo

Vr Force Feedback Gloves, Mark Wu, Claire Chen

Electrical Engineering

The goal of this project is to produce a manufacturing plan for a consumer VR glove. The total addressable market of VR is over 170 million global users as of 2022 (Kolmar , 2022) with a serviceable available market of 300,000 users on Meta’s own social platform (Heath, 2022). The targeted Quest 2 platform utilizes handheld controllers, which causes a lack of immersivity in social settings and gaming scenarios. One common use of the platform involves social platforms such as “Horizons” where users meet in a virtual world to interact; handheld controllers don’t allow users to shake hands, make finger …


Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes 2023 Eastern Washington University

Using An Embedded System For A Quality Cup Of Coffee, Evan Powers, Joshua Stermer, Tsion Yohannes

2023 Symposium

Many coffee lovers spend up to $5 on a cup of coffee everyday. To save money one could make them at home, but a quality machine with PIDs start at $1000. Using an embedded system one could spend less than $50 and a few hours implement PIDs into an existing $400 machine that will last a lifetime. microcontroller. Learning C language combined with hardware implementation applied to cheap and simple everyday objects can improve everyday quality of life and save money.

This is challenging because we have to incorporate the additional circuitry into a pre established circuit with limited space, …


Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey 2023 Department of Information Technology, Government College of Engineering & Ceramic Technology

Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey

Al-Bahir Journal for Engineering and Pure Sciences

Twitter is a social media platform where users can post, read, and interact with 'tweets'. Third party like corporate organization can take advantage of this huge information by collecting data about their customers' opinions. The use of emoticons on social media and the emotions expressed through them are the subjects of this research paper. The purpose of this paper is to present a model for analyzing emotional responses to real-life Twitter data. The proposed model is based on supervised machine learning algorithms and data on has been collected through crawler “TWEEPY” for empirical analysis. Collected data is pre-processed, pruned and …


Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung 2023 SEAS, University of Pennsylvania

Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung

Lab Papers (GRASP)

We propose a novel design for a lightweight and compact tunable stiffness actuator capable of stiffness changes up to 20x. The design is based on the concept of a coiled spring, where changes in the number of layers in the spring change the bulk stiffness in a near-linear fashion. We present an elastica nested rings model for the deformation of the proposed actuator and empirically verify that the designed stiffness-changing spring abides by this model. Using the resulting model, we design a physical prototype of the tunable-stiffness coiled-spring actuator and discuss the effect of design choices on the resulting achievable …


Credit Card Fraud Detection Using Logistic Regression And Synthetic Minority Oversampling Technique (Smote) Approach, Nrusingha Tripathy, Subrat Kumar Nayak, Julius Femi Godslove, Ibanga Kpereobong Friday, Sasanka Sekhar Dalai 2023 Siksha 'O' Anusandhan

Credit Card Fraud Detection Using Logistic Regression And Synthetic Minority Oversampling Technique (Smote) Approach, Nrusingha Tripathy, Subrat Kumar Nayak, Julius Femi Godslove, Ibanga Kpereobong Friday, Sasanka Sekhar Dalai

International Journal of Computer and Communication Technology

Financial fraud is a serious threat that is expanding effects on the financial sector. The use of credit cards is growing as digitization and internet transactions advance daily. The most common issues in today's culture are credit card scams. This kind of fraud typically happens when someone uses someone else's credit card details. Credit card fraud detection uses transaction data attributes to identify credit card fraud, which can save significant financial losses and affluence the burden on the police. The detection of credit card fraud has three difficulties: uneven data, an abundance of unseen variables, and the selection of an …


Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy 2023 University of AlKafeel, Najf, Iraq

Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy

Al-Bahir Journal for Engineering and Pure Sciences

The proliferation of social networking sites and their user base has led to an exponential increase in the amount of data generated on a daily basis. Textual content is one type of data that is commonly found on these platforms, and it has been shown to have a significant impact on decision-making processes at the individual, group, and national levels. One of the most important and largest part of this data are the texts that express human intentions, feelings and condition. Understanding these texts is one of the biggest challenges that facing data analysis. It is the backbone for understanding …


A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar 2023 Department of Computer Applications, Bhilai Institute of Technology, Durg, (C.G.), India

A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar

Karbala International Journal of Modern Science

Automatic identification of insects and diseases has attracted researchers for the last few years. Researchers have suggested several algorithms to get around the problems of manually identifying insects and pests. Image processing techniques and deep convolution neural networks can overcome the challenges of manual insect identification and classification. This work focused on optimizing and assessing deep convolutional neural networks for insect identification. AlexNet, MobileNetv2, ResNet-50, ResNet-101, GoogleNet, InceptionV3, SqueezeNet, ShuffleNet, DenseNet201, VGG-16 and VGG-19 are the architectures evaluated on three different datasets. In our experiments, DenseNet 201 performed well with the highest test accuracy. Regarding training time, AlexNet performed well, …


A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh 2023 University of Nebraska-Lincoln

A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Automatic modulation classification (AMC) refers to a signal processing procedure through which the modulation type and order of an observed signal are identified without any prior information about the communications setup. AMC has been recognized as one of the essential measures in various communications research fields such as intelligent modem design, spectrum sensing and management, and threat detection. The research literature in AMC is limited to accounting only for the noise that affects the received signal, which makes their models applicable for stationary environments. However, a more practical and real-world application of AMC can be found in mobile environments where …


Towards Optimal Operation And Control Of Emerging Electric Distribution Networks, Jimiao Zhang 2023 Rowan University

Towards Optimal Operation And Control Of Emerging Electric Distribution Networks, Jimiao Zhang

Theses and Dissertations

The growing integration of power-electronics converters enabled components causes low inertia in the evolving electric distribution networks, which also suffer from uncertainties due to renewable energy sources, electric demands, and anomalies caused by physical or cyber attacks, etc. These issues are addressed in this dissertation. First, a virtual synchronous generator (VSG) solution is provided for solar photovoltaics (PVs) to address the issues of low inertia and system uncertainties. Furthermore, for a campus AC microgrid, coordinated control of the PV-VSG and a combined heat and power (CHP) unit is proposed and validated. Second, for islanded AC microgrids composed of SGs and …


Tech Time, 2023 DePaul University

Tech Time

DePaul Magazine

DePaul is embracing tech more than ever, incorporating innovative devices and approaches into education in all corners of the university. Here are seven ways DePaul provides hands-on experiences with cutting-edge tools that position students and faculty in the forefront of their industries and disciplines.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


A Graph-Based Approach For Adaptive Serious Games, Nidhi G. Patel 2023 Rowan University

A Graph-Based Approach For Adaptive Serious Games, Nidhi G. Patel

Theses and Dissertations

Traditional education systems are based on the one-size-fits-all approach, which lacks personalization, engagement, and flexibility necessary to meet the diverse needs and learning styles of students. This encouraged researchers to focus on exploring automated, personalized instructional systems to enhance students’ learning experiences. Motivated by this remark, this thesis proposes a personalized instructional system using a graph method to enhance a player’s learning process by preventing frustration and avoiding a monotonous experience. Our system uses a directional graph, called an action graph, for representing solutions to in-game problems based on possible player actions. Through our proposed algorithm, a serious game integrated …


Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan 2023 Washington University in St. Louis

Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan

McKelvey School of Engineering Theses & Dissertations

Trajectory prediction is an integral component of modern autonomous systems as it allows for envisioning future intentions of nearby moving agents. Due to the lack of other agents' dynamics and control policies, deep neural network (DNN) models are often employed for trajectory forecasting tasks. Although there exists an extensive literature on improving the accuracy of these models, there is a very limited number of works studying their robustness against adversarially crafted input trajectories. To bridge this gap, in this paper, we propose a targeted adversarial attack against DNN models for trajectory forecasting tasks. We call the proposed attack TA4TP for …


Enabling The Integration Of Sustainable Design Methodological Frameworks And Computational Life Cycle Assessment Tools Into Product Development Practice, Tejaswini Chatty 2023 Dartmouth College

Enabling The Integration Of Sustainable Design Methodological Frameworks And Computational Life Cycle Assessment Tools Into Product Development Practice, Tejaswini Chatty

Dartmouth College Ph.D Dissertations

Environmental sustainability has gained critical importance in product development (PD) due to increased regulation, market competition, and consumer awareness, leading companies to set ambitious climate targets . To meet these goals, PD practitioners (engineers and designers) are often left to adapt their practices to reduce the impacts of the products they manufacture. Literature review and interviews with practitioners show that they highly valued using quantitative life cycle assessment (LCA) results to inform decision making.

LCA is a technique to measure the environmental impacts across various stages of a product life cycle. Existing LCA software tools, however, are designed for dedicated …


Digital Commons powered by bepress