Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

20,187 Full-Text Articles 30,797 Authors 7,390,316 Downloads 248 Institutions

All Articles in Computer Engineering

Faceted Search

20,187 full-text articles. Page 1 of 766.

Drag Coefficient Characterization Of The Origami Magic Ball (Inproceedings), Guanyu Chen, Dongsheng Chen, Jessica Weakly, Cynthia Sung 2023 University of Pennsylvania

Drag Coefficient Characterization Of The Origami Magic Ball (Inproceedings), Guanyu Chen, Dongsheng Chen, Jessica Weakly, Cynthia Sung

Lab Papers (GRASP)

The drag coefficient plays a vital role in the design and optimization of robots that move through fluids. From aircraft to underwater vehicles, their geometries are specially engineered so that the drag coefficients are as low as possible to achieve energy-efficient performances. Origami magic balls are 3-dimensional reconfigurable geometries composed of repeated simple waterbomb units. Their volumes can change as their geometries vary and we have used this concept in a recent underwater robot design. This paper characterizes the drag coefficient of an origami magic ball in a wind tunnel. Through dimensional analysis, the scenario where the robot swims underwater …


When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway 2023 Stanford University

When Is An Owl More Than An Owl? An Interaction Analysis Of A Computer Science Co-Design Conversation On Cultural Relevance, Stephanie M. Robillard, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway

Publications

The learning sciences community is currently exploring new ways to enact productive and equitable co-design research-practice partnerships that are sensitive to all the concerns and needs of stakeholders. The paper contributes to that still-growing literature through an interaction analysis of a co-design discussion involving school district partners that unfolded about cultural relevance and sensitivity in relation to the use of a specific image in an elementary school coding lesson. The episode involved looking moment-by-moment at how district educators recognized and acknowledged that a specific design decision could be harmful for a minoritized population of students enrolled in the district. However, …


Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung 2023 SEAS, University of Pennsylvania

Design And Control Of A Tunable-Stiffness Coiled-Spring Actuator, Shivangi Misra, Mason Mitchell, Rongqian Chen, Cynthia Sung

Lab Papers (GRASP)

We propose a novel design for a lightweight and compact tunable stiffness actuator capable of stiffness changes up to 20x. The design is based on the concept of a coiled spring, where changes in the number of layers in the spring change the bulk stiffness in a near-linear fashion. We present an elastica nested rings model for the deformation of the proposed actuator and empirically verify that the designed stiffness-changing spring abides by this model. Using the resulting model, we design a physical prototype of the tunable-stiffness coiled-spring actuator and discuss the effect of design choices on the resulting achievable …


A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh 2023 University of Nebraska-Lincoln

A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Automatic modulation classification (AMC) refers to a signal processing procedure through which the modulation type and order of an observed signal are identified without any prior information about the communications setup. AMC has been recognized as one of the essential measures in various communications research fields such as intelligent modem design, spectrum sensing and management, and threat detection. The research literature in AMC is limited to accounting only for the noise that affects the received signal, which makes their models applicable for stationary environments. However, a more practical and real-world application of AMC can be found in mobile environments where …


Tech Time, 2023 DePaul University

Tech Time

DePaul Magazine

DePaul is embracing tech more than ever, incorporating innovative devices and approaches into education in all corners of the university. Here are seven ways DePaul provides hands-on experiences with cutting-edge tools that position students and faculty in the forefront of their industries and disciplines.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan 2023 Washington University in St. Louis

Targeted Adversarial Attacks Against Neural Network Trajectory Predictors, Kaiyuan Tan

McKelvey School of Engineering Theses & Dissertations

Trajectory prediction is an integral component of modern autonomous systems as it allows for envisioning future intentions of nearby moving agents. Due to the lack of other agents' dynamics and control policies, deep neural network (DNN) models are often employed for trajectory forecasting tasks. Although there exists an extensive literature on improving the accuracy of these models, there is a very limited number of works studying their robustness against adversarially crafted input trajectories. To bridge this gap, in this paper, we propose a targeted adversarial attack against DNN models for trajectory forecasting tasks. We call the proposed attack TA4TP for …


A Graph-Based Approach For Adaptive Serious Games, Nidhi G. Patel 2023 Rowan University

A Graph-Based Approach For Adaptive Serious Games, Nidhi G. Patel

Theses and Dissertations

Traditional education systems are based on the one-size-fits-all approach, which lacks personalization, engagement, and flexibility necessary to meet the diverse needs and learning styles of students. This encouraged researchers to focus on exploring automated, personalized instructional systems to enhance students’ learning experiences. Motivated by this remark, this thesis proposes a personalized instructional system using a graph method to enhance a player’s learning process by preventing frustration and avoiding a monotonous experience. Our system uses a directional graph, called an action graph, for representing solutions to in-game problems based on possible player actions. Through our proposed algorithm, a serious game integrated …


Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong 2023 Washington University in St. Louis

Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong

McKelvey School of Engineering Theses & Dissertations

Adversarial patch attack has demonstrated that it can cause the misclassification of deep neural networks to the target label when the size of patch is relatively small to the size of input image; however, the effectiveness of adversarial patch attack has never been experimented on deep reinforcement learning algorithms. We design algorithms to generate adversarial patches to attack two types of deep reinforcement learning algorithms, including deep Q-networks (DQN) and proximal policy optimization (PPO). Our algorithms of generating adversarial patch consist of two parts: choosing attack position and training adversarial patch on that position. Under the same bound of total …


Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya 2023 Louisiana State University

Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya

LSU Doctoral Dissertations

Software-Defined Networking (SDN) is an efficient networking design that decouples the network's control plane from the data plane. When compared to the traditional network architecture, the SDN architecture shares many of the same security issues. The centralized SDN controller makes it easier to control, easier to program in real-time, and more flexible, but this comes at the cost of more security risks. An attack on the control plane layer of the SDN controller is a major security concern.

First, centralized design and the existence of a single point of failure in the control plane compromise the accessibility and availability of …


Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal 2023 Kennesaw State University

Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal

Master of Science in Computer Science Theses

The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …


Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty 2023 University of Minnesota Law School

Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty

Minnesota Journal of Law, Science & Technology

No abstract provided.


Osmosis: Asymmetries In Telematic Performance, Matthias Ziegler 2023 Zurich University of the Arts

Osmosis: Asymmetries In Telematic Performance, Matthias Ziegler

Journal of Network Music and Arts

For the 2022 edition of the NowNet Arts Conference on October 31st, the telematic research team of the Zurich University of the Arts (ZHdK) presented a project entitled OSMOSIS. OSMOSIS was a concert event, highlighting how telematically connected spaces always confront each other asymmetrically. Their telematic connection is part of a continuous space in which information is fragmented and selectively reassembled. Like the biochemical process of osmosis in which molecules diffuse across a cell membrane from one level of concentration to another, in telematic connections certain elements such as sound, physicality, movement, and empathy are diffused across spaces, each being …


Synthesis: Works Of Sarah Weaver And Collaborations (2020-2022), Sarah Weaver 2023 Stony Brook University

Synthesis: Works Of Sarah Weaver And Collaborations (2020-2022), Sarah Weaver

Journal of Network Music and Arts

Synthesis Series is a set of contemplative contemporary network arts works for solo, chamber, and large ensemble performance. The works are my compositions and collaborations from the years 2020 to 2022. The concept of synthesis is conceived as an activation of synchrony. Synthesis Series follows my prior works in Synchrony Series and Source Series as sequences of compositions since 1998 proliferating into a networked system of artistic realization. In Synchrony Series I defined synchrony as the perceptual alignment of distributed time and space components. Synthesis builds on this to activate the alignment as a networked state of composite resultants, networked …


Distributed Networks Of Listening And Sounding: 20 Years Of Telematic Musicking, Doug Van Nort 2023 Stony Brook University

Distributed Networks Of Listening And Sounding: 20 Years Of Telematic Musicking, Doug Van Nort

Journal of Network Music and Arts

This paper traces a twenty-year arc of my performance and compositional practice in the medium of telematic music, focusing on a distinct approach to fostering interdependence and emergence through the integration of listening strategies, electroacoustic improvisation, pre-composed structures, blended real/virtual acoustics, networked mutual-influence, shared signal transformations, gesture-concepts and machine agencies. Communities of collaboration and exchange over this time period are discussed, which span both pre- and post-pandemic approaches to the medium that range from metaphors of immersion and dispersion to diffraction.


An Overview Of Immersive Virtual Reality Music Experiences In Online Platforms, Ben Loveridge 2023 University of Melbourne

An Overview Of Immersive Virtual Reality Music Experiences In Online Platforms, Ben Loveridge

Journal of Network Music and Arts

As the field of Virtual Reality (VR) continues to mature, so too does the potential for creative and immersive musical experiences in the medium. However, of the thousands of applications now available across the major VR platforms, only a small number of titles focus on the ability to create or explore musical content. This article outlines the current state of music games, experiences, and creative applications across the current VR ecosystem. Firstly, it surveys the quantity of commercial titles currently available across the major VR platforms with a music-related focus. Secondly, the article classifies music applications into the following subcategories: …


Musical Time In Network Interaction: The Case Of Unfinished Line, Silvio Ferraz, William Teixeira 2023 Stony Brook University

Musical Time In Network Interaction: The Case Of Unfinished Line, Silvio Ferraz, William Teixeira

Journal of Network Music and Arts

Considering recent world events, art and music could not be unmoved by the dramatic turn of directions in both the way people relate and the place of technology in their lives. An ongoing project of both the authors in writing a new piece for cello and Disklavier operated by interactions in real-time gave place to a new kind of composition, mixing written music to improvisation and replacing real-time for something we are calling remote time. This paper presents such walking of resilience, first reviewing some relevant points of view about musical interaction in real-time and the importance of synchrony for …


The Entanglement: Volumetric Music Performances In A Virtual Metaverse Environment, Damian Dziwis, Henrik Von Coler 2023 Stony Brook University

The Entanglement: Volumetric Music Performances In A Virtual Metaverse Environment, Damian Dziwis, Henrik Von Coler

Journal of Network Music and Arts

Telematic music performances are an established performance practice in contemporary music. Performing music pieces with geographically distributed musicians is both a technological challenge and an artistic one. These challenges and the resulting possibilities can lead to innovative aesthetic realizations. This paper presents the implementation and realization of “The Entanglement,” a telematic concert performance in a metaverse environment. The system is realized using web-based frameworks to implement a platform-independent online multi-user environment with volumetric, three- dimensional, streaming of audio and video. This allows live performance of this improvisation piece based on an algorithmic quantum computer composition within a freely explorational virtual …


Adventures In [A]Synchrony: Tools And Strategies For The Network Arts-Curious Music Educator, Seth Adams 2023 Stony Brook University

Adventures In [A]Synchrony: Tools And Strategies For The Network Arts-Curious Music Educator, Seth Adams

Journal of Network Music and Arts

Networked Music Performance (NMP) is ensemble music mediated by a network such as the internet. NMP can be usefully divided into asynchronous and synchronous formats. Prototypical examples of the asynchronous format familiar to music educators are Eric Whitacre’s virtual choirs that began in 2009. A decade later, the virtual ensemble format exploded in popularity due to the COVID-19 pandemic. Although the format does not allow participants to interact with one another, virtual ensembles nonetheless provide ample opportunities for both musical and nonmusical benefits. Synchronous NMP is, by comparison, little known and rarely practiced by music educators. However, both types of …


Editorial, Sarah Weaver 2023 Stony Brook University

Editorial, Sarah Weaver

Journal of Network Music and Arts

No abstract provided.


Digital Commons powered by bepress