Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

15,512 Full-Text Articles 21,291 Authors 5,462,937 Downloads 227 Institutions

All Articles in Computer Engineering

Faceted Search

15,512 full-text articles. Page 1 of 549.

3d Bionic Arm, Anny Baez Silfa 2021 CUNY New York City College of Technology

3d Bionic Arm, Anny Baez Silfa

Publications and Research

Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic ...


Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovič Jr., Jakub Bartaloš, Vincent Karovič, Michal Greguš 2021 Comenius University

Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovič Jr., Jakub Bartaloš, Vincent Karovič, Michal Greguš

Journal of Global Business Insights

The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing ...


Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz 2021 Western University

Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz

Electrical and Computer Engineering Publications

We introduce Dynamic Planning Networks (DPN), a novel architecture for deep reinforcement learning, that combines model-based and model-free aspects for online planning. Our architecture learns to dynamically construct plans using a learned state-transition model by selecting and traversing between simulated states and actions to maximize information before acting. DPN learns to efficiently form plans by expanding a single action conditional state transition at a time instead of exhaustively evaluating each action, reducing the number of state-transitions used during planning. We observe emergent planning patterns in our agent, including classical search methods such as breadth-first and depth-first search. DPN shows improved ...


Rebalancing Shared Mobility Systems By User Incentive Scheme Via Enforcement Learning, Matthew Brian Schofield 2021 Rowan University

Rebalancing Shared Mobility Systems By User Incentive Scheme Via Enforcement Learning, Matthew Brian Schofield

Theses and Dissertations

Shared mobility systems regularly suffer from an imbalance of vehicle supply within the system, leading to users being unable to receive service. If such imbalance problems are not mitigated some users will not be serviced. There is an increasing interest in the use of reinforcement learning (RL) techniques for improving the resource supply balance and service level of systems. The goal of these techniques is to produce an effective user incentivization policy scheme to encourage users of a shared mobility system to slightly alter their travel behavior in exchange for a small monetary incentive. These slight changes in user behavior ...


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin 2021 Independent Researcher

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying ...


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui 2021 California Polytechnic State University, San Luis Obispo

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities ...


Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah 2021 The Graduate Center, City University of New York

Efficient Protocols For Multi-Party Computation, Tahereh Jafarikhah

Dissertations, Theses, and Capstone Projects

Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their inputs without revealing any information beyond the result of the computation. We demonstrate secure function evaluation protocols for branching programs, where the communication complexity is linear in the size of the inputs, and polynomial in the security parameter. Our result is based on the circular security of the Paillier's encryption scheme. Our work followed the breakthrough results by Boyle et al. [9; 11]. They presented a Homomorphic Secret Sharing scheme which allows the non-interactive computation of Branching Programs over shares of the secret ...


Pier Ocean Pier, Brandon J. Nowak 2021 California Polytechnic State University, San Luis Obispo

Pier Ocean Pier, Brandon J. Nowak

Computer Engineering

Pier Ocean Peer is a weatherproof box containing a Jetson Nano, connected to a cell modem and camera, and powered by a Lithium Iron Phosphate battery charged by a 50W solar panel. This system can currently provide photos to monitor the harbor seal population that likes to haul out at the base of the Cal Poly Pier, but more importantly it provides a platform for future expansion by other students either though adding new sensors directly to the Jetson Nano or by connecting to the jetson nano remotely through a wireless protocol of their choice.


Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani 2021 California Polytechnic State University, San Luis Obispo

Observation Of The Evolution Of Hide And Seek Ai, Anthony J. Catelani

Computer Science and Software Engineering

The purpose of this project is to observe the evolution of two artificial agents, a ‘Seeker’ and a ‘Hider’, as they play a simplified version of the game Hide and Seek. These agents will improve through machine learning, and will only be given an understanding of the rules of the game and the ability to navigate through the grid-like space where the game shall be played; they will not be taught or given any strategies, and will be made to learn from a clean slate. Of particular interest is observing the particular playstyle of hider and seeker intelligences as new ...


Applying Deep Learning On Financial Sentiment Analysis, Cuiyuan Wang 2021 The Graduate Center, City University of New York

Applying Deep Learning On Financial Sentiment Analysis, Cuiyuan Wang

Dissertations, Theses, and Capstone Projects

Portfolio Investment has always been appealing to investors and researchers. In the past, people tend to use historical trading information of the securities to predict the return or manage the portfolio. Nowadays, the literature has been proved that the market sentiment could predict asset prices. Specifically, it has been shown that the stock market movement is related to financial news and social media events. Thus, it becomes necessary to extract the sentiment of the financial news. We explicitly introduce the application of dictionary methods, traditional machine learning models and deep learning models on text classification. The experiment results show that ...


Characterization Of Time-Variant And Time-Invariant Assessment Of Suicidality On Reddit Using C-Ssrs, Manas Gaur, Vamsi Aribandi, Amanuel Alambo, Ugur Kursuncu, Krishnaprasad Thirunarayan, Jonathan Beich, Jyotishman Pathak, Amit Sheth 2021 University of South Carolina - Columbia

Characterization Of Time-Variant And Time-Invariant Assessment Of Suicidality On Reddit Using C-Ssrs, Manas Gaur, Vamsi Aribandi, Amanuel Alambo, Ugur Kursuncu, Krishnaprasad Thirunarayan, Jonathan Beich, Jyotishman Pathak, Amit Sheth

Publications

Suicide is the 10th leading cause of death in the U.S (1999-2019). However, predicting when someone will attempt suicide has been nearly impossible. In the modern world, many individuals suffering from mental illness seek emotional support and advice on well-known and easily-accessible social media platforms such as Reddit. While prior artificial intelligence research has demonstrated the ability to extract valuable information from social media on suicidal thoughts and behaviors, these efforts have not considered both severity and temporality of risk. The insights made possible by access to such data have enormous clinical potential - most dramatically envisioned as a trigger ...


The Long-Term Cost Of Cyber Overreaction, Jan Kallberg 2021 Army Cyber Institute

The Long-Term Cost Of Cyber Overreaction, Jan Kallberg

ACI Journal Articles

The default modus operandi when facing negative cyber events is to overreact. It is essential to highlight the cost of overreaction, which needs to be a part of calculating when to engage and how. For an adversary probing cyber defenses, reactions provide information that can aggregate a clear picture of the defendant’s capabilities and preauthorization thresholds.

Ideally, potential adversaries cannot assess our strategic and tactical cyber capacities, but over time and numerous responses, the information advantage evaporates. A reactive culture triggered by cyberattacks provides significant information to a probing adversary, which seeks to understand underlying authorities and tactics, techniques ...


A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. 2021 Symbiosis International University and Pimpri Chinchwad College of Engineering, SPPU, Pune, India

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences ...


Using An Integrative Machine Learning Approach To Study Microrna Regulation Networks In Pancreatic Cancer Progression, Roland Madadjim 2021 University of Nebraska-Lincoln

Using An Integrative Machine Learning Approach To Study Microrna Regulation Networks In Pancreatic Cancer Progression, Roland Madadjim

Computer Science and Engineering: Theses, Dissertations, and Student Research

With advances in genomic discovery tools, recent biomedical research has produced a massive amount of genomic data on post-transcriptional regulations related to various transcript factors, microRNAs, lncRNAs, epigenetic modifications, and genetic variations. In this direction, the field of gene regulation network inference is created and aims to understand the interactome regulations between these molecules (e.g., gene-gene, miRNA-gene) that take place to build models able to capture behavioral changes in biological systems. A question of interest arises in integrating such molecules to build a network while treating each specie in its uniqueness. Given the dynamic changes of interactome in chaotic ...


Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, soin Abdoul Kassif Traore 2021 Kennesaw State University

Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore

Symposium of Student Scholars

Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job ...


An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk 2021 Kennesaw State University

An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk

Symposium of Student Scholars

Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Laband University of California San Francisco. Then, we study a ...


Framework For Collecting Data From Iot Device, Md Saiful Islam 2021 Kennesaw State University

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis ...


Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan 2021 Kennesaw State University

Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan

Symposium of Student Scholars

Innovations in health monitoring systems are fundamental for the continuous improvement of remote healthcare. With the current presence of SARS-CoV-2, better known as COVID-19, in people’s daily lives, solutions for monitoring heart and especially respiration and pulmonary functions are more needed than ever. Besides, health monitoring systems are widely used for patients who need isolated care, unconscious patients who cannot get medical attention for themselves. As it is well-known, monitoring systems rely on sensor technologies. Currently, there are multiple research studies for remote monitoring using different types of sensors. In this effort, we survey the current approaches that utilize ...


Do I Have Your Attention ? Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa 2021 Kennesaw State University

Do I Have Your Attention ? Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa

Symposium of Student Scholars

Studies show that the quality of the information collected during an elicitation interview, and consequently the quality of the software product that needs to be developed, highly depends on the interviewee's engagement. Because of social expectations, interviewees tend to hide if they are bored or not engaged. To overcome this problem and support the analyst during the interviews, this research uses biometric data and voice features, together with supervised machine learning algorithms, to predict the interviewee's engagement. We built our solution on an experiment consisted of interviewing 31 participants. We collected the data using an Empatica wristband and ...


Grandparent-Grandchild Virtual Communication Study, Tanya Keval 2021 University of San Diego

Grandparent-Grandchild Virtual Communication Study, Tanya Keval

Undergraduate Honors Theses

The cross generational bond between a grandparent and grandchild is extremely important. The stories, traditions, and beliefs that grandparents share with their grandchildren have the ability to shape their grandchildren’s beliefs. For grandparents, the role of being a grandparent and creating shared memories with their grandchildren leaves a positive impact on their mental health. Although the elderly population prefers to connect with others in-person, including their grandchildren, this face-to-face connection is not always possible due to schedules, distance, or health. Many products have been designed for grandparents and grandchildren to try to fill this communication gap when they are ...


Digital Commons powered by bepress