Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

15,724 Full-Text Articles 21,726 Authors 5,526,221 Downloads 229 Institutions

All Articles in Computer Engineering

Faceted Search

15,724 full-text articles. Page 1 of 559.

3d Bionic Arm, Anny Baez Silfa 2021 CUNY New York City College of Technology

3d Bionic Arm, Anny Baez Silfa

Publications and Research

Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic ...


Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovič Jr., Jakub Bartaloš, Vincent Karovič, Michal Greguš 2021 Comenius University

Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovič Jr., Jakub Bartaloš, Vincent Karovič, Michal Greguš

Journal of Global Business Insights

The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing ...


Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun 2021 Louisiana State University and Agricultural and Mechanical College

Evaluating Word Embedding Models For Traceability, Mahfuza Khatun, Mahfuza Khatun

LSU Master's Theses

ABSTRACT

Traceability link recovery (TLR) is a software engineering activity that helps to ensure software quality and assists with keeping track of changes by establishing links between software artifacts that are a part of the software engineering process, such as requirements, use cases, source code, test cases, and documentation. Software requirement artifacts are typically written in natural language. An Information Retrieval process is frequently used in many software activities, including the TLR activity. Recently, Word Embedding (WE) techniques have been used in many natural language processing tasks as well as in TLR tasks. We investigate the effectiveness of WE techniques ...


Projection-Based Ar For Hearing Parent-Deaf Child Communication, Victor N. Antony, Adira Blumenthal, Ziyue Qiu, Ashely Tenesaca, Wanyin Hu, Zhen Bai 2021 University of Rochester

Projection-Based Ar For Hearing Parent-Deaf Child Communication, Victor N. Antony, Adira Blumenthal, Ziyue Qiu, Ashely Tenesaca, Wanyin Hu, Zhen Bai

Frameless

Deaf infants born to hearing parents are at risk of language deprivation due to lack of sign language fluency and subpar parent-child communication. We present a projection-based Augmented Reality (AR) prototype designed to improve parent-child communication and American Sign Language (ASL) acquisition. Our system aims to non-intrusively augment play episodes by projecting just-in-time and context-aware ASL equivalents extracted from nursery rhymes being sung by parents. This paper presents the initial implementation of the prototype .


Eye Tracking In Virtual Reality For Educational Technology Research, Jorge Bacca-Acosta, Julian Tejada 2021 Fundación Universitaria Konrad Lorenz

Eye Tracking In Virtual Reality For Educational Technology Research, Jorge Bacca-Acosta, Julian Tejada

Frameless

No abstract provided.


Designing Blended Experiences: Laugh Traders Design Fiction, BRIAN J. OKEEFE 2021 Farmingdale State College

Designing Blended Experiences: Laugh Traders Design Fiction, Brian J. Okeefe

Frameless

The increasing ubiquity of interactions that involve complementary digital content, physical objects, and spaces, brings about new challenges for designers. There is a need to embed designs in legacy systems, whether those are existing physical structures or existing digital platforms. Traditional approaches to product design, interaction design, and user experience design often do not take this new context into account. Many systems do not consider how designers produce new digital and physical experiences that work harmoniously, while supporting new interactions and relationships with people (Imaz and Benyon 2007; Jetter, Geyer, Schwarz & Reiterer 2012). To address this, we propose the idea ...


An Efficient Multi-Message And Multi-Receiver Signcryption Scheme For Heterogeneous Smart Mobile Iot, Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang 2021 Xidian University

An Efficient Multi-Message And Multi-Receiver Signcryption Scheme For Heterogeneous Smart Mobile Iot, Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang

Faculty Publications from the Department of Electrical and Computer Engineering

The Internet of Things (IoT) is developing towards smart and mobile Internet of Things (SM-IoT), which has made great progress. Due to the inherent heterogeneity, distribution, intensive communication, and resource constraints of SM-IoT, efficient security and privacy communication protocols become a particularly critical challenge. Signcryption has received considerable attention. Various signcryption schemes have been proposed to solve secure communication. However, most of them are low in efficiency, without the consideration of characteristics of the SM-IoT. In this paper, we propose a signcryption scheme to achieve efficient secure multi-message and multi-receiver communication for the heterogeneous and distributed SM-IoT. We develop Identity-based ...


Connecting Islamic Technology And The History Of Robotics In Wikidata Via Wikidatabot, Anchalee Panigabutra-Roberts 2021 University of Tennessee, Knoxville

Connecting Islamic Technology And The History Of Robotics In Wikidata Via Wikidatabot, Anchalee Panigabutra-Roberts

UT Libraries Faculty: Other Publications and Presentations

My current study is on the connection between the history of robotics and Islamic technology. I focused on early Muslim inventors, such as al-Jazari, from Artuqid Dynasty of Jazira in Mesopotamia (modern day Iraq, Syria and Turkey) who is considered to be the father of robotics. His wrote the Book of Knowledge of Ingenious Mechanical Devices, the manuscript treaty published after his passing in 1206, translated by Donald R. Hill, a British engineer and scholar on Islamic technology, in 1974. The manuscript in Arabic (MS. Greaves 27) is archived at the Bodleian Library, University of Oxford, United Kingdom. In this ...


A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa AMM, yehia M. Helmy YMH, Amira M. Idrees AMI 2021 Business Information Systems, Faculty of Commerce and Business Administration, Helwan University, Egypt

A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa Amm, Yehia M. Helmy Ymh, Amira M. Idrees Ami

Future Computing and Informatics Journal

There is no doubt that this age is the age of data and technology. Moreover, there is tremendous development in all fields. The personalized material is a good approach in the different fields. It provides a fit material that matches the styles of readers. It supports readers in various reading domains. This research paper aims to support students in the educational system. Additionally, the research paper designs to increase education values for students. Furthermore, the research paper builds the smart appropriate materials through Egyptian Knowledge Banking (EKB) based on the learner question. The Egyptian Knowledge Bank (EKB) is a rich ...


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban 2021 October 6 University

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This paper ...


Reconfiguring Non-Convex Holes In Pivoting Modular Cube Robots, Daniel Adam Feshbach, Cynthia Sung 2021 University of Pennsylvania

Reconfiguring Non-Convex Holes In Pivoting Modular Cube Robots, Daniel Adam Feshbach, Cynthia Sung

Lab Papers (GRASP)

We present an algorithm for self-reconfiguration of admissible 3D configurations of pivoting modular cube robots with holes of arbitrary shape and number. Cube modules move across the surface of configurations by pivoting about shared edges, enabling configurations to reshape themselves. Previous work provides a reconfiguration algorithm for admissible 3D configurations containing no non-convex holes; we improve upon this by handling arbitrary admissible 3D configurations. The key insight specifies a point in the deconstruction of layers enclosing non-convex holes at which we can pause and move inner modules out of the hole. We prove this happens early enough to maintain connectivity ...


Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz 2021 Western University

Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz

Electrical and Computer Engineering Publications

We introduce Dynamic Planning Networks (DPN), a novel architecture for deep reinforcement learning, that combines model-based and model-free aspects for online planning. Our architecture learns to dynamically construct plans using a learned state-transition model by selecting and traversing between simulated states and actions to maximize information before acting. DPN learns to efficiently form plans by expanding a single action conditional state transition at a time instead of exhaustively evaluating each action, reducing the number of state-transitions used during planning. We observe emergent planning patterns in our agent, including classical search methods such as breadth-first and depth-first search. DPN shows improved ...


Scholarly Communication On Web 3.0: An Analysis Based On Web Of Science, ARUNKUMAR V R 2021 University of Nebraska - Lincoln

Scholarly Communication On Web 3.0: An Analysis Based On Web Of Science, Arunkumar V R

Library Philosophy and Practice (e-journal)

For investigating the structure and process of academic communication, bibliometrics provides an excellent set of methodologies and measures. Web 3.0 is a concept that incorporates artificial intelligence and other advanced technologies and brings forth new opportunities and challenges to information scientists. The present study provides an evaluation of the scientific productivity related to Web 3.0 technologies in Web of Science (WoS) during the period of 2007 to 2020. The country-wise distribution of the literature revealed that the majorities (22.330%) of the documents were published from the USA, followed by Spain, and scholarly output of Web 3.0 ...


Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays do Nascimento, Gustavo Dalmarco 2021 PUCRS

Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays Do Nascimento, Gustavo Dalmarco

Markets, Globalization & Development Review

This paper points out the major disruptions caused by the COVID-19 pandemic. It proposes an automated Internet-of-Things (IoT) based manufacturing and supply chain system, termed FASTEN, that can deal with such severe disruptions.


Hybrid Recommendation System Approach For Appropriate Developer Selection In Bug Repositories, Mohanad AL-İMARİ, Sefer KURNAZ, Jalal S. H. AL-BAYATİ 2021 Altınbaş University

Hybrid Recommendation System Approach For Appropriate Developer Selection In Bug Repositories, Mohanad Al-İmari, Sefer Kurnaz, Jalal S. H. Al-Bayati

Dicle University Journal of Engineering

The essential destination of this research is to develop a hybrid recommendation system methodology to enhance the overall performance accuracy of such existed systems, this recommendation approach normally utilized to assign or propose a few counted numbers of programmers or developers that capable of resolving system's bug reports generated automatically from an open source bug repository, meaning the system decides which programmers or developers should be taken into account to be in charge of finding a solution the bugs mentioned in the bug's report. The definition of the bug selection problems in bug repositories are the activities that ...


Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik 2021 University of South Carolina - Columbia

Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik

Publications

A manufacturing paradigm shift from conventional control pyramids to decentralized, service-oriented, and cyber-physical systems (CPSs) is taking place in today’s 4th industrial revolution. Generally accepted roles and implementation recipes of cyber systems are expected to be standardized in the future of manufacturing industry. The authors intend to develop a novel CPS-enabled control architecture that accommodates: (1) intelligent information systems involving domain knowledge, empirical model, and simulation; (2) fast and secured industrial communication networks; (3) cognitive automation by rapid signal analytics and machine learning (ML) based feature extraction; (4) interoperability between machine and human. Semantic integration of process indicators is ...


Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux 2021 Purdue University

Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux

International Conference on Lean Six Sigma

Abstract

Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability ...


A Quantitative Validation Of Multi-Modal Image Fusion And Segmentation For Object Detection And Tracking, Nicholas LaHaye, Michael J. Garay, Brian D. Bue, Hesham el-Askary, Erik Linstead 2021 California Institute of Technology

A Quantitative Validation Of Multi-Modal Image Fusion And Segmentation For Object Detection And Tracking, Nicholas Lahaye, Michael J. Garay, Brian D. Bue, Hesham El-Askary, Erik Linstead

Mathematics, Physics, and Computer Science Faculty Articles and Research

In previous works, we have shown the efficacy of using Deep Belief Networks, paired with clustering, to identify distinct classes of objects within remotely sensed data via cluster analysis and qualitative analysis of the output data in comparison with reference data. In this paper, we quantitatively validate the methodology against datasets currently being generated and used within the remote sensing community, as well as show the capabilities and benefits of the data fusion methodologies used. The experiments run take the output of our unsupervised fusion and segmentation methodology and map them to various labeled datasets at different levels of global ...


The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola 2021 Harrisburg University of Science and Technology

The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola

Dissertations and Theses

In recent years Revenue Operations or RevOps has emerged in professional circles as a new approach to manage Sales, Marketing and Customer Success teams in the context of b2b sales. In practitioner circles, RevOps definitions range from the increased collaboration of the three job functions to an all-out creation of job function within organizations. While the subject of interdepartmental alignment has been covered extensively in academia (albeit not exhaustively), RevOps as a term and set of practices has received no attention and industry practitioners struggle to find a unified set of best practices that isn’t coming from organizations trying ...


Mac For Machine-Type Communications In Industrial Iot—Part Ii: Scheduling And Numerical Results, Jie Gao, Mushu Li, Weihua Zhuang, Xuemin Shen, Xu Li 2021 Marquette University

Mac For Machine-Type Communications In Industrial Iot—Part Ii: Scheduling And Numerical Results, Jie Gao, Mushu Li, Weihua Zhuang, Xuemin Shen, Xu Li

Electrical and Computer Engineering Faculty Research and Publications

In the second part of this article, we develop a centralized packet transmission scheduling scheme to pair with the protocol designed in Part I and complete our medium access control (MAC) design for machine-type communications in the industrial Internet of Things. For the networking scenario, fine-grained scheduling that attends to each device becomes necessary, given stringent Quality-of-Service (QoS) requirements and diversified service types, but prohibitively complex for a large number of devices. To address this challenge, we propose a scheduling solution in two steps. First, we develop algorithms for device assignment based on the analytical results from Part I, when ...


Digital Commons powered by bepress