Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1,215 Full-Text Articles 1,895 Authors 766,293 Downloads 128 Institutions

All Articles in Other Computer Engineering

Faceted Search

1,215 full-text articles. Page 1 of 55.

Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr 2023 Southern Adventist University

Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr

Campus Research Day

Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …


The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil 2023 Department of Computer Engineering, K.J. Somaiya College of Engineering, Ramrao Adik Institute of Technology, Mumbai, Maharashtra, India

The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil

Library Philosophy and Practice (e-journal)

In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …


Procedural Model Of The Monitoring System, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi. Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan, E-mail: botirov_fz@mail.ru, Phone: +998-97-751-16-97.

Procedural Model Of The Monitoring System, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.


Comprehensive Wind Speed Forecasting-Based Analysis Of Stacked Stateful & Stateless Models, Swayamjit Saha, Amogu Uduka, Hunter Walt, James Lucore 2023 Mississippi State University

Comprehensive Wind Speed Forecasting-Based Analysis Of Stacked Stateful & Stateless Models, Swayamjit Saha, Amogu Uduka, Hunter Walt, James Lucore

Graduate Research Symposium

Wind speed is a powerful source of renewable energy, which can be used as an alternative to the non-renewable resources for production of electricity. Renewable sources are clean, infinite and do not impact the environment negatively during production of electrical energy. However, while eliciting electrical energy from renewable resources viz. solar irradiance, wind speed, hydro should require special planning failing which may result in huge loss of labour and money for setting up the system. In this poster, we discuss four deep recurrent neural networks viz. Stacked Stateless LSTM, Stacked Stateless GRU, Stacked Stateful LSTM and Statcked Stateful GRU which …


Stand-Up Comedy Visualized, Berna Yenidogan 2023 The Graduate Center, City University of New York

Stand-Up Comedy Visualized, Berna Yenidogan

Dissertations, Theses, and Capstone Projects

Stand-up comedy has become an increasingly popular form of comedy in the recent years and comedians reach audiences beyond the halls they are performing through streaming services, podcasts and social media. While comedic performances are typically judged by how 'funny' they are, which could be proxied by the frequency and intensity of laughs through the performance, comedians also explore untapped social issues and provoke conversation, especially in this age where interaction with artists goes beyond their act. It is easy to see commonalities in the topics addressed in comedians’ work such as relationships, race and politics.This project provides an interactive …


Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah 2023 University Of the Cumberlands

Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah

International Journal of Smart Sensor and Adhoc Network

One of the leading disruptive technologies in the upcoming technological revolution is Self-Driving vehicles. However, the absence of security is the greatest obstacle to adoption. This study looks at how cybersecurity impacts the adoption of driverless cars. The purpose of this paper is to perform a literature review supporting the in-depth analysis of cybersecurity and its impacts on the slower adoption rate of Self-Driving Vehicles. The study's primary goal is to determine the connection between worries about cybersecurity and the rate of adoption of self-driving vehicles. Driverless vehicles are the most effective and cutting-edge technology in the transportation sector, yet …


Completeness Of Nominal Props, Samuel Balco, Alexander Kurz 2023 Runtime Verication Inc.

Completeness Of Nominal Props, Samuel Balco, Alexander Kurz

Engineering Faculty Articles and Research

We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.


Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V 2023 Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.

Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V

Karbala International Journal of Modern Science

Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …


A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees 2023 Information Systems Department, Helwan University

A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees

Future Computing and Informatics Journal

most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.


Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant 2023 Virginia Tech

Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant

Department of Electrical and Computer Engineering Faculty Publications

Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis 2023 Purdue University

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Max Fit Event Management With Salesforce, AKSHAY DAGWAR 2023 California State University, San Bernardino

Max Fit Event Management With Salesforce, Akshay Dagwar

Electronic Theses, Projects, and Dissertations

MAX FIT Gym is looking for an event management software program to help manage activities very efficiently, along with attendees and environmental statistics. The event management program is developed and deployed using the Salesforce platform. MAX FIT can efficiently create, edit, and remove events and send email alerts to clients. This task operated on opportunities captured under MAX FIT, including all clients, and prepared information in the Salesforce cloud. This also includes product inventory with various varieties of protein products, and business owners can also add more products to their inventory. In the event management program, the event addresses within …


The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel 2022 University of Tuebingen

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel

Human-Machine Communication

Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …


Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico de Luca 2022 University of Udine, Italy

Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca

Human-Machine Communication

Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …


Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost 2022 University of Windsor

Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost

Major Papers

The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak 2022 Southern Methodist University

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke 2022 The University of Western Ontario

Behavioral Biometrics-Based Continuous User Authentication, Sanket Vilas Salunke

Electronic Thesis and Dissertation Repository

The field of cybersecurity is exploring new ways to defend against cyber-attacks, including a technique called continuous user authentication. This method uses keystroke (typing) data to continuously match the user's typing pattern with patterns previously recorded using artificial intelligence (AI) to identify the user. While this approach has the potential to improve security, it also has some challenges, including the time it takes to register a user, the performance of machine learning algorithms on real-world data, and latency within the system. In this study, the researchers proposed solutions to these issues by using transfer learning to reduce user registration time, …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li 2022 Kennesaw State University

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton 2022 Mississippi State University

Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton, John F. Hutton

Theses and Dissertations

All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …


A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed 2022 California State University, San Bernardino

A Study Of Heart Disease Diagnosis Using Machine Learning And Data Mining, Intisar Ahmed

Electronic Theses, Projects, and Dissertations

Heart disease is the leading cause of death for people around the world today. Diagnosis for various forms of heart disease can be detected with numerous medical tests, however, predicting heart disease without such tests is very difficult. Machine learning can help process medical big data and provide hidden knowledge which otherwise would not be possible with the naked eye. The aim of this project is to explore how machine learning algorithms can be used in predicting heart disease by building an optimized model. The research questions are; 1) What Machine learning algorithms are used in the diagnosis of heart …


Digital Commons powered by bepress