Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1,031 Full-Text Articles 1,546 Authors 592,036 Downloads 113 Institutions

All Articles in Other Computer Engineering

Faceted Search

1,031 full-text articles. Page 4 of 45.

An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder 2020 Louisiana State University

An Approach To Counting Vehicles From Pre-Recorded Video Using Computer Algorithms, Mishuk Majumder

LSU Master's Theses

One of the fundamental sources of data for traffic analysis is vehicle counts, which can be conducted either by the traditional manual method or by automated means. Different agencies have guidelines for manual counting, but they are typically prepared for particular conditions. In the case of automated counting, different methods have been applied, but You Only Look Once (YOLO), a recently developed object detection model, presents new potential in automated vehicle counting. The first objective of this study was to formulate general guidelines for manual counting based on experience gained in the field. Another goal of this study was to ...


Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad 2020 Louisiana State University

Optimizing The Performance Of Multi-Threaded Linear Algebra Libraries Based On Task Granularity, Shahrzad Shirzad

LSU Doctoral Dissertations

Linear algebra libraries play a very important role in many HPC applications. As larger datasets are created everyday, it also becomes crucial for the multi-threaded linear algebra libraries to utilize the compute resources properly. Moving toward exascale computing, the current programming models would not be able to fully take advantage of the advances in memory hierarchies, computer architectures, and networks. Asynchronous Many-Task(AMT) Runtime systems would be the solution to help the developers to manage the available parallelism. In this Dissertation we propose an adaptive solution to improve the performance of a linear algebra library based on a set of ...


Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar 2020 Harrisburg University of Science and Technology

Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar

Dissertations and Theses

IT infrastructure projects have long been an overlooked field superseded by the more popular software development silos and cross-functional project teams when it comes to enterprise Agile transformations. This paper presents a systematic literature review by leveraging a qualitative research methodology based on empirical evidence provided in contemporary scholarly research articles to explore how certain variables such as organizational culture- including team structure, leadership hierarchy, geolocation, etc. along with an organization’s change management processes affect the adoption of a Hybrid/Agile project management methodology, focusing on reported challenges and critical success factors that define such large-scale enterprise transformations. The ...


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade 2020 Symbiosis Institute of Technology, Symbiosis International (Deemed University),Pune, India.Email: smita.khade.phd2020@sitpune.edu.in..

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face ...


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha 2020 Research Scholar, Symbiosis Institute of Technology, Symbiosis International University, Pune, India.

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and ...


A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha 2020 Symbiosis Institute of Technology (SIT)

A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Delivering a reliable software product is a fairly complex process, which involves proper coordination from the various teams in planning, execution, and testing for delivering software. Most of the development time and the software budget's cost is getting spent finding and fixing bugs. Rework and side effect costs are mostly not visible in the planned estimates, caused by inherent bugs in the modified code, which impact the software delivery timeline and increase the cost. Artificial intelligence advancements can predict the probable defects with classification based on the software code changes, helping the software development team make rational decisions. Optimizing ...


A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha 2020 Symbiosis Institute of Technology ,Pune

A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Heterogenous and voluminous unstructured data is produced from various sources like emails, social media tweets, reviews, videos, audio, images, PDFs, scanned documents, etc. Organizations need to store this wide range of unstructured data for more and longer periods so that they can examine information all the more profoundly to make a better decision and extracting useful insights. Manual processing of such unstructured data is always a challenging, time-consuming, and expensive task for any organization. Automating unstructured document processing using Optical Character Recognition (OCR) and Robotics Process Automation (RPA), seems to have limitations, as those techniques are driven by rules or ...


A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra 2020 Department of Computer Science & Engineering, Veer Surendra Sai University of Technology (VSSUT), Burla, India

A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra

Karbala International Journal of Modern Science

An energy-efficient sensor cloud model is proposed based on the combination of prediction and forecasting methods. The prediction using Artificial Neural Network (ANN) with single activation function and forecasting using Autoregressive Integrated Moving Average (ARIMA) models use to reduce the communication of data. The requests of the users generate in every second. These requests must be transferred to the wireless sensor network (WSN) through the cloud system in the traditional model, which consumes extra energy. In our approach, instead of one second, the sensors generally communicate with the cloud every 24 hours, and most of the requests reply using the ...


A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B. 2020 University of New Mexico

A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.

Mathematics and Statistics Faculty and Staff Publications

With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a ...


Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham el-Askary 2020 Chapman University

Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Machine learning (ML) techniques can be applied to predict and monitor drought conditions due to climate change. Predicting future vegetation health indicators (such as EVI, NDVI, and LAI) is one approach to forecast drought events for hotspots (e.g. Middle East and North Africa (MENA) regions). Recently, ML models were implemented to predict EVI values using parameters such as land types, time series, historical vegetation indices, land surface temperature, soil moisture, evapotranspiration etc. In this work, we collected the MODIS atmospherically corrected surface spectral reflectance imagery with multiple vegetation related indices for modeling and evaluation of drought conditions in the ...


Back To The Future With Higher Ed: A Sample Of Drupal Sites At Uga, Rachel S. Evans, Deborah Stanley, Delmaries I. Gray, Lauren Blais 2020 University of Georgia School of Law

Back To The Future With Higher Ed: A Sample Of Drupal Sites At Uga, Rachel S. Evans, Deborah Stanley, Delmaries I. Gray, Lauren Blais

Presentations

Consisting of a show and tell of a selection of large and small site installations from various departments, schools and colleges at the University of Georgia, panelists including back end and front end developers, public relations experts, librarians, and web coordinators will share their ship's timeline with Drupal versions and examples from the past, present and future. A moderator will then ask questions of panelists including: the biggest challenges they have faced with migrations and upgrades, the issues or blessings of more cohesive branding initiatives over the last few years, and their visions, concerns, and hopes for the future ...


A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi 2020 University of California, Irvine

A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi

Engineering Faculty Articles and Research

Implementing artificial neural networks is commonly achieved via high-level programming languages such as Python and easy-to-use deep learning libraries such as Keras. These software libraries come preloaded with a variety of network architectures, provide autodifferentiation, and support GPUs for fast and efficient computation. As a result, a deep learning practitioner will favor training a neural network model in Python, where these tools are readily available. However, many large-scale scientific computation projects are written in Fortran, making it difficult to integrate with modern deep learning methods. To alleviate this problem, we introduce a software library, the Fortran-Keras Bridge (FKB). This two-way ...


A New Approach For Homomorphic Encryption With Secure Function Evaluation On Genomic Data, Mounika Pratapa 2020 The University of Western Ontario

A New Approach For Homomorphic Encryption With Secure Function Evaluation On Genomic Data, Mounika Pratapa

Electronic Thesis and Dissertation Repository

Additively homomorphic encryption is a public-key primitive allowing a sum to be computed on encrypted values. Although limited in functionality, additive schemes have been an essential tool in the private function evaluation toolbox for decades. They are typically faster and more straightforward to implement relative to their fully homomorphic counterparts, and more efficient than garbled circuits in certain applications. This thesis presents a novel method for extending the functionality of additively homomorphic encryption to allow the private evaluation of functions of restricted domain. Provided the encrypted sum falls within the restricted domain, the function can be homomorphically evaluated “for free ...


Ontology-Driven Semantic Data Integration In Open Environment, Islam M. Ali 2020 The University of Western Ontario

Ontology-Driven Semantic Data Integration In Open Environment, Islam M. Ali

Electronic Thesis and Dissertation Repository

Collaborative intelligence in the context of information management can be defined as "A shared intelligence that results from the collaboration between various information systems". In open environments, these collaborating information systems can be heterogeneous, dynamic and loosely-coupled. Information systems in open environment can also possess a certain degree of autonomy. The integration of data residing in various heterogeneous information systems is essential in order to drive the intelligence efficiently and accurately. Because of the heterogeneous, loosely-coupled, and dynamic nature of open environment, the integration between these information systems in the data level is not efficient. Several approaches and models have ...


Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell 2020 The University of Western Ontario

Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell

Electronic Thesis and Dissertation Repository

An instrumented rover wheel can collect vast amounts of data about a planetary surface. Planetary surfaces are changed by complex geological processes which can be better understood with an abundance of surface data and the use of terramechanics. Identifying terrain parameters such as cohesion and angle of friction hold importance for both the rover driver and the planetary scientist. Knowledge of terrain characteristics can warn of unsafe terrain and flag potential interesting scientific sites. The instrumented wheel in this research utilizes a pressure pad to sense load and sinkage, a string potentiometer to measure slip, and records motor current draw ...


Exploring The Efficacy Of Transfer Learning In Mining Image‑Based Software Artifacts, Natalie Best, Jordan Ott, Erik J. Linstead 2020 Chapman University

Exploring The Efficacy Of Transfer Learning In Mining Image‑Based Software Artifacts, Natalie Best, Jordan Ott, Erik J. Linstead

Engineering Faculty Articles and Research

Background

Transfer learning allows us to train deep architectures requiring a large number of learned parameters, even if the amount of available data is limited, by leveraging existing models previously trained for another task. In previous attempts to classify image-based software artifacts in the absence of big data, it was noted that standard off-the-shelf deep architectures such as VGG could not be utilized due to their large parameter space and therefore had to be replaced by customized architectures with fewer layers. This proves to be challenging to empirical software engineers who would like to make use of existing architectures without ...


Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner 2020 CUNY New York City College of Technology

Artificial Intelligence And Game Theory Controlled Autonomous Uav Swarms, Janusz Kusyk, M. Umit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jefrey Boksiner

Publications and Research

Autonomous unmanned aerial vehicles (UAVs) operating as a swarm can be deployed in austere environments, where cyber electromagnetic activities often require speedy and dynamic adjustments to swarm operations. Use of central controllers, UAV synchronization mechanisms or pre-planned set of actions to control a swarm in such deployments would hinder its ability to deliver expected services. We introduce artificial intelligence and game theory based flight control algorithms to be run by each autonomous UAV to determine its actions in near real-time, while relying only on local spatial, temporal and electromagnetic (EM) information. Each UAV using our flight control algorithms positions itself ...


Optimized Machine Learning Models Towards Intelligent Systems, MohammadNoor Ahmad Mohammad Injadat 2020 The University of Western Ontario

Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat

Electronic Thesis and Dissertation Repository

The rapid growth of the Internet and related technologies has led to the collection of large amounts of data by individuals, organizations, and society in general [1]. However, this often leads to information overload which occurs when the amount of input (e.g. data) a human is trying to process exceeds their cognitive capacities [2]. Machine learning (ML) has been proposed as one potential methodology capable of extracting useful information from large sets of data [1]. This thesis focuses on two applications. The first is education, namely e-Learning environments. Within this field, this thesis proposes different optimized ML ensemble models ...


Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor 2020 CUNY Hunter College

Two Techniques For Automated Logging Statement Evolution, Allan R. Spektor

School of Arts & Sciences Theses

This thesis presents and explores two techniques for automated logging statement evolution. The first technique reinvigorates logging statement levels to reduce information overload using degree of interest obtained via software repository mining. The second technique converts legacy method calls to deferred execution to achieve performance gains, eliminating unnecessary evaluation overhead.


Analysis Of Information Security Methods In Biosystems And Application Of Intelligent Tools In Information Security Systems, Sherzod Sayfullaev 2020 Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Address: 108, Amir Temur st., 100200, Tashkent city, Republic of Uzbekistan E-mail: sherzodsay@gmail.com, Phone:+998-91-162-42-70.

Analysis Of Information Security Methods In Biosystems And Application Of Intelligent Tools In Information Security Systems, Sherzod Sayfullaev

Chemical Technology, Control and Management

In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed. Disadvantages and advantages of neural network technologies in modern information security systems are described. The characteristics of bio systems and the specificity of DNA, the main features of the DNA code that provide information security and functional stability of bio systems data protection structure. Application of intelligent tools to create a comprehensive adaptive protection ...


Digital Commons powered by bepress