Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1,031 Full-Text Articles 1,546 Authors 592,036 Downloads 113 Institutions

All Articles in Other Computer Engineering

Faceted Search

1,031 full-text articles. Page 5 of 45.

User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane 2020 Kennesaw State University

User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane

African Conference on Information Systems and Technology

Users belonging to different countries have different exposure and perception to trust the technology to adopt it. Users’ trust and adoption rates are challenging issues in mobile financial services. Thus, the purpose of the research is how to design a trustful user interface. Market research is conducted to collect data. Using the data, personas and use cases developed. The result of personas and use cases used to develop prototypes. Prototype A and B designed differently to give choice to users to investigate users' trust. Prototype A is designed to make it easy to use and clear workflow. Whereas prototype B ...


A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, sisay yemata 2020 Kennesaw State University

A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata

African Conference on Information Systems and Technology

Several models recently have been addressed in software engineering for requirements transformation. However, such transformation models have encountered many problems due to the nature of requirements. In the classical transformation modeling, some requirements are discovered to be missing or erroneous at later stages, in addition to major assumptions that may affect the quality of the software. This has created a crucial need for new approaches to requirements transformation. In this paper, a comprehensive study is presented in the main modern models of linking requirements to software architectures. An extensive evaluation is conducted to investigate the capabilities of such modern models ...


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle 2020 Kennesaw State University

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For ...


A Deep-Learning Based Robust Framework Against Adversarial P.E. And Cryptojacking Malware, Faraz Amjad Naseem 2020 Florida International University

A Deep-Learning Based Robust Framework Against Adversarial P.E. And Cryptojacking Malware, Faraz Amjad Naseem

FIU Electronic Theses and Dissertations

This graduate thesis introduces novel, deep-learning based frameworks that are resilient to adversarial P.E. and cryptojacking malware. We propose a method that uses a convolutional neural network (CNN) to classify image representations of malware, that provides robustness against numerous adversarial attacks. Our evaluation concludes that the image-based malware classifier is significantly more robust to adversarial attacks than a state-of-the-art ML-based malware classifier, and remarkably drops the evasion rate of adversarial samples to 0% in certain attacks. Further, we develop MINOS, a novel, lightweight cryptojacking detection system that accurately detects the presence of unwarranted mining activity in real-time. MINOS can ...


Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley 2020 University of Georgia School of Law

Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley

Articles, Chapters and Online Publications

With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution ...


Machine Learning Applications In Power Systems, Xinan Wang 2020 Southern Methodist University

Machine Learning Applications In Power Systems, Xinan Wang

Electrical Engineering Theses and Dissertations

Machine learning (ML) applications have seen tremendous adoption in power system research and applications. For instance, supervised/unsupervised learning-based load forecasting and fault detection are classic ML topics that have been well studied. Recently, reinforcement learning-based voltage control, distribution analysis, etc., are also gaining popularity. Compared to conventional mathematical methods, ML methods have the following advantages: (i). better robustness against different system configurations due to its data-driven nature; (ii). better adaption to system uncertainties; (iii). less dependent on the modeling accuracy and validity of assumptions. However, due to the unique physics of the power grid, many problems cannot be directly ...


A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin 2020 Florida International University

A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin

FIU Electronic Theses and Dissertations

Since its introduction, Bitcoin cryptocurrency has revolutionized the way payment systems can be designed in a purely distributed manner through its novel Blockchain data structure. While Bitcoin has opened new opportunities, it has been long criticized for its slow transaction confirmation times and high transaction fees. To address this issue, one of the recently emerging solutions is to build a payment channel network (PCN) on top of Bitcoin where the transactions can be made without writing to blockchain. Specifically, a PCN is a network where the users connect either directly or indirectly to send payments to each other in a ...


A Survey On Exploring Key Performance Indicators, Amira Idrees 2020 Association of Arab Universities

A Survey On Exploring Key Performance Indicators, Amira Idrees

Future Computing and Informatics Journal

Key Performance Indicators (KPIs) allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs).


Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda XODJAYEVA, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova 2020 International Islamic Academy of Uzbekistan

Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda Xodjayeva, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova

The Light of Islam

We recognize that the sustainable development of tourism has great potential for the development of cultural and humanitarian ties around the world. We emphasize the importance of information technology in tourism, especially in the areas of advertising, marketing, differentiation and specialization of tourism products. In addition, we reaffirm our commitment to pilgrimage tourism for the individual growth of people and the strengthening of basic social norms and national values. The program uses modern programming languages such as Php, Java, C ++. Al-Hakim at-Termizi is one of the most famous places of worship in Uzbekistan, which is also known for its historical ...


Conference Roundup: Smart Cataloging - Beginning The Move From Batch Processing To Automated Classification, Rachel S. Evans 2020 University of Georgia School of Law

Conference Roundup: Smart Cataloging - Beginning The Move From Batch Processing To Automated Classification, Rachel S. Evans

Articles, Chapters and Online Publications

This article reviewed the Amigos Online Conference titled “Work Smarter, Not Harder: Innovating Technical Services Workflows” keynote session delivered by Dr. Terry Reese on February 13, 2020. Excerpt:

"As the developer of MarcEdit, a popular metadata suite used widely across the library community, Reese’s current work is focused on the ways in which libraries might leverage semantic web techniques in order to transform legacy library metadata into something new. So many sessions related to using new technologies in libraries or academia, although exciting, are not practical enough to put into everyday use by most librarians. Reese’s keynote, titled ...


Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller 2020 California Polytechnic State University, San Luis Obispo

Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller

Master's Theses

Massively Multiplayer Online Role Playing Games (MMORPGs) are a prominent genre in today's video game industry with the most popular MMORPGs generating billions of dollars in revenue and attracting millions of players. As they have grown, they have become a major target for both technological research and sociological research. In such research, it is nearly impossible to reach the same player scale from any self-made technology or sociological experiments. This greatly limits the amount of control and topics that can be explored. In an effort to make up a lacking or non-existent player-base for custom-made MMORPG research scenarios A ...


Analysis Of Human Affect And Bug Patterns To Improve Software Quality And Security, Md Rakibul Islam 2020 University of New Orleans

Analysis Of Human Affect And Bug Patterns To Improve Software Quality And Security, Md Rakibul Islam

University of New Orleans Theses and Dissertations

The impact of software is ever increasing as more and more systems are being software operated. Despite the usefulness of software, many instances software failures have been causing tremendous losses in lives and dollars. Software failures take place because of bugs (i.e., faults) in the software systems. These bugs cause the program to malfunction or crash and expose security vulnerabilities exploitable by malicious hackers.

Studies confirm that software defects and vulnerabilities appear in source code largely due to the human mistakes and errors of the developers. Human performance is impacted by the underlying development process and human affects, such ...


Alexa, Ask My Library: How Do I Build A Custom Skill To Extend Reference Services?, Christopher M. Jimenez 2020 Florida International University

Alexa, Ask My Library: How Do I Build A Custom Skill To Extend Reference Services?, Christopher M. Jimenez

Works of the FIU Libraries

The Reference Technology team at Florida International University recently published an Alexa Skill that incorporates the LibAnswers API into the device’s answer bank. We have several Echo Show devices at our public service desks to meet the demands of extended hours while also enhancing public service presence beyond the reference desk.

The Green Library at FIU’s Modesto Maidique Campus now operates on a 24/5 schedule, allowing students to access library facilities at any time during the week. In addition, both the Hubert Library and the Engineering Library Service Center stay open past times when personal reference assistance ...


Security Camera Using Raspberry Pi, Tejendra Khatri 2020 Minnesota State University Moorhead

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

No abstract provided.


Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling 2020 Minnesota State University Moorhead

Predictive Analysis Of Ethanol Prices With Machine Learning, Benjamin Schilling

Student Academic Conference

Overview of a predictive analysis regression developed using machine learning alongside ETL process techniques.


Estimating The Tempo Of Audio Files, Parker Ostertag 2020 Minnesota State University Moorhead

Estimating The Tempo Of Audio Files, Parker Ostertag

Student Academic Conference

On the market today, there exists a multitude of software that allows for the detection and prediction of beats per minute (BPM) contained in audio files. There are both free and monetized versions of these programs, but there is one thing that they all have in common: they are inaccurate. This is simply because the science behind beat detection is unfinished, and may never be. In this project, I decided to use a method of audio peak detection to help me detect the tempo that may exist in any audio file. I started by researching existing programs and the science ...


Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles Hines 2020 James Madison University

Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles Hines

Senior Honors Projects, 2020-current

Less-Java is an object-oriented programming language whose primary goal is to help new programmers learn programming. Some of the features of Less-Java that might make it better for beginners are static typing, implicit typing, low verbosity, and built-in support for unit testing. The primary focus of this project is on improving type inference (especially with regards to object-oriented programming) and adding static analysis in the Less-Java compiler.


Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead 2020 University of Colorado, Aurora

Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead

Engineering Faculty Articles and Research

Accessible interactive tools that integrate machine learning methods with clinical research and reduce the programming experience required are needed to move science forward. Here, we present Machine Learning for Medical Exploration and Data-Inspired Care (ML-MEDIC), a point-and-click, interactive tool with a visual interface for facilitating machine learning and statistical analyses in clinical research. We deployed ML-MEDIC in the American Heart Association (AHA) Precision Medicine Platform to provide secure internet access and facilitate collaboration. ML-MEDIC’s efficacy for facilitating the adoption of machine learning was evaluated through two case studies in collaboration with clinical domain experts. A domain expert review was ...


Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia Zastudil 2020 James Madison University

Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia Zastudil

Senior Honors Projects, 2020-current

Route-planning applications such as Google Maps and Apple Maps are used by millions of people each month. However, these mapping applications are optimized for vehicle navigation, and although they provide pedestrian routing, the route customization options aren’t sufficient for pedestrian users, especially those with mobility impairments. CampusPartner is an assistive mobile application that was designed with the purpose of supporting people with mobility impairments in planning and previewing their walking routes. By viewing routes in advance, users can see an overview and detailed information about them as well as turn-by-turn instructions. CampusPartner integrates existing services, GraphHopper, OpenStreetMap, and Mapbox ...


Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil 2020 University of Louisville

Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil

Electronic Theses and Dissertations

White blood cells play important rule in the human body immunity and any change in their count may cause serious diseases. In this study, a system is introduced for white blood cells localization and classification. The dataset used in this study is formed by two components, the first is the annotation dataset that will be used in the localization (364 images), and the second is labeled classes that will be used in the classification (12,444 images). For the localization, two approaches will be discussed, a classical approach and a deep learning based approach. For the classification, 5 different deep ...


Digital Commons powered by bepress