Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1,363 Full-Text Articles 2,108 Authors 800,472 Downloads 141 Institutions

All Articles in Other Computer Engineering

Faceted Search

1,363 full-text articles. Page 51 of 62.

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia 2013 California Polytechnic State University, San Luis Obispo

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin 2013 California Polytechnic State University, San Luis Obispo

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices …


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella 2013 California Polytechnic State University, San Luis Obispo

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …


Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson 2013 Liberty University

Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson

Senior Honors Theses

Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.

Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …


Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver 2013 DePaul University

Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver

College of Computing and Digital Media Dissertations

Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.

To respond to this problem, …


Cis Map Drawer Visualization System, Hanye Xu, David Ebert 2013 Purdue University

Cis Map Drawer Visualization System, Hanye Xu, David Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

U.S. Citizenship and Immigration Services (USCIS) is the government agency that manages immigration to the United States. They are not only working on filing documents, but also analyzing those data they have. They require help from a visualization system to know the trend of immigration among offices across the country over time. We developed a project called CIS Map Drawer that is used to help build a visualization system for USCIS in order to analyze immigration data easily. This system makes use of a map view, a calendar visual representation, line charts, pixel drawing and other analysis tools to improve …


Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu 2013 Purdue University

Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …


Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu 2013 Purdue University

Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Researchers working on air conditioning systems currently use a software called ABSIM ( Absorption Simulation ) to evaluate current absorption systems or simulate new system designs. ABSIM was developed at Oak Ridge National Labs in the 1980s and the latest platform it is compatible with is Windows XP. ABSIM is not compatible on newer platforms and is not very user friendly. A lot of the actions involved in using ABSIM aren’t very intuitive. The goal is to develop a more user friendly simulation program that is based off of ABSIM and see to it that the program can be deployed …


Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin 2013 Binghamton University--SUNY

Dust To Digital: Electronic Document & Record Management For The Broome County Department Of Public Works- Engineering Divison, Scott R. Mastin

MPA Capstone Projects 2006 - 2015

The Broome County Department of Public Works- Engineering Division is currently preparing to implement an Electronic Document and Records Management System (EDRMS) to store their increasing number of digital records and to manage existing paper records as they are digitized. This study examines Division integrate electronic document and record management into their organization.


Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, Liang-Jie Zhang, Jia Zhang 2013 Carnegie Mellon University, Silicon Valley

Service Oriented Solution Modeling And Variation Propagation Analysis Based On Architectural Building Blocks, Liang-Jie Zhang, Jia Zhang

Jia Zhang

In spite of the widely recognized benefits of applying Service Oriented Architecture (SOA) to design enterprise-scale software systems, its actual application practice is not always a success. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a new method of architectural building blocks (ABB)-based SOA solution design and it is applicable to any layered or tiered infrastructure. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables event-based variation notification and propagation analysis. The goal is to provide architecture-level support …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola 2013 The University of Western Ontario

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, John Snel, Charlie Cullen 2013 Technological University Dublin

Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, John Snel, Charlie Cullen

Conference papers

In speech, low frequency regions play a significant role in paralinguistic communication such as the conveyance of emotion or mood. The extent to which lower frequencies signify or contribute to affective speech is still an area for investigation. To investigate paralinguistic cues, and remove interference from linguistic cues, researchers can low-pass filter the speech signal on the assumption that certain acoustic cues characterizing affect are still discernible. Low-pass filtering is a practical technique to investigate paralinguistic phenomena, and is used here to investigate the inference of naturalistic emotional speech. This paper investigates how listeners perceive the level of Activation, and …


The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi 2013 German Archaeological Institute

The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi

Department of Anthropology: Faculty Publications

There is a need in the humanities for a 3D WebGIS with analytical tools that allow researchers to analyze 3D models linked to spatially referenced data. Geographic Information Systems (GIS) allow for complex spatial analysis of 2.5D data. For example, they offer bird’s eye views of landscapes with extruded building footprints, but one cannot ‘get on the ground’ and interact with true 3D models from a pedestrian perspective. Meanwhile, 3D models and virtual environments visualize data in 3D space, but analytical tools are simple rotation or lighting effects. The MayaArch3D Project is developing a 3D WebGIS—called QueryArch3D—to allow these two …


Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy 2013 Air Force Institute of Technology

Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy

Theses and Dissertations

Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone 2013 Air Force Institute of Technology

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, Florentin Smarandache, Jean Dezert, Valeri Kroumov 2013 University of New Mexico

Examples Where The Conjunctive And Dempster’S Rules Are Insensitive, Florentin Smarandache, Jean Dezert, Valeri Kroumov

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper we present several counter-examples to the Conjunctive rule and to Dempster rule of combinations in information fusion.


Reliability Models Applied To Smartphone Applications, Sonia Meskini 2013 The University of Western Ontario

Reliability Models Applied To Smartphone Applications, Sonia Meskini

Electronic Thesis and Dissertation Repository

Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur 2013 University Of New Orleans

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Adaptive Co-Scheduler For Highly Dynamic Resources, Kartik Vedalaveni 2013 University of Nebraska-Lincoln

Adaptive Co-Scheduler For Highly Dynamic Resources, Kartik Vedalaveni

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

There are many kinds of scientific applications that run on high throughput computational (HTC) grids. HTC may utilize clusters opportunistically, only running on a given cluster when it is otherwise idle. These widely dispersed HTC clusters are heterogeneous in terms of capability and availability, but can provide significant computing power in aggregate. The scientific algorithms run on them also vary greatly. Some scientific algorithms might use high rates of disk I/O and some might need large amounts of RAM. Most schedulers only consider cpu availability, but unchecked demand on these associated resources that aren’t managed by resource managers may give …


Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose 2013 University of Tennessee, Knoxville

Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose

Doctoral Dissertations

Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …


Digital Commons powered by bepress