Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Series

2014

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 304

Full-Text Articles in Engineering

A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham Dec 2014

A Kinect-Based System For Automatic Recording Of Some Pigeon Behaviors, Damian Lyons, James Macdonall, Kelly Cunningham

Faculty Publications

Contact switches and touch screens are the state of the art for recording pigeons’ pecking behavior. Recording other behavior, however, requires a different sensor for each behavior, and some behaviors cannot easily be recorded. We present a flexible and inexpensive image-based approach to detecting and counting pigeon behaviors that is based on the Kinect sensor from Microsoft. Although the system is as easy to set up and use as the standard approaches, it is more flexible because it can record behaviors in addition to key pecking. In this article, we show how both the fast, fine motion of key pecking …


Responses To Catastrophic Agi Risk: A Survey, Kaj Sotala, Roman V. Yampolskiy Dec 2014

Responses To Catastrophic Agi Risk: A Survey, Kaj Sotala, Roman V. Yampolskiy

Faculty Scholarship

Many researchers have argued that humanity will create artificial general intelligence (AGI) within the next twenty to one hundred years. It has been suggested that AGI may inflict serious damage to human well-being on a global scale ('catastrophic risk'). After summarizing the arguments for why AGI may pose such a risk, we review the fields proposed responses to AGI risk. We consider societal proposals, proposals for external constraints on AGI behaviors and proposals for creating AGIs that are safe due to their internal design.


Coordinated Control And Estimation Of Multiagent Systems With Engineering Applications, Housheng Su, Michael Z.Q. Chen, Qing Hui, Wei Zhang, Fanglai Zhu Dec 2014

Coordinated Control And Estimation Of Multiagent Systems With Engineering Applications, Housheng Su, Michael Z.Q. Chen, Qing Hui, Wei Zhang, Fanglai Zhu

Department of Electrical and Computer Engineering: Faculty Publications

Recently, coordinated control and estimation problems have attracted a great deal of attention in different fields especially in biology, physics, computer science, and control engineering. Coordinated control and estimation problems have prominent characteristics of distributed control, local interaction, and self-organization. Research on multiagent coordinated control and estimation problems not only helps better understand the mechanisms of natural collective phenomena but also benefits the applications of cyberphysical systems.

This special issue focuses on theoretical and technological achievements in cooperative multiagent Systems. It contains twenty-six papers, the contents of which are summarized below.


Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong Dec 2014

Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong

Research Collection School Of Computing and Information Systems

The ability to identify or predict a target audience from the increasingly crowded social space will provide a company some competitive advantage over other companies. In this paper, we analyze various training datasets, which include Twitter contents of an account owner and its list of followers, using features generated in different ways for two machine learning approaches - the Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Various configurations of the ELM and SVM have been evaluated. The results indicate that training datasets using features generated from the owner tweets achieve the best performance, relative to other feature sets. …


Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun Dec 2014

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …


Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun Dec 2014

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …


Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr. Dec 2014

Media Usage Survey: Overall Comparison Of Faculty And Students, Gerd Gidion, Michael Grosch, Luiz Fernando Capretz, Ken Meadows Dr.

Electrical and Computer Engineering Publications

Recent developments in the use of technologies in education have provided unique opportunities for teaching and learning. This paper describes the results of a survey conducted at Western University (Canada) in 2013, regarding the use of media by students and instructors. The results of this study support the assumption that the media usage of students and instructors include a mixture of traditional and new media. The main traditional media continue to be important, and some new media have emerged as seemingly on equal footing or even more important than the traditional forms of media. Some new media that have recently …


Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr. Dec 2014

Media Usage In Post-Secondary Education And Implications For Teaching And Learning, Gerd Gidion, Luiz Fernando Capretz, Ken Mead Dr., Michael Grosch Dr.

Electrical and Computer Engineering Publications

The Web 2.0 has permeated academic life. The use of online information services in post-secondary education has led to dramatic changes in faculty teaching methods as well as in the learning and study behavior of students. At the same time, traditional information media, such as textbooks and printed handouts, still form the basic pillars of teaching and learning. This paper reports the results of a survey about media usage in teaching and learning conducted with Western University students and instructors, highlighting trends in the usage of new and traditional media in higher education by instructors and students. In addition, the …


Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr. Dec 2014

Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.

Electrical and Computer Engineering Publications

Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.


Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich Dec 2014

Granularity Helps Explain Seemingly Irrational Features Of Human Decision Making, Joe Lorkowski, Vladik Kreinovich

Departmental Technical Reports (CS)

Starting from well-known studies by Kahmenan and Tarsky, researchers have found many examples when our decision making -- and our decision making -- seem to be irrational. In this chapter, we show that this seemingly irrational decision making can be explained if we take into account that human abilities to process information are limited; as a result, instead of the exact values of different quantities, we operate with granules that contain these values. On several examples, we show that optimization under such granularity restriction indeed leads to observed human decision making. Thus, granularity helps explain seemingly irrational human decision making.


When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich Dec 2014

When Can We Reduce Multi-Variable Range Estimation Problem To Two Fewer-Variable Problems?, Joe Lorkowski, Olga Kosheleva, Luc Longpre, Vladik Kreinovich

Departmental Technical Reports (CS)

Sometimes, a function f of n variables can be represented as a composition of two functions of fewer variables. In this case, the problem of computing the range of f on given intervals can be reduced to two range-computation problems with fewer variables. In this paper, we describe a feasible algorithm that checks whether such a reduction is possible -- and, if it is possible, produces the desired reduction.


Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich Dec 2014

Interval Computations And Interval-Related Statistical Techniques: Estimating Uncertainty Of The Results Of Data Processing And Indirect Measurements, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, we only know the upper bound Δ on the measurement error: |Δx| ≤ Δ. In other words, we only know that the measurement error is located on the interval [−Δ, Δ]. The traditional approach is to assume that Δx is uniformly distributed on [−Δ, Δ]. In some situations, however, this approach underestimates the error of indirect measurements. It is therefore desirable to directly process this interval uncertainty. Such "interval computations" methods have been developed since the 1950s. In this paper, we provide a brief overview of related algorithms and results.


Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich Dec 2014

Every Sue Function Is A Ratio Of Two Multi-Linear Functions, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

We prove that the function computed by each single-use expression is a ratio of two multi-linear functions.


50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen Dec 2014

50 Years Of Fuzzy: From Discrete To Continuous To -- Where?, Vladik Kreinovich, Hung T. Nguyen, Olga Kosheleva, Rujira Ouncharoen

Departmental Technical Reports (CS)

While many objects and processes in the real world are discrete, from the computational viewpoint, discrete objects and processes are much more difficult to handle than continuous ones. As a result, a continuous approximation is often a useful way to describe discrete objects and processes. We show that the need for such an approximation explains many features of fuzzy techniques, and we speculate on to which promising future directions of fuzzy research this need can lead us.


How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich Dec 2014

How Much For An Interval? A Set? A Twin Set? A P-Box? A Kaucher Interval? Towards An Economics-Motivated Approach To Decision Making Under Uncertainty, Joe Lorkowski, Vladik Kreinovich

Departmental Technical Reports (CS)

A natural idea of decision making under uncertainty is to assign a fair price to different alternatives, and then to use these fair prices to select the best alternative. In this paper, we show how to assign a fair price under different types of uncertainty.


Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta Dec 2014

Need For Data Processing Naturally Leads To Fuzzy Logic (And Neural Networks): Fuzzy Beyond Experts And Beyond Probabilities, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta

Departmental Technical Reports (CS)

Fuzzy techniques have been originally designed to describe imprecise ("fuzzy") expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in situations without expert knowledge, when all we have is data. In this paper, we explain this surprising phenomenon by showing that the need for optimal processing of data (including crisp data) naturally leads to fuzzy and neural data processing techniques.

This result shows the potential of fuzzy data processing. To maximally utilize this potential, we need to provide an operational meaning of the corresponding fuzzy degrees. We show that such a meaning can be extracted from the above …


Split-Step Approach To Electromagnetic Propagation Through Atmospheric Turbulence Using The Modified Von Karman Spectrum And Planar Apertures, Monish Ranjan Chatterjee, Fathi H.A. Mohamed Dec 2014

Split-Step Approach To Electromagnetic Propagation Through Atmospheric Turbulence Using The Modified Von Karman Spectrum And Planar Apertures, Monish Ranjan Chatterjee, Fathi H.A. Mohamed

Electrical and Computer Engineering Faculty Publications

The impact of atmospheric phase turbulence on Gaussian beam propagation along propagation paths of varying lengths is examined using multiple random phase screens. The work is motivated by research involving generation and encryption of acousto-optic chaos, and the interest in examining propagation of such chaotic waves through atmospheric turbulence. A phase screen technique is used to simulate perturbations to the refractive index of the medium through the propagation path. A power spectral density based on the modified von Karman spectrum model for turbulence is used to describe the random phase behavior of the medium.

In recent work, results for the …


Improved Performance Of Analog And Digital Acousto-Optic Modulation With Feedback Under Profiled Beam Propagation For Secure Communication Using Chaos, Fares S. Almehmadi, Monish Ranjan Chatterjee Dec 2014

Improved Performance Of Analog And Digital Acousto-Optic Modulation With Feedback Under Profiled Beam Propagation For Secure Communication Using Chaos, Fares S. Almehmadi, Monish Ranjan Chatterjee

Electrical and Computer Engineering Faculty Publications

Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise.

The simulations with profiled input beams are shown to produce a stronger encryption …


Homogenous Ensemble Phonotactic Language Recognition Based On Svm Supervector Reconstruction, Wei-Wei Liu, Wei-Qiang Zhang, Michael T. Johnson, Jia Liu Dec 2014

Homogenous Ensemble Phonotactic Language Recognition Based On Svm Supervector Reconstruction, Wei-Wei Liu, Wei-Qiang Zhang, Michael T. Johnson, Jia Liu

Electrical and Computer Engineering Faculty Research and Publications

Currently, acoustic spoken language recognition (SLR) and phonotactic SLR systems are widely used language recognition systems. To achieve better performance, researchers combine multiple subsystems with the results often much better than a single SLR system. Phonotactic SLR subsystems may vary in the acoustic features vectors or include multiple language-specific phone recognizers and different acoustic models. These methods achieve good performance but usually compute at high computational cost. In this paper, a new diversification for phonotactic language recognition systems is proposed using vector space models by support vector machine (SVM) supervector reconstruction (SSR). In this architecture, the subsystems share the same …


Data Transport System, Rahav Dor Dec 2014

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …


A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn Dec 2014

A Performance Study Of Genetic Algorithm-Assisted Beamforming In Distributed Cognitive Radio Networks, Andrew Minturn

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Cognitive Radio (CR) is a technology that has gained much interest recently due to the increasing scarcity of the radio frequency spectrum. Large portions of the radio frequency spectrum are licensed to users who then have exclusive access to the bandwidth, and unlicensed bands can be a challenge to use due to interference from unlicensed users. Despite the seeming scarcity, tests of bands allocated by the Federal Communications Committee (FCC) to licensed and unlicensed user have shown that many are underutilized and often unoccupied by the user to whom they are licensed. CR aims to exploit this unused spectrum and …


A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji Dec 2014

A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this thesis, we study several algorithms for enforcing Generalized Arc­-Consistency (GAC), which is the most popular consistency property for solving Constraint Satisfaction Problems (CSPs) with backtrack search. The popularity of such algorithms stems from their relative low cost and effectiveness in improving the performance of search. Virtually all commercial and public- domain constraint solvers include some implementation of a generic GAC algorithm. In recent years, several algorithms for enforcing GAC have been proposed in the literature that relies on increasingly complex data structures and mechanisms to improve performance. In this thesis, we study, assess, and compare a basic algorithm …


Is The Smartphone Smart In Kathmandu?, Seth Bird Dec 2014

Is The Smartphone Smart In Kathmandu?, Seth Bird

Independent Study Project (ISP) Collection

This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …


Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin Nov 2014

Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin

All Computer Science and Engineering Research

Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but also which users …


Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni Nov 2014

Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni

FIU Electronic Theses and Dissertations

A nuclear waste stream is the complete flow of waste material from origin to treatment facility to final disposal. The objective of this study was to design and develop a Geographic Information Systems (GIS) module using Google Application Programming Interface (API) for better visualization of nuclear waste streams that will identify and display various nuclear waste stream parameters. A proper display of parameters would enable managers at Department of Energy waste sites to visualize information for proper planning of waste transport. The study also developed an algorithm using quadratic Bézier curve to make the map more understandable and usable. Microsoft …


Trends In Multimodal Human-Computer Interfaces, Jerry C. Schnepp Nov 2014

Trends In Multimodal Human-Computer Interfaces, Jerry C. Schnepp

Visual Communications and Technology Education Faculty Publications

Touch screens, voice commands and wireless gesture controllers have the potential to provide a more natural human-computer interface than traditional mice and keyboards. While these technologies are still evolving, the usefulness of such interfaces across industries is undeniable. In this presentation, the state of the art of human-computer interfaces will be explored. We will examine the qualifications necessary for these technologies to replace traditional interface hardware and project how far this interface revolution can take us.


Stable And Metastable Nanowires Displaying Locally Controllable Properties, Eli A. Sutter, Peter Werner Sutter Nov 2014

Stable And Metastable Nanowires Displaying Locally Controllable Properties, Eli A. Sutter, Peter Werner Sutter

Department of Electrical and Computer Engineering: Faculty Publications

(57) ABSTRACT Vapor-liquid-solid growth of nanowires is tailored to achieve complex one-dimensional material geometries using phase diagrams determined for nanoscale materials. Segmented one-dimensional nanowires having constant composition dis play locally variable electronic band structures that are deter mined by the diameter of the nanowires. The unique electrical and optical properties of the segmented nanowires are exploited to form electronic and optoelectronic devices. Using gold-germanium as a model system, in situ transmis sion electron microscopy establishes, for nanometer-sized Au Ge alloy drops at the tips of Ge nanowires (NWs), the parts of the phase diagram that determine their temperature dependent equilibrium …


Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci Nov 2014

Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci

FIU Electronic Theses and Dissertations

Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …


Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong Nov 2014

Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong

Research Collection School Of Computing and Information Systems

Doing business on social media has become a common practice for many companies these days. While the contents shared on Twitter and Facebook offer plenty of opportunities to uncover business insights, it remains a challenge to sift through the huge amount of social media data and identify the potential social audience who is highly likely to be interested in a particular company. In this paper, we analyze the Twitter content of an account owner and its list of followers through various text mining methods, which include fuzzy keyword matching, statistical topic modeling and machine learning approaches. We use tweets of …


Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty Nov 2014

Low Cost Infrared And Near Infrared Sensors For Uavs, Samuel T. Aden, James P. Bialas, Zachary Champion, Eugene Levin, Jessica L. Mccarty

Michigan Tech Research Institute Publications

Thermal remote sensing has a wide range of applications, though the extent of its use is inhibited by cost. Robotic and computer components are now widely available to consumers on a scale that makes thermal data a readily accessible resource. In this project, thermal imagery collected via a lightweight remote sensing Unmanned Aerial Vehicle (UAV) was used to create a surface temperature map for the purpose of providing wildland firefighting crews with a cost-effective and time-saving resource. The UAV system proved to be flexible, allowing for customized sensor packages to be designed that could include visible or infrared cameras, GPS, …