Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Computer Engineering

Institution
Keyword
Publication Year
Publication
File Type

Articles 361 - 390 of 8029

Full-Text Articles in Engineering

Who Is Missing? Characterizing The Participation Of Different Demographic Groups In A Korean Nationwide Daily Conversation Corpus, Haewoon Kwak, Jisun An, Kunwoo Park Jun 2022

Who Is Missing? Characterizing The Participation Of Different Demographic Groups In A Korean Nationwide Daily Conversation Corpus, Haewoon Kwak, Jisun An, Kunwoo Park

Research Collection School Of Computing and Information Systems

A conversation corpus is essential to build interactive AI applications. However, the demographic information of the participants in such corpora is largely underexplored mainly due to the lack of individual data in many corpora. In this work, we analyze a Korean nationwide daily conversation corpus constructed by the National Institute of Korean Language (NIKL) to characterize the participation of different demographic (age and sex) groups in the corpus.


The Db Community Vis-À-Vis Environmental, Health, And Societal Grand Challenges: Innovation Engine, Plumber, Or Bystander?, Anastasia Ailamaki, Leilani Battle, Johannes Gehrke, Masaru Kitsuregawa, David Maier, Christopher Re, Meihui Zhang, Magdalena Balazinska Jun 2022

The Db Community Vis-À-Vis Environmental, Health, And Societal Grand Challenges: Innovation Engine, Plumber, Or Bystander?, Anastasia Ailamaki, Leilani Battle, Johannes Gehrke, Masaru Kitsuregawa, David Maier, Christopher Re, Meihui Zhang, Magdalena Balazinska

Computer Science Faculty Publications and Presentations

This panel considers the role of the database research community in addressing humanity's greatest challenges. Are we an innovation engine, tool providers, or are we standing on the side while other research communities take the lead?


Poster: Indoor Navigation For Visually Impaired People With Vertex Colored Graphs, Pei Du, Nirupama Bulusu Jun 2022

Poster: Indoor Navigation For Visually Impaired People With Vertex Colored Graphs, Pei Du, Nirupama Bulusu

Electrical and Computer Engineering Faculty Publications and Presentations

Visually impaired people face many daily encumbrances. Traditional visual enhancements do not suffice to navigate indoor environments. In this paper, we explore path finding algorithms such as Dijkstra and A* combined with graph coloring to find a safest and shortest path for visual impaired people to navigate indoors. Our mobile application is based on a database which stores the locations of several spots in the building and their corresponding label. Visual impaired people select the start and destination when they want to find their way, and our mobile application will show the appropriate path which guarantees their safety.


Rechargeable Multi-Cell Battery, Wei Qiao, Taesic Kim, Liyan Qu May 2022

Rechargeable Multi-Cell Battery, Wei Qiao, Taesic Kim, Liyan Qu

Department of Electrical and Computer Engineering: Faculty Publications

A method for power management of a multi - cell battery includes identifying a desired power value and voltage value , determining a battery voltage value and a battery current value for a battery , determining a number of battery banks from a plurality of battery banks to use for the battery , where each battery bank includes one or more battery cells ( or battery modules ) , checking availability of each of the one or more battery cells ( or battery modules ) , selecting one or more battery banks from the plurality of battery banks , where …


A High-Density Theta Burst Paradigm Enhances The Aftereffects Of Transcranial Magnetic Stimulation: Evidence From Focal Stimulation Of Rat Motor Cortex, Qinglei Meng, Hieu Nguyen, Antonia Vrana, Simone Baldwin, Charlotte Qiong Li, Antonia Giles, Jun Wang, Yihong Yang, Hanbing Lu May 2022

A High-Density Theta Burst Paradigm Enhances The Aftereffects Of Transcranial Magnetic Stimulation: Evidence From Focal Stimulation Of Rat Motor Cortex, Qinglei Meng, Hieu Nguyen, Antonia Vrana, Simone Baldwin, Charlotte Qiong Li, Antonia Giles, Jun Wang, Yihong Yang, Hanbing Lu

Department of Electrical and Computer Engineering: Faculty Publications

Background: Theta burst stimulation (TBS) is an efficient noninvasive neuromodulation paradigm that has been widely adopted, clinically. However, the efficacy of TBS treatment remains similarly modest as conventional 10 Hz repetitive transcranial magnetic stimulation (rTMS).

Objective/hypothesis: To develop a new TBS paradigm that enhances the effects of TMS administration while maintaining high time-efficiency.

Methods: We describe here a new TMS paradigm, named High-Density Theta Burst Stimulation (hdTBS). This paradigm delivers up to 6 pulses per burst, as opposed to only 3 in conventional TBS, while maintaining the inter-burst interval of 200 ms (or 5 Hz) - a …


Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy May 2022

Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy

Articles

Today, there are a number of real testbeds worldwide among which Fed4Fire testbeds are prominent in the EU, while POWDER and COSMOS are prominent in the US. This paper aims to validate inter-testbed experiments between the EU and the US by connecting a number of Fed4Fire and US testbeds as part of an NGIAtlantic project. The goal is to compare the hop count, the topology formed, the maximum bandwidth permitted, and the loss and jitter that occurred between different testbeds. Additionally, Software Defined Networking (SDN) experiments between EU and US testbeds are conducted, and an edge-computing use case is developed …


Project Metamorphosis: Designing A Dynamic Framework For Converting Musical Compositions Into Paintings, Rao Hamza Ali, Grace Fong, Erik Linstead May 2022

Project Metamorphosis: Designing A Dynamic Framework For Converting Musical Compositions Into Paintings, Rao Hamza Ali, Grace Fong, Erik Linstead

Engineering Faculty Articles and Research

The authors present an automated, rule-based system for converting piano compositions into paintings. Using a color-note association scale presented by Edward Maryon in 1919, which correlates 12-tone scale with 12 hues of the color circle, the authors present a simple approach for extracting colors associated with each note played in a piano composition. The authors also describe the color extraction and art generation process in detail, as well as the process for creating “moving art,” which imitates the progression of a musical piece in real time. They share and discuss artworks generated for four well-known piano compositions.


Cloudbots: Autonomous Atmospheric Explorers, Akash Binoj May 2022

Cloudbots: Autonomous Atmospheric Explorers, Akash Binoj

Honors Scholar Theses

The CloudBot is an autonomous weather balloon that operates on the principle of variable buoyancy to ascend and descend in the atmosphere. This project aims to develop a device that will collect atmospheric measurements and communicate them mid-flight. The apparatus consists of a helium-filled balloon, the robotic payload, and an air cell. The fixed-volume helium balloon at the top provides an upwards buoyancy force, while the air cell at the bottom can hold a variable amount of pressure to adjust the weight of the CloudBot. By doing so, it is able to travel in storm conditions and collect valuable atmospheric …


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones May 2022

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


A Music-Therapy Robotic Platform For Children With Autism: A Pilot Study, Huanghao Feng, Mohammad H. Mahoor, Francesca Dino May 2022

A Music-Therapy Robotic Platform For Children With Autism: A Pilot Study, Huanghao Feng, Mohammad H. Mahoor, Francesca Dino

Electrical and Computer Engineering: Faculty Scholarship

Children with Autism Spectrum Disorder (ASD) experience deficits in verbal and nonverbal communication skills including motor control, turn-taking, and emotion recognition. Innovative technology, such as socially assistive robots, has shown to be a viable method for Autism therapy. This paper presents a novel robot-based music-therapy platform for modeling and improving the social responses and behaviors of children with ASD. Our autonomous social interactive system consists of three modules. Module one provides an autonomous initiative positioning system for the robot, NAO, to properly localize and play the instrument (Xylophone) using the robot’s arms. Module two allows NAO to play customized songs …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous vehicles, driver assistance systems, and in-vehicle entertainment, these vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question, we study the efficient placement of distributed services on a moving vehicle cluster. We present a macroscopic flow model for an intersection in Dublin, Ireland, using real vehicle density data. We show that such aggregate flows are highly predictable (even though the paths …


Open Hardware In Science: The Benefits Of Open Electronics, Michael Oellermann, Jolle W. Jolles, Diego Ortiz, Rui Seabra, Tobias Wenzel, Hannah Wilson, Richelle L. Tanner May 2022

Open Hardware In Science: The Benefits Of Open Electronics, Michael Oellermann, Jolle W. Jolles, Diego Ortiz, Rui Seabra, Tobias Wenzel, Hannah Wilson, Richelle L. Tanner

Biology, Chemistry, and Environmental Sciences Faculty Articles and Research

Openly shared low-cost electronic hardware applications, known as open electronics, have sparked a new open-source movement, with much untapped potential to advance scientific research. Initially designed to appeal to electronic hobbyists, open electronics have formed a global “maker” community and are increasingly used in science and industry. In this perspective article, we review the current costs and benefits of open electronics for use in scientific research ranging from the experimental to the theoretical sciences. We discuss how user-made electronic applications can help (I) individual researchers, by increasing the customization, efficiency, and scalability of experiments, while improving data quantity and quality; …


Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin May 2022

Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin

Articles

Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …


Evaluation Of Selected Computer Software For Concussion Recovery And Diagnosis, J.P. Jensen May 2022

Evaluation Of Selected Computer Software For Concussion Recovery And Diagnosis, J.P. Jensen

Honors Theses

Acquired traumatic brain injuries, such as concussions, impact many athletes participating in sports, particularly at the high school, collegiate, and professional levels. The risks posed by concussions – particularly when an athlete suffers repeated injuries – demands that protocols and tools be developed to maximize athlete health and safety. Computer technology can perform critical roles in the analysis and management of concussions. While specialized devices in the areas of imaging and impact sensing, are most associated with concussion management, researchers within the last two decades have increasingly explored the incorporation of various consumer technologies into the identification and treatment of …


Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux May 2022

Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux

Honors Theses

As web applications become increasingly popular, many are running several calculations and data processing on the client machine, it is important to consider data management practices on the front-end of these web applications. Typically, some data from the server is stored in the client's memory or hard disk. How much data should be stored for how long, as well as many other considerations, influence the time and space performance of the web application, as well as its security. In this thesis, we explore several challenges, solutions, and design patterns in web application data management through the lens of a senior …


Designing A Digital Electronics Lab, Ben Buckwalter May 2022

Designing A Digital Electronics Lab, Ben Buckwalter

Honors Theses

Hardware electronics tools can be more expensive than a new learner is willing to invest resulting in a barrier to entry. Furthermore, it can be difficult for a new learner to know where to start when learning electronics. To resolve this issue, we first explore current mobile app solutions that provide free electronics tooling. Then, we propose a design for a new mobile app that contains basic function generator and oscilloscope functionality as well as the learning resources necessary in order to guide new learners in the basics of digital electronics.


Design Of Hardware To Aid Smartphone-Based Oscilloscope App, Riddock Moran May 2022

Design Of Hardware To Aid Smartphone-Based Oscilloscope App, Riddock Moran

Honors Theses

A smartphone-based oscilloscope improves on traditional lab oscilloscopes in accessibility and portability but faces several performance limitations compared to traditional oscilloscopes. Among these, an oscilloscope app that uses the phone’s audio to read voltage signals will have a sampling rate and voltage bottlenecked by the capabilities of the audio codec, which will rarely exceed a rate of 48 kHz and 1 volt, respectively. Additionally, smartphones lack the ability to read line-in audio, allowing only one channel input through the microphone. Direct connections to an audio source may not be possible due to requiring an audio jack connection, and different poles …


Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy May 2022

Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy

Publications and Research

The main purpose of this project is to create a functional prototype of a multilayered system that incorporates aspects of electrical, mechanical, and computer engineering technology. The main objective of the system is to be able to determine whether a light bulb is working or not. The building blocks of this system are a robotic arm that is able to slide along a rail (for added mobility), a conveyor belt, and an electromechanical device that holds and tests light bulbs. Initially, the robot arm picks up a light bulb and places it into the holder which then tests it. A …


Low-Latency And Fresh Content Provision In Information-Centric Vehicular Networks, Shan Zhang, Junjie Li, Hongbin Luo, Jie Gao, Lian Zhao, Xuemin Sherman Shen May 2022

Low-Latency And Fresh Content Provision In Information-Centric Vehicular Networks, Shan Zhang, Junjie Li, Hongbin Luo, Jie Gao, Lian Zhao, Xuemin Sherman Shen

Electrical and Computer Engineering Faculty Research and Publications

In this paper, the content service provision of information-centric vehicular networks (ICVNs) is investigated from the aspect of mobile edge caching, considering the dynamic driving-related context information. To provide up-to-date information with low latency, two schemes are designed for cache update and content delivery at the roadside units (RSUs). The roadside unit centric (RSUC) scheme decouples cache update and content delivery through bandwidth splitting, where the cached content items are updated regularly in a round-robin manner. The request adaptive (ReA) scheme updates the cached content items upon user requests with certain probabilities. The performance of both proposed schemes are analyzed, …


Designing Autonomous Drone For Food Delivery In Gazebo/Ros Based Environments, Hrishitva Patel May 2022

Designing Autonomous Drone For Food Delivery In Gazebo/Ros Based Environments, Hrishitva Patel

Computer Science and Engineering Research

There has been a growing global trend towards convenience, speed, and ease in delivery services, and this has been further accelerated by the COVID pandemic. With the everincreasing demand for easily accessible deliveries and expanded delivery service coverage, it has become critical that innovations in this space be developed to further ensure the industry’s smooth operation. With the emergence of the COVID-19 pandemic, the inadequacies became more apparent, emphasizing the need to revolutionize and accelerate the trend in order to meet the increased demand. Drone delivery systems are of particular interest in this context because they can enable faster and …


An Empirical Study Of Memorization In Nlp, Xiaosen Zheng, Jing Jiang May 2022

An Empirical Study Of Memorization In Nlp, Xiaosen Zheng, Jing Jiang

Research Collection School Of Computing and Information Systems

A recent study by Feldman (2020) proposed a long-tail theory to explain the memorization behavior of deep learning models. However, memorization has not been empirically verified in the context of NLP, a gap addressed by this work. In this paper, we use three different NLP tasks to check if the long-tail theory holds. Our experiments demonstrate that top-ranked memorized training instances are likely atypical, and removing the top-memorized training instances leads to a more serious drop in test accuracy compared with removing training instances randomly. Furthermore, we develop an attribution method to better understand why a training instance is memorized. …


2022 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department May 2022

2022 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department

ENSI Informer Magazine Archive

The ENSI Informer Magazine published in the spring of 2022.


Shellfusion: Answer Generation For Shell Programming Tasks Via Knowledge Fusion, Neng Zhang, Chao Liu, Xin Xia, Christoph Treude, Ying Zou, David Lo, Zibin Zheng May 2022

Shellfusion: Answer Generation For Shell Programming Tasks Via Knowledge Fusion, Neng Zhang, Chao Liu, Xin Xia, Christoph Treude, Ying Zou, David Lo, Zibin Zheng

Research Collection School Of Computing and Information Systems

Shell commands are widely used for accomplishing tasks, such as network management and file manipulation, in Unix and Linux platforms. There are a large number of shell commands available. For example, 50,000+ commands are documented in the Ubuntu Manual Pages (MPs). Quite often, programmers feel frustrated when searching and orchestrating appropriate shell commands to accomplish specific tasks. To address the challenge, the shell programming community calls for easy-to-use tutorials for shell commands. However, existing tutorials (e.g., TLDR) only cover a limited number of frequently used commands for shell beginners and provide limited support for users to search for commands by …


Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv May 2022

Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv

Research Collection School Of Computing and Information Systems

Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also providing defense against different types of attacks, such as duplicate faking attack and brute-force attack. A typical MLE scheme only focuses on deduplication. On the other hand, supporting search operations on stored content is another essential requirement for cloud storage. In this article, we present a message-locked searchable encryption (MLSE) scheme in a dual-server setting, which achieves simultaneously the desirable features of supporting …


Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo May 2022

Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Software developers often use social media (such as Twitter) to shareprogramming knowledge such as new tools, sample code snippets,and tips on programming. One of the topics they talk about is thesoftware library. The tweets may contain useful information abouta library. A good understanding of this information, e.g., on thedeveloper’s views regarding a library can be beneficial to weigh thepros and cons of using the library as well as the general sentimentstowards the library. However, it is not trivial to recognize whethera word actually refers to a library or other meanings. For example,a tweet mentioning the word “pandas" may refer to …


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao May 2022

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique …


Identification Of Orthologous Gene Groups Using Machine Learning, Dillon Burgess Apr 2022

Identification Of Orthologous Gene Groups Using Machine Learning, Dillon Burgess

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Identification of genes that show similarity between different organisms, a.k.a orthologous genes, is an open problem in computational biology. The purpose of this thesis is to create an algorithm to group orthologous genes using machine learning. Following an optimization step to find the best characterization based on training data, we represented sequences of genes or proteins with kmer vectors. These kmer vectors were then clustered into orthologous groups using hierarchical clustering. We optimized the clustering phase with the same training data for the method and parameter selection. Our results indicated that use of protein sequences with k=2 and scaling the …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


Unconventional Computation Including Quantum Computation, Bruce J. Maclennan Apr 2022

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.