Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 19 of 19

Full-Text Articles in Other Operations Research, Systems Engineering and Industrial Engineering

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez Dec 2023

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez

Cyber Operations and Resilience Program Graduate Projects

This research paper analyzes the ethical implications of utilizing artificial intelligence, specifically AI-based algorithms in business selection and recruiting processes, with a focus on potential violations under Title VII of the Civil Rights Act of 1964 and Title 1 of the Americans with Disabilities Act (ADA). Amazon’s attempt at launching AI recruiting tools is examined. This paper will assess the fairness of AI recruiting practices, considering data collection, potential biases, and accuracy concerns in its implementation process. Additionally, the paper will provide an overview of federal civil rights statutes enforced by the U.S. Equal Employment Opportunity Commission (EEOC) and recent …


Development Of A Smart Waste Management System For City Application, Lawrence D. Fraction Apr 2023

Development Of A Smart Waste Management System For City Application, Lawrence D. Fraction

Morehead State Theses and Dissertations

A thesis presented to the faculty of the Elmer R. Smith College of Business and Technology Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Lawrence D. Fraction on April 14, 2023.


Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan Aug 2022

Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan

Undergraduate Student Research Internships Conference

The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.


Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D Feb 2022

Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D

Articles

Healthcare systems are under siege globally regarding technology adoption; the recent pandemic has only magnified the issues. Providers and patients alike look to new enabling technologies to establish real-time connectivity and capability for a growing range of remote telehealth solutions. The migration to new technology is not as seamless as clinicians and patients would like since the new workflows pose new responsibilities and barriers to adoption across the telehealth ecosystem. Technology-mediated workflows (integrated software and personal medical devices) are increasingly important in patient-centered healthcare; software-intense systems will become integral in prescribed treatment plans [1]. My research explored the path to …


Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux Jun 2021

Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux

International Conference on Lean Six Sigma

Abstract

Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability. An …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre Jun 2021

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


Dual-Axis Solar Tracker, Bryan Kennedy Jan 2020

Dual-Axis Solar Tracker, Bryan Kennedy

All Undergraduate Projects

Renewable energies, and fuels that are not fossil fuel-based, are one of the prolific topics of debate in modern society. With climate change now becoming a primary focus for scientists and innovators of today, one of the areas for the largest amount of potential and growth is that of the capturing and utilization of Solar Energy. This method involves using a mechanical system to track the progression of the sun as it traverses the sky throughout the day. A dual-axis solar tracker such as the one designed and built for this project, can follow the sun both azimuthally and in …


Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling Feb 2019

Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling

Space Traffic Management Conference

Space Traffic Management (STM) has already demonstrated its potential to be extremely data-intensive. The large number of objects on orbit today, if observed constantly throughout their lifetimes, could produce a staggeringly large number of observations that might in turn generate large numbers of orbits. Orbit data with a lengthy time history can be used to produce estimates of maneuver frequency, susceptibility to natural forces such as drag, and (if combined with photometric data) assessments of behavioral patterns of life.

A future of mega-constellations and a growing number of nations and organizations with assets on orbit would make it likely that …


An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan Jan 2018

An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan

Ronald Greenberg

A performance model for wormhole routed interconnection networks is presented and applied to the butterfly fat-tree network. Experimental results agree very closely over a wide range of load rate. Novel aspects of the model, leading to accurate and simple performance predictions, include (1) use of multiple-server queues, and (2) a general method of correcting queuing results based on Poisson arrivals to apply to wormhole routing. These ideas can also be applied to other networks.


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson Oct 2017

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …


Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor Dec 2016

Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor

Computer Engineering

No abstract provided.


Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava May 2016

Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava

Masters Theses, 2010-2019

With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Design Refinement By Iterative Virtual Experimentation (D.R.I.V.E.): A Methodology To Solving Engineering Design Problems, Charles M. Watson Apr 2015

Design Refinement By Iterative Virtual Experimentation (D.R.I.V.E.): A Methodology To Solving Engineering Design Problems, Charles M. Watson

Morehead State Theses and Dissertations

A Thesis Presented to the Faculty of the College of Science & Technology Morehead State University in Partial Fulfillment of the requirements for the Degree Master of Science by Charles M. “Matt” Watson on April 25, 2015


Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy Sep 2009

Synthesis, Interdiction, And Protection Of Layered Networks, Kevin T. Kennedy

Theses and Dissertations

This research developed the foundation, theory, and framework for a set of analysis techniques to assist decision makers in analyzing questions regarding the synthesis, interdiction, and protection of infrastructure networks. This includes extension of traditional network interdiction to directly model nodal interdiction; new techniques to identify potential targets in social networks based on extensions of shortest path network interdiction; extension of traditional network interdiction to include layered network formulations; and develops models/techniques to design robust layered networks while considering trade-offs with cost. These approaches identify the maximum protection/disruption possible across layered networks with limited resources, find the most robust layered …


A Multithreaded Scheduler For A High-Speed Simulator, Gene Saghi, Kirk Reinholtz, Paul Savory Jan 1998

A Multithreaded Scheduler For A High-Speed Simulator, Gene Saghi, Kirk Reinholtz, Paul Savory

Department of Industrial and Management Systems Engineering: Faculty Publications

The Cassini spacecraft is on its journey to Saturn to perform a close-up study of the Saturnian system; its rings, moons, magneto-sphere, and the planet itself. Sequences of commands will be sent to the spacecraft by ground personnel to control every aspect of the mission. To validate and verify these command sequences, a bit-level, high-speed simulator (HSS) has been developed. To maximize performance, the HSS is implemented with multiple threads and runs on a multiprocessor system. A key component of the HSS is the scheduler, which controls the execution of the simulator. The general framework of the scheduler can be …


Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan Oct 1997

Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan

Computer Science: Faculty Publications and Other Works

2D-mesh and torus networks have often been proposed as the interconnection pattern for parallel computers. In addition, wormhole routing has increasingly been advocated as a method of reducing latency. Most analysis of wormhole routed networks, however, has focused on the torus and the broader class of k-ary n-cubes to which it belongs. This paper presents a performance model for the wormhole routed mesh, and it compares the performance of the mesh and torus based on theoretical and empirical analyses.


An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan Aug 1997

An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan

Computer Science: Faculty Publications and Other Works

A performance model for wormhole routed interconnection networks is presented and applied to the butterfly fat-tree network. Experimental results agree very closely over a wide range of load rate. Novel aspects of the model, leading to accurate and simple performance predictions, include (1) use of multiple-server queues, and (2) a general method of correcting queuing results based on Poisson arrivals to apply to wormhole routing. These ideas can also be applied to other networks.


Packet Routing In Networks With Long Wires, Ronald I. Greenberg, H.-C. Oh Oct 1992

Packet Routing In Networks With Long Wires, Ronald I. Greenberg, H.-C. Oh

Computer Science: Faculty Publications and Other Works

In this paper, we examine the packet routing problem for networks with wires of differing length. We consider this problem in a network independent context, in which routing time is expressed in terms of “congestion” and “dilation” measures for a set of packet paths. We give, for any constant ε > 0, a randomized on-line algorithm for routing any set of N packets in O((Clg^ε(Nd)+Dlg(Nd))/lglg(Nd)) time, where C is the maximum congestion and D is the length of the longest path, both taking wire delays into account, and d is the longest path in terms of number of wires. We also …