- USF Research
- USF Libraries
Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations
Computer Science and Engineering Theses and Dissertations
Theses/dissertations from 2023 2023.
Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno
Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan
Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros
Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin
Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen
Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur
A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.
Graph Analysis on Social Networks , Shen Lu
Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera
Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo
Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai NG Lugo
Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi
Theses/Dissertations from 2022 2022
Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed
Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala
Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen
A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave
On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou
Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang
A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri
Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney
Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin
Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker
Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich
Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar
Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong
Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward
Theses/Dissertations from 2021 2021
Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar
Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia
Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto
Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey
AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi
Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill
Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja
Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana
Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev
Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.
Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski
Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov
Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai
Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri
Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco
Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam
Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava
A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza
Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar
Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams
Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari
Theses/Dissertations from 2020 2020
Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal
Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil
Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari
Composition of Atomic-Obligation Security Policies , Yan Cao Albright
Action Recognition Using the Motion Taxonomy , Maxat Alibayev
Sentiment Analysis in Peer Review , Zachariah J. Beasley
Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov
Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang
Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram
PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami
Composition of Atomic-Obligation Security Policies , Danielle Ferguson
Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel
The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann
Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez
Privacy-Preserving and Functional Information Systems , Thang Hoang
Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January
Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi
Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam
Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha
Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath
System Support of Concurrent Database Query Processing on a GPU , Hao Li
Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu
Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li
Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla
Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng
Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi
Models of Secure Software Enforcement and Development , Hernan M. Palombo
Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos
Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul
Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan
Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah
Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui
Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah
Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu
Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon
Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna
Theses/Dissertations from 2019 2019
Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur
Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed
Phenomena of Social Dynamics in Online Games , Essa Alhazmi
A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri
Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari
Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee
A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao
Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin
Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano
Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang
Advanced Search
- Email Notifications and RSS
- All Collections
- USF Faculty Publications
- Open Access Journals
- Conferences and Events
- Theses and Dissertations
- Textbooks Collection
Useful Links
- Rights Information
- SelectedWorks
- Submit Research
Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements
Privacy Copyright
Home > College of Natural Sciences > COMPUTERSCI-ENGINEERING > COMPUTERSCI-ENGINEERING-ETD
Computer Science and Engineering Theses, Projects, and Dissertations
Theses/projects/dissertations from 2024 2024.
TRAFFIC ANALYSIS OF CITIES IN SAN BERNARDINO COUNTY , Sai Kalyan Ayyagari
Recommendation System using machine learning for fertilizer prediction , Durga Rajesh Bommireddy
Classification of Remote Sensing Image Data Using Rsscn-7 Dataset , Satya Priya Challa
Cultural Awareness Application , Bharat Gupta
PREDICTING HOSPITALIZATION USING ARTIFICIAL INTELLIGENCE , Sanath Hiremath
AUTOMATED BRAIN TUMOR CLASSIFIER WITH DEEP LEARNING , venkata sai krishna chaitanya kandula
TRUCK TRAFFIC ANALYSIS IN THE INLAND EMPIRE , Bhavik Khatri
Crash Detecting System Using Deep Learning , Yogesh Reddy Muddam
A SMART HYBRID ENHANCED RECOMMENDATION AND PERSONALIZATION ALGORITHM USING MACHINE LEARNING , Aswin Kumar Nalluri
Theses/Projects/Dissertations from 2023 2023
CLASSIFICATION OF LARGE SCALE FISH DATASET BY DEEP NEURAL NETWORKS , Priyanka Adapa
GEOSPATIAL WILDFIRE RISK PREDICTION USING DEEP LEARNING , Abner Alberto Benavides
HUMAN SUSPICIOUS ACTIVITY DETECTION , Nilamben Bhuva
MAX FIT EVENT MANAGEMENT WITH SALESFORCE , AKSHAY DAGWAR
MELANOMA DETECTION BASED ON DEEP LEARNING NETWORKS , Sanjay Devaraneni
Heart Disease Prediction Using Binary Classification , Virendra Sunil Devare
CLASSIFICATION OF THORAX DISEASES FROM CHEST X-RAY IMAGES , Sharad Jayusukhbhai Dobariya
WEB BASED MANAGEMENT SYSTEM FOR HOUSING SOCIETY , Likhitha Reddy Eddala
Sales and Stock Management System , Rashmika Gaddam Ms
CONTACTLESS FOOD ORDERING SYSTEM , Rishivar Kumar Goli
RESTAURANT MANAGEMENT WEBSITE , Akhil Sai Gollapudi
DISEASE OF LUNG INFECTION DETECTION USING CNN MODEL -BAYESIAN OPTIMIZATION , poojitha gutha
DATA POISONING ATTACKS ON PHASOR MEASUREMENT UNIT DATA , Rutuja Sanjeev Haridas
CRIME MAPPING ANALYSIS USING WEB APPLICATION. , Lavanya Krishnappa
A LONG-TERM FUNDS PREDICTOR BASED ON DEEP LEARNING , SHUIYI KUANG
LIVER SEGMENTATION AND LESION DETECTION IN MEDICAL IMAGES USING A DEEP LEARNING-BASED U-NET MODEL , Kaushik Mahida
PHASOR MEASUREMENT UNIT DATA VISUALIZATION , Nikhila Mandava
TWITTER POLICING , Hemanth Kumar Medisetty
TRANSACTION MANAGEMENT SYSYEM FOR A PUBLISHER , HASSAIN SHAREEF MOHAMMED JR
LOBANGU: AN OPTICAL CHARACTER RECOGNITION RECEIPT MANAGEMENT APP FOR HEALTH CENTER PHARMACIES IN THE D.R.CONGO AND SURROUNDING EASTERN AFRICAN COUNTRIES , Bénis Munganga
PREDICTIVE MODEL FOR CFPB CONSUMER COMPLAINTS , Vyshnavi Nalluri
REVIEW CLASSIFICATION USING NATURAL LANGUAGE PROCESSING AND DEEP LEARNING , Brian Nazareth
Brain Tumor Detection Using MRI Images , Mayur Patel
QUIZ WEB APPLICATION , Dipti Rathod
HYPOTHYROID DISEASE ANALYSIS BY USING MACHINE LEARNING , SANJANA SEELAM
Pillow Based Sleep Tracking Device Using Raspberry Pi , Venkatachalam Seviappan
FINSERV ANDROID APPLICATION , Harsh Piyushkumar Shah
AUTOMATED MEDICAL NOTES LABELLING AND CLASSIFICATION USING MACHINE LEARNING , Akhil Prabhakar Thota
GENETIC PROGRAMMING TO OPTIMIZE PERFORMANCE OF MACHINE LEARNING ALGORITHMS ON UNBALANCED DATA SET , Asitha Thumpati
GOVERNMENT AID PORTAL , Darshan Togadiya
GENERAL POPULATION PROJECTION MODEL WITH CENSUS POPULATION DATA , Takenori Tsuruga
LUNG LESION SEGMENTATION USING DEEP LEARNING APPROACHES , Sree Snigdha Tummala
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING , Saranya Valleri
Machine Learning for Kalman Filter Tuning Prediction in GPS/INS Trajectory Estimation , Peter Wright
Theses/Projects/Dissertations from 2022 2022
LEARN PROGRAMMING IN VIRTUAL REALITY? A PROJECT FOR COMPUTER SCIENCE STUDENTS , Benjamin Alexander
LUNG CANCER TYPE CLASSIFICATION , Mohit Ramajibhai Ankoliya
HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING , Raja Kajuluri
IMPROVING INDIA’S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS , Umesh Makhloga
DETECTION OF EPILEPSY USING MACHINE LEARNING , Balamurugan Murugesan
SOCIAL MOBILE APPLICATION: UDROP , Mahmoud Oraiqat
Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional and Recurrent Neural Networks , Sonia Perez-Gamboa
College of Education FileMaker Extraction and End-User Database Development , Andrew Tran
DEEP LEARNING EDGE DETECTION IN IMAGE INPAINTING , Zheng Zheng
Theses/Projects/Dissertations from 2021 2021
A General Conversational Chatbot , Vipin Nambiar
Verification System , Paras Nigam
DESKTOP APPLICATION FOR THE PUZZLE BOARD GAME “RUSH HOUR” , Huanqing Nong
Ahmedabad City App , Rushabh Picha
COMPUTER SURVEILLANCE SYSTEM USING WI-FI FOR ANDROID , Shashank Reddy Saireddy
ANDROID PARKING SYSTEM , Vishesh Reddy Sripati
Sentiment Analysis: Stock Index Prediction with Multi-task Learning and Word Polarity Over Time , Yue Zhou
Theses/Projects/Dissertations from 2020 2020
BUBBLE-IN DIGITAL TESTING SYSTEM , Chaz Hampton
FEEDBACK REVIEW SYSTEM USING SENTIMENT ANALYSIS , Vineeth Kukkamalla
WEB APPLICATION FOR MOVIE PERFORMANCE PREDICTION , Devalkumar Patel
Theses/Projects/Dissertations from 2019 2019
REVIEWS TO RATING CONVERSION AND ANALYSIS USING MACHINE LEARNING TECHNIQUES , Charitha Chanamolu
EASY EXAM , SARTHAK DABHI
EXTRACT TRANSFORM AND LOADING TOOL FOR EMAIL , Amit Rajiv Lawanghare
VEHICLE INFORMATION SYSTEM USING BLOCKCHAIN , Amey Zulkanthiwar
Theses/Projects/Dissertations from 2018 2018
USING AUTOENCODER TO REDUCE THE LENGTH OF THE AUTISM DIAGNOSTIC OBSERVATION SCHEDULE (ADOS) , Sara Hussain Daghustani
California State University, San Bernardino Chatbot , Krutarth Desai
ORGANIZE EVENTS MOBILE APPLICATION , Thakshak Mani Chandra Reddy Gudimetla
SOCIAL NETWORK FOR SOFTWARE DEVELOPERS , Sanket Prabhakar Jadhav
VIRTUALIZED CLOUD PLATFORM MANAGEMENT USING A COMBINED NEURAL NETWORK AND WAVELET TRANSFORM STRATEGY , Chunyu Liu
INTER PROCESS COMMUNICATION BETWEEN TWO SERVERS USING MPICH , Nagabhavana Narla
SENSOR-BASED HUMAN ACTIVITY RECOGNITION USING BIDIRECTIONAL LSTM FOR CLOSELY RELATED ACTIVITIES , Arumugam Thendramil Pavai
NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING , Khoi Minh Pham
EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM , IVO A. TANTAMANGO
STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao
Theses/Projects/Dissertations from 2017 2017
CHILDREN’S SOCIAL NETWORK: KIDS CLUB , Eiman Alrashoud
MULTI-WAY COMMUNICATION SYSTEM , S. Chinnam
WEB APPLICATION FOR GRADUATE COURSE RECOMMENDATION SYSTEM , Sayali Dhumal
MOBILE APPLICATION FOR ATTENDANCE SYSTEM COYOTE-ATTENDANCE , Sindhu Hari
WEB APPLICATION FOR GRADUATE COURSE ADVISING SYSTEM , Sanjay Karrolla
Custom T-Shirt Designs , Ranjan Khadka
STUDENT CLASS WAITING LIST ENROLLMENT , AISHWARYA LACHAGARI
ANDROID MOBILE APPLICATION FOR HOSPITAL EXECUTIVES , Vihitha Nalagatla
PIPPIN MACHINE , Kiran Reddy Pamulaparthy
SOUND MODE APPLICATION , Sindhuja Pogaku
I2MAPREDUCE: DATA MINING FOR BIG DATA , Vishnu Vardhan Reddy Sherikar
COMPARING AND IMPROVING FACIAL RECOGNITION METHOD , Brandon Luis Sierra
NATURAL LANGUAGE PROCESSING BASED GENERATOR OF TESTING INSTRUMENTS , Qianqian Wang
AUTOMATIC GENERATION OF WEB APPLICATIONS AND MANAGEMENT SYSTEM , Yu Zhou
Theses/Projects/Dissertations from 2016 2016
CLOTH - MODELING, DEFORMATION, AND SIMULATION , Thanh Ho
CoyoteLab - Linux Containers for Educational Use , Michael D. Korcha
PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS , Essa Yahya M Muharish
DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP , Bir Apaar Singh Sodhi
Theses/Projects/Dissertations from 2015 2015
APPLY DATA CLUSTERING TO GENE EXPRESSION DATA , Abdullah Jameel Abualhamayl Mr.
Density Based Data Clustering , Rayan Albarakati
Developing Java Programs on Android Mobile Phones Using Speech Recognition , Santhrushna Gande
THE DESIGN AND IMPLEMENTATION OF AN ADAPTIVE CHESS GAME , Mehdi Peiravi
CALIFORNIA STATE UNIVERSITY SAN BERNARDINO WiN GPS , Francisco A. Ron
ESTIMATION ON GIBBS ENTROPY FOR AN ENSEMBLE , Lekhya Sai Sake
Advanced Search
- Notify me via email or RSS
- Department, Program, or Office
- Disciplines
Author Corner
- School of Computer Science and Engineering Website
A service of the John M. Pfau Library
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright Acrobat Reader
Search form
Review of computer engineering studies.
- ISSN: 2369-0755 (print); 2369-0763 (online)
- Indexing & Archiving: EBSCOhost Cabell's Directory Publons ScienceOpen Google Scholar Index Copernicus CrossRef Portico Microsoft Academic CNKI Scholar Baidu Scholar
- Subject: Computer Sciences Engineering
Review of Computer Engineering Studies (RCES) is an international, scholarly and peer-reviewed journal dedicated to providing scientists, engineers and technicians with the latest developments on computer science. The journal offers a window into the most recent discoveries in four categories, namely, computing (computing theory, scientific computing, cloud computing, high-performance computing, numerical and symbolic computing), system (database systems, real-time systems, operating systems, warning systems, decision support systems, information processes and systems, systems integration), intelligence (robotics, bio-informatics, web intelligence, artificial intelligence), and application (security, networking, software engineering, pattern recognition, e-science and e-commerce, signal and image processing, control theory and applications). The editorial board welcomes original, substantiated papers on the above topics, which could provoke new science interest and benefit those devoted to computer science. The journal is published quarterly by the IIETA.
The RCES is an open access journal. All contents are available for free, that is, users are entitled to read, download, duplicate, distribute, print, search or link to the full texts of the articles in this journal without prior consent from the publisher or the author.
Focus and Scope
The RCES welcomes original research papers, technical notes and review articles on the following disciplines:
- Computing theory
- Scientific computing
- Cloud computing
- High-performance computing
- Numerical and symbolic computing
- Database systems
- Real-time systems
- Operating systems
- Warning systems
- Decision support systems
- Information processes and systems
- Systems integration
- Bio-informatics
- Web intelligence
- Artificial intelligence
- Software engineering
- Pattern recognition
- E-science and e-commerce
- Signal and image processing
- Control theory and applications
Publication Frequency
The RCES is published quarterly by the IIETA, with four regular issues (excluding special issues) and one volume per year.
Peer Review Statement
The IIETA adopts a double blind review process. Once submitted, a paper dealing with suitable topics will be sent to the editor-in-chief or managing editor, and then be reviewed by at least two experts in the relevant field. The reviewers are either members of our editorial board or special external experts invited by the journal. In light of the reviewers’ comments, the editor-in-chief or managing editor will make the final decision over the publication, and return the decision to the author.
There are four possible decisions concerning the paper: acceptance, minor revision, major revision and rejection. Acceptances means the paper will be published directly without any revision. Minor revision means the author should make minor changes to the manuscript according to reviewers’ comments and submit the revised version to the IIETA. The revised version will be accepted or rejected at the discretion of the editor-in-chief or managing editor. Major revision means the author should modify the manuscript significantly according to reviewers’ comments and submit the revised version to the IIETA. The revised version will be accepted or rejected at the discretion of the editor-in-chief or managing editor. Rejection means the submitted paper will not be published.
If a paper is accepted, the editor-in-chief or managing editor will send an acceptance letter to the author, and ask the author to prepare the paper in MS Word using the template of IIETA.
Plagiarism Policy
Plagiarism is committed when one author uses another work without permission, credit, or acknowledgment. Plagiarism takes different forms, from literal copying to paraphrasing the work of another. The IIETA uses CrossRef to screen for unoriginal material. Authors submitting to an IIETA journal should be aware that their paper may be submitted to CrossRef at any point during the peer-review or production process. Any allegations of plagiarism made to a journal will be investigated by the editor-in-chief or managing editor. If the allegations appear to be founded, we will request all named authors of the paper to give an explanation of the overlapping material. If the explanation is not satisfactory, we will reject the submission, and may also reject future submissions.
For instructions on citing any of IIETA’s journals as well as our Ethics Statement , see Policies and Standards .
Indexing Information
Web: https://www.portico.org/
- Index Copernicus
Web: http://journals.indexcopernicus.com
- Google Scholar
Web: http://scholar.google.com
- CNKI Scholar
Web: http://scholar.cnki.net
Included in
- Crossref.org
Web: https://www.crossref.org/
ISSN: 2369-0755 (print); 2369-0763 (online)
For Submission Inquiry
Email: [email protected]
- Just Published
- Featured Articles
- Most Read and Cited
- Winters’ Multiplicative Model Based Analysis of the Development and Prospects of New Energy Electric Vehicles in China Zhishuo Jin, Yubing Qian
- Agent-based Analysis and Simulation of Online Shopping Behavior in the Context of Online Promotion Xiaoyi Deng
- Study of Two Kinds of Analysis Methods of Intrusion Tolerance System State Transition Model Zhiyong Luo, Xu Yang, Guanglu Sun, Zhiqiang Xie
- A Review on Automated Billing for Smart Shopping System Using IOT Priyanka S. Sahare, Anup Gade, Jayant Rohankar
- A Review on Automated Billing for Smart Shopping System Using IOT Priyanka S. Sahare, Anup Gade, Jayant Rohank
- Algorithm Research on the Analysis of College Student Score Jinxin Ma, Limin Cui
Phone: + 1 825 436 9306
Email: [email protected]
Subscription
Language support
Please sign up to receive notifications on new issues and newsletters from IIETA
Select Journal/Journals:
Copyright © 2024 IIETA. All Rights Reserved.
is Mainsite
- Search all IEEE websites
- Mission and vision
- IEEE at a glance
- IEEE Strategic Plan
- Organization of IEEE
- Diversity, Equity, & Inclusion
- Organizational Ethics
- Annual Report
- History of IEEE
- Volunteer resources
- IEEE Corporate Awards Program
- Financials and Statistics
- IEEE Future Directions
- IEEE for Industry (Corporations, Government, Individuals)
IEEE Climate Change
- Humanitarian and Philanthropic Opportunities
- Select an option
- Get the latest news
- Access volunteer resources (Code of Ethics, financial forms, tools and templates, and more)
- Find IEEE locations
- Get help from the IEEE Support Center
- Recover your IEEE Account username and password
- Learn about the IEEE Awards program and submit nomination
- View IEEE's organizational structure and leadership
- Apply for jobs at IEEE
- See the history of IEEE
- Learn more about Diversity, Equity & Inclusion at IEEE
- Join an IEEE Society
- Renew your membership
- Member benefits
- IEEE Contact Center
- Connect locally
- Memberships and Subscriptions Catalog
- Member insurance and discounts
- Member Grade Elevation
- Get your company engaged
- Access your Account
- Learn about membership dues
- Learn about Women in Engineering (WIE)
- Access IEEE member email
- Find information on IEEE Fellows
- Access the IEEE member directory
- Learn about the Member-Get-a-Member program
- Learn about IEEE Potentials magazine
- Learn about Student membership
- Affinity groups
- IEEE Societies
- Technical Councils
- Technical Communities
- Geographic Activities
- Working groups
- IEEE Regions
- IEEE Collabratec®
- IEEE Resource Centers
IEEE DataPort
- See the IEEE Regions
- View the MGA Operations Manual
- Find information on IEEE Technical Activities
- Get IEEE Chapter resources
- Find IEEE Sections, Chapters, Student Branches, and other communities
- Learn how to create an IEEE Student Chapter
- Upcoming conferences
- IEEE Meetings, Conferences & Events (MCE)
- IEEE Conference Application
- IEEE Conference Organizer Education Program
- See benefits of authoring a conference paper
- Search for 2025 conferences
- Search for 2024 conferences
- Find conference organizer resources
- Register a conference
- Publish conference papers
- Manage conference finances
- Learn about IEEE Meetings, Conferences & Events (MCE)
- Visit the IEEE SA site
- Become a member of the IEEE SA
- Find information on the IEEE Registration Authority
- Obtain a MAC, OUI, or Ethernet address
- Access the IEEE 802.11™ WLAN standard
- Purchase standards
- Get free select IEEE standards
- Purchase standards subscriptions on IEEE Xplore®
- Get involved with standards development
- Find a working group
- Find information on IEEE 802.11™
- Access the National Electrical Safety Code® (NESC®)
- Find MAC, OUI, and Ethernet addresses from Registration Authority (regauth)
- Get free IEEE standards
- Learn more about the IEEE Standards Association
- View Software and Systems Engineering Standards
- IEEE Xplore® Digital Library
- Subscription options
- IEEE Spectrum
- The Institute
Proceedings of the IEEE
- IEEE Access®
- Author resources
- Get an IEEE Xplore Digital Library trial for IEEE members
- Review impact factors of IEEE journals
- Request access to the IEEE Thesaurus and Taxonomy
- Access the IEEE copyright form
- Find article templates in Word and LaTeX formats
- Get author education resources
- Visit the IEEE Xplore digital library
- Find Author Digital Tools for IEEE paper submission
- Review the IEEE plagiarism policy
- Get information about all stages of publishing with IEEE
- IEEE Learning Network (ILN)
- IEEE Credentialing Program
- Pre-university
- IEEE-Eta Kappa Nu
- Accreditation
- Access continuing education courses on the IEEE Learning Network
- Find STEM education resources on TryEngineering.org
- Learn about the TryEngineering Summer Institute for high school students
- Explore university education program resources
- Access pre-university STEM education resources
- Learn about IEEE certificates and how to offer them
- Find information about the IEEE-Eta Kappa Nu honor society
- Learn about resources for final-year engineering projects
- Access career resources
Publications
Ieee provides a wide range of quality publications that make the exchange of technical knowledge and information possible among technology professionals..
Expand All | Collapse All
- > Get an IEEE Xplore Digital Library trial for IEEE members
- > Review impact factors of IEEE journals
- > Access the IEEE thesaurus and taxonomy
- > Find article templates in Word and LaTeX formats
- > Get author education resources
- > Visit the IEEE Xplore Digital Library
- > Learn more about IEEE author tools
- > Review the IEEE plagiarism policy
- > Get information about all stages of publishing with IEEE
Why choose IEEE publications?
IEEE publishes the leading journals, transactions, letters, and magazines in electrical engineering, computing, biotechnology, telecommunications, power and energy, and dozens of other technologies.
In addition, IEEE publishes more than 1,800 leading-edge conference proceedings every year, which are recognized by academia and industry worldwide as the most vital collection of consolidated published papers in electrical engineering, computer science, and related fields.
Spotlight on IEEE publications
Ieee xplore ®.
- About IEEE Xplore
- Visit the IEEE Xplore Digital Library
- See how to purchase articles and standards
- Find support and training
- Browse popular content
- Sign up for a free trial
IEEE Spectrum Magazine
- Visit the IEEE Spectrum website
- Visit the Institute for IEEE member news
IEEE Access
- Visit IEEE Access
- See recent issues
Benefits of publishing
Authors: why publish with ieee.
- PSPB Accomplishments in 2023 (PDF, 228 KB)
- IEEE statement of support for Open Science
- IEEE signs San Francisco Declaration on Research Assessment (DORA)
- Read about how IEEE journals maintain top citation rankings
Open Access Solutions
- Visit IEEE Open
Visit the IEEE Author Center
Find author resources >
- > IEEE Collabratec ®
- > Choosing a journal
- > Writing
- > Author Tools
- > How to Publish with IEEE (English) (PPT, 3 MB)
- > How to Publish with IEEE (Chinese) (PPT, 3 MB)
- > Benefits of Publishing with IEEE (PPT, 7 MB)
- > View author tutorial videos
- Read the IEEE statement on appropriate use of bibliometric indicators
Publication types and subscription options
- Journal and magazine subscriptions
- Digital library subscriptions
- Buy individual articles from IEEE Xplore
For organizations:
- Browse IEEE subscriptions
- Get institutional access
- Subscribe through your local IEEE account manager
Publishing information
IEEE publishing makes the exchange of technical knowledge possible with the highest quality and the greatest impact.
- Open access publishing options
- Intellectual Property Rights (IPR)
- Reprints of articles
- Services for IEEE organizations
Contact information
- Contact IEEE Publications
- About the Publication Services & Products Board
Related Information >
Network. collaborate. create with ieee collabratec®..
All within one central hub—with exclusive features for IEEE members.
- Experience IEEE Collabratec
Join/Renew IEEE or a Society
Receive member access to select content, product discounts, and more.
- Review all member benefits
Try this easy-to-use, globally accessible data repository that provides significant benefits to researchers, data analysts, and the global technical community.
- Start learning today
IEEE is committed to helping combat and mitigate the effects of climate change.
- See what's new on the IEEE Climate Change site
DigitalCommons@University of Nebraska - Lincoln
Home > Computer Science > CSEARTICLES
Computer Science and Engineering, Department of
School of computing: faculty publications.
Studying Developer Eye Movements to Measure Cognitive Workload and Visual Effort for Expertise Assessment , SALWA D. ALJEHANE, Bonita Sharif, and JONATHAN I. MALETIC
Co-Existence with IEEE 802.11 Networks in the ISM Band Without Channel Estimation , Muhammad Naveed Aman, Muhammad Ishfaq, and Biplab Sikdar
Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems , James Adu Ansere, Mohsin Kamal, Izaz Ahmad Khan, and Muhammad Naveed Aman
Towards Modeling Human Attention from Eye Movements for Neural Source Code Summarization , AAKASH BANSAL, Bonita Sharif, and COLLIN MCMILLAN
On Approximating Total Variation Distance , Arnab Bhattacharyya, Sutanu Gayen, Kuldeep S. Meel, Dimitrios Myrisiotis, A. Pavan, and N. V. Vinodchandran
Rapid: Region-Based Pointer Disambiguation , KHUSHBOO CHITRE, PIYUS KEDIA, and RAHUL PURANDARE
Dynamic Field Programmable Logic-Driven Soft Exosuit , Frances Cleary, Witawas Srisa-an, David C. Henshall, and Sasitharan Balasubramaniam
Convolutional Neural Networks Analysis Reveals Three Possible Sources of Bronze Age Writings between Greece and India , Shruti Daggumati and Peter Z. Revesz
EmergeNet: A novel deep-learning based ensemble segmentation model for emergence timing detection of coleoptile , Aankit Das, Sruti Das Choudhury, Amit Kumar Das, Ashok Samal, and Tala Awada
Network Slicing via Transfer Learning aided Distributed Deep Reinforcement Learning , Tianlun Hu, Qi Liao, Qiang Liu, and Georg Carle
Relative Comparison of Modern Computing to Computer Technology of Ages , Iwasan D. Kejawa Dr. and Hailly Rubio Ms.
Conversion of fat to cellular fuel—Fatty acids 𝛽-oxidation model , Sylwester M. Kloska, Krzysztof Pałczyński, Tomasz Marciniak, Tomasz Talaśka, Marissa Miller, Beata J. Wysocki, Paul Davis, and Tadeusz A. Wysocki
AgRIS: wind-adaptive wideband reconfigurable intelligent surfaces for resilient wireless agricultural networks at millimeter-wave spectrum , Shuai Nie and M. C. Vuran
Perceptual cue-guided adaptive image downscaling for enhanced semantic segmentation on large document images , Chulwoo Pack, Leen-Kiat Soh, and Elizabeth Lorang
Ethical Design of Computers: From Semiconductors to IoT and Artificial Intelligence , Sudeep Pasricha and Marilyn Wolf
OSC-CO 2 : coattention and cosegmentation framework for plant state change with multiple features , Rubi Quiñones, Ashok Samal, Sruti Das Choudhury, and Francisco Muñoz-Arriola
A Generalization of the Chomsky-Halle Phonetic Representation using Real Numbers for Robust Speech Recognition in Noisy Environments , Peter Z. Revesz
A Markovian Error Model for False Negatives in DNN-based Perception-Driven Control Systems , Kruttidipta Samal, Thomas Walton, Tran Hoang-Dung, and Marilyn Wolf
3DGAUnet: 3D Generative Adversarial Networks with a 3D U-Net Based Generator to Achieve the Accurate and Effective Synthesis of Clinical Tumor Image Data for Pancreatic Cancer , Yu Shi, Hannah Tang, Michael J. Baine, Michael A. Hollingsworth, Huijing Du, Dandan Zheng, Chi Zhang, and Hongfeng Yu
Revealing gene regulation-based neural network computing in bacteria , Samitha S. Somathilaka, Sasitharan Balasubramaniam, Daniel P. Martins, and Xu Li
Extending the breadth of saliva metabolome fngerprinting by smart template strategies and efective pattern realignment on comprehensive two‑dimensional gas chromatographic data , Simone Squara, Friederike Manig, Thomas Henle, Michael Hellwig, Andrea Caratti, Carlo Bicchi, Stephen E. Reichenbach, Qingping Tao, Massimo Collino, and Chiara Cordero
MFA-DVR: direct volume rendering of MFA models , Jianxin Sun, David Lenz, Hongfeng Yu, and Tom Peterka
Metamobility: Connecting Future Mobility with Metaverse , Haoxin Wang, Ziran Wang, Dawei Chen, Qiang Liu, Hongyu Ke, and Kyungtae Han
A Light-weight Technique to Detect GPS Spoofing using Attenuated Signal Envelopes , Xiao Wei, Muhammad Naveed Aman, and Biplab Sikdar
From Laboratory to Field: Unsupervised Domain Adaptation for Plant Disease Recognition in the Wild , Xinlu Wu, Xijian Fan, Peng Luo, Sruti Das Choudhury, Tardi Tjahjadi, and Chunhua Hu
Leaf-Counting in Monocot Plants Using Deep Regression Models , Xinyan Xie, Yufeng Ge, Harkamal Walia, Jinliang Yang, and Hongfeng Yu
Next-Generation Sequencing Data-Based Association Testing of a Group of Genetic Markers for Complex Responses Using a Generalized Linear Model Framework , Zheng Xu, Song Yan, Cong Wu, Qing Duan, Sixia Chen, and Yun Li
Efficient Two-Stage Analysis for Complex Trait Association with Arbitrary Depth Sequencing Data , Zheng Xu, Song Yan, Shuai Yuan, Cong Wu, Sixia Chen, and Zifang Guo
A Roadmap for the Human Gut Cell Atlas , Matthias Zilbauer, Kylie R. James, Mandeep Kaur, Sebastian Pott, Zhixin Li, Albert Burger, Jay R. Thiagarajah, Joseph Burclaff, Frode L. Jahnsen, Francesca Perrone, Alexander D. Ross, Gianluca Matteoli, Nathalie Stakenborg, Tomohisa Sujino, Andreas Moor, Raquel Bartolome-Casado, Espen S. Bækkevold, Ran Zhou, Bingqing Xie, Ken S. Lau, Shahida Din, Scott T. Magness, Qiuming Yao, Semir Beyaz, Mark Arends, Alexandre Denadai-Souza, Lori A. Coburn, Jellert T. Gaublomme, Richard Baldock, Irene Papatheodorou, Jose Ordovas-Montanes, Guy Boeckxstaens, Anna Hupalowska, and Sarah A. Teichmann
MR-PIPA: An Integrated Multi-level RRAM (HfOx) based Processing-In-Pixel Accelerator , Minhaz Abedin, Arman Roohi, Maximilian Liehr, Nathaniel Cady, and Shaahin Angizi
Enabling Intelligent IoTs for Histopathology Image Analysis Using Convolutional Neural Networks , Mohammed H. Alali, Arman Roohi, Shaahin Angizi, and Jitender S. Deogun
Realizing Molecular Machine Learning through Communications for Biological AI: Future Directions and Challenges , Sasitharan Balasubramaniam, Samitha Somathilaka, Sehee Sun, Adrian Ratwatte, and Massimiliano Pierobon
ubjective Information and Survival in a Simulated Biological System , Tyler S. Barker, Massimiliano Pierobon, and Peter J. Thomas
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications , Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, and Marcelo Frias
Security, Trust and Privacy for Cloud, Fog and Internet of Things , Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, and Muhammad Naveed Aman
The Road Not Taken: Exploring Alias Analysis Based Optimizations Missed by the Compiler , KHUSHBOO CHITRE, PIYUS KEDIA, and RAHUL PURANDARE
Pitfalls and Guidelines for Using Time-Based Git Data , Samuel W. Flint, Jigyasa Chauhan, and Robert Dyer
Quasi-Spherical Absorbing Receiver Model of Glioblastoma Cells For Exosome-based Molecular Communications , Caio Fonseca, Michael Taynan Barros, Andreani Odysseos, Srivatsan Kidambi, and Sasitharan Balasubramaniam
Incoherent and Online Dictionary Learning Algorithm for Motion Prediction , Farrukh Hafeez, Usman Ullah Sheikh, Asif Iqbal, and Muhammad Naveed Aman
Inter-Cell Slicing Resource Partitioning via Coordinated Multi-Agent Deep Reinforcement Learning , Tianlun Hu, Qi Liao, Qiang Liu, Dan Wellington, and Georg Carle
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio‑Cyber attacks , M. S. Islam, S. Ivanov, H. Awan, J. Drohan, Sasitharan Balasubramaniam, L. Coffey, Srivatsan Kidambi, and W. Sri-saan
Decision-Theoretic Planning with Communication in Open Multiagent Systems , Anirudh Kakarlapudi, Gayathri Anil, Adam Eck, Prashant Doshi, and Leen-Kiat Soh
Society Dilemma of Computer Technology Management in Today's World , Iwasan D. Kejawa Ed.D
Deep Reinforcement Learning for End-to-End Network Slicing: Challenges and Solutions , Qiang Liu, Nakjung Choi, and Tao Han
Real-Time Dynamic Map with Crowdsourcing Vehicles in Edge Computing , Qiang Liu, Tao Han, Jiang (Linda) Xie, and BaekGyu Kim
Internal Model Control (IMC)-Based Active and Reactive Power Control of Brushless Double-Fed Induction Generator with Notch Filter , Ahsanullah Memon, Mohd Wazir Bin Mustafa, Zohaib Hussain Laghari, Touqeer Ahmed Jumani, Waqas Anjum, Shafi Ullah, and Muhammad Naveed Aman
Systems-Based Approach for Optimization of Assembly-Free Bacterial MLST Mapping , Natasha Pavlovikj, Joao Carlos Gomes-Neto, Jitender Deogun, and Andrew Benson
Room-temperature polariton quantum fluids in halide perovskites , Kai Peng, Renjie Tao, Louis Haeberlé, Quanwei Li, Dafei Jin, Graham R. Fleming, Stéphane Kéna-Cohen, Xiang Zhang, and Wei Bao
Autonomous, Long-Range, Sensor Emplacement Using Unmanned Aircraft Systems , Adam Plowcha, Justin Bradley, Jacob Hoberg, Thomas Ammon, Mark Nail, Brittany Duncan, and Carrick Detweiler
What Makes the Article “Condition Monitoring and Fault Diagnosis of Electrical Motors—A Review” So Popular? , Wei Qiao
Decipherment Challenges Due to Tamga and Letter Mix-Ups in an Old Hungarian Runic Inscription from the Altai Mountains , Peter Revesz
Profiling a Community-Specific Function Landscape for Bacterial Peptides Through Protein-Level Meta-Assembly and Machine Learning , Mitra Vajjala, Brady Johnson, Lauren Kasparek, Michael Leuze, and Qiuming Yao
Nanomechanical Resonators: Toward Atomic Scale , Bo Xu, Pengcheng Zhang, Jiankai Zhu, Zuheng Liu, Alexander Eichler, Xu-Qian Zheng, Jaesung Lee, Aneesh Dash, Swapnil More, Song Wu, Yanan Wang, Hao Jia, Akshay Naik, Adrian Bachtold, Rui Yang, Philip X.-L. Feng, and Zenghui Wang
Neural Network Repair with Reachability Analysis , Xiaodong Yang, Tom Yamaguchi, Tran Hoang-Dung, Bardh Hoxha, Taylor T. Johnson, and Danil Prokhorov
High throughput analysis of leaf chlorophyll content in sorghum using RGB, hyperspectral, and fluorescence imaging and sensor fusion , Huichun Zhang; Yufeng Ge; Xinyan Xie; Abbas Atefi; Nuwan Wijewardane,; and Suresh Thapa
Rethinking Sampled-Data Control for Unmanned Aircraft Systems , Xinkai Zhang and Justin M. Bradley
Deja Vu: semantics-aware recording and replay of high-speed eye tracking and interaction data to support cognitive studies of software engineering tasks—methodology and analyses , Vlas Zyrianov, Cole S. Peterson, Drew T. Guarnera, Joshua Behler, Praxis Weston, Bonita Sharif Ph.D., and Jonathan I. Maletic
Visual Growth Tracking for Automated Leaf Stage Monitoring Based on Image Sequence Analysis , Srinidhi Bashyam, Sruti Das Choudhury, Ashok Samal, and Tala Awada
Aerial Flight Paths for Communication , Alisha Bevins and Brittany Duncan
Facility Location Games with Ordinal Preferences , Hau Chan, Minming Li, and Chenhao Wang
Fingerlings mass estimation: A comparison between deep and shallow learning algorithms , Adair da Silva Oliveira Junior, Diego André Sant’Ana, Marcio Carneiro Brito Pache, Vanir Garcia, Vanessa Aparecida de Moares Weber, Gilberto Astolfi, Fabricio de Lima Weber, Geazy Vilharva Menezes, Gabriel Kirsten Menezes, Pedro Lucas França Albuquerque, Celso Soares Costa, Eduardo Quirino Arguelho de Queiroz, João Victor Araújo Rozales, Milena Wolff Ferreira, Marco Hiroshi Naka, and Hemerson Pistori
Fire Suppression and Ignition with Unmanned Aerial Vehicles , Carrick Detweiler, Sebastian Elbaum, James Higgins, Christian Laney, Craig Allen, Dirac L. Twidwell Jr, and Evan Michale Beachly
HyperSeed: An End-to-End Method to Process Hyperspectral Images of Seeds , Tian Gao, Anil Kumar Nalini Chandran, Puneet Paul, Harkamal Walia, and Hongfeng Yu
Novel 3D Imaging Systems for High-Throughput Phenotyping of Plants , Tian Gao, Feiyu Zhu, Puneet Paul, Jaspreet Sandhu, Henry Akrofi Doku, Jianxin Sun, Yu Pan, Paul Staswick, Harkamal Walia, and Hongfeng Yu
Human body-fluid proteome: quantitative profiling and computational prediction , Lan Huang, Dan Shao, Yan Wang, Xueteng Cui, Yufei Li, Qian Chen, and Juan Cui
University of Nebraska unmanned aerial system (UAS) profiling during the LAPSE-RATE field campaign , Ashraful Islam, Ajay Shankar, Adam Houston, and Carrick Detweiler
The Integral of Education Technology in the Society , Prof. Iwasan D. Kejawa Ed.D
Optimal Container Migration for Mobile Edge Computing: Algorithm, System Design and Implementation , Taewoon Kim, Motassem Al-Tarazi, Jenn-Wei Lin, and Wooyeol Choi
Microfluidic-based Bacterial Molecular Computing on a Chip , Daniel P. Martins; Michael Taynnan Barros; Benjamin O'Sullivan; Ian Seymour; Alan O'Riordan; Lee Coffey; Joseph Sweeney; and Sasitharan Balasubramaniam,
A Task-Driven Feedback Imager with Uncertainty Driven Hybrid Control , Burhan A. Mudassar, Priyabrata Saha, Marilyn Wolf, and Saibal Mukhopadhyay
Model Counting meets F 0 Estimation , A. PAVAN, N. V. VINODCHANDRAN, ARNAB BHATTACHARYYA, and KULDEEP S. MEEL
Multi-feature data repository development and analytics for image cosegmentation in high-throughput plant phenotyping , Rubi Quiñones, Francisco Munoz-Arriola, Sruti Das Choudhury, and Ashok Samal
A tiling algorithm-based string similarity measure , Peter Revesz
Combined Untargeted and Targeted Fingerprinting by Comprehensive Two-Dimensional Gas Chromatography to Track Compositional Changes on Hazelnut Primary Metabolome during Roasting , Marta Cialiè Rosso, Federico Stilo, Carlo Bicchi, Melanie Charron, Ginevra Rosso, Roberto Menta, Stephen Reichenbach, Christoph H. Weinert, Carina I. Mack, Sabine E. Kulling, and Chiara Cordero
DeepSec: a deep learning framework for secreted protein discovery in human body fluids , Dan Shao, Lan Huang, Yan Wang, Kai He, Xueteng Cui, Yao Wang, Qin Ma, and Juan Cui
A study of the generalizability of self-supervised representations , Atharva Tendle and Mohammad Rashedul Hasan
PhenoImage : An open-source graphical user interface for plant image analysis , Feiyu Zhu, Manny Saluja, Jaspinder Singh, Puneet Paul, Scott E. Sattler, Paul Staswick, Harkamal Walia, and Hongfeng Yu
SYSTEMSANDMETHODSFORREDUCING THE ACTUATION VOLTAGE FOR ELECTROSTATIC MEMS DEVICES , Fadi M. Alsaleem and Mohammad H. Hasan
Comparative evaluation of machine learning models for groundwater quality assessment , Shine Bedi, Ashok Samal, Chittaranjan Ray, and Daniel D. Snow
Validating a CS Attitudes Instrument , Ryan Bockmon, Stephen Cooper, Jonathan Gratch, and Mohsen Dorodchi
A CS1 Spatial Skills Intervention and the Impact on Introductory Programming Abilities , Ryan Bockmon, Stephen Cooper, William Koperski, Jonathan Gratch, Sheryl Sorby, and Mohsen Dorodchi
Elucidation of molecular links between obesity and cancer through microRNA regulation , Haluk Dogan, Jiang Shu, Zeynep M. Hakguder, Zheng Xu, and Juan Cui
Variability in the Effectiveness of Psychological Interventions based on Machine Learning in STEM Education , Mohammad Hasan and Bilal Khan
Resource Allocation and QoS Guarantees for Real World IP Traffic in Integrated XG-PON and IEEE802.11e EDCA Networks , Ravneet Kaur, Akshita Gupta, Anand Srivastava, Bijoy Chand Chatterjee, Abhijit Mitra, Byrav Ramamurthy, and Vivek Ashok Bohara
Global Technology Economic Analysis Paradigm , Iwasan D. Kejawa Ed.D
THE EFFECTS OF COMPUTER AND INFORMATION TECHNOLOGY ON EDUCATION , Iwasan D. Kejawa Ed.D
Development and Validation of the Computational Thinking Concepts and Skills Test , Markeya S. Peteranetz, Patrick M. Morrow, and Leen-Kiat Soh
A Multi-level Analysis of the Relationship between Instructional Practices and Retention in Computer Science , Markeya S. Peteranetz and Leen-Kiat Soh
ELECTROMAGNETIC POWER CONVERTER , Wei Qiao, Liyan Qu, and Haosen Wang
Estimating the maximum rise in temperature according to climate models using abstract interpretation , Peter Revesz and Robert J. Woodward
Paired Trial Classification: A Novel Deep Learning Technique for MVPA , Jacob M. Williams; Ashok Samal; Prahalada K. Rao; and Matthew R, Johnson
Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic , Guolong Zheng, Hamid Bagheri, Gregg Rothermel, and Jianghao Wang
Microbiome-Gut-Brain Axis as a Biomolecular Communication Network for the Internet of Bio-NanoThings , Ian F. Akyildiz, Jiande Chen, Maysam Ghovanloo, Ulkuhan Guler, Tevhide Ozkaya-Ahmadov, Massimiliano Pierobon, A Faith Sarioglu, and Bige D. Unluturk
Advanced Search
Search Help
- Notify me via email or RSS
- Administrator Resources
- How to Cite Items From This Repository
- Copyright Information
- Collections
- Disciplines
Author Corner
- Guide to Submitting
- Submit your paper or article
- Computer Science Website
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Journal of Computer Science and Technology
- Sponsored by the Institute of Computing Technology (ICT), Chinese Academy of Sciences (CAS), and China Computer Federation (CCF).
- Jointly published by ICT, CAS and Springer on a bimonthly basis in English.
- Coverage includes a wide range of topics from computer architecture to artificial intelligence and pattern recognition.
- Promotes insight and understanding of the state of the art, and trends in technology.
- Publishes original research, innovative applications, and surveys/reviews from around the world.
Latest issue
Volume 39, Issue 1
February 3, 2024
Latest articles
A transfer function design for medical volume data using a knowledge database based on deep image and primitive intensity profile features retrieval.
- Younhyun Jung
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network
- Shi-Yao Cui
- Jin-Qiao Shi
Minimal Context-Switching Data Race Detection with Dataflow Tracking
Smec: scene mining for e-commerce, identity-preserving adversarial training for robust network embedding.
- Ke-Ting Cen
- Hua-Wei Shen
- Xue-Qi Cheng
Journal updates
Acknowledgement to reviewers.
We do appreciate all the efforts and contributions of the reviewers done for Journal of Computer Science and Technology (JCST). Their professional comments make a huge improvement for the JCST papers. We want to take this opportunity to give our great thanks to them.
Journal information
- ACM Digital Library
- Chinese Science Citation Database
- EI Compendex
- Google Scholar
- OCLC WorldCat Discovery Service
- Science Citation Index Expanded (SCIE)
- TD Net Discovery Service
- UGC-CARE List (India)
Rights and permissions
Editorial policies
© Institute of Computing Technology, Chinese Academy of Sciences
- Find a journal
- Publish with us
- Track your research
- Search by keyword
- Search by citation
Page 1 of 2
Metric-centered and technology-independent architectural views for software comprehension
The maintenance of applications is a crucial activity in the software industry. The high cost of this process is due to the effort invested on software comprehension since, in most of cases, there is no up-to-...
- View Full Text
Back to the future: origins and directions of the “Agile Manifesto” – views of the originators
In 2001, seventeen professionals set up the manifesto for agile software development. They wanted to define values and basic principles for better software development. On top of being brought into focus, the ...
Investigating the effectiveness of peer code review in distributed software development based on objective and subjective data
Code review is a potential means of improving software quality. To be effective, it depends on different factors, and many have been investigated in the literature to identify the scenarios in which it adds qu...
On the benefits and challenges of using kanban in software engineering: a structured synthesis study
Kanban is increasingly being used in diverse software organizations. There is extensive research regarding its benefits and challenges in Software Engineering, reported in both primary and secondary studies. H...
Challenges on applying genetic improvement in JavaScript using a high-performance computer
Genetic Improvement is an area of Search Based Software Engineering that aims to apply evolutionary computing operators to the software source code to improve it according to one or more quality metrics. This ...
Actor’s social complexity: a proposal for managing the iStar model
Complex systems are inherent to modern society, in which individuals, organizations, and computational elements relate with each other to achieve a predefined purpose, which transcends individual goals. In thi...
Investigating measures for applying statistical process control in software organizations
The growing interest in improving software processes has led organizations to aim for high maturity, where statistical process control (SPC) is required. SPC makes it possible to analyze process behavior, pred...
An approach for applying Test-Driven Development (TDD) in the development of randomized algorithms
TDD is a technique traditionally applied in applications with deterministic algorithms, in which the input and the expected result are known. However, the application of TDD with randomized algorithms have bee...
Supporting governance of mobile application developers from mining and analyzing technical questions in stack overflow
There is a need to improve the direct communication between large organizations that maintain mobile platforms (e.g. Apple, Google, and Microsoft) and third-party developers to solve technical questions that e...
Working software over comprehensive documentation – Rationales of agile teams for artefacts usage
Agile software development (ASD) promotes working software over comprehensive documentation. Still, recent research has shown agile teams to use quite a number of artefacts. Whereas some artefacts may be adopt...
Development as a journey: factors supporting the adoption and use of software frameworks
From the point of view of the software framework owner, attracting new and supporting existing application developers is crucial for the long-term success of the framework. This mixed-methods study explores th...
Applying user-centered techniques to analyze and design a mobile application
Techniques that help in understanding and designing user needs are increasingly being used in Software Engineering to improve the acceptance of applications. Among these techniques we can cite personas, scenar...
A measurement model to analyze the effect of agile enterprise architecture on geographically distributed agile development
Efficient and effective communication (active communication) among stakeholders is thought to be central to agile development. However, in geographically distributed agile development (GDAD) environments, it c...
A survey of search-based refactoring for software maintenance
This survey reviews published materials related to the specific area of Search-Based Software Engineering that concerns software maintenance and, in particular, refactoring. The survey aims to give a comprehen...
Guest editorial foreword for the special issue on automated software testing: trends and evidence
Similarity testing for role-based access control systems.
Access control systems demand rigorous verification and validation approaches, otherwise, they can end up with security breaches. Finite state machines based testing has been successfully applied to RBAC syste...
An algorithm for combinatorial interaction testing: definitions and rigorous evaluations
Combinatorial Interaction Testing (CIT) approaches have drawn attention of the software testing community to generate sets of smaller, efficient, and effective test cases where they have been successful in det...
How diverse is your team? Investigating gender and nationality diversity in GitHub teams
Building an effective team of developers is a complex task faced by both software companies and open source communities. The problem of forming a “dream”
Investigating factors that affect the human perception on god class detection: an analysis based on a family of four controlled experiments
Evaluation of design problems in object oriented systems, which we call code smells, is mostly a human-based task. Several studies have investigated the impact of code smells in practice. Studies focusing on h...
On the evaluation of code smells and detection tools
Code smells refer to any symptom in the source code of a program that possibly indicates a deeper problem, hindering software maintenance and evolution. Detection of code smells is challenging for developers a...
On the influence of program constructs on bug localization effectiveness
Software projects often reach hundreds or thousands of files. Therefore, manually searching for code elements that should be changed to fix a failure is a difficult task. Static bug localization techniques pro...
DyeVC: an approach for monitoring and visualizing distributed repositories
Software development using distributed version control systems has become more frequent recently. Such systems bring more flexibility, but also greater complexity to manage and monitor multiple existing reposi...
A genetic algorithm based framework for software effort prediction
Several prediction models have been proposed in the literature using different techniques obtaining different results in different contexts. The need for accurate effort predictions for projects is one of the ...
Elaboration of software requirements documents by means of patterns instantiation
Studies show that problems associated with the requirements specifications are widely recognized for affecting software quality and impacting effectiveness of its development process. The reuse of knowledge ob...
ArchReco: a software tool to assist software design based on context aware recommendations of design patterns
This work describes the design, development and evaluation of a software Prototype, named ArchReco, an educational tool that employs two types of Context-aware Recommendations of Design Patterns, to support us...
On multi-language software development, cross-language links and accompanying tools: a survey of professional software developers
Non-trivial software systems are written using multiple (programming) languages, which are connected by cross-language links. The existence of such links may lead to various problems during software developmen...
SoftCoDeR approach: promoting Software Engineering Academia-Industry partnership using CMD, DSR and ESE
The Academia-Industry partnership has been increasingly encouraged in the software development field. The main focus of the initiatives is driven by the collaborative work where the scientific research work me...
Issues on developing interoperable cloud applications: definitions, concepts, approaches, requirements, characteristics and evaluation models
Among research opportunities in software engineering for cloud computing model, interoperability stands out. We found that the dynamic nature of cloud technologies and the battle for market domination make clo...
Game development software engineering process life cycle: a systematic review
Software game is a kind of application that is used not only for entertainment, but also for serious purposes that can be applicable to different domains such as education, business, and health care. Multidisc...
Correlating automatic static analysis and mutation testing: towards incremental strategies
Traditionally, mutation testing is used as test set generation and/or test evaluation criteria once it is considered a good fault model. This paper uses mutation testing for evaluating an automated static anal...
A multi-objective test data generation approach for mutation testing of feature models
Mutation approaches have been recently applied for feature testing of Software Product Lines (SPLs). The idea is to select products, associated to mutation operators that describe possible faults in the Featur...
An extended global software engineering taxonomy
In Global Software Engineering (GSE), the need for a common terminology and knowledge classification has been identified to facilitate the sharing and combination of knowledge by GSE researchers and practition...
A systematic process for obtaining the behavior of context-sensitive systems
Context-sensitive systems use contextual information in order to adapt to the user’s current needs or requirements failure. Therefore, they need to dynamically adapt their behavior. It is of paramount importan...
Distinguishing extended finite state machine configurations using predicate abstraction
Extended Finite State Machines (EFSMs) provide a powerful model for the derivation of functional tests for software systems and protocols. Many EFSM based testing problems, such as mutation testing, fault diag...
Extending statecharts to model system interactions
Statecharts are diagrams comprised of visual elements that can improve the modeling of reactive system behaviors. They extend conventional state diagrams with the notions of hierarchy, concurrency and communic...
On the relationship of code-anomaly agglomerations and architectural problems
Several projects have been discontinued in the history of the software industry due to the presence of software architecture problems. The identification of such problems in source code is often required in re...
An approach based on feature models and quality criteria for adapting component-based systems
Feature modeling has been widely used in domain engineering for the development and configuration of software product lines. A feature model represents the set of possible products or configurations to apply i...
Patch rejection in Firefox: negative reviews, backouts, and issue reopening
Writing patches to fix bugs or implement new features is an important software development task, as it contributes to raise the quality of a software system. Not all patches are accepted in the first attempt, ...
Investigating probabilistic sampling approaches for large-scale surveys in software engineering
Establishing representative samples for Software Engineering surveys is still considered a challenge. Specialized literature often presents limitations on interpreting surveys’ results, mainly due to the use o...
Characterising the state of the practice in software testing through a TMMi-based process
The software testing phase, despite its importance, is usually compromised by the lack of planning and resources in industry. This can risk the quality of the derived products. The identification of mandatory ...
Self-adaptation by coordination-targeted reconfigurations
A software system is self-adaptive when it is able to dynamically and autonomously respond to changes detected either in its internal components or in its deployment environment. This response is expected to ensu...
Templates for textual use cases of software product lines: results from a systematic mapping study and a controlled experiment
Use case templates can be used to describe functional requirements of a Software Product Line. However, to the best of our knowledge, no efforts have been made to collect and summarize these existing templates...
F3T: a tool to support the F3 approach on the development and reuse of frameworks
Frameworks are used to enhance the quality of applications and the productivity of the development process, since applications may be designed and implemented by reusing framework classes. However, frameworks ...
NextBug: a Bugzilla extension for recommending similar bugs
Due to the characteristics of the maintenance process followed in open source systems, developers are usually overwhelmed with a great amount of bugs. For instance, in 2012, approximately 7,600 bugs/month were...
Assessing the benefits of search-based approaches when designing self-adaptive systems: a controlled experiment
The well-orchestrated use of distilled experience, domain-specific knowledge, and well-informed trade-off decisions is imperative if we are to design effective architectures for complex software-intensive syst...
Revealing influence of model structure and test case profile on the prioritization of test cases in the context of model-based testing
Test case prioritization techniques aim at defining an order of test cases that favor the achievement of a goal during test execution, such as revealing failures as earlier as possible. A number of techniques ...
A metrics suite for JUnit test code: a multiple case study on open source software
The code of JUnit test cases is commonly used to characterize software testing effort. Different metrics have been proposed in literature to measure various perspectives of the size of JUnit test cases. Unfort...
Designing fault-tolerant SOA based on design diversity
Over recent years, software developers have been evaluating the benefits of both Service-Oriented Architecture (SOA) and software fault tolerance techniques based on design diversity. This is achieved by creat...
Method-level code clone detection through LWH (Light Weight Hybrid) approach
Many researchers have investigated different techniques to automatically detect duplicate code in programs exceeding thousand lines of code. These techniques have limitations in finding either the structural o...
The problem of conceptualization in god class detection: agreement, strategies and decision drivers
The concept of code smells is widespread in Software Engineering. Despite the empirical studies addressing the topic, the set of context-dependent issues that impacts the human perception of what is a code sme...
- Editorial Board
- Sign up for article alerts and news from this journal
ScholarWorks@UMass Amherst
Home > Engineering > ECE > Electrical & Computer Engineering Masters Theses Collection
Electrical & Computer Engineering Masters Theses Collection
Theses from 2024 2024.
Extracting DNN Architectures Via Runtime Profiling On Mobile GPUs , Dong Hyub Kim, Electrical & Computer Engineering
Semantic-Aware Blockchain Architecture Design for Lifelong Edge-enabled Metaverse , Ning Wang, Electrical & Computer Engineering
Blockchain Design for a Secure Pharmaceutical Supply Chain , Zhe Xu, Electrical & Computer Engineering
Collaborative Caching and Computation Offloading for Intelligent Transportation Systems enabled by Satellite-Airborne-Terrestrial Networks , Shulun Yang, Electrical & Computer Engineering
Protecting Return Address Integrity for RISC-V via Pointer Authentication , yuhe zhao, Electrical & Computer Engineering
Theses from 2023 2023
Fingerprinting for Chiplet Architectures Using Power Distribution Network Transients , Matthew G. Burke, Electrical & Computer Engineering
Design and Fabrication of a Trapped Ion Quantum Computing Testbed , Christopher A. Caron, Electrical & Computer Engineering
Analog Cancellation of a Known Remote Interference: Hardware Realization and Analysis , James M. Doty, Electrical & Computer Engineering
Electrothermal Properties of 2D Materials in Device Applications , Samantha L. Klein, Electrical & Computer Engineering
Ablation Study on Deeplabv3+ for Semantic Segmentation , Bowen Lei, Electrical & Computer Engineering
A Composability-Based Transformer Pruning Framework , Yuping Lin, Electrical & Computer Engineering
A Model Extraction Attack on Deep Neural Networks Running on GPUs , Jonah G. O'Brien Weiss, Electrical & Computer Engineering
Heterogeneous IoT Network Architecture Design for Age of Information Minimization , Xiaohao Xia, Electrical & Computer Engineering
Theses from 2022 2022
Theory and Analysis of Backprojection Processing for Interferometric SAR , Marc Closa Tarres, Electrical & Computer Engineering
Unpaired Skeleton-to-Photo Translation for Sketch-to-Photo Synthesis , Yuanzhe Gu, Electrical & Computer Engineering
Integration of Digital Signal Processing Block in SymbiFlow FPGA Toolchain for Artix-7 Devices , Andrew T. Hartnett, Electrical & Computer Engineering
Planar Ultra-Wideband Modular Antenna (PUMA) Arrays for High-Volume Manufacturing on Organic Laminates and BGA Interfaces , James R. LaCroix, Electrical & Computer Engineering
Planar Transmission-Line Metamaterials on an Irregular Grid , Tina E. Maurer, Electrical & Computer Engineering
Formally Verifiable Synthesis Flow In FPGAs , Anurag V. Muttur, Electrical & Computer Engineering
Theses from 2021 2021
Graph-Algorithm Based Verification on Network Configuration Robustness , Zibin Chen, Electrical & Computer Engineering
A Cloud Infrastructure for Large Scale Health Monitoring in Older Adult Care Facilities , Uchechukwu Gabriel David, Electrical & Computer Engineering
Internet Infrastructures for Large Scale Emulation with Efficient HW/SW Co-design , Aiden K. Gula, Electrical & Computer Engineering
Mtemp: An Ambient Temperature Estimation Method Using Acoustic Signal on Mobile Devices , Hao Guo, Electrical & Computer Engineering
BENCHMARKING SMALL-DATASET STRUCTURE-ACTIVITY-RELATIONSHIP MODELS FOR PREDICTION OF WNT SIGNALING INHIBITION , Mahtab Kokabi, Electrical & Computer Engineering
ACTION : Adaptive Cache Block Migration in Distributed Cache Architectures , Chandra Sekhar Mummidi, Electrical & Computer Engineering
Modeling and Characterization of Optical Metasurfaces , Mahsa Torfeh, Electrical & Computer Engineering
TickNet: A Lightweight Deep Classifier for Tick Recognition , Li Wang, Electrical & Computer Engineering
Lecture Video Transformation through An Intelligent Analysis and Post-processing System , Xi Wang, Electrical & Computer Engineering
Correcting For Terrain Interference, Attenuation, and System Bias for a Dual Polarimetric, X-Band Radar , Casey Wolsieffer, Electrical & Computer Engineering
Theses from 2020 2020
Numerical Simulation of Thermoelectric Transport in Bulk and Nanostructured SiSn Alloys , Venkatakrishna Dusetty, Electrical & Computer Engineering
Deep Reinforcement Learning For Distributed Fog Network Probing , Xiaoding Guan, Electrical & Computer Engineering
COMPRESSIVE PARAMETER ESTIMATION VIA APPROXIMATE MESSAGE PASSING , Shermin Hamzehei, Electrical & Computer Engineering
Metric Learning via Linear Embeddings for Human Motion Recognition , ByoungDoo Kong, Electrical & Computer Engineering
Compound Effects of Clock and Voltage Based Power Side-Channel Countermeasures , Jacqueline Lagasse, Electrical & Computer Engineering
Network Virtualization and Emulation using Docker, OpenvSwitch and Mininet-based Link Emulation , Narendra Prabhu, Electrical & Computer Engineering
Thermal Transport Modeling Of Semiconductor Materials From First Principles , Aliya Qureshi, Electrical & Computer Engineering
CROSSTALK BASED SIDE CHANNEL ATTACKS IN FPGAs , Chethan Ramesh, Electrical & Computer Engineering
Accelerating RSA Public Key Cryptography via Hardware Acceleration , Pavithra Ramesh, Electrical & Computer Engineering
Real-Time TDDFT-Based Filtered Spectroscopy , Ivan Williams, Electrical & Computer Engineering
Perception System: Object and Landmark Detection for Visually Impaired Users , Chenguang Zhang, Electrical & Computer Engineering
Theses from 2019 2019
An Empirical Analysis of Network Traffic: Device Profiling and Classification , Mythili Vishalini Anbazhagan, Electrical & Computer Engineering
Pre-Travel Training And Real-Time Guidance System For People With Disabilities In Indoor Environments , Binru Cao, Electrical & Computer Engineering
Energy Efficiency of Computation in All-spin Logic: Projections and Fundamental Limits , Zongya Chen, Electrical & Computer Engineering
Improving Resilience of Communication in Information Dissemination for Time-Critical Applications , Rajvardhan Somraj Deshmukh, Electrical & Computer Engineering
InSAR Simulations for SWOT and Dual Frequency Processing for Topographic Measurements , Gerard Masalias Huguet, Electrical & Computer Engineering
A Study on Controlling Power Supply Ramp-Up Time in SRAM PUFs , Harshavardhan Ramanna, Electrical & Computer Engineering
The UMass Experimental X-Band Radar (UMAXX): An Upgrade of the CASA MA-1 to Support Cross-Polarization Measurements , Jezabel Vilardell Sanchez, Electrical & Computer Engineering
A Video-Based System for Emergency Preparedness and Recovery , Juechen Yin, Electrical & Computer Engineering
Theses from 2018 2018
Phonon Transport at Boundaries and Interfaces in Two-Dimensional Materials , Cameron Foss, Electrical & Computer Engineering
SkinnySensor: Enabling Battery-Less Wearable Sensors Via Intrabody Power Transfer , Neev Kiran, Electrical & Computer Engineering
Immersive Pre-travel Training Application for Seniors and People with Disabilities , Yang Li, Electrical & Computer Engineering
Analog Computing using 1T1R Crossbar Arrays , Yunning Li, Electrical & Computer Engineering
On-Chip Communication and Security in FPGAs , Shivukumar Basanagouda Patil, Electrical & Computer Engineering
CROWDSOURCING BASED MICRO NAVIGATION SYSTEM FOR VISUALLY IMPAIRED , Quan Shi, Electrical & Computer Engineering
AN EVALUATION OF SDN AND NFV SUPPORT FOR PARALLEL, ALTERNATIVE PROTOCOL STACK OPERATIONS IN FUTURE INTERNETS , Bhushan Suresh, Electrical & Computer Engineering
Applications Of Physical Unclonable Functions on ASICS and FPGAs , Mohammad Usmani, Electrical & Computer Engineering
Improvements to the UMASS S-Band FM-CW Vertical Wind Profiling Radar: System Performance and Data Analysis. , Joseph Waldinger, Electrical & Computer Engineering
Theses from 2017 2017
AutoPlug: An Automated Metadata Service for Smart Outlets , Lurdh Pradeep Reddy Ambati, Electrical & Computer Engineering
SkyNet: Memristor-based 3D IC for Artificial Neural Networks , Sachin Bhat, Electrical & Computer Engineering
Navigation Instruction Validation Tool and Indoor Wayfinding Training System for People with Disabilities , Linlin Ding, Electrical & Computer Engineering
Energy Efficient Loop Unrolling for Low-Cost FPGAs , Naveen Kumar Dumpala, Electrical & Computer Engineering
Effective Denial of Service Attack on Congestion Aware Adaptive Network on Chip , Vijaya Deepak Kadirvel, Electrical & Computer Engineering
VIRTUALIZATION OF CLOSED-LOOP SENSOR NETWORKS , Priyanka Dattatri Kedalagudde, Electrical & Computer Engineering
The Impact of Quantum Size Effects on Thermoelectric Performance in Semiconductor Nanostructures , Adithya Kommini, Electrical & Computer Engineering
MAGNETO-ELECTRIC APPROXIMATE COMPUTATIONAL FRAMEWORK FOR BAYESIAN INFERENCE , Sourabh Kulkarni, Electrical & Computer Engineering
Time Domain SAR Processing with GPUs for Airborne Platforms , Dustin Lagoy, Electrical & Computer Engineering
Query on Knowledge Graphs with Hierarchical Relationships , Kaihua Liu, Electrical & Computer Engineering
HIGH PERFORMANCE SILVER DIFFUSIVE MEMRISTORS FOR FUTURE COMPUTING , Rivu Midya, Electrical & Computer Engineering
Achieving Perfect Location Privacy in Wireless Devices Using Anonymization , Zarrin Montazeri, Electrical & Computer Engineering
KaSI: a Ka-band and S-band Cross-track Interferometer , Gerard Ruiz Carregal, Electrical & Computer Engineering
Analyzing Spark Performance on Spot Instances , Jiannan Tian, Electrical & Computer Engineering
Indoor Navigation For The Blind And Visually Impaired: Validation And Training Methodology Using Virtual Reality , Sili Wang, Electrical & Computer Engineering
Efficient Scaling of a Web Proxy Cluster , Hao Zhang, Electrical & Computer Engineering
ORACLE GUIDED INCREMENTAL SAT SOLVING TO REVERSE ENGINEER CAMOUFLAGED CIRCUITS , Xiangyu Zhang, Electrical & Computer Engineering
Theses from 2016 2016
Seamless Application Delivery Using Software Defined Exchanges , Divyashri Bhat, Electrical & Computer Engineering
PROCESSOR TEMPERATURE AND RELIABILITY ESTIMATION USING ACTIVITY COUNTERS , Mayank Chhablani, Electrical & Computer Engineering
PARQ: A MEMORY-EFFICIENT APPROACH FOR QUERY-LEVEL PARALLELISM , Qianqian Gao, Electrical & Computer Engineering
Accelerated Iterative Algorithms with Asynchronous Accumulative Updates on a Heterogeneous Cluster , Sandesh Gubbi Virupaksha, Electrical & Computer Engineering
Improving Efficiency of Thermoelectric Devices Made of Si-Ge, Si-Sn, Ge-Sn, and Si-Ge-Sn Binary and Ternary Alloys , Seyedeh Nazanin Khatami, Electrical & Computer Engineering
6:1 PUMA Arrays: Designs and Finite Array Effects , Michael Lee, Electrical & Computer Engineering
Protecting Controllers against Denial-of-Service Attacks in Software-Defined Networks , Jingrui Li, Electrical & Computer Engineering
INFRASTRUCTURE-FREE SECURE PAIRING OF MOBILE DEVICES , Chunqiu Liu, Electrical & Computer Engineering
Extrinsic Effects on Heat and Electron Transport In Two-Dimensional Van-Der Waals Materials- A Boltzmann Transport Study , Arnab K. Majee, Electrical & Computer Engineering
SpotLight: An Information Service for the Cloud , Xue Ouyang, Electrical & Computer Engineering
Localization, Visualization And Evacuation Guidance System In Emergency Situations , Jingyan Tang, Electrical & Computer Engineering
Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems , Shrikant S. Vyas, Electrical & Computer Engineering
EVALUATING FEATURES FOR BROAD SPECIES BASED CLASSIFICATION OF BIRD OBSERVATIONS USING DUAL-POLARIZED DOPPLER WEATHER RADAR , Sheila Werth, Electrical & Computer Engineering
Theses from 2015 2015
Quality Factor of Horizontal Wire Dipole Antennas near Planar Conductor or Dielectric Interface , Adebayo Gabriel Adeyemi, Electrical & Computer Engineering
Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents , Shuai Chen, Electrical & Computer Engineering
Design and Implementation of a High Performance Network Processor with Dynamic Workload Management , Padmaja Duggisetty, Electrical & Computer Engineering
Wavelet-Based Non-Homogeneous Hidden Markov Chain Model For Hyperspectral Signature Classification , Siwei Feng, Electrical & Computer Engineering
DEVELOPMENT OF INFRARED AND TERAHERTZ BOLOMETERS BASED ON PALLADIUM AND CARBON NANOTUBES USING ROLL TO ROLL PROCESS , Amulya Gullapalli, Electrical & Computer Engineering
Development of Prototypes of a Portable Road Weather Information System , Meha Kainth, Electrical & Computer Engineering
ADACORE: Achieving Energy Efficiency via Adaptive Core Morphing at Runtime , Nithesh Kurella, Electrical & Computer Engineering
Architecting SkyBridge-CMOS , Mingyu Li, Electrical & Computer Engineering
Function Verification of Combinational Arithmetic Circuits , Duo Liu, Electrical & Computer Engineering
ENERGY EFFICIENCY EXPLORATION OF COARSE-GRAIN RECONFIGURABLE ARCHITECTURE WITH EMERGING NONVOLATILE MEMORY , Xiaobin Liu, Electrical & Computer Engineering
Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering , Shweta Malik, Electrical & Computer Engineering
Energy Agile Cluster Communication , Muhammad Zain Mustafa, Electrical & Computer Engineering
Architecting NP-Dynamic Skybridge , Jiajun Shi, Electrical & Computer Engineering
Advanced Search
- Notify me via email or RSS
- Collections
- Disciplines
Author Corner
- Login for Faculty Authors
- Faculty Author Gallery
- Expert Gallery
- University Libraries
- Electrical and Computer Engineering Website
- UMass Amherst
This page is sponsored by the University Libraries.
© 2009 University of Massachusetts Amherst • Site Policies
Privacy Copyright
computer science Recently Published Documents
Total documents.
- Latest Documents
- Most Cited Documents
- Contributed Authors
- Related Sources
- Related Keywords
Hiring CS Graduates: What We Learned from Employers
Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer science-specific hiring processes. However, the hiring process for CS majors may be different. It is critical to have up-to-date information on questions such as “what positions are in high demand for CS majors?,” “what is a typical hiring process?,” and “what do employers say they look for when hiring CS graduates?” This article discusses the analysis of a survey of 218 recruiters hiring CS graduates in the United States. We used Atlas.ti to analyze qualitative survey data and report the results on what positions are in the highest demand, the hiring process, and the resume review process. Our study revealed that a software developer was the most common job the recruiters were looking to fill. We found that the hiring process steps for CS graduates are generally aligned with traditional hiring steps, with an additional emphasis on technical and coding tests. Recruiters reported that their hiring choices were based on reviewing resume’s experience, GPA, and projects sections. The results provide insights into the hiring process, decision making, resume analysis, and some discrepancies between current undergraduate CS program outcomes and employers’ expectations.
A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature
Context. Computing Education Research (CER) is critical to help the computing education community and policy makers support the increasing population of students who need to learn computing skills for future careers. For a community to systematically advance knowledge about a topic, the members must be able to understand published work thoroughly enough to perform replications, conduct meta-analyses, and build theories. There is a need to understand whether published research allows the CER community to systematically advance knowledge and build theories. Objectives. The goal of this study is to characterize the reporting of empiricism in Computing Education Research literature by identifying whether publications include content necessary for researchers to perform replications, meta-analyses, and theory building. We answer three research questions related to this goal: (RQ1) What percentage of papers in CER venues have some form of empirical evaluation? (RQ2) Of the papers that have empirical evaluation, what are the characteristics of the empirical evaluation? (RQ3) Of the papers that have empirical evaluation, do they follow norms (both for inclusion and for labeling of information needed for replication, meta-analysis, and, eventually, theory-building) for reporting empirical work? Methods. We conducted a systematic literature review of the 2014 and 2015 proceedings or issues of five CER venues: Technical Symposium on Computer Science Education (SIGCSE TS), International Symposium on Computing Education Research (ICER), Conference on Innovation and Technology in Computer Science Education (ITiCSE), ACM Transactions on Computing Education (TOCE), and Computer Science Education (CSE). We developed and applied the CER Empiricism Assessment Rubric to the 427 papers accepted and published at these venues over 2014 and 2015. Two people evaluated each paper using the Base Rubric for characterizing the paper. An individual person applied the other rubrics to characterize the norms of reporting, as appropriate for the paper type. Any discrepancies or questions were discussed between multiple reviewers to resolve. Results. We found that over 80% of papers accepted across all five venues had some form of empirical evaluation. Quantitative evaluation methods were the most frequently reported. Papers most frequently reported results on interventions around pedagogical techniques, curriculum, community, or tools. There was a split in papers that had some type of comparison between an intervention and some other dataset or baseline. Most papers reported related work, following the expectations for doing so in the SIGCSE and CER community. However, many papers were lacking properly reported research objectives, goals, research questions, or hypotheses; description of participants; study design; data collection; and threats to validity. These results align with prior surveys of the CER literature. Conclusions. CER authors are contributing empirical results to the literature; however, not all norms for reporting are met. We encourage authors to provide clear, labeled details about their work so readers can use the study methodologies and results for replications and meta-analyses. As our community grows, our reporting of CER should mature to help establish computing education theory to support the next generation of computing learners.
Light Diacritic Restoration to Disambiguate Homographs in Modern Arabic Texts
Diacritic restoration (also known as diacritization or vowelization) is the process of inserting the correct diacritical markings into a text. Modern Arabic is typically written without diacritics, e.g., newspapers. This lack of diacritical markings often causes ambiguity, and though natives are adept at resolving, there are times they may fail. Diacritic restoration is a classical problem in computer science. Still, as most of the works tackle the full (heavy) diacritization of text, we, however, are interested in diacritizing the text using a fewer number of diacritics. Studies have shown that a fully diacritized text is visually displeasing and slows down the reading. This article proposes a system to diacritize homographs using the least number of diacritics, thus the name “light.” There is a large class of words that fall under the homograph category, and we will be dealing with the class of words that share the spelling but not the meaning. With fewer diacritics, we do not expect any effect on reading speed, while eye strain is reduced. The system contains morphological analyzer and context similarities. The morphological analyzer is used to generate all word candidates for diacritics. Then, through a statistical approach and context similarities, we resolve the homographs. Experimentally, the system shows very promising results, and our best accuracy is 85.6%.
A genre-based analysis of questions and comments in Q&A sessions after conference paper presentations in computer science
Gender diversity in computer science at a large public r1 research university: reporting on a self-study.
With the number of jobs in computer occupations on the rise, there is a greater need for computer science (CS) graduates than ever. At the same time, most CS departments across the country are only seeing 25–30% of women students in their classes, meaning that we are failing to draw interest from a large portion of the population. In this work, we explore the gender gap in CS at Rutgers University–New Brunswick, a large public R1 research university, using three data sets that span thousands of students across six academic years. Specifically, we combine these data sets to study the gender gaps in four core CS courses and explore the correlation of several factors with retention and the impact of these factors on changes to the gender gap as students proceed through the CS courses toward completing the CS major. For example, we find that a significant percentage of women students taking the introductory CS1 course for majors do not intend to major in CS, which may be a contributing factor to a large increase in the gender gap immediately after CS1. This finding implies that part of the retention task is attracting these women students to further explore the major. Results from our study include both novel findings and findings that are consistent with known challenges for increasing gender diversity in CS. In both cases, we provide extensive quantitative data in support of the findings.
Designing for Student-Directedness: How K–12 Teachers Utilize Peers to Support Projects
Student-directed projects—projects in which students have individual control over what they create and how to create it—are a promising practice for supporting the development of conceptual understanding and personal interest in K–12 computer science classrooms. In this article, we explore a central (and perhaps counterintuitive) design principle identified by a group of K–12 computer science teachers who support student-directed projects in their classrooms: in order for students to develop their own ideas and determine how to pursue them, students must have opportunities to engage with other students’ work. In this qualitative study, we investigated the instructional practices of 25 K–12 teachers using a series of in-depth, semi-structured interviews to develop understandings of how they used peer work to support student-directed projects in their classrooms. Teachers described supporting their students in navigating three stages of project development: generating ideas, pursuing ideas, and presenting ideas. For each of these three stages, teachers considered multiple factors to encourage engagement with peer work in their classrooms, including the quality and completeness of shared work and the modes of interaction with the work. We discuss how this pedagogical approach offers students new relationships to their own learning, to their peers, and to their teachers and communicates important messages to students about their own competence and agency, potentially contributing to aims within computer science for broadening participation.
Creativity in CS1: A Literature Review
Computer science is a fast-growing field in today’s digitized age, and working in this industry often requires creativity and innovative thought. An issue within computer science education, however, is that large introductory programming courses often involve little opportunity for creative thinking within coursework. The undergraduate introductory programming course (CS1) is notorious for its poor student performance and retention rates across multiple institutions. Integrating opportunities for creative thinking may help combat this issue by adding a personal touch to course content, which could allow beginner CS students to better relate to the abstract world of programming. Research on the role of creativity in computer science education (CSE) is an interesting area with a lot of room for exploration due to the complexity of the phenomenon of creativity as well as the CSE research field being fairly new compared to some other education fields where this topic has been more closely explored. To contribute to this area of research, this article provides a literature review exploring the concept of creativity as relevant to computer science education and CS1 in particular. Based on the review of the literature, we conclude creativity is an essential component to computer science, and the type of creativity that computer science requires is in fact, a teachable skill through the use of various tools and strategies. These strategies include the integration of open-ended assignments, large collaborative projects, learning by teaching, multimedia projects, small creative computational exercises, game development projects, digitally produced art, robotics, digital story-telling, music manipulation, and project-based learning. Research on each of these strategies and their effects on student experiences within CS1 is discussed in this review. Last, six main components of creativity-enhancing activities are identified based on the studies about incorporating creativity into CS1. These components are as follows: Collaboration, Relevance, Autonomy, Ownership, Hands-On Learning, and Visual Feedback. The purpose of this article is to contribute to computer science educators’ understanding of how creativity is best understood in the context of computer science education and explore practical applications of creativity theory in CS1 classrooms. This is an important collection of information for restructuring aspects of future introductory programming courses in creative, innovative ways that benefit student learning.
CATS: Customizable Abstractive Topic-based Summarization
Neural sequence-to-sequence models are the state-of-the-art approach used in abstractive summarization of textual documents, useful for producing condensed versions of source text narratives without being restricted to using only words from the original text. Despite the advances in abstractive summarization, custom generation of summaries (e.g., towards a user’s preference) remains unexplored. In this article, we present CATS, an abstractive neural summarization model that summarizes content in a sequence-to-sequence fashion while also introducing a new mechanism to control the underlying latent topic distribution of the produced summaries. We empirically illustrate the efficacy of our model in producing customized summaries and present findings that facilitate the design of such systems. We use the well-known CNN/DailyMail dataset to evaluate our model. Furthermore, we present a transfer-learning method and demonstrate the effectiveness of our approach in a low resource setting, i.e., abstractive summarization of meetings minutes, where combining the main available meetings’ transcripts datasets, AMI and International Computer Science Institute(ICSI) , results in merely a few hundred training documents.
Exploring students’ and lecturers’ views on collaboration and cooperation in computer science courses - a qualitative analysis
Factors affecting student educational choices regarding oer material in computer science, export citation format, share document.
IMAGES
VIDEO
COMMENTS
This conceptual research paper is written to discuss the implementation of the A.D.A.B model in technology -based and technical subjects such as Computer Science, Engineering, Technical and so on ...
USF Research; USF Libraries; Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations. Computer Science and Engineering Theses and Dissertations . Follow. Jump to: Theses/Dissertations from 2023 PDF. Refining the Machine Learning Pipeline for US-based Public Transit Systems, Jennifer Adorno. PDF.
PDF. Cultural Awareness Application, Bharat Gupta. PDF. PREDICTING HOSPITALIZATION USING ARTIFICIAL INTELLIGENCE, Sanath Hiremath. PDF. AUTOMATED BRAIN TUMOR CLASSIFIER WITH DEEP LEARNING, venkata sai krishna chaitanya kandula. PDF. TRUCK TRAFFIC ANALYSIS IN THE INLAND EMPIRE, Bhavik Khatri. PDF. Crash Detecting System Using Deep Learning ...
T3E-1. A Computer Engineering Technology. Body of Knowledge. Jeffrey J. Evans and Douglas W. Jacobson. [email protected], [email protected]. Abstract - Educational programs in engineering and ...
An engineering paper describes an implementation of an algorithm, or part or all of a computer system or application. Engineering papers are now frequently required to include descriptions of system evaluation. An empirical paper describes an experiment designed to test some hypothesis. All three types of paper are found in computational ...
Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or ...
This paper presents a software-aided method for assessment and trend analysis, which can be used in software engineering as well as other research fields in computer science (or other disciplines). The method proposed in this paper is modular and automated compared with the method in prior studies [7, 10-22, 2].
trends in Computer science Research. cOmPUTEr ScIEncE IS an expanding research field driven by emerging application domains and improving hardware and software that eliminate old bottlenecks even as they create new challenges and opportunities for CS research. Accordingly, the number of research papers published in CS conferences and journals ...
06 May 2024. 29 Apr 2024. Journal of Electrical and Computer Engineering publishes recent advances from the rapidly moving fields of both electrical engineering and computer engineering in the areas of circuits and systems, communications, power systems and signal processing.
Review of Computer Engineering Studies (RCES) is an international, scholarly and peer-reviewed journal dedicated to providing scientists, engineers and technicians with the latest developments on computer science.The journal offers a window into the most recent discoveries in four categories, namely, computing (computing theory, scientific computing, cloud computing, high-performance computing ...
Minitutorial. Mary Shaw. Carnegie Mellon University [email protected]. Abstract. Software engineering researchers solve problems of several different kinds. To do so, they produce several different kinds of results, and they should develop appropriate evidence to validate these results. They often report their research in conference papers.
IEEE Spectrum is an award-winning technology magazine and the flagship publication of IEEE, covering major trends and developments in technology, engineering, and science. The Institute, dedicated to IEEE members, features stories about IEEE activities, member profiles, conference information, important member dates and deadlines, IEEE election ...
This paper aims to perform a detailed scientometric and text-based analysis of Computer Science (CS) research output of the 100 most productive institutions in India and in the world.
PDF. Relative Comparison of Modern Computing to Computer Technology of Ages, Iwasan D. Kejawa Dr. and Hailly Rubio Ms. PDF. Conversion of fat to cellular fuel—Fatty acids 𝛽-oxidation model, Sylwester M. Kloska, Krzysztof Pałczyński, Tomasz Marciniak, Tomasz Talaśka, Marissa Miller, Beata J. Wysocki, Paul Davis, and Tadeusz A. Wysocki. PDF
Journal of Computer Science and Technology is an international platform publishing high quality, refereed papers in all aspects of computer science and technology. Sponsored by the Institute of Computing Technology (ICT), Chinese Academy of Sciences (CAS), and China Computer Federation (CCF). Jointly published by ICT, CAS and Springer on a ...
The journal Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and communication and information systems. The journal publishes papers featuring novel implementations of …. View full aims & scope.
They wanted to define values and basic principles for better software development. On top of being brought into focus, the ... Philipp Hohl, Jil Klünder, Arie van Bennekum, Ryan Lockard, James Gifford, Jürgen Münch, Michael Stupperich and Kurt Schneider. Journal of Software Engineering Research and Development 2018 6 :15.
Theses from 2015 PDF. Quality Factor of Horizontal Wire Dipole Antennas near Planar Conductor or Dielectric Interface, Adebayo Gabriel Adeyemi, Electrical & Computer Engineering. PDF. Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents, Shuai Chen, Electrical & Computer Engineering. PDF
Journal of Engineering Research (JER) is an international, peer reviewed journal which publishes full length original research papers, reviews and case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, etc. JER is intended to serve a wide range of educationists, scientists, specialists ...
Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer ...
Research in Computer Engineering. Norbert Frištacký, Ladislav Hudec. The paper deals with the most relevant results reached at the Department of Computer Science and. Engineering of the Faculty ...