Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers,
2022
Union College - Schenectady, NY
Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers, Nicholas O'Toole
Honors Theses
My research looks into the use of ”presets” in digital synthesizers, which alter the timbre (quality) of the synthesizer’s sound by loading in pre-selected configurations of settings. My study compares imagery- based and feelings-based preset names – for example, Cloud City Keys and Mellow lead, respectively – in an attempt to see which better predicts the sound it represents. Through my results, I will then explain how the wording of these preset names affected my subjects’ perception of certain sounds. The results I found lead me to believe that imagery-based preset names could be representative of their respective presets’ sounds.
Viability And Implementation Of A Vector Cryptography Extension For Risc-V,
2022
California Polytechnic State University, San Luis Obispo
Viability And Implementation Of A Vector Cryptography Extension For Risc-V, Jonathan W. Skelly
Master's Theses
RISC-V is an open-source instruction-set architecture (ISA) forming the basis of thousands of commercial and experimental microprocessors. The Scalar Cryptography extension ratified in December 2021 added scalar instructions that target common hashing and encryption algorithms, including SHA2 and AES. The next step forward for the RISC-V ISA in the field of cryptography and digital security is the development of vector cryptography instructions.
This thesis examines if it is viable to add vector implementations of existing RISC-V scalar cryptography instructions to the existing vector instruction format, and what improvements they can make to the execution of SHA2 and AES algorithms. Vector …
Specialized Named Entity Recognition For Breast Cancer Subtyping,
2022
California Polytechnic State University, San Luis Obispo
Specialized Named Entity Recognition For Breast Cancer Subtyping, Griffith Scheyer Hawblitzel
Master's Theses
The amount of data and analysis being published and archived in the biomedical research community is more than can feasibly be sifted through manually, which limits the information an individual or small group can synthesize and integrate into their own research. This presents an opportunity for using automated methods, including Natural Language Processing (NLP), to extract important information from text on various topics. Named Entity Recognition (NER), is one way to automate knowledge extraction of raw text. NER is defined as the task of identifying named entities from text using labels such as people, dates, locations, diseases, and proteins. There …
Cloudbots: Autonomous Atmospheric Explorers,
2022
University of Connecticut
Cloudbots: Autonomous Atmospheric Explorers, Akash Binoj
Honors Scholar Theses
The CloudBot is an autonomous weather balloon that operates on the principle of variable buoyancy to ascend and descend in the atmosphere. This project aims to develop a device that will collect atmospheric measurements and communicate them mid-flight. The apparatus consists of a helium-filled balloon, the robotic payload, and an air cell. The fixed-volume helium balloon at the top provides an upwards buoyancy force, while the air cell at the bottom can hold a variable amount of pressure to adjust the weight of the CloudBot. By doing so, it is able to travel in storm conditions and collect valuable atmospheric …
Classification Of Internet Advertisement,
2022
Department of Computer Application, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be University, Odisha, India
Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari
Graduate Research in Engineering and Technology (GRET)
The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients' examples and …
Speech Emotion Recognition System Using Librosa For Better Customer Experience,
2022
Odisha University of Technology and Research, Bhubaneswar, Odisha, India
Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo
Graduate Research in Engineering and Technology (GRET)
Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures …
Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks,
2022
Dartmouth College
Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik
Dartmouth College Master’s Theses
The vision of smart homes is rapidly becoming a reality, as the Internet of Things and other smart devices are deployed widely. Although smart devices offer convenience, they also create a significant management problem for home residents. With a large number and variety of devices in the home, residents may find it difficult to monitor, or even locate, devices. A central controller that brings all the home’s smart devices under secure management and a unified interface would help homeowners and residents track and manage their devices.
We envision a solution called the SPLICEcube whose goal is to detect smart devices, …
Data Management In Web Applications To Balance
Performance And Security,
2022
University of Nebraska - Lincoln
Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux
Honors Theses, University of Nebraska-Lincoln
As web applications become increasingly popular, many are running several calculations and data processing on the client machine, it is important to consider data management practices on the front-end of these web applications. Typically, some data from the server is stored in the client's memory or hard disk. How much data should be stored for how long, as well as many other considerations, influence the time and space performance of the web application, as well as its security. In this thesis, we explore several challenges, solutions, and design patterns in web application data management through the lens of a senior …
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft,
2022
Air University, Air Force Cyber College
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Offensive Cyber Operations And Future Littoral Operating Concepts,
2022
National Defense University
Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work
Military Cyber Affairs
Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …
Side-Channel Analysis On Post-Quantum Cryptography Algorithms,
2022
University of Arkansas, Fayetteville
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems,
2022
University of Arkansas, Fayetteville
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna,
2022
University of Arkansas, Fayetteville
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
Computer Science and Computer Engineering Undergraduate Honors Theses
The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move …
Live Access Control Policy Error Detection Through Hardware,
2022
University of Arkansas, Fayetteville
Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall
Graduate Theses and Dissertations
Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide …
Modeling Damage Spread, Assessment, And Recovery Of Critical Systems,
2022
University of Arkansas, Fayetteville
Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns
Graduate Theses and Dissertations
Critical infrastructure systems have recently become more vulnerable to attacks on their data systems through internet connectivity. If an attacker is successful in breaching a system’s defenses, it is imperative that operations are restored to the system as quickly as possible. This thesis focuses on damage assessment and recovery following an attack. A literature review is first conducted on work done in both database protection and critical infrastructure protection, then the thesis defines how damage affects the relationships between data and software. Then, the thesis proposes a model using a graph construction to show the cascading affects within a system …
Enter The Battleverse: China's Metaverse War,
2022
University of South Florida
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Benchmarking Library Recognition In Tweets,
2022
Singapore Management University
Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Software developers often use social media (such as Twitter) to shareprogramming knowledge such as new tools, sample code snippets,and tips on programming. One of the topics they talk about is thesoftware library. The tweets may contain useful information abouta library. A good understanding of this information, e.g., on thedeveloper’s views regarding a library can be beneficial to weigh thepros and cons of using the library as well as the general sentimentstowards the library. However, it is not trivial to recognize whethera word actually refers to a library or other meanings. For example,a tweet mentioning the word “pandas" may refer to …
Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization,
2022
University of Arkansas, Fayetteville
Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner
Industrial Engineering Undergraduate Honors Theses
The global investment industry offers a wide variety of investment products especially for individual investors. One such product, index funds, which are younger than actively managed mutual funds, have typically outperformed managed funds. Despite this phenomenon, investors have displayed a tendency to continue investing in actively managed funds. Although only a small percentage of actively managed funds outperform index funds, the costs of actively managed funds are significantly higher. Also, managed fund performances are most often determined by their fund category such as growth or real estate. I wanted to answer the following question for individual investors: can we …
The Development Of Tigra: A Zero Latency Interface For Accelerator Communication In Risc-V Processors,
2022
Clemson University
The Development Of Tigra: A Zero Latency Interface For Accelerator Communication In Risc-V Processors, Wesley Brad Green
All Dissertations
Field programmable gate arrays (FPGA) give developers the ability to design application specific hardware by means of software, providing a method of accelerating algorithms with higher power efficiency when compared to CPU or GPU accelerated applications. FPGA accelerated applications tend to follow either a loosely coupled or tightly coupled design. Loosely coupled designs often use OpenCL to utilize the FPGA as an accelerator much like a GPU, which provides a simplifed design flow with the trade-off of increased overhead and latency due to bus communication. Tightly coupled designs modify an existing CPU to introduce instruction set extensions to provide a …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System.,
2022
University of Arkansas, Fayetteville
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …