Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Data

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 96

Full-Text Articles in Entire DC Network

@Yourlocation: A Spatial Analysis Of Geotagged Tweets In The Us, Ocean Mckinney Jan 2019

@Yourlocation: A Spatial Analysis Of Geotagged Tweets In The Us, Ocean Mckinney

CMC Senior Theses

This project examines the spatial network properties observable from geo-located tweet data. Conventional exploration examines characteristics of a variety of network attributes, but few employ spatial edge correlations in their analysis. Recent studies have demonstrated the improvements that these correlations contribute to drawing conclusions about network structure. This thesis expands upon social network research utilizing spatial edge correlations and presents processing and formatting techniques for JSON (JavaScript Object Notation) data.


Microarray Data Analysis And Classification Of Cancers, Grant Gates Jan 2019

Microarray Data Analysis And Classification Of Cancers, Grant Gates

Williams Honors College, Honors Research Projects

When it comes to cancer, there is no standardized approach for identifying new cancer classes nor is there a standardized approach for assigning cancer tumors to existing classes. These two ideas are known as class discovery and class prediction. For a cancer patient to receive proper treatment, it is important that the type of cancer be accurately identified. For my Senior Honors Project, I would like to use this opportunity to research a topic in bioinformatics. Bioinformatics incorporates a few different subjects into one including biology, computer science and statistics. An intricate method for class discovery and class prediction is …


U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder Jan 2019

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi Dec 2018

Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi

Dissertations

The growth of IoT applications has resulted in generating massive volumes of data about people and their surroundings. Significant portions of these data are sensitive since they reflect peoples' behaviors, interests, lifestyles, etc. Protecting sensitive IoT data from privacy violations is a challenge since these data need to be handled by public networks, servers and clouds, most of which are untrusted parties for data owners. In this study, a solution called Policy Enforcement Fog Module (PEFM) is proposed for protecting sensitive IoT data. The primary task of the PEFM solution is mandatory enforcement of privacy polices for sensitive IoT data-whenever …


Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart Oct 2018

Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart

Theses and Dissertations

We use a Fully Convolutional Neural Network (FCNN) to classify pixels in historical document images, enabling the extraction of high-quality, pixel-precise and semantically consistent layers of masked content. We also analyze a dataset of hand-labeled historical form images of unprecedented detail and complexity. The semantic categories we consider in this new dataset include handwriting, machine-printed text, dotted and solid lines, and stamps. Segmentation of document images into distinct layers allows handwriting, machine print, and other content to be processed and recognized discriminatively, and therefore more intelligently than might be possible with content-unaware methods. We show that an efficient FCNN with …


Bot Or Not: Detecting Bots In Online Multiplayer Video Games Through User Input, Alexander Boutelle Apr 2018

Bot Or Not: Detecting Bots In Online Multiplayer Video Games Through User Input, Alexander Boutelle

Undergraduate Research Celebration 2018

No abstract provided.


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Harnessing The Data Revolution, Chaitan Baru Oct 2017

Harnessing The Data Revolution, Chaitan Baru

Commonwealth Computational Summit

Harnessing Data for 21st Century Science and Engineering (aka Harnessing the Data Revolution, HDR) is one of NSF's six "Big Research Ideas," aimed at supporting fundamental research in data science and engineering; developing a cohesive, federated approach to the research data infrastructure needed to power this revolution; and developing of a 21st-century data-capable workforce. HDR will enable new modes of data-driven discovery allowing researchers to ask and answer new questions in frontier science and engineering, generate new knowledge and understanding by working with domain experts, and accelerate discovery and innovation. This initiative builds on NSF's history of data science investments. …


Visually Analyzing The Impacts Of Essential Air Service Funding Decisions, Rohan Kashuka, Chittayong Surakitbanharn, Calvin Yau, David S. Ebert Aug 2017

Visually Analyzing The Impacts Of Essential Air Service Funding Decisions, Rohan Kashuka, Chittayong Surakitbanharn, Calvin Yau, David S. Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

Essential Air Service (EAS) is a U.S. government subsidy program which ensures maintenance of commercial airline services in small deregulated communities. The program’s budget currently is around $250 million annually, which is used as subsidy for airlines to maintain a minimal level of scheduled air service in relatively smaller airports. It is evident that 2% of the FAA budget is being spent to maintain air service in smaller communities, but there is not enough evidence to prove that all the current decisions made by Congress about EAS are advantageous. To understand these decisions, 15 years of data produced by the …


Data Insertion In Bitcoin's Blockchain, Andrew Sward, Vecna Op_0, Forrest Stonedahl Jul 2017

Data Insertion In Bitcoin's Blockchain, Andrew Sward, Vecna Op_0, Forrest Stonedahl

Computer Science: Faculty Scholarship & Creative Works

This paper provides the first comprehensive survey of methods for inserting arbitrary data into Bitcoin's blockchain. Historical methods of data insertion are described, along with lesser-known techniques that are optimized for efficiency. Insertion methods are compared on the basis of efficiency, cost, convenience of data reconstruction, permanence, and potentially negative impact on the Bitcoin ecosystem.


Towards Querying And Visualization Of Large Spatio-Temporal Databases, Sugam Sharma Jun 2017

Towards Querying And Visualization Of Large Spatio-Temporal Databases, Sugam Sharma

Sugam Sharma

In any database model, data analysis can be eased by extracting a smaller set of the data of interest, called subset, from the mammoth original dataset. Thus, a subset helps enhance the performance of a system by avoiding the iteration through the huge parental data in further analysis. A subset, its specification, or the formal process for its extraction can be complex. In the database community, subsets are extracted through SQL-like queries and through visualization in the Geographic Information System (GIS) community. Both are iterative processes. An SQL query can be a composition of subqueries. Each subquery can be seen …


Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper Dec 2016

Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Data Visualizations And Infographics, Darren Sweeper Sep 2016

Data Visualizations And Infographics, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Ifly: Code Development For An App To Support Automating Entomological Data Collection, Michael P. Cosentino, Trevor Stamper Aug 2016

Ifly: Code Development For An App To Support Automating Entomological Data Collection, Michael P. Cosentino, Trevor Stamper

The Summer Undergraduate Research Fellowship (SURF) Symposium

We are developing a prototype entomological data-collection application called "iFly," which runs on a field-capable iPad device. In this phase, we tackled refining screens and introducing a database manager to streamline operations as info is entered, stored, retrieved and delivered. We used SQLite3 database in Apple's Xcode Integrated Development Environment (IDE). Xcode gives mixed programming results. Apple's iOS environment ensures functional and fairly error-free apps can be built. But the sophisticated Xcode IDE requires specialist developers and valuable project time is spent as new programmers learn key techniques. The iFly prototype was advanced with improved database integration; however, more work …


Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson Jun 2016

Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson

Computer Engineering

This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …


Alignment For Comprehensive Two-Dimensional Gas Chromatography (Gcxgc) With Global, Low-Order Polynomial Transformations, Davis Rempe, Stephen Reichenbach, Stephen Scott Apr 2016

Alignment For Comprehensive Two-Dimensional Gas Chromatography (Gcxgc) With Global, Low-Order Polynomial Transformations, Davis Rempe, Stephen Reichenbach, Stephen Scott

UCARE Research Products

As columns age and differ between systems, retention times for GC x GC may vary between runs. In order to properly analyze chromatograms, it is often desirable to align chromatographic features between chromatograms. This alignment can be characterized by a mapping of retention times from one chromatogram to the retention times of another chromatogram. Alignment methods can be classified as global or local, i.e., whether the geometric differences between chromatograms are characterized by a single function for the entire chromatogram or by a combination of many functions for different regions of the chromatogram. Previous work has shown that global, low-degree …


Ultrasonic Data Steganography, Alexander Orosz Edwards Mar 2016

Ultrasonic Data Steganography, Alexander Orosz Edwards

KSU Journey Honors College Capstones and Theses

What started off as a question on the possibly of data transmission via sound above the level of human hearing evolved into a project exploring the possibility of ultrasonic data infiltration and exfiltration in an information security context. It is well known that sound can be used to transmit data as this can be seen in many old technologies, most notably and simply DTMF tones for phone networks. But what if the sound used to transmit signals was in in the ultrasonic range? It would go generally unnoticed to anyone not looking for it with tools such as a spectrum …


Forecasting Internal Temperature In A Home With A Sensor Network, Bruce Spencer, Omar Alfandi Jan 2016

Forecasting Internal Temperature In A Home With A Sensor Network, Bruce Spencer, Omar Alfandi

All Works

© 2016 The Authors. We forecast internal temperature in a home with sensors, modeled as a linear function of recent sensor values. The Smart∗Project provides publicly available data from an inhabited home over a three month period, reporting on 38 sensors including environmental readings, circuit loads, motion detectors, and switches controlling lights and fans. We select 13 of these sensors that have some influence on the internal temperature, and create forecasts that are accurate to within about 1.6°F (0.9°C) over the next six hours. Temperature prediction is important for saving energy while maintaining comfortable conditions in the home.


The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina Nov 2015

The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina

UBT International Conference

Through this paper we present the development of information technology especially in cloud computing and mobile technology as an integral part of everyday life, as well as the advantages that cloud computing and mobile technology offers to the business community and the private one. Furthermore, it presents the possibilities offered by this technology on the data preservation compared with the traditional ones. Due to the increased demand for big space, it was necessary to establish a centralized data storage which has brought with it more innovation and advantage, in comparison with other media for data storage in personal memories. This …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer Oct 2014

Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer

Theses and Dissertations

Lists of records in machine-printed documents contain much useful information. As one example, the thousands of family history books scanned, OCRed, and placed on-line by FamilySearch.org probably contain hundreds of millions of fact assertions about people, places, family relationships, and life events. Data like this cannot be fully utilized until a person or process locates the data in the document text, extracts it, and structures it with respect to an ontology or database schema. Yet, in the family history industry and other industries, data in lists goes largely unused because no known approach adequately addresses all of the costs, challenges, …


Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage, Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jiangying Zhou, Robert H. Deng Feb 2014

Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage, Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jiangying Zhou, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set …


A Model Of Data Structures Commonly Used In Programming Languages And Data Base Management Systems, William L. Honig Jul 2013

A Model Of Data Structures Commonly Used In Programming Languages And Data Base Management Systems, William L. Honig

William L Honig

This thesis claims that contemporary data structures can be understood and studied with an intelligible model which captures their essential differences and similarities and, further, that such a model is an appropriate basis for a top-down description method for data structures. To define the scope of the model, the data structures included in 21 programming languages and data base management systems have been tabulated. Each individual data structure is illustrated with an example drawn from a published paper or a working computer program. This mélange of data structures is divided into three classes (aggregates, associations , and files) and each …


Big Data: Immediate Opportunities And Longer Term Challenges, Jens Pohl, Kym Jason Pohl Jul 2013

Big Data: Immediate Opportunities And Longer Term Challenges, Jens Pohl, Kym Jason Pohl

Collaborative Agent Design (CAD) Research Center

The transformation of words, locations, and human interactions into digital data forms the basis of trend detection and information extraction opportunities that can be automated with the increasing availability of relatively inexpensive computer storage and processing technology. Trend detection, which focuses on what, is facilitated by the ability to apply analytics to an entire corpus of data instead of a random sample. Since the corpus essentially includes all data within a population there is no need to apply any of the precautions that are in order to ensure the representativeness of a sample in traditional statistical analysis. Several examples are …


A Medical Data Cleaner, Jahnavi Yetukuri May 2013

A Medical Data Cleaner, Jahnavi Yetukuri

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

This report describes medical-data cleaning tool, called MedDataCleaner that can detect outliers in medical data and assistant Database Administrators in resolving data-related problem. Specifically, MedDataCleaner, enables the users to define cleaning rules and offers the ability to choose classification methods that help determine if the data is good or bad. MedDataClearer uses Vitruvian DB objects for object-relation mapping (ORM) support and Vitruvian alignment links for designing the GUI.

My contribution towards this work includes designing the user interfaces using Vitruvian Alignment links, design and implement mean, standard deviation and neural classification methods using Vitruvian DB objects.


The Representation Of Context In Computer Software, Hisham Assal, Kym Pohl, Jens G. Pohl Feb 2013

The Representation Of Context In Computer Software, Hisham Assal, Kym Pohl, Jens G. Pohl

Hisham Assal

Computers do not have the equivalent of a human cognitive system and therefore store data simply as the numbers and words that are entered into the computer. For a computer to interpret data it requires an information structure that provides at least some level of context. This can be accomplished utilizing an ontology of objects with characteristics, semantic behavior, and a rich set of relationships to create a virtual version of real world situations and provide the context within which intelligent logic (e.g., agents) can automatically operate. This paper discusses the process of developing ontologies that serve to provide context …


A Confidence-Prioritization Approach To Data Processing In Noisy Data Sets And Resulting Estimation Models For Predicting Streamflow Diel Signals In The Pacific Northwest, Nathaniel Lee Gustafson Aug 2012

A Confidence-Prioritization Approach To Data Processing In Noisy Data Sets And Resulting Estimation Models For Predicting Streamflow Diel Signals In The Pacific Northwest, Nathaniel Lee Gustafson

Theses and Dissertations

Streams in small watersheds are often known to exhibit diel fluctuations, in which streamflow oscillates on a 24-hour cycle. Streamflow diel fluctuations, which we investigate in this study, are an informative indicator of environmental processes. However, in Environmental Data sets, as well as many others, there is a range of noise associated with individual data points. Some points are extracted under relatively clear and defined conditions, while others may include a range of known or unknown confounding factors, which may decrease those points' validity. These points may or may not remain useful for training, depending on how much uncertainty they …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.