Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (17)
- Edith Cowan University (6)
- Selected Works (5)
- California Polytechnic State University, San Luis Obispo (4)
- SelectedWorks (4)
-
- University of Dayton (4)
- Western University (4)
- Chapman University (3)
- University of South Florida (3)
- Bucknell University (2)
- Air Force Institute of Technology (1)
- Bard College (1)
- Louisiana Tech University (1)
- Purdue University (1)
- Technological University Dublin (1)
- University of Arkansas, Fayetteville (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of New Orleans (1)
- University of Puget Sound (1)
- University of Rhode Island (1)
- University of Tennessee Health Science Center (1)
- University of Tennessee, Knoxville (1)
- Utah State University (1)
- Walden University (1)
- Keyword
-
- Computer Security (3)
- Open source (3)
- Android (2)
- Austerity (2)
- Authority (2)
-
- Gender (2)
- Government (2)
- Information Warfare (2)
- Legitimacy (2)
- Open Government (2)
- Open government (2)
- Privacy (2)
- Quantum computing (2)
- Sports (2)
- 3. Current Research Projects (1)
- AVRF (1)
- Accessibility (1)
- Action (1)
- Addresses (1)
- Algorithms (1)
- Arab Spring (1)
- Asia Pacific (1)
- Blackfin (1)
- Board Games (1)
- Body of knowledge (1)
- Brazil (1)
- Building Management System (1)
- Built environment (1)
- CS0 (1)
- Children (1)
- Publication
-
- Master's Projects (17)
- Australian Security and Intelligence Conference (4)
- Computer Science Faculty Publications (3)
- Electronic Thesis and Dissertation Repository (3)
- Engineering Faculty Articles and Research (3)
-
- Manoj Maharaj (3)
- USF Tampa Graduate Theses and Dissertations (3)
- Honors Theses (2)
- InfoSci@ECU Seminars (2)
- Jan Kallberg (2)
- John Christian Smith (2)
- Master's Theses (2)
- CSE Conference and Workshop Papers (1)
- Charles M. Schweik (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Software Engineering (1)
- Conference papers (1)
- Doctoral Dissertations (1)
- Electrical and Computer Engineering Publications (1)
- Faculty Publications (1)
- Instructional Technology and Learning Sciences Faculty Publications (1)
- MIS/OM/DS Faculty Publications (1)
- Martin L Griss (1)
- Masters Theses (1)
- Physics (1)
- Public Policy and Leadership Faculty Presentations (1)
- Purdue Polytechnic Masters Theses (1)
- Senior Honors Projects (1)
- Senior Projects Spring 2011 (1)
- Summer Research (1)
- Publication Type
Articles 1 - 30 of 68
Full-Text Articles in Entire DC Network
Android Memory Capture And Applications For Security And Privacy, Joseph T. Sylve
Android Memory Capture And Applications For Security And Privacy, Joseph T. Sylve
University of New Orleans Theses and Dissertations
The Android operating system is quickly becoming the most popular platform for mobiledevices. As Android’s use increases, so does the need for both forensic and privacy toolsdesigned for the platform. This thesis presents the first methodology and toolset for acquiringfull physical memory images from Android devices, a proposed methodology for forensicallysecuring both volatile and non-volatile storage, and details of a vulnerability discovered by theauthor that allows the bypass of the Android security model and enables applications to acquirearbitrary permissions.
Effective Security By Obscurity, John Christian Smith
Effective Security By Obscurity, John Christian Smith
John Christian Smith
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
Umakant Mishra
The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.
Automated Pollen Image Classification, Nicholas Quentin Haas
Automated Pollen Image Classification, Nicholas Quentin Haas
Masters Theses
This Master of Science thesis reviews previous research, proposes a method anddemonstrates proof-of-concept software for the automated matching of pollen grainimages to satisfy degree requirements at the University of Tennessee. An ideal imagesegmentation algorithm and shape representation data structure is selected, alongwith a multi-phase shape matching system. The system is shown to be invariantto synthetic image translation, rotation, and to a lesser extent global contrast andintensity changes. The proof-of-concept software is used to demonstrate how pollengrains can be matched to images of other pollen grains, stored in a database, thatshare similar features with up to a 75% accuracy rate.
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
USF Tampa Graduate Theses and Dissertations
Despite our awareness of the fascination modern humans have with the Internet, little is known about how and why colleges and universities create and maintain Websites. At the most general level, in this case study, I hypothesize that university Websites serve as communication and marketing tools in attracting students. At the most specific level, I postulate that civil engineering programs with Web pages depicting images of women and minorities would be more successful in recruiting and retaining women and students of color than civil engineering programs with Web pages displaying fewer or no images of women and minorities. The primary …
Improving Search Engine Results By Query Extension And Categorization, Guo Mei
Improving Search Engine Results By Query Extension And Categorization, Guo Mei
Electronic Thesis and Dissertation Repository
Since its emergence, the Internet has changed the way in which information is distributed and it has strongly influenced how people communicate. Nowadays, Web search engines are widely used to locate information on the Web, and online social networks have become pervasive platforms of communication.
Retrieving relevant Web pages in response to a query is not an easy task for Web search engines due to the enormous corpus of data that the Web stores and the inherent ambiguity of search queries. We present two approaches to improve the effectiveness of Web search engines. The first approach allows us to retrieve …
Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb
Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb
Electronic Thesis and Dissertation Repository
Workflow-nets are mathematical frameworks that are used to formally describe, model and implement workflows. First, we propose critical section workflow nets (abbreviated WFCSnet). This framework allows feedbacks in workflow systems while ensuring the soundness of the workflow. Feedback is generally not recommended in workflow systems as they threaten the soundness of the system. The proposed WFCSnet allows safe feedback and limits the maximum number of activities per workflow as required. A theorem for soundness of WFCSnet is presented. Serializability, Separability, Quasi-liveness and CS-Properties of WFCSnet are examined and some theorems and lemmas are proposed to mathematically formalize them. In this …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
Social Network Leverage Search, Payal Gupta
Social Network Leverage Search, Payal Gupta
Master's Projects
Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …
Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel
Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel
Computer Science Faculty Publications
Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him or herself. Its effectiveness in rehabilitation and education has been repeatedly demonstrated but technical challenges remain in creating video contents that depict previously unseen behaviors. In this paper, we propose a novel system that re-renders new talking-head sequences suitable to be used for VSM treatment of patients with voice disorder. After the raw footage is captured, a new speech track is either synthesized using text-to-speech or selected based on voice similarity from a database of clean speeches. …
A Theoretical Model Of Multi-Agent Quantum Computing, F. Matthew Mihelic
A Theoretical Model Of Multi-Agent Quantum Computing, F. Matthew Mihelic
Faculty Publications
The best design for practical quantum computing is one that emulates the multi-agent quantum logic function of natural biological systems. Such systems are theorized to be based upon a quantum gate formed by a nucleic acid Szilard engine (NASE) that converts Shannon entropy of encountered molecules into useful work of nucleic acid geometric reconfiguration. This theoretical mechanism is logically and thermodynamically reversible in this special case because it is literally constructed out of the (nucleic acid) information necessary for its function, thereby allowing the nucleic acid Szilard engine to function reversibly because, since the information by which it functions exists …
Onboard Video Stabilization For Unmanned Air Vehicles, Nicholas Stewart Cross
Onboard Video Stabilization For Unmanned Air Vehicles, Nicholas Stewart Cross
Master's Theses
Unmanned Air Vehicles (UAVs) enable the observation of hazardous areas without endangering a pilot. Observational capabilities are provided by on-board video cameras and images are relayed to remote operators for analysis. However, vibration and wind cause video camera mounts to move and can introduce unintended motion that makes video analysis more difficult. Video stabilization is a process that attempts to remove unwanted movement from a video input to provide a clearer picture.
This thesis presents an onboard video stabilization solution that removes high-frequency jitter, displays output at 20 frames per second (FPS), and runs on a Blackfin embedded processor. Any …
Symbolic Quantum Circuit Simplification In Sympy, Matthew Curry
Symbolic Quantum Circuit Simplification In Sympy, Matthew Curry
Physics
In the field of quantum information science, one can design a series of quantum logic operations known as a circuit. Circuits are the basis for quantum computations in quantum computing. As circuits will most likely be designed from a logical standpoint, there could exist mathematical redundancies which will lead to a larger circuit than necessary. These redundancies are computationally expensive, and there is a need for them to be found and eliminated to simplify the circuit. We present our research on finding the rules for simplifying circuits and its implementation in SymPy.
Disability And The Web: Why Website Accessibility Matters, Vivienne Conway
Disability And The Web: Why Website Accessibility Matters, Vivienne Conway
InfoSci@ECU Seminars
With Australia now transitioning to WCAG 2.0, accessibility has become a critical area requiring a far greater emphasis in the next couple of years. The Australian Human Rights Commission has argued that all Australian websites should meet WCAG 2.0 AA by December 2014. In this presentation, Vivienne will discuss important findings from her study of public library web site accessibility. She will also provide insights into her current PhD investigation and give a first hand account of the Hyderabad conference and global efforts on web site accessibility.
Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb
Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb
InfoSci@ECU Seminars
The Australian National Data Service (ANDS) (http://ands.org.au/index.html) provides funding to foster partnerships and build infrastructure to enable better local data management in Australian universities and research institutions. Begun in 2008, ANDS has received $72 million of Commonwealth funding. ANDS aims to establish infrastructure and services for an Australian research data commons in which research data with enduring value and the potential for reuse, is preserved and managed for continuing accessibility.
An Introductory Educational Board Game For Use In Early Computer Science Education, Tyler Moore
An Introductory Educational Board Game For Use In Early Computer Science Education, Tyler Moore
Computer Science and Computer Engineering Undergraduate Honors Theses
Early computer science education should be necessary in high school curricula, but often it becomes inextricably linked to the act of programming instead of the study of the principles of computation. In order to divest computer science from programming a new teaching medium is needed, and early research into games as teaching tools shows some positive results when used properly. In order to find a better way to teach early computer science concepts I have designed and implemented a board game which illustrates and defines a few necessary computer science terms and mechanics. I had reasonable success in the classroom, …
Determining The Effects Of Technology On Children, Kristina E. Hatch
Determining The Effects Of Technology On Children, Kristina E. Hatch
Senior Honors Projects
Determining the Effects of Technology on Children
Kristina Hatch
Faculty Sponser: Timothy Henry, Computer Science and Statistics
Technology has become an essential part of Americans’ daily lives, affecting our communications, mail, relationships, the management of our bills and finances. As we have become more immersed in the benefits and capabilities of these constantly developing technologies, children as well as adults have become avid users. Laptops and cell phones are specially developed for preteens. Software and game companies have been targeting children in their game development. Video games have become common entertainment for children as young as four. Children today can …
A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith
A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith
Purdue Polytechnic Masters Theses
Any major research institution has a substantial number of computer systems on its campus, often in the scale of tens of thousands. Given that a large amount of scientific computing is appropriate for execution in an opportunistic environment, a campus grid is an inexpensive way to build a powerful computational resource. What is missing, though, is a model for making an informed decision on the cost-effectives of a campus grid. In this thesis, the author describes a model for measuring the costs and benefits of building a campus computing resource based on the institution’s existing investment in computing hardware.
For …
Substitution Cipher With NonPrefix Codes, Rashmi Bangalore Muralidhar
Substitution Cipher With NonPrefix Codes, Rashmi Bangalore Muralidhar
Master's Projects
Substitution ciphers normally use prefix free codes there is no code word which is the prefix of some other code word. Prefix free codes are used for encryption because it makes the decryption process easier at the receiver's end.
In this project, we study the feasibility of substitution ciphers with nonprefix codes. The advantage of using nonprefix codes is that extracting statistical information is more difficult. However, the ciphertext is nontrivial to decrypt.
We present a dynamic programming technique for decryption and verify that the plaintext can be recovered. This shows that substitution ciphers with nonprefix codes are feasible. …
Decompiler For Pseudo Code Generation, Ankit Patel
Decompiler For Pseudo Code Generation, Ankit Patel
Master's Projects
Decompiling is an area of interest for researchers in the field of software reverse engineering. When the source code from a high-level programming language is compiled, it loses a great deal of information, including code structure, syntax, and punctuation.
The purpose of this research is to develop an algorithm that can efficiently decompile assembly language into pseudo C code. There are tools available that claim to extract high-level code from an executable file, but the results of these tools tend to be inaccurate and unreadable.
Our proposed algorithm can decompile assembly code to recover many basic high-level programming structures, including …
Rna Secondary Structure Prediction Tool, Meenakshee Mali
Rna Secondary Structure Prediction Tool, Meenakshee Mali
Master's Projects
Ribonucleic Acid (RNA) is one of the major macromolecules essential to all forms of life. Apart from the important role played in protein synthesis, it performs several important functions such as gene regulation, catalyst of biochemical reactions and modification of other RNAs. In some viruses, instead of DNA, RNA serves as the carrier of genetic information. RNA is an interesting subject of research in the scientific community. It has lead to important biological discoveries. One of the major problems researchers are trying to solve is the RNA structure prediction problem. It has been found that the structure of RNA is …
Robust Watermarking Using Hidden Markov Models, Mausami Mungale
Robust Watermarking Using Hidden Markov Models, Mausami Mungale
Master's Projects
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars. Prevention is a difficult problem since digital documents are easy to copy and distribute. Watermarking is a possible defense against software piracy. A software watermark consists of information embedded in the software, which allows it to be identified. A watermark can act as a deterrent to unauthorized copying, since it can be used to provide evidence for legal action against those responsible for piracy.
In this project, we present a novel software watermarking scheme that …
Automated Penetration Testing, Neha Samant
Automated Penetration Testing, Neha Samant
Master's Projects
Penetration testing is used to search for vulnerabilities that might exist in a system. The testing usually involves simulating different types of attacks on the target system. This type of testing provides an organized and controlled way to identify security shortcomings. The resources and time required for comprehensive testing can make penetration testing cost intensive. Consequently, such tests are usually only performed during important milestones.
In this project we have automated the penetration testing process for several protocol-based attacks. Our automated penetration testing application covers several attacks based on HTTP, SIP and TCP/IP. The objective of this work is to …
Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik
Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik
Master's Projects
In this internet and smart-phone era paper books are almost obsolete. Many developers have come up with the eBooks which can be read online on computer or on a smart-phone. Users can now access them offline any time without carrying a bulky pBook (Paper Book). The stable eBook application should restrict and control the use of contents to protect the copyrights. Encryption and enforcement of digital policies are generally managed by Digital Rights Management (DRM). The stable system for online as well as offline readers safeguard the intellectual properties for authors, publishers by providing a protection to their digital content, …
Fbchatters: A Facebook Application For Gtalk, Ronak Shah
Fbchatters: A Facebook Application For Gtalk, Ronak Shah
Master's Projects
The motto of this project is to provide accessibility to Google talk (gtalk) service within a Facebook account by creating Facebook application called FBchatters and also by creating Firefox plug-in called FBchatters. Most of all internet users have account on Facebook and Google. Social network site, Facebook has more than 600 million users and half of them log on to Facebook in any given day [1]. Google also has 170 million users who are using gmail and gtalk services every day. There are lot of users who do chatting simultaneously on Facebook and Gtalk. Also, Google talk provides a facility …
Video Chat Application For Facebook, Shirali Chokshi
Video Chat Application For Facebook, Shirali Chokshi
Master's Projects
This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook.
Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski
Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski
Master's Projects
Genes that encode novel proteins are constantly being discovered and added to databases, but the speed with which their structures are being determined is not keeping up with this rate of discovery. Currently, homology and threading methods perform the best for protein structure prediction, but they are not appropriate to use for all proteins. Still, the best way to determine a protein's structure is through biological experimentation. This research looks into possible methods and relations that pertain to ab initio protein structure prediction. The study includes the use of positional and transitional probabilities of amino acids obtained from a non-redundant …
Similarity Tests For Metamorphic Virus Detection, Mahim Patel
Similarity Tests For Metamorphic Virus Detection, Mahim Patel
Master's Projects
A metamorphic computer virus generates copies of itself using code morphing techniques. A new virus has the same functionality as the parent but it has a different internal structure. The goal of the metamorphic virus writer is to produce viral copies that have no common signature. If the viral copies are sufficiently different, they can evade signature detection, which is the most widely-used anti-virus technique.
In previous research, hidden Markov models (HMMs) have been used to detect some metamorphic viruses. However, recent research has shown that it is possible for carefully designed metamorphic viruses to evade HMM-based detection.
In this …
User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev
User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev
Master's Projects
The dawn of the laptop era presents new challenges to the computing research community. Performance is no longer the end all be all of computing research because a new, significant requirement has cropped up: reducing the power consumption and improving battery usage. The key restriction to mobility is the constant need to be near a power outlet to recharge the laptop battery. Thus, extending battery life without compromising performance is a pressing concern.
A research named as "iGreen" was proposed to stimulate power consumption awareness and behavioral change among laptop users via interactive energy-usage feedback with college students as the …