Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (162)
- TÜBİTAK (74)
- University of Texas at El Paso (71)
- University of Nebraska - Lincoln (68)
- Selected Works (59)
-
- Embry-Riddle Aeronautical University (44)
- California Polytechnic State University, San Luis Obispo (34)
- Universitas Indonesia (30)
- Air Force Institute of Technology (27)
- SelectedWorks (21)
- Washington University in St. Louis (19)
- Marquette University (18)
- Old Dominion University (18)
- Technological University Dublin (17)
- Clemson University (15)
- University of Massachusetts Amherst (15)
- Portland State University (13)
- Singapore Management University (13)
- University of Dayton (10)
- Institute of Business Administration (9)
- University of Central Florida (9)
- Syracuse University (8)
- University of Arkansas, Fayetteville (8)
- University of Nevada, Las Vegas (8)
- Connecticut College (7)
- University of South Florida (7)
- University of Tennessee, Knoxville (7)
- Western Kentucky University (7)
- Wayne State University (6)
- Cleveland State University (5)
- Keyword
-
- Applied sciences (8)
- Department of Computer Science and Engineering (8)
- Ubiquitous Computing (8)
- #antcenter (7)
- Engineering (7)
-
- Optimization (7)
- Robotics (7)
- Security (7)
- Classification (6)
- Context-Aware (6)
- Interval computations (6)
- Technology (6)
- Computer science (5)
- Computer vision (5)
- GPGPU (5)
- Image processing (5)
- Localization (5)
- Mobile (5)
- Mobility (5)
- Simulation (5)
- Social media (5)
- Wireless sensor networks (5)
- Authentication (4)
- Computer security (4)
- Data mining (4)
- Digital forensics (4)
- Genetic algorithm (4)
- Genetic algorithms (4)
- Oceanography (4)
- Ontology (4)
- Publication
-
- Computer Science & Engineering Syllabi (154)
- Turkish Journal of Electrical Engineering and Computer Sciences (74)
- Departmental Technical Reports (CS) (64)
- Makara Journal of Technology (30)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (28)
-
- Journal of Digital Forensics, Security and Law (28)
- Theses and Dissertations (25)
- All Computer Science and Engineering Research (19)
- Electrical and Computer Engineering Faculty Research and Publications (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Electrical and Computer Engineering Faculty Publications (16)
- Computer Engineering (15)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (14)
- Master's Theses (14)
- All Theses (13)
- Department of Electrical and Computer Engineering: Faculty Publications (13)
- Research Collection School Of Computing and Information Systems (13)
- Computer Science Faculty Publications (11)
- Electronic Theses and Dissertations (11)
- International Conference on Information and Communication Technologies (9)
- Martin L Griss (9)
- Browse all Theses and Dissertations (8)
- Computer Science Faculty Publications and Presentations (8)
- Doctoral Dissertations (7)
- JITP 2011: The Future of Computational Social Science (7)
- Masters Theses 1911 - February 2014 (7)
- Open Access Theses & Dissertations (7)
- USF Tampa Graduate Theses and Dissertations (7)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (6)
- Conference papers (6)
- Publication Type
Articles 1 - 30 of 898
Full-Text Articles in Engineering
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Master's Theses
No abstract provided.
Data Exploration Interface For Digital Forensics, Varun Dontula
Data Exploration Interface For Digital Forensics, Varun Dontula
University of New Orleans Theses and Dissertations
The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst.
We present an alternative approach, which leverages data visualization techniques to provide a more …
Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong
Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong
Technical Reports
Choosing and implementing the right security software tools can protect a company’s assets. In particular, data breaches might not happen if a company is aware of its information flow and has the proper tool to protect it. This thesis paper will explain why and how acquiring data loss prevention (DLP) software will help a company to reduce data loss, mitigate the loss impact and save money. Facts and examples are provided to support and illustrate the statement above.
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
Christopher N. Roman
In the summer of 2011, the Exploration Vessel NAUTILUS is undertaking a four-month expedition to the Black, Aegean and Mediterranean Seas, and North Atlantic Ocean. The primary goal of the NAUTILUS is to create a focus of international leadership for the development and integration of leading-edge technologies, educational programs, field operations, and public outreach programs for ocean exploration, in partnership with NOAA, National Geographic Society, Office of Naval Research, and other sponsors. To do so, the program uses a complement of deep submergence vehicle systems and “telepresence” technologies to engage scientists, educators and the public, both at sea and ashore, …
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey
Graduate School of Oceanography Faculty Publications
Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey
Graduate School of Oceanography Faculty Publications
Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
Christopher N. Roman
Detailed bathymetric maps of the sea floor with centimeter level resolution can be produced by underwater vehicles using multibeam sonars and structured light laser imaging. Over spatial scales up to tens of thousands of square meters it is possible to produce maps gridded to sub centimeter levels. This level of accuracy demands detailed treatments of the sensor relative data, the vehicle navigation data and the vehicle to sensor position and rotational offsets. The presented results will show comparisons between these two sensor modalities. Data have a been collected during recent field programs to the Kolumbo volcanic crater and the Southern …
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey
Christopher N. Roman
Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey
Christopher N. Roman
Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …
A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo
A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found that …
Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb
Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb
Computer Engineering
California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …
Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson
Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson
Mechanical Engineering
Creation of a mounted wireless self-powered thermal imaging camera system.
Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams
Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams
Mechanical Engineering
The Deutsches Museum of Munich, Germany requested add-on components to their mechanical calculator exhibit. The end-goal is to produce an interactive 3D model in software to demonstrate the functions of the Braun-Vayringe Machine (BVM). There will be four students working on this project at California Polytechnic State University, San Luis Obispo: two mechanical engineers (Dan Marioni and Will Harris) and two computer engineers (Chad Williams and Kevin Webb).This project involves the coordination of three facilities; the Deutsches Museum, and the Mechanical and Computer Science Departments of Cal Poly. The name of the project is known as the Historic Calculator Project …
Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian
Requirements Specification For Dsic: Distribution System For Information And Collaboration, Alex Abrahamian
Computer Science and Software Engineering
There seems to exist an invisible barrier between people that should be connected but for whatever reasons (don't hang out in the same circles, don't go to the same meetings, or are geographically separated) haven't met each other yet.
Normally these people will only meet when others bring them together or they are thrown together on a project. DSIC aims to preempt the person discovery process by allowing a way for people to post ideas, events, and other collaborations in a single place that can then be searched by other users.
The system utilizes postings, user profiles, and a tagging …
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
School of Information Sciences -- Faculty Publications and Other Works
The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.
Robotic Turret, Daniel Romero, Matthew (Matt) Martelle, Scott Mullens, Rachel Diamant
Robotic Turret, Daniel Romero, Matthew (Matt) Martelle, Scott Mullens, Rachel Diamant
Mechanical Engineering
No abstract provided.
Solving Virus Problems By System Administrators- A Triz Perspective, Umakant Mishra
Solving Virus Problems By System Administrators- A Triz Perspective, Umakant Mishra
Umakant Mishra
The computer virus is not only a problem to the end user but also a problem to everybody whoever is associated with computers, including systems administrators, corporate managers and even anti-virus manufacturers. In the previous article we discussed on how to use TRIZ for analyzing and solving virus problems of an end user. In this article we will focus on the problems faced by the systems administrators.
An analysis of virus scenario finds that the same situation of virus infection creates different problems to people at different levels, such as, a computer user, a system administrator, a corporate manager and …
Solving Virus Problems By Computer Users- A Triz Perspective, Umakant Mishra
Solving Virus Problems By Computer Users- A Triz Perspective, Umakant Mishra
Umakant Mishra
The knowledge on TRIZ helps us analyzing a problem. Analysis is an important step in problem solving because the same event may be causing different problems (or benefits) to different people under different conditions. Some solutions may be addressing a problem in a short term or narrow perspective while giving rise to other problems or disadvantages. A good solution should be ideal and holistic in approach and should lead to no other problems or negative consequences.
When we analyze the problem of computer virus we find that different types of computer users face different types of problems and seek to …
Stability And Classification Performance Of Feature Selection Techniques., Huanjing Wang, Taghi M. Khoshgoftaar, Qianhui Althea Liang
Stability And Classification Performance Of Feature Selection Techniques., Huanjing Wang, Taghi M. Khoshgoftaar, Qianhui Althea Liang
Dr. Huanjing Wang
No abstract provided.
In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich
In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich
Departmental Technical Reports (CS)
No abstract provided.
Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich
Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich
Departmental Technical Reports (CS)
It is well known that an arbitrary continuous function on a bounded set -- e.g., on an interval [a,b] -- can be, with any given accuracy, approximated by a polynomial. Usually, polynomials are described as linear combinations of monomials. It turns out that in many computational problems, it is more efficient to represent a polynomial as Bernstein polynomials -- e.g., for functions of one variable, a linear combination of terms (x-a)k * (b-x)n-k. In this paper, we provide a simple fuzzy-based explanation of why Bernstein polynomials are often more efficient, and we show how this informal explanation …
Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich
Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich
Departmental Technical Reports (CS)
In many practically useful cases, we know how to efficiently compute the exact range of a function over given intervals (and, possibly, under additional constraints). In other words, we know how to efficiently compute the minimum and maximum of a given function f(x1, ..., xn) on any box. From the practical viewpoint, it is important not only to find the value of the corresponding maximum or minimum, but also to know for what values of the parameters xi this optimum is attained. We prove a general result: that if we can efficiently compute the optimum, …
Semi-Heuristic Poverty Measures Used By Economists: Justification Motivated By Fuzzy Techniques, Karen Villaverde, Nagwa Albehery, Tonghui Wang, Vladik Kreinovich
Semi-Heuristic Poverty Measures Used By Economists: Justification Motivated By Fuzzy Techniques, Karen Villaverde, Nagwa Albehery, Tonghui Wang, Vladik Kreinovich
Departmental Technical Reports (CS)
Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich
Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich
Departmental Technical Reports (CS)
Many neurological disorders result in disordered motion. The effects of a disorder can be decrease by an appropriate rehabilitation. To make rehabilitation efficient, we need to monitor the patient and check how well he or she improves. In our previous papers, we proposed a fuzzy-based semi-heuristic method of gauging how well a patient improved. Surprisingly, this semi-heuristic method turned out to be more efficient that we expected. In this paper, we provide a justification for this efficiency.
In the future, it is desirable to combine this fuzzy-assessment approach with results by Alavarez-Alvarez, Trivino, and Cordon who use fuzzy techniques …
Efficient Approximation For Security Games With Interval Uncertainty, Chris Kiekintveld, Vladik Kreinovich
Efficient Approximation For Security Games With Interval Uncertainty, Chris Kiekintveld, Vladik Kreinovich
Departmental Technical Reports (CS)
Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang
Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang
Computer Science Faculty Publications
Feature selection techniques can be evaluated based on either model performance or the stability (robustness) of the technique. The ideal situation is to choose a feature selec- tion technique that is robust to change, while also ensuring that models built with the selected features perform well. One domain where feature selection is especially important is software defect prediction, where large numbers of met- rics collected from previous software projects are used to help engineers focus their efforts on the most faulty mod- ules. This study presents a comprehensive empirical ex- amination of seven filter-based feature ranking techniques (rankers) applied to …
State-Based Techniques For Designing, Verifying And Debugging Message Passing Systems, Rajaa Khaled Alqudah
State-Based Techniques For Designing, Verifying And Debugging Message Passing Systems, Rajaa Khaled Alqudah
Electrical Engineering and Computer Science - Dissertations
Message passing systems support the applications of concurrent events, where independent or semi-independent events occur simultaneously in a nondeterministic fashion. The nature of independence, random interactions and concurrency made the code development of such applications complicated and error-prone. Conventional code development environments or IDEs, such as Microsoft Visual Studio, provide little programming support in this regard. Furthermore, ensuring the correctness of a message passing system is a challenge. Typically, it is important to guarantee that a system meets its desired specifications along its construction process. Model checking is one of the techniques used in software verification which has proven to …
Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez
Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez
Electrical and Computer Engineering Faculty Publications
Fast nonuniform interpolation based super-resolution (SR) has traditionally been limited to applications with translational interframe motion. This is in part because such methods are based on an underlying assumption that the warping and blurring components in the observation model commute. For translational motion this is the case, but it is not true in general. This presents a problem for applications such as airborne imaging where translation may be insufficient. Here we present a new Fourier domain analysis to show that, for many image systems, an affine warping model with limited zoom and shear approximately commutes with the point spread function …
Context-Driven Agents In Computer Supported Cooperative Works, Brian D. Lichtman
Context-Driven Agents In Computer Supported Cooperative Works, Brian D. Lichtman
HIM 1990-2015
This thesis describes a research project that investigates the level of contextualization needed to successfully build context-driven agents that can manage a cooperative project. Many times in industry, collaborators in a large project may be located vast distances from each other. It is for this reason that management of such projects can often be difficult. The purpose of this research is to design an agent that can take on the role of a project manager (PM) to assist the human project manager. Specifically, this thesis looks to give such project management agents full situational awareness. It is hypothesized that only …
Accelerating Pattern Recognition Algorithms On Parallel Computing Architectures, Kenneth Rice
Accelerating Pattern Recognition Algorithms On Parallel Computing Architectures, Kenneth Rice
All Dissertations
The move to more parallel computing architectures places more responsibility on the programmer to achieve greater performance. The programmer must now have a greater understanding of the underlying architecture and the inherent algorithmic parallelism. Using parallel computing architectures for exploiting algorithmic parallelism can be a complex task. This dissertation demonstrates various techniques for using parallel computing architectures to exploit algorithmic parallelism. Specifically, three pattern recognition (PR) approaches are examined for acceleration across multiple parallel computing architectures, namely field programmable gate arrays (FPGAs) and general purpose graphical processing units (GPGPUs).
Phase-only filter correlation for fingerprint identification was studied as the first …