Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (115)
- Singapore Management University (34)
- Washington University in St. Louis (34)
- Embry-Riddle Aeronautical University (32)
- TÜBİTAK (25)
-
- Air Force Institute of Technology (20)
- University of Central Florida (19)
- Old Dominion University (11)
- Missouri University of Science and Technology (10)
- Institute of Business Administration (8)
- University of Nebraska - Lincoln (7)
- Selected Works (5)
- SelectedWorks (5)
- Portland State University (4)
- Technological University Dublin (4)
- California Polytechnic State University, San Luis Obispo (3)
- Utah State University (3)
- University of Kentucky (2)
- University of Nevada, Las Vegas (2)
- American University in Cairo (1)
- Chapman University (1)
- Florida International University (1)
- Kennesaw State University (1)
- Munster Technological University (1)
- University of Denver (1)
- University of New Haven (1)
- University of South Florida (1)
- University of Texas at El Paso (1)
- Keyword
-
- Computer networks--Security measures (7)
- Department of Computer Science and Engineering (7)
- Bayesian Networks (5)
- Steganography (5)
- #antcenter (4)
-
- Electrical Power Systems (4)
- Arithmetic Circuits (3)
- Bandwidth (3)
- Biometrics (3)
- Classification (3)
- Clustering (3)
- Computer security (3)
- Data mining (3)
- Diagnosis (3)
- Drone aircraft--Control systems (3)
- Genetic algorithms (3)
- Image processing (3)
- Algorithms (2)
- Authentication (2)
- Bayesian networks (2)
- Bioinformatics (2)
- Commodity Trading (2)
- Computer software (2)
- Computer vision (2)
- Context (2)
- Costs (2)
- Cryptography (2)
- Data protection (2)
- EMC (2)
- Electromagnetic Compatibility (2)
- Publication
-
- Computer Science & Engineering Syllabi (100)
- All Computer Science and Engineering Research (34)
- Research Collection School Of Computing and Information Systems (34)
- Turkish Journal of Electrical Engineering and Computer Sciences (25)
- Electronic Theses and Dissertations (20)
-
- Journal of Digital Forensics, Security and Law (20)
- Theses and Dissertations (19)
- Annual ADFSL Conference on Digital Forensics, Security and Law (11)
- Electrical and Computer Engineering Faculty Research & Creative Works (9)
- Computer Science and Engineering Faculty Publications (8)
- International Conference on Information and Communication Technologies (8)
- Browse all Theses and Dissertations (7)
- Ole J Mengshoel (5)
- Electrical & Computer Engineering Theses & Dissertations (4)
- CSE Technical Reports (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Dissertations and Theses (3)
- Electrical & Computer Engineering Faculty Publications (3)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (2)
- Chien Hsun Chen (2)
- Chunping Hu (2)
- Computer Science Faculty Publications (2)
- Conference Papers (2)
- Master's Theses (2)
- Publications (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- Alexandre Martin (1)
- Archived Theses and Dissertations (1)
- Articles (1)
- CSE Conference and Workshop Papers (1)
Articles 1 - 30 of 352
Full-Text Articles in Engineering
Biological Sequence Simulation For Testing Complex Evolutionary Hypotheses: Indel-Seq-Gen Version 2.0, Cory L. Strope
Biological Sequence Simulation For Testing Complex Evolutionary Hypotheses: Indel-Seq-Gen Version 2.0, Cory L. Strope
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Reconstructing the evolutionary history of biological sequences will provide a better understanding of mechanisms of sequence divergence and functional evolution. Long-term sequence evolution includes not only substitutions of residues but also more dynamic changes such as insertion, deletion, and long-range rearrangements. Such dynamic changes make reconstructing sequence evolution history difficult and affect the accuracy of molecular evolutionary methods, such as multiple sequence alignments (MSAs) and phylogenetic methods. In order to test the accuracy of these methods, benchmark datasets are required. However, currently available benchmark datasets have limitations in their sizes and evolutionary histories of the included sequences are unknown. These …
Exercise Power Grid Display And Web Interface, Alexander (Alex) Chernetz
Exercise Power Grid Display And Web Interface, Alexander (Alex) Chernetz
Computer Engineering
The 2008-2009 expansion of the Recreation Center at Cal Poly includes three new rooms with cardiovascular fitness equipment. As part of its ongoing commitment to sustainable development, the new machines connect to the main power grid and generate power during a workout. This document explains the process of quantifying and expressing the power generated using two interfaces: an autonomous display designed for a television with a text size and amount of detail adaptable to multiple television sizes and viewing distances, and an interactive, more detailed Web interface accessible with any Java-capable computer system or browser.
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
Master's Theses
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …
A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li
A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li
Research Collection School Of Computing and Information Systems
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency …
Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan
Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan
Research Collection School Of Computing and Information Systems
Proper maintenance strategies are very desirable for minimizing the operational and maintenance costs of power systems without sacrificing reliability. Condition-based maintenance has largely replaced time-based maintenance because of the former's potential economic benefits. As offshore substations are often remotely located, they experience more adverse environments, higher failures, and therefore need more powerful analytical tools than their onshore counterpart. As reliability information collected during operation of an offshore substation can rarely avoid uncertainties, it is essential to obtain consistent estimates of reliability measures under changing environmental and operating conditions. Some attempts with type-1 fuzzy logic were made with limited success in …
Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan
Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
This paper presents an efficient and effective solution for retrieving image near-duplicate (IND) from image database. We introduce the coherent phrase model which incorporates the coherency of local regions to reduce the quantization error of the bag-of-words (BoW) model. In this model, local regions are characterized by visual phrase of multiple descriptors instead of visual word of single descriptor. We propose two types of visual phrase to encode the coherency in feature and spatial domain, respectively. The proposed model reduces the number of false matches by using this coherency and generates sparse representations of images. Compared to other method, the …
Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins
Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins
Faculty Publications
The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and …
Classification, Clustering And Data-Mining Of Biological Data, Thomas Triplet
Classification, Clustering And Data-Mining Of Biological Data, Thomas Triplet
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The proliferation of biological databases and the easy access enabled by the Internet is having a beneficial impact on biological sciences and transforming the way research is conducted. There are currently over 1100 molecular biology databases dispersed throughout the Internet. However, very few of them integrate data from multiple sources. To assist in the functional and evolutionary analysis of the abundant number of novel proteins, we introduce the PROFESS (PROtein Function, Evolution, Structure and Sequence) database that integrates data from various biological sources. PROFESS is freely available athttp://cse.unl.edu/~profess/. Our database is designed to be versatile and expandable and will not …
Rigid And Non-Rigid Point-Based Medical Image Registration, Nestor Andres Parra
Rigid And Non-Rigid Point-Based Medical Image Registration, Nestor Andres Parra
FIU Electronic Theses and Dissertations
The primary goal of this dissertation is to develop point-based rigid and non-rigid image registration methods that have better accuracy than existing methods. We first present point-based PoIRe, which provides the framework for point-based global rigid registrations. It allows a choice of different search strategies including (a) branch-and-bound, (b) probabilistic hill-climbing, and (c) a novel hybrid method that takes advantage of the best characteristics of the other two methods. We use a robust similarity measure that is insensitive to noise, which is often introduced during feature extraction. We show the robustness of PoIRe using it to register images obtained with …
Adaptive Distributed Fair Scheduling For Multiple Channels In Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani, Steve Eugene Watkins, James W. Fonda
Adaptive Distributed Fair Scheduling For Multiple Channels In Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani, Steve Eugene Watkins, James W. Fonda
Electrical and Computer Engineering Faculty Research & Creative Works
A novel adaptive and distributed fair scheduling (ADFS) scheme for wireless sensor networks (WSN) in the presence of multiple channels (MC-ADFS) is developed. The proposed MC-ADFS increases available network capacity and focuses on quality-of-service (QoS) issues. when nodes access a shared channel, the proposed MC-ADFS allocates the channel bandwidth proportionally to the packet's weight which indicates the priority of the packet's flow. The packets are dynamically assigned to channels based on the packet weight and current channel utilization. The dynamic assignment of channels is facilitated by use of receiver-based allocation and alternative routes. Moreover, MC-ADFS allows the dynamic allocation of …
3d Reconstruction And Visualization Of A Hovering Dragonfly, Christopher Koehler, Thomas Wischgoll, Haibo Dong, Zachary Gaston, Hui Wan
3d Reconstruction And Visualization Of A Hovering Dragonfly, Christopher Koehler, Thomas Wischgoll, Haibo Dong, Zachary Gaston, Hui Wan
Computer Science and Engineering Faculty Publications
No abstract provided.
Fantom - Lessons Learned From Design, Implementation, Administration, And Use Of A Visualization System For Over 10 Years, Alexander Wiebel, Christoph Garth, Mario Hlawitschka, Thomas Wischgoll, Gerik Scheuermann
Fantom - Lessons Learned From Design, Implementation, Administration, And Use Of A Visualization System For Over 10 Years, Alexander Wiebel, Christoph Garth, Mario Hlawitschka, Thomas Wischgoll, Gerik Scheuermann
Computer Science and Engineering Faculty Publications
No abstract provided.
Ceg 210: Pc Networking I, Chris P. Fickert
Ceg 210: Pc Networking I, Chris P. Fickert
Computer Science & Engineering Syllabi
Introduction to networking technologies including infrastructure and architectures, standards, protocols and directory services, administration, security and management. Integrated lecture and lab.
Cs 141: Computer Programming - I, Michael Ondrasek
Cs 141: Computer Programming - I, Michael Ondrasek
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language. Students must register for both lecture and one laboratory section. 4 credit hours. Prerequisite: MTH 127 (College Algebra) or equivalent.
Cs 205-08: Introduction To Computers And Office Productivity Software, Kim Gros
Cs 205-08: Introduction To Computers And Office Productivity Software, Kim Gros
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 208: Computer Programming For Business I, David M. Hutchison
Cs 208: Computer Programming For Business I, David M. Hutchison
Computer Science & Engineering Syllabi
CS 208 is the first In a sequence of two programming classes required for MIS majors. This course will introduce students to the basic concepts of programming. Examples are from business applications and display graphics and emphasis is on problem solving with the computer as a tool.
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Computer Science & Engineering Syllabi
CS 209 is the second of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming.
Cs 240: Computer Programming I, Sarah Gothard
Cs 240: Computer Programming I, Sarah Gothard
Computer Science & Engineering Syllabi
Basic concepts of programming and programming languages are introduced.
Emphasis is on structured programming and stepwise refinement.
Cs 214: Visual Basic Programming, Vanessa Starkey
Cs 214: Visual Basic Programming, Vanessa Starkey
Computer Science & Engineering Syllabi
This course will cover the fundamentals of object-oriented computer
programming including design, structure, debugging, and testing. Visual Basic 2008 will be used for
developing programs.
Cs 242: Computer Programming Iii, Mateen M. Rizki
Cs 242: Computer Programming Iii, Mateen M. Rizki
Computer Science & Engineering Syllabi
No abstract provided.
Cs 302-01: Introduction To Oracle Sql Databases, Karen Meyer
Cs 302-01: Introduction To Oracle Sql Databases, Karen Meyer
Computer Science & Engineering Syllabi
No abstract provided.
Cs 241: Computer Science Ii, Travis E. Doom
Cs 241: Computer Science Ii, Travis E. Doom
Computer Science & Engineering Syllabi
A continuation of CS240. The emphasis is on data abstraction and software engineering. Prerequisite: CS240.
Cs 340: Programming Language Workshop In Python, Krishnaprasad Thirunarayan
Cs 340: Programming Language Workshop In Python, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course is designed as a self-study in Python. You are expected to learn the language and solve a set of programming problems assigned to you from Dietel et al using Python available from http://www.python.org. There are no exams. We officially meet only once in the quarter. However, I will be available in the posted office hours for clarifications and discussions about the programming problems.
Cs 405/605-02: Introduction To Database Management Systems, Keke Chen
Cs 405/605-02: Introduction To Database Management Systems, Keke Chen
Computer Science & Engineering Syllabi
This course will cover the following topics: (1) Logical and physical aspects of database management systems (2) Data models including entity-relationship (ER) and relational models (3) Physical implementation (data organization and indexing) methods. (4) Query languages including SQL, relational algebra, and relational calculus. Students will gain experience in creating and manipulating a database, and gain knowledge on professional and ethical responsibility and on the importance of privacy/security of data.
Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp
Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp
Computer Science & Engineering Syllabi
This course is an introduction to one of the fundamental topics in the theory of computer science: computability theory. Computability theory is concerned with determining whether there is an algorithmic solution to a problem. The study of computability uses the Turing machine as the basic computational model. A Turing machine is a random access, read-write, finite state automaton. Although the Turing machine provides a simple computational framework, the Church-Turing thesis asserts that any problem that can be solved in any algorithmic manner can be solved by a Turing machine.
Cs 409/609: Principles Of Artificial Intelligence, Shaojun Wang
Cs 409/609: Principles Of Artificial Intelligence, Shaojun Wang
Computer Science & Engineering Syllabi
No abstract provided.
Cs 475/675: Web Information Systems, Amit P. Sheth
Cs 475/675: Web Information Systems, Amit P. Sheth
Computer Science & Engineering Syllabi
This course covers advanced topics in managing W eh-based resources, with a focus on building applications involving heterogeneous data. It will expose students to the following concept, topics, architectures, techniques, and technologies:
• data, metadata, information, knowledge, and ontologies
• unstructured, semi-structured, structured, multimodal, multimedia, and sensor data syntax,
structural/representational, and semantic aspects of data
• architectures: federated databases, mediator, information brokering
• integration and analysis of Web-based information
• automatic information/metadata extraction (entity identification/recognition, disambiguation)
• Web search engines, social networks, Web 2.0
• Semantic Web and Web 3.0
• relevant Web standards and technologies
• real-world examples that …
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Computer Science & Engineering Syllabi
CS 466/666 is an introduction to formal language and automata theory. In this course we will examine methods for defining syntax of languages and recognizing patterns: the syntax of languages can be defined using grammars and patterns accepted by finite state machines. Along with presenting the fundamentals of these two topics, the course will develop and investigate the relationships between language definition and pattern recognition. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science, by Thomas Sudkamp.
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course will introduce fundamental concepts and paradigms underlying the design of modem programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java), and a functional language (e.g., Scheme) . The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will be coded in Java 5 and in scheme.
Cs 499/699: Special Topics In Information Security, Meilin Liu
Cs 499/699: Special Topics In Information Security, Meilin Liu
Computer Science & Engineering Syllabi
This course gives a comprehensive study of security vulnerabilities in information systems and the basic techniques for developing secure applications and practicing safe computing. Topics include: Conventional encryption; Data Encryption Standard; Advanced Encryption Standard; Hashing functions and data integrity; Basic Number Theory; Public-key encryption (RSA); Digital signature; Security standards and applications; Access Control; Management and analysis of security. After taking this course, students will have the knowledge of several well-known security standards and their applications; and the students should be able to increase system security and develop secure applications.