Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (6)
- University of New Mexico (5)
- SelectedWorks (3)
- University of Nebraska - Lincoln (3)
- Old Dominion University (2)
-
- Purdue University (2)
- Technological University Dublin (2)
- University of Arkansas, Fayetteville (2)
- Western University (2)
- American University in Cairo (1)
- Bard College (1)
- Kennesaw State University (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Selected Works (1)
- The University of Southern Mississippi (1)
- Universidad de La Salle (1)
- University of Central Florida (1)
- University of Connecticut (1)
- University of North Florida (1)
- University of Rhode Island (1)
- University of Tennessee, Knoxville (1)
- Western Michigan University (1)
- Keyword
-
- Application (3)
- Art (2)
- Cloud computing (2)
- DSmT (2)
- Deep Learning (2)
-
- Information fusion (2)
- Networks (2)
- Quality of Service (2)
- Simulation (2)
- Software (2)
- VANET (2)
- 3D (1)
- 3D Publishing (1)
- 3D audio & video (1)
- Ad hoc Network (1)
- Algorithms (1)
- Android (1)
- Anomaly (1)
- App (1)
- Applied Machine Learning (1)
- Archaeological practice (1)
- Architecture (1)
- Artificial Intelligence (AI) (1)
- Artificial Intelligence and Cognitive Theory (1)
- Artificial intelligence (1)
- Autoencoders (1)
- Automation (1)
- Autonomous (1)
- Autonomous behaviours (1)
- Avatars (1)
- Publication Year
- Publication
-
- Branch Mathematics and Statistics Faculty and Staff Publications (3)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Computer Engineering (2)
- Computer Science and Computer Engineering Undergraduate Honors Theses (2)
- Electronic Thesis and Dissertation Repository (2)
-
- Master's Theses (2)
- African Conference on Information Systems and Technology (1)
- Amean S Al_Safi (1)
- Articles (1)
- Bulletin of TUIT: Management and Communication Technologies (1)
- Computer Science and Software Engineering (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Conference papers (1)
- Department of Anthropology: Faculty Publications (1)
- Discovery Undergraduate Interdisciplinary Research Internship (1)
- Dissertations (1)
- Doctoral Dissertations (1)
- Electrical Engineering (1)
- Faculty Publications (1)
- Honors Scholar Theses (1)
- Hooman Hoodeh (1)
- Human-Machine Communication (1)
- IP Theory (1)
- Ingeniería en Automatización (1)
- Jozsef A Toth Ph.D. (1)
- Library Philosophy and Practice (e-journal) (1)
- MFA Thesis Exhibit Catalogs (1)
- Mathematics & Statistics ETDs (1)
- Parallel Computing and Data Science Lab Technical Reports (1)
- Publication Type
- File Type
Articles 1 - 30 of 42
Full-Text Articles in Computational Engineering
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication
This is the complete volume of HMC Volume 6.
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer
Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer
Master's Theses
Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …
Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar
Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar
UNF Graduate Theses and Dissertations
This thesis introduces the Farming Lightweight Protocol (FLP) optimized for energy-restricted environments that depend upon secure communication, such as multi-robot information gathering systems within the vision of ``smart'' agriculture. FLP uses a hash-based message authentication code (HMAC) to achieve data integrity. HMAC implementations, resting upon repeated use of the SHA256 hashing operator, impose additional resource requirements and thus also impact system availability. We address this particular integrity/availability trade-off by proposing an energy-saving algorithmic engineering method on the internal SHA256 hashing operator. The energy-efficient hash is designed to maintain the original security benefits yet reduce the negative effects on system availability. …
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Discovery Undergraduate Interdisciplinary Research Internship
Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Theses and Dissertations
Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.
Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …
Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev
Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev
Bulletin of TUIT: Management and Communication Technologies
This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things. In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications), components according to test methods, performance, loading, security, etc.
Self && Self, Shuang Cai
Self && Self, Shuang Cai
Senior Projects Spring 2021
Seldom before the COVID-19 pandemic have so many people simultaneously had their lifestyle drastically changed in the same way. The forced physical isolation is, ironically, a communal experience. The sickening quarantine left everyone nothing but time to confront and reconnect with themselves. Another inevitable result of corporal isolation is the predominant awakening awareness of digital existences and connections. Evoking the shared sensitivity and delicacy, studying the tectonic activity of the digital world, the project documents the endured contemplation in the upcoming resurgence.
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
African Conference on Information Systems and Technology
Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …
Evaluating Driving Performance Of A Novel Behavior Planning Model On Connected Autonomous Vehicles, Keyur Shah
Evaluating Driving Performance Of A Novel Behavior Planning Model On Connected Autonomous Vehicles, Keyur Shah
Honors Scholar Theses
Many current algorithms and approaches in autonomous driving attempt to solve the "trajectory generation" or "trajectory following” problems: given a target behavior (e.g. stay in the current lane at the speed limit or change lane), what trajectory should the vehicle follow, and what inputs should the driving agent apply to the throttle and brake to achieve this trajectory? In this work, we instead focus on the “behavior planning” problem—specifically, should an autonomous vehicle change lane or keep lane given the current state of the system?
In addition, current theory mainly focuses on single-vehicle systems, where vehicles do not communicate with …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Mathematics & Statistics ETDs
This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements …
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Electronic Thesis and Dissertation Repository
Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …
University Of Rhode Island Course Information Assistant, Daniel Gauthier
University Of Rhode Island Course Information Assistant, Daniel Gauthier
Senior Honors Projects
Personal voice-interactive systems have become ubiquitous in daily life. There are many of these digital assistants such as Siri, Alexa, and Google Assistant. The chances are high you have access to one right now. This technology has reached a point where the context of a conversation can be maintained, which is a vast improvement over earlier technology. Interactions without conversational context can limit interactions greatly and this was the case for previous digital assistants. Every time someone would say something to an assistant, it was like they were constantly changing operators on a customer service line. The assistants can now …
Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam
Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam
Faculty Publications
In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required derived the degrees of …
Recipe For Disaster, Zac Travis
Recipe For Disaster, Zac Travis
MFA Thesis Exhibit Catalogs
Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.
The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Department of Anthropology: Faculty Publications
While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Master's Theses
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Computer Science and Software Engineering
I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
Conference papers
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
Branch Mathematics and Statistics Faculty and Staff Publications
The paper aims to explain the technology of emergence of information. Our research proves that information as communicational product is the result of processing within some operations, actions, mechanisms and strategies of informational material meanings. Are determined eight computational-communicative operations of building information. Information occurs in two communication phases, syncretic and the segregation-synthetic. The syncretic phase consists of four operations: referral of significant field, primary delimitation of information, detection-looking information and an anticipative-draft constitution (feedforward). The segregation-synthetic phase also includes four operations: discrimination, identification, interpretation and confrontation (feedback). In the future we will investigate informational actions, mechanisms and strategies.
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Computer Engineering
“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2
In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Articles
Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.
Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo
Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo
Ingeniería en Automatización
Este trabajo describe el procedimiento y diseño para realizar una plataforma de realidad virtual basada en una planta pasteurizadora de leche, incluyendo la interfaz de usuario mediante periféricos digitales y etapas del proceso en la industria alimenticia de la leche. Para llevar a cabo este proyecto, se realiza un estudio de los tipos de pasteurización de leche que se aplican hoy en día. Este proceso varía según la cantidad de materia prima a pasteurizar, y a su vez depende de la distribución de la planta y selección de la instrumentación de la misma, de acuerdo a las normativas industriales existentes …
Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed
Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed
Parallel Computing and Data Science Lab Technical Reports
Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage, transfer, analysis and visualization. Integrating these big data sets (NGS+MS) for proteogenomics studies compounds all of the associated computational problems. Existing sequential algorithms for these proteogenomics datasets analysis are inadequate for big data and high performance computing (HPC) solutions are almost non-existent. The purpose of this …
Data Security And Privacy In Smart Grid, Yue Tong
Data Security And Privacy In Smart Grid, Yue Tong
Doctoral Dissertations
This dissertation explores novel data security and privacy problems in the emerging smart grid.
The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …
Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi
Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi
Amean S Al_Safi
The powerful computation of GPU has increased the computation speed up of many systems. This paper summarize some of the most important work in the field of communication and signal processing using GPU
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …