Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (146)
- California State University, San Bernardino (136)
- SelectedWorks (112)
- California Polytechnic State University, San Luis Obispo (105)
- Singapore Management University (85)
-
- Portland State University (79)
- Air Force Institute of Technology (53)
- University of Arkansas, Fayetteville (48)
- University of Nebraska - Lincoln (48)
- Old Dominion University (45)
- Technological University Dublin (43)
- University of Massachusetts Amherst (43)
- University of Tennessee, Knoxville (33)
- Florida International University (31)
- University of Nevada, Las Vegas (26)
- Embry-Riddle Aeronautical University (24)
- Association of Arab Universities (23)
- Kennesaw State University (21)
- Western University (21)
- University of Kentucky (19)
- Purdue University (17)
- Syracuse University (16)
- University of Pennsylvania Carey Law School (16)
- The University of Akron (15)
- City University of New York (CUNY) (14)
- Kansas State University Libraries (13)
- Morehead State University (13)
- University of New Mexico (13)
- University of North Florida (13)
- Cleveland State University (12)
- Keyword
-
- Inventive Problem Solving (50)
- TRIZ (45)
- Software Patents (34)
- Graphical User Interface (32)
- Security (29)
-
- Software inventions (29)
- Machine learning (24)
- Computer architecture (20)
- Cybersecurity (20)
- GUI (20)
- Innovation (20)
- Computer Hardware (19)
- Computer Keyboard (19)
- Hardware Inventions (19)
- Computer science (18)
- Android (17)
- Blockchain (17)
- Deep learning (17)
- Keyboard design (17)
- Simulation (17)
- Software Inventions (17)
- Information Retrieval (16)
- Technology (16)
- Cloud computing (15)
- FPGA (15)
- Internet (15)
- Invention (15)
- Privacy (15)
- Cloud Computing (14)
- GUI design (14)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (108)
- Research Collection School Of Computing and Information Systems (79)
- Theses and Dissertations (65)
- Umakant Mishra (59)
- Computer Engineering (46)
-
- Computer Science Faculty Publications and Presentations (44)
- Master's Theses (39)
- Masters Theses (35)
- Doctoral Dissertations (31)
- FIU Electronic Theses and Dissertations (31)
- Graduate Theses and Dissertations (29)
- Dr Deogratias Harorimana (24)
- Electronic Theses and Dissertations (24)
- Computational Modeling & Simulation Engineering Faculty Publications (23)
- Electronic Theses, Projects, and Dissertations (22)
- Future Computing and Informatics Journal (22)
- Electronic Thesis and Dissertation Repository (20)
- Hong-Ning Dai (17)
- All Faculty Scholarship (16)
- Conference papers (16)
- Publications (16)
- Computer Science and Software Engineering (15)
- Williams Honors College, Honors Research Projects (15)
- Dissertations and Theses (14)
- Library Philosophy and Practice (e-journal) (14)
- Morehead State Theses and Dissertations (13)
- UNF Graduate Theses and Dissertations (13)
- Central Plains Network for Digital Asset Management (12)
- Robert A Iannucci (12)
- College of Engineering and Computing Course Catalogs (11)
- Publication Type
Articles 61 - 90 of 1639
Full-Text Articles in Computer Engineering
Optimizing High-Performance Computing Design: The Impacts Of Bandwidth And Topology Across Workloads For Distributed Shared Memory Systems, Jonathan A. Milton
Optimizing High-Performance Computing Design: The Impacts Of Bandwidth And Topology Across Workloads For Distributed Shared Memory Systems, Jonathan A. Milton
Electrical and Computer Engineering ETDs
With the complexity of high-performance computing designs continuously increasing, the importance of evaluating with simulation also grows. One of the key design aspects is the network architecture; topology and bandwidth greatly influence the overall performance and should be optimized. This work uses simulations written to run in the Structural Simulation Toolkit software framework to evaluate a variety of architecture configurations, identify the optimal design point based on expected workload, and evaluate the changes with increased scale. The results show that advanced topologies outperform legacy architectures justifying the additional design complexity; and that after a certain point increasing the bandwidth provides …
Evaluating An Mhealth Application For Cancer Survivors With Disabilities Through Usability Testing, Kevin Baez
Evaluating An Mhealth Application For Cancer Survivors With Disabilities Through Usability Testing, Kevin Baez
University Honors Program Senior Projects
The effect of cancer treatment can cause difficulties in a cancer survivor's life due to the risk of attaining a long-term disability which has potential negative cognitive, psychological, physical, and social consequences. Furthermore, post-treatment support has been shown to be severely limited, leaving many to deal with new obstacles and struggles on their own. With no real support system in place, cancer survivors with disabilities can be lost during post-cancer transition. However, mHealth interventions have been proven to effectively aid users in dealing with various health issues. We aim to support and empower cancer survivors through an application called, WeCanManage. …
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Chemical Technology, Control and Management
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Conference Papers
Regularizing polygons involves simplifying irregular and noisy shapes of built environment objects (e.g. buildings) to ensure that they are accurately represented using a minimum number of vertices. It is a vital processing step when creating/transmitting online digital maps so that they occupy minimal storage space and bandwidth. This paper presents a data-driven and Deep Learning (DL) based approach for regularizing OpenStreetMap building polygon edges. The study introduces a building footprint regularization technique (Poly-GAN) that utilises a Generative Adversarial Network model trained on irregular building footprints and OSM vector data. The proposed method is particularly relevant for map features …
Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth
Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth
Computer Engineering
PolyFlowBuilder is a web application that lets users create visually intuitive flowcharts to aid in academic planning at Cal Poly. These flowcharts can be customized in a variety of ways to accurately represent complex academic plans, such as double majors, minors, taking courses out- of-order, etc. The original version of PolyFlowBuilder, released Summer 2020, was not written for continued expansion and growth. Therefore, a complete rewrite was determined to be necessary to enable the project to grow in the future. This report details the process to completely rewrite the existing version of PolyFlowBuilder over the course of six months, using …
Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin
Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin
Master's Theses
Massively multiplayer online role-playing games (MMORPGs) are one of the most
popular genres in video games that combine massively multiplayer online genres with
role-playing gameplay. MMORPGs’ featured social interaction and forms of level pro-
gression through quest completion are the core for gaining players’ attention. Varied
and challenging quests play an essential part in retaining that attention. However,
well-crafted content takes much longer to develop with human efforts than it does to
consume, and the dominant procedural content generation models for quests suffer
from the drawback of being incompatible with dynamic world changes and the feeling
of repetition over time. …
Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy
Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy
Al-Bahir Journal for Engineering and Pure Sciences
The proliferation of social networking sites and their user base has led to an exponential increase in the amount of data generated on a daily basis. Textual content is one type of data that is commonly found on these platforms, and it has been shown to have a significant impact on decision-making processes at the individual, group, and national levels. One of the most important and largest part of this data are the texts that express human intentions, feelings and condition. Understanding these texts is one of the biggest challenges that facing data analysis. It is the backbone for understanding …
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
36th Florida Conference on Recent Advances in Robotics
According to "The World Report on Vision" by World Health Organization (WHO) [1], there are more than 2.2 billion people who have near or distant vision Impairments, out of which 36 million people are classified as entirely blind. This report also emphasizes the importance of social and communal support in enabling individuals with vision impairments to integrate into society and reach their full potential. While performing daily activities and navigating the environment, people with visual impairments (PVIs) often require direct or synchronous assistance [2]. Consequently, there is a growing need for automated solutions to assist in this regard. However, existing …
Tech Time
DePaul Magazine
DePaul is embracing tech more than ever, incorporating innovative devices and approaches into education in all corners of the university. Here are seven ways DePaul provides hands-on experiences with cutting-edge tools that position students and faculty in the forefront of their industries and disciplines.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong
Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong
McKelvey School of Engineering Theses & Dissertations
Adversarial patch attack has demonstrated that it can cause the misclassification of deep neural networks to the target label when the size of patch is relatively small to the size of input image; however, the effectiveness of adversarial patch attack has never been experimented on deep reinforcement learning algorithms. We design algorithms to generate adversarial patches to attack two types of deep reinforcement learning algorithms, including deep Q-networks (DQN) and proximal policy optimization (PPO). Our algorithms of generating adversarial patch consist of two parts: choosing attack position and training adversarial patch on that position. Under the same bound of total …
Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial
Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial
Electrical and Computer Engineering ETDs
Radionuclide spectroscopic sensor data is analyzed with minimal power consumption through the use of neuromorphic computing architectures. Memristor crossbars are harnessed as the computational substrate in this non-conventional computing platform and integrated with CMOS-based neurons to mimic the computational dynamics observed in the mammalian brain’s visual cortex. Functional prototypes using spiking sparse locally competitive approximations are presented. The architectures are evaluated for classification accuracy and energy efficiency. The proposed systems achieve a 90% true positive accuracy with a high-resolution detector and 86% with a low-resolution detector.
Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp
Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp
Masters Theses, 2020-current
Ethereum, the decentralized global software platform powered by blockchain technology known for its native cryptocurrency, Ether (ETH), provides a technology stack for building apps, holding assets, transacting, and communicating without control by a central authority. At the core of Ethereum’s network is a suite of purpose-built protocols known as DEVP2P, which provides the underlying nodes in an Ethereum network the ability to discover, authenticate and communicate confidentiality. This document discusses the creation of a new Wireshark dissector for DEVP2P’s discovery protocols, DiscoveryV4 and DiscoveryV5, and a dissector for RLPx, an extensible TCP transport protocol for a range of Ethereum node …
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe
Publications and Research
Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Computer Science and Computer Engineering Undergraduate Honors Theses
The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …
Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks
Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks
Computer Science and Computer Engineering Undergraduate Honors Theses
The SPAR-2 array processor was designed as an overlay architecture for implementation on Xilinx Field Programmable Gate Arrays (FPGAs). As an overlay, the SPAR-2 array processor can be configured to take advantage of the specific resources available on different FPGAs. However once configured, the SPAR-2 requires programmer’s to have knowledge of the low level architecture, and write platform-specific code. In this thesis SVAR, a hardware/software co-designed virtual machine, is proposed that runs on the SPAR-2. SVAR allows programmers to write portable, platform-independent code once and have it interpreted for any specific configuration. Results are presented that verify the virtual machine …
Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor
Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor
Undergraduate Honors Theses
Systems like Google Home, Alexa, and Siri that use voice-based authentication to verify their users’ identities are vulnerable to voice replay attacks. These attacks gain unauthorized access to voice-controlled devices or systems by replaying recordings of passphrases and voice commands. This shows the necessity to develop more resilient voice-based authentication systems that can detect voice replay attacks.
This thesis implements a system that detects voice-based replay attacks by using deep learning and image classification of voice spectrograms to differentiate between live and recorded speech. Tests of this system indicate that the approach represents a promising direction for detecting voice-based replay …
Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera
Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera
Electronic Theses, Projects, and Dissertations
This culminating experience sought to lay the foundation for a miniaturized physical SCADA testbed to be built at California State University San Bernardino to enable students to apply the cybersecurity knowledge, skills and abilities in a fun and engaging environment while learning about what SCADA is, how it works, and how to improve the security of it. This project was conducted in response to a growing trend of cybersecurity attacks that have targeted our critical infrastructure systems through SCADA systems which are legacy systems that manage critical infrastructure systems within the past 10 years. Since SCADA systems require constant availability, …
Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo
Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo
Research Collection School Of Computing and Information Systems
Machine learning (ML) has gained much attention and has been incorporated into our daily lives. While there are numerous publicly available ML projects on open source platforms such as GitHub, there have been limited attempts in filtering those projects to curate ML projects of high quality. The limited availability of such a high-quality dataset poses an obstacle to understanding ML projects. To help clear this obstacle, we present NICHE, a manually labelled dataset consisting of 572 ML projects. Based on the evidence of good software engineering practices, we label 441 of these projects as engineered and 131 as non-engineered. This …
Government Aid Portal, Darshan Togadiya
Government Aid Portal, Darshan Togadiya
Electronic Theses, Projects, and Dissertations
In today’s world, contacting government officials seems a big task when it comes to reporting small concerns. There are many authorities and officials which makes it very difficult for ordinary people to figure out who they should contact to resolve their daily issues. To address this problem, I have developed an application which can act as intermediary between citizens and government authorities. This portal will enable locals to submit complaints regarding personal or general issues through a complaint form, which will then be routed to the appropriate government department. Once a complaint is filed, government teams are immediately alerted and …
Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap
Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap
Culminating Experience Projects
In my master’s project, I used Terraform to create a scalable infrastructure on Amazon Web Services (AWS) for my personal website. Terraform is an open-source infrastructure-as-code (IAC) tool that allows you to create, manage and provision infrastructure resources, such as virtual machines, storage accounts, networks, and more, across multiple cloud providers and on-premises data centers using a declarative configuration language. A scalable infrastructure is important because it enables a system or application to handle increasing amounts of traffic or workload without experiencing performance issues or downtime. It ensures that the system remains responsive, available, and reliable as an organization grows …
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Master of Science in Information Technology Theses
The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Chemical Technology, Control and Management
This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Cybersecurity Undergraduate Research Showcase
This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li
Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li
Bulletin of Chinese Academy of Sciences (Chinese Version)
Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
Bulletin of Chinese Academy of Sciences (Chinese Version)
In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research Showcase
Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …