Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (3)
- Other Computer Engineering (3)
- Computational Engineering (2)
- Electrical and Computer Engineering (2)
- Physical Sciences and Mathematics (2)
-
- Signal Processing (2)
- Astrophysics and Astronomy (1)
- Computer Sciences (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Hardware Systems (1)
- Information Security (1)
- Law (1)
- Legislation (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Electrical and Computer Engineering (1)
- Physics (1)
- Power and Energy (1)
- Systems and Communications (1)
- Keyword
-
- Amazon AWS (1)
- Approximation Algorithms (1)
- Cloud computing (1)
- Computer Vision (1)
- Computer architecture (1)
-
- Computer security (1)
- Coordinate Ascent (1)
- Cybersecurity (1)
- Education (1)
- Electron beam deposition (1)
- Electronic signatures (1)
- Filter Technique (1)
- Future Internet (1)
- Future Internet Architecture (1)
- Graph Coarsening (1)
- ICD-9 (1)
- Image Processing (1)
- Information Retrieval (1)
- Kentucky (1)
- Learning-to-Rank (1)
- Magnetic fields (1)
- Magnetic films (1)
- Maximum power point tracker (1)
- MeSH (1)
- Metaheuristic (1)
- Mining software repositories (1)
- Multilevel Approaches (1)
- Network security (1)
- Parameter Turning (1)
- Path Selection (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Electronic Signatures: Review And Analysis, Bryan Gibson
Electronic Signatures: Review And Analysis, Bryan Gibson
Kentucky Transportation Center Technical Assistance Report
Electronic signatures, or e-signatures, are an increasingly ubiquitous component of a rapidly digitizing world. Compared to traditional paper signature, e-signatures have emerged as a viable, potentially more efficient method of entering into a contract. An e-signature can be thought of as an electronic symbol or marking associated with the signer. It acts as a signature and functions in lieu of a manual paper signature. This technical assistance report briefly reviews relevant Kentucky statutes and guidelines regarding e-signatures and public recordkeeping as well as applicable federal law. Following this, the report presents conclusions and points for continued discussion. Relevant statues and …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong
Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong
Physics and Astronomy Faculty Publications
The static and dynamic magnetic responses of patterned ferromagnetic thin films are uniquely altered in the case of aperiodic patterns that retain long-range order (e.g., quasicrystals). We have fabricated permalloy wire networks based on periodic square antidot lattices (ADLs) distorted according to an aperiodic Fibonacci sequence applied to two lattice translations, d1 = 1618 nm and d2 = 1000 nm. The wire segment thickness is fixed at t = 25 nm, and the width W varies from 80 to 510 nm. We measured the DC magnetization between room temperature and 5 K. Room-temperature, narrow-band (9.7 GHz) ferromagnetic resonance …
Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil
Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil
Theses and Dissertations--Computer Science
Despite the world-changing success of the Internet, shortcomings in its routing and forwarding system have become increasingly apparent. One symptom is an escalating tension between users and providers over the control of routing and forwarding of packets: providers understandably want to control use of their infrastructure, and users understandably want paths with sufficient quality-of-service (QoS) to improve the performance of their applications. As a result, users resort to various “hacks” such as sending traffic through intermediate end-systems, and the providers fight back with mechanisms to inspect and block such traffic.
To enable users and providers to jointly control routing and …
Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin
Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin
Theses and Dissertations--Computer Science
In this dissertation, we focus on solving forest transportation planning related problems, including constraints that consider negative environmental impacts and multi-objective optimizations that provide forest managers and road planers alternatives for making informed decisions. Along this line of study, several multilevel techniques and mataheuristic algorithms have been developed and investigated. The forest transportation planning problem is a fixed-charge problem and known to be NP-hard. The general idea of utilizing multilevel approach is to solve the original problem of which the computational cost maybe prohibitive by using a set of increasingly smaller problems of which the computational cost is cheaper.
The …
A Network Path Advising Service, Xiongqi Wu
A Network Path Advising Service, Xiongqi Wu
Theses and Dissertations--Computer Science
A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between a source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will present applications with a set of paths and allow them to select the most appropriate path. Although this enables applications to be actively involved in the selection of the paths their packets travel, the huge number of potential paths and the need to know the current network conditions of each …
Misfit: Mining Software Fault Information And Types, Billy R. Kidwell
Misfit: Mining Software Fault Information And Types, Billy R. Kidwell
Theses and Dissertations--Computer Science
As software becomes more important to society, the number, age, and complexity of systems grow. Software organizations require continuous process improvement to maintain the reliability, security, and quality of these software systems. Software organizations can utilize data from manual fault classification to meet their process improvement needs, but organizations lack the expertise or resources to implement them correctly.
This dissertation addresses the need for the automation of software fault classification. Validation results show that automated fault classification, as implemented in the MiSFIT tool, can group faults of similar nature. The resulting classifications result in good agreement for common software faults …
Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu
Theses and Dissertations--Computer Science
Many manual biomedical annotation tasks can be categorized as instances of the typical multi-label classification problem where several categories or labels from a fixed set need to assigned to an input instance. MeSH term assignment to biomedical articles and diagnosis code extraction from medical records are two such tasks. To address this problem automatically, in this thesis, we present a way to utilize latent associations between labels based on output label sets. We used random indexing as a method to determine latent associations and use the associations as a novel feature in a learning-to-rank algorithm that reranks candidate labels selected …
Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang
Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang
Theses and Dissertations--Electrical and Computer Engineering
Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high …
Stargrazer One: A New Architecture For Distributed Maximum Power Point Tracking Of Solar Photovoltaic Sources, Edgard Munoz-Coreas
Stargrazer One: A New Architecture For Distributed Maximum Power Point Tracking Of Solar Photovoltaic Sources, Edgard Munoz-Coreas
Theses and Dissertations--Electrical and Computer Engineering
The yield from a solar photovoltaic (PV) source is dependent on factors such as light and temperature. A control system called a maximum power point tracker (MPPT) ensures that the yield from a solar PV source is maximized in spite of these factors. This thesis presents a novel implementation of a perturb and observe (PO) MPPT.
The implementation uses a switched capacitor step down converter and a custom digital circuit implementation of the PO algorithm. Working in tandem, the switched capacitor step down converter and the custom digital circuit implementation were able to successfully track the maximum power point of …