Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Hardware And Software (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li Oct 2018

Hardware And Software (Ksu), Rebecca Rutherfoord, Dawn Tatum, Susan Vandeven, Richard Halstead-Nussloch, James Rutherfoord, Zhigang Li

Computer Science and Information Technology Grants Collections

This Grants Collection for Hardware and Software was created under a Round Eleven ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


User's Manual For Tardigrade Risk Assessment, Alexis M. Shook May 2018

User's Manual For Tardigrade Risk Assessment, Alexis M. Shook

University of New Orleans Theses and Dissertations

This user-guide provides instructions for operating Tardigrade 1.1.3, a cybersecurity software for Nollysoft, LLC. This guide instructs users step-by-step on how to set security controls, risk assessments, and administrative maintenance. Tardigrade 1.1.3 is a Risk Assessment Enterprise that evaluates the risk level of corporations and offers solutions to any security gaps within an organization. Tardigrade 1.1.3 is a role-based software that operates through three modules, Cybersecurity Assessment, Internal Control, and Security Requirement Traceability Matrix.


Behavior-Based Authentication System, Taylor Means, Jared Frank Apr 2018

Behavior-Based Authentication System, Taylor Means, Jared Frank

Honors Theses AY 17/18

All current forms of authentication are exploitable via social engineering, theft, hacking, or replication. Due to this, a new form of authentication should be explored: behavioral. A solution to this problem would result in more secure digital environment, including physical access to computers as well as software access. The maze-solving approach presented by this project allows for multiple variables to be observed within a user, presenting many facets of behavior that can be analyzed. In order to solve this problem, enough parameters must be collected and contrasted against one another in order to tell different humans apart from each other ...


An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon Mar 2018

An Analysis Of Project Setup And Organization In Software, Adam Fitzgibbon

Honors Theses, University of Nebraska-Lincoln

The setup of a software project can greatly influence how efficiently software can be built. In this paper, I will be discussing my experiences with various software projects and their setups. These experiences will be used as a basis to draw conclusions on the strengths and weaknesses of specific project setups in certain situations.

Because of the complexity of building software, there isn’t a project setup that works optimally for solving every type of software-based problem. The best approach is to know what variations would best fit the situation and make design decisions from there.


Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos Jan 2018

Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos

Computational Medicine Center Faculty Papers

MINTbase is a repository that comprises nuclear and mitochondrial tRNA-derived fragments ('tRFs') found in multiple human tissues. The original version of MINTbase comprised tRFs obtained from 768 transcriptomic datasets. We used our deterministic and exhaustive tRF mining pipeline to process all of The Cancer Genome Atlas datasets (TCGA). We identified 23 413 tRFs with abundance of ≥ 1.0 reads-per-million (RPM). To facilitate further studies of tRFs by the community, we just released version 2.0 of MINTbase that contains information about 26 531 distinct human tRFs from 11 719 human datasets as of October 2017. Key new elements include: the ...


Exploration Of Audio Synthesizers, Timothy Lindquist Jan 2018

Exploration Of Audio Synthesizers, Timothy Lindquist

Creative Components

In this creative component, I explore how synthesizers originated as well as the various techniques available for complex signal generation. The primary synthesis techniques researched were Additive, Subtractive, Frequency Modulation, and Sample-Based Synthesis. After extensive background information was examined, a series of MATLAB scripts were created to verify the synthesis implementation and demonstrate understanding. Following this, I set out to design my own hybrid synthesizer using a combination of the various techniques learned. The synthesizer created is a polyphonic composition device capable of audio generation as well as audio manipulation. It demonstrates core principles from each of the researched techniques ...