Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
-
- ActiveX (1)
- Coalgebra (1)
- Computer hackers (1)
- Computer networks (1)
- Computer program language (1)
-
- Computer programming (1)
- Computer science (1)
- Computer security (1)
- Computer vision. (1)
- Data sonification (1)
- Deception. (1)
- Descriptive general frames (1)
- Digital techniques (1)
- Dna sonification (1)
- Human face recognition (1)
- Image processing (1)
- Java (1)
- Kripke polynomial functors (1)
- Modal logic (1)
- Security measures (1)
- Security measures. (1)
- Stone spaces (1)
- Vietoris topology (1)
- World Wide Web (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Other Computer Engineering
Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema
Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema
Engineering Faculty Articles and Research
In this paper we argue that the category of Stone spaces forms an interesting base category for coalgebras, in particular, if one considers the Vietoris functor as an analogue to the power set functor. We prove that the so-called descriptive general frames, which play a fundamental role in the semantics of modal logics, can be seen as Stone coalgebras in a natural way. This yields a duality between the category of modal algebras and that of coalgebras over the Vietoris functor. Building on this idea, we introduce the notion of a Vietoris polynomial functor over the category of Stone spaces. …
Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle
Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle
Conference papers
Sonification allows existing mathematical data to be used as the model for audio output, notably that the audio produced is related to or representative of that data in some way. Existing work in the field has been largely focused on the aesthetic tailoring of the output audio for compositional benefit rather than as a framework for audio representation and analysis. It is the goal of this research to apply existing techniques for pitch substitution to an analytical method that seeks to define and represent patterns within existing data sets (primarily DNA and RNA sequences). It is often the case that …
Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar
Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar
Journal of the Arkansas Academy of Science
The use of finite difference schemes in computational aeroacoustics requires the use of structured grids incomputational space. Complex geometries in the physical space can be modeled using multiple overlapping grids that are transformed into computational space. In this work, finite difference schemes are used that necessitate the addition of psuedo- or ghost-points in the overlap region of the grids for closure of the difference stencil. The functional values at these ghost points must be approximated from the values at the original grid points. This paper investigates interpolation techniques for these overset grids. An n th order interpolation scheme using Lagrange …
Automatic Human Face Detection In Color Images, Son Lam Phung
Automatic Human Face Detection In Color Images, Son Lam Phung
Theses: Doctorates and Masters
Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Theses: Doctorates and Masters
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
Theses: Doctorates and Masters
Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …