Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (27)
- Physical Sciences and Mathematics (23)
- Computer Sciences (21)
- Social and Behavioral Sciences (16)
- Computer and Systems Architecture (15)
-
- Digital Communications and Networking (11)
- Other Electrical and Computer Engineering (11)
- Signal Processing (10)
- Arts and Humanities (9)
- Education (8)
- Hardware Systems (8)
- Robotics (8)
- Software Engineering (8)
- Medicine and Health Sciences (7)
- Communication (6)
- Other Computer Sciences (6)
- Systems and Communications (6)
- Computer Law (5)
- Data Storage Systems (5)
- Law (5)
- Psychology (5)
- Art and Design (4)
- Artificial Intelligence and Robotics (4)
- Data Science (4)
- Information Security (4)
- Other Engineering (4)
- Power and Energy (4)
- Institution
-
- Chapman University (10)
- California Polytechnic State University, San Luis Obispo (7)
- Purdue University (7)
- West Virginia University (6)
- Louisiana State University (5)
-
- Clemson University (4)
- Technological University Dublin (4)
- Western University (4)
- American University in Cairo (3)
- City University of New York (CUNY) (3)
- Rochester Institute of Technology (3)
- University of Central Florida (3)
- University of Nebraska - Lincoln (3)
- California State University, San Bernardino (2)
- Embry-Riddle Aeronautical University (2)
- Michigan Technological University (2)
- Penn State Dickinson Law (2)
- The University of Akron (2)
- Universidad de Cundinamarca (2)
- University of Kentucky (2)
- University of South Florida (2)
- Association of Arab Universities (1)
- CentraCare Health (1)
- Dartmouth College (1)
- Eastern Washington University (1)
- Harrisburg University of Science and Technology (1)
- Kennesaw State University (1)
- Marshall University (1)
- Mississippi State University (1)
- Morehead State University (1)
- Keyword
-
- Deep learning (8)
- Machine Learning (8)
- Machine learning (7)
- Cybersecurity (5)
- Computer Science (4)
-
- Deep Learning (4)
- Empirical software engineering (4)
- Blockchain (3)
- Neural networks (3)
- 3D Printing (2)
- Additive Manufacturing (2)
- Bug Localization (2)
- China (2)
- Computer Vision (2)
- Data Science (2)
- Deepfake (2)
- Diagnosis (2)
- Drones (2)
- Forensics (2)
- Human-machine communication (2)
- Internet of things (2)
- LSTM (2)
- Metaverse (2)
- Natural language processing (2)
- Random forest (2)
- Simulation (2)
- Smartphone (2)
- Software Engineering (2)
- U.S. government (2)
- USG (2)
- Publication
-
- Engineering Faculty Articles and Research (8)
- Department of Electrical and Computer Engineering Faculty Publications (6)
- Graduate Theses, Dissertations, and Problem Reports (6)
- Honors Theses (6)
- Electronic Thesis and Dissertation Repository (4)
-
- Theses and Dissertations (4)
- Conference papers (3)
- Dissertations, Theses, and Capstone Projects (3)
- Frameless (3)
- Human-Machine Communication (3)
- LSU Doctoral Dissertations (3)
- Master's Theses (3)
- All Dissertations (2)
- All Theses (2)
- Computer Engineering (2)
- Dickinson Law Review (2017-Present) (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Doctoral Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- LSU Master's Theses (2)
- Military Cyber Affairs (2)
- Williams Honors College, Honors Research Projects (2)
- Art Faculty Articles and Research (1)
- Computer Science Graduate Research Workshop (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Dartmouth College Master’s Theses (1)
- Doctoral Dissertations and Master's Theses (1)
- EWU Masters Thesis Collection (1)
- Electrical Engineering (1)
- Electronic Theses and Dissertations (1)
- Publication Type
- File Type
Articles 91 - 102 of 102
Full-Text Articles in Other Computer Engineering
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Williams Honors College, Honors Research Projects
In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Dissertations, Master's Theses and Master's Reports
The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.
Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
Dissertations, Master's Theses and Master's Reports
The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.
In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …
A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez
A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez
Other
With cloud infrastructure becoming an ever more popular platform for business network implementations, and with ever-tightening data protection regulation, the ability to carry out digital investigations has become more difficult. This has led to areas of research that have looked to restore the balance to digital investigations in this environment. These areas include the use of blockchain, data tracing, and digital forensics as a service. With so many methods to consider, this article looks at how each method aims to return the balance and make it possible to carry out an investigation that complies with new privacy regulations (e.g., the …
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
Graduate Theses, Dissertations, and Problem Reports
Lung cancer has the second highest cancer incidence rate and the top cancer-related mortality worldwide. An estimate from the American Cancer Society shows that, in 2022, there will be about 236,740 lung cancer cases (117,910 men and 118,830 women) in the US. To date, there are no prognostic/predictive biomarkers to select chemotherapy, immunotherapy, and radiotherapy in individual non-small cell lung cancer (NSCLC) patients. There is an unmet clinical need to identify patients with early-stage NSCLC who are likely to develop recurrence and to predict their therapeutic responses. This dissertation developed a novel computational methodology for modeling molecular gene association networks …
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Graduate Theses, Dissertations, and Problem Reports
Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …
Penetration Testing In A Small Business Network, Lee Kandle
Penetration Testing In A Small Business Network, Lee Kandle
Williams Honors College, Honors Research Projects
Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Graduate Theses, Dissertations, and Problem Reports
Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman
An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman
Theses and Dissertations--Computer Science
The ever-increasing parallelism in computer systems has made software more prone to concurrency failures, causing problems during both pre- and post-development. Debugging concurrent programs is difficult because of the non-deterministic behavior and the specific sequences of interleaving in the execution flow. Debugging is a technique where programmers reproduce the bug, identify the root cause, and then take necessary steps to remove the bug from the system. The failure information may come from the bug reports of the testing phase or the production runs. In both cases, there should be steps taken to reproduce and localize the failure. However, reproducing and …