Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2022

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 102 of 102

Full-Text Articles in Other Computer Engineering

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire Jan 2022

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire

Graduate Theses, Dissertations, and Problem Reports

Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey Jan 2022

Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey

Williams Honors College, Honors Research Projects

In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …


Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei Jan 2022

Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei

Dissertations, Master's Theses and Master's Reports

The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.

Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …


An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar Jan 2022

An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar

Dissertations, Master's Theses and Master's Reports

The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.

In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …


A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez Jan 2022

A Systematic Review Of How Cloud Infrastructure And Gdpr Have Affected Digital Investigations In A Multinational Business Context, Stuart Fraser, A.Omar Portillo-Dominguez

Other

With cloud infrastructure becoming an ever more popular platform for business network implementations, and with ever-tightening data protection regulation, the ability to carry out digital investigations has become more difficult. This has led to areas of research that have looked to restore the balance to digital investigations in this environment. These areas include the use of blockchain, data tracing, and digital forensics as a service. With so many methods to consider, this article looks at how each method aims to return the balance and make it possible to carry out an investigation that complies with new privacy regulations (e.g., the …


A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye Jan 2022

A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye

Graduate Theses, Dissertations, and Problem Reports

Lung cancer has the second highest cancer incidence rate and the top cancer-related mortality worldwide. An estimate from the American Cancer Society shows that, in 2022, there will be about 236,740 lung cancer cases (117,910 men and 118,830 women) in the US. To date, there are no prognostic/predictive biomarkers to select chemotherapy, immunotherapy, and radiotherapy in individual non-small cell lung cancer (NSCLC) patients. There is an unmet clinical need to identify patients with early-stage NSCLC who are likely to develop recurrence and to predict their therapeutic responses. This dissertation developed a novel computational methodology for modeling molecular gene association networks …


Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean Jan 2022

Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean

Graduate Theses, Dissertations, and Problem Reports

Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …


Penetration Testing In A Small Business Network, Lee Kandle Jan 2022

Penetration Testing In A Small Business Network, Lee Kandle

Williams Honors College, Honors Research Projects

Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …


Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu Jan 2022

Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu

Graduate Theses, Dissertations, and Problem Reports

Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman Jan 2022

An Automated Framework To Debug System-Level Concurrency Failures, Tarannum Shaila Zaman

Theses and Dissertations--Computer Science

The ever-increasing parallelism in computer systems has made software more prone to concurrency failures, causing problems during both pre- and post-development. Debugging concurrent programs is difficult because of the non-deterministic behavior and the specific sequences of interleaving in the execution flow. Debugging is a technique where programmers reproduce the bug, identify the root cause, and then take necessary steps to remove the bug from the system. The failure information may come from the bug reports of the testing phase or the production runs. In both cases, there should be steps taken to reproduce and localize the failure. However, reproducing and …