Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (259)
- Physical Sciences and Mathematics (245)
- Computer and Systems Architecture (220)
- Computer Sciences (200)
- Digital Communications and Networking (187)
-
- Social and Behavioral Sciences (133)
- Other Electrical and Computer Engineering (122)
- Hardware Systems (115)
- Data Storage Systems (114)
- Other Computer Sciences (101)
- Robotics (86)
- Mathematics (71)
- Systems and Communications (69)
- Computational Engineering (67)
- Arts and Humanities (60)
- Logic and Foundations (59)
- Other Mathematics (59)
- Signal Processing (56)
- Education (48)
- VLSI and Circuits, Embedded and Hardware Systems (48)
- Algebra (46)
- Artificial Intelligence and Robotics (39)
- Business (39)
- Software Engineering (38)
- Communication (36)
- Library and Information Science (34)
- Medicine and Health Sciences (34)
- Institution
-
- California Polytechnic State University, San Luis Obispo (231)
- Chapman University (86)
- Selected Works (79)
- University of Nebraska - Lincoln (56)
- SelectedWorks (54)
-
- Technological University Dublin (47)
- University of Tennessee, Knoxville (41)
- Western University (41)
- University of New Mexico (32)
- California State University, San Bernardino (30)
- Embry-Riddle Aeronautical University (29)
- Purdue University (29)
- University of Massachusetts Amherst (29)
- Kennesaw State University (28)
- City University of New York (CUNY) (25)
- Louisiana State University (25)
- West Virginia University (24)
- University of Louisville (23)
- San Jose State University (20)
- Southern Methodist University (20)
- University of Arkansas, Fayetteville (20)
- University of North Florida (20)
- Air Force Institute of Technology (19)
- Florida International University (19)
- Association of Arab Universities (15)
- Boise State University (15)
- University of Central Florida (14)
- Michigan Technological University (13)
- University of South Florida (13)
- The University of Akron (10)
- Keyword
-
- Machine learning (58)
- Machine Learning (55)
- Deep learning (37)
- Deep Learning (34)
- Cybersecurity (28)
-
- Security (25)
- Inventive Problem Solving (22)
- Software Patents (21)
- Android (20)
- Artificial intelligence (20)
- Computer Science (20)
- Computer Vision (20)
- Software inventions (20)
- Graphical User Interface (19)
- Software (19)
- Blockchain (18)
- TRIZ (18)
- Artificial Intelligence (17)
- Computer security (16)
- GUI (16)
- Thesis; University of North Florida; UNF; Dissertations (16)
- Virtual reality (15)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (14)
- Anti-virus (14)
- Computer Anti-Virus (14)
- Computer virus (14)
- Innovation (14)
- Anti-virus design (13)
- Anti-virus software (13)
- Coalgebra (13)
- Publication Year
- Publication
-
- Computer Engineering (107)
- Engineering Faculty Articles and Research (80)
- Master's Theses (65)
- Computer Science and Software Engineering (43)
- Doctoral Dissertations (40)
-
- Electronic Thesis and Dissertation Repository (39)
- Theses and Dissertations (39)
- Umakant Mishra (39)
- Electronic Theses and Dissertations (38)
- Library Philosophy and Practice (e-journal) (34)
- Conference papers (30)
- Electronic Theses, Projects, and Dissertations (28)
- Masters Theses (26)
- Branch Mathematics and Statistics Faculty and Staff Publications (24)
- Graduate Theses, Dissertations, and Problem Reports (24)
- Honors Theses (19)
- Master's Projects (19)
- UNF Graduate Theses and Dissertations (19)
- FIU Electronic Theses and Dissertations (18)
- Steven R Ray (15)
- Computer Science and Computer Engineering Undergraduate Honors Theses (14)
- Future Computing and Informatics Journal (13)
- Military Cyber Affairs (13)
- Boise State University Theses and Dissertations (12)
- Dissertations, Master's Theses and Master's Reports (12)
- Human-Machine Communication (12)
- LSU Doctoral Dissertations (12)
- Articles (11)
- LSU Master's Theses (11)
- Publications and Research (11)
- Publication Type
Articles 1351 - 1380 of 1402
Full-Text Articles in Other Computer Engineering
Toward A User-Centered I2-Enabled Collaborative Learning And Teaching Environment: The Cal Poly Scandinavian Style Participatory Design Project, Helen Y. Chu, Franz Kurfess, David Gillette, Craig Schultz, Mary Somerville, Marita Holst, Peter Lundkvist, Anita Mirijamdotter, Robert Sundlof, Seppo Tanskanen, Markus Tiburzi
Toward A User-Centered I2-Enabled Collaborative Learning And Teaching Environment: The Cal Poly Scandinavian Style Participatory Design Project, Helen Y. Chu, Franz Kurfess, David Gillette, Craig Schultz, Mary Somerville, Marita Holst, Peter Lundkvist, Anita Mirijamdotter, Robert Sundlof, Seppo Tanskanen, Markus Tiburzi
Helen Y. Chu
Information Technology Services and the University Library partnered to build an Internet2-enabled Learning Commons (LC) at California Polytechnic State University in San Luis Obispo. The project team now extends the campus partnership model to include student and faculty users in collaboratively applying Scandinavian style co-design methodologies for physical and virtual learning and teaching environments. The interactive design approach was tested from January to June 2005 with funding from a U.S. Office of Naval Research Internet2 MiniGrant subcontract award. The project evaluated the efficacy of an interactive design/redesign methodology for encouraging user-driven, boundary-crossing information exchange and knowledge creation. Involving graduate and …
Inventions On Dialog Boxes Used In Gui, Umakant Mishra
Inventions On Dialog Boxes Used In Gui, Umakant Mishra
Umakant Mishra
The dialog boxes are useful in case of displaying warnings, errors, confirmations etc. in special situations. A typical dialog box is displayed in a small window with some text message along with a few options for the user to select. However, there are certain difficulties associated in programming and implementing a conventional dialog box, such as, severe programming effort, rigidity of the hard coded message, obscuring screen space and so on. There is a need to overcome these difficulties of the dialog box to make them more efficient and useful. The modality of the dialog boxes also creates some limitations. …
Inventions On Tree Navigators Used In Graphical User Interface, Umakant Mishra
Inventions On Tree Navigators Used In Graphical User Interface, Umakant Mishra
Umakant Mishra
A tree view or tree navigator is used to display hierarchical data organized in the form of a tree. In a tree structure there are parent and child nodes. The child nodes may further have descendants to n levels. There are many methods to make the navigation easy. Some of these are expanding and collapsing branches, splitting the tree, displaying a parent node in a separate tree, zooming branches, scrolling in various directions etc. It is still a difficult exercise to handle large trees efficiently. The effort still continues to manage large number of nodes with faster speed, greater control, …
10 Inventions On Scrolling And Scrollbars In Graphical User Interface, Umakant Mishra
10 Inventions On Scrolling And Scrollbars In Graphical User Interface, Umakant Mishra
Umakant Mishra
Scrolling mechanism is used to display and edit large documents in a limited screen space or window. The scrolling mechanism may include a vertical scroll bar or a horizontal scroll bar or both to move the contents of the documents up and down or left and right. There may be navigation buttons on the screen representing the navigation keys on the keyboard. The user can click these buttons to scroll the screen. There may be very different methods of scrolling such as by using the “thumb”, as popularly used with a pdf document. Scrolling may be achieved through eyeball tracking …
A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle
A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle
Articles
Spam filtering is a particularly challenging machine learning task as the data distribution and concept being learned changes over time. It exhibits a particularly awkward form of concept drift as the change is driven by spammers wishing to circumvent spam filters. In this paper we show that lazy learning techniques are appropriate for such dynamically changing contexts. We present a case-based system for spam filtering that can learn dynamically. We evaluate its performance as the case-base is updated with new cases. We also explore the benefit of periodically redoing the feature selection process to bring new features into play. Our …
Information Delivery On Mobile Devices Using Contour Icon Sonification, Charlie Cullen, Eugene Coyle
Information Delivery On Mobile Devices Using Contour Icon Sonification, Charlie Cullen, Eugene Coyle
Conference papers
This paper examines the use of musical patterns to convey information, specifically in the context of mobile devices. Existing mechanisms (such as the popularity of the Morse code SMS alert) suggest that the use of musical patterns on mobile devices can be a very efficient and powerful method of data delivery. Unique musical patterns based on templates known as Contour Icons are used to represent specific data variables, with the output rendering of these patterns being referred to as a Sonification of that data. Contour Icon patterns mimic basic shapes and structures, thus providing listeners with a means of categorising …
Trioson: A Graphical User Interface For Pattern Sonification, Charlie Cullen, Eugene Coyle
Trioson: A Graphical User Interface For Pattern Sonification, Charlie Cullen, Eugene Coyle
Conference papers
The TrioSon software allows users to map musical patterns to input data variables via a graphical user interface (GUI). The application is a Java routine designed to take input files of standard Comma Separated Values (CSV) format and output Standard Midi Files (SMF) using the internal Java Sound API. TrioSon renders output Sonifications from input data files for up to 3 user-defined parameters, allocated as bass, chord and melody instruments for the purposes of arrangement. In this manner each parameter concerned is distinguished by its individual instrumental timbre, with the option of rendering any combination of 1 to 3 parameters …
Information Delivery On Mobile Devices Using Boolean Sonification Patterns, Charlie Cullen, Eugene Coyle
Information Delivery On Mobile Devices Using Boolean Sonification Patterns, Charlie Cullen, Eugene Coyle
Conference papers
Sonification is the means by which non-speech audio can be used to convey information. Existing work has produced methods for delivering information in a wide range of fields, and recent work has considered the huge potential of mobile devices for Sonification. Boolean Sonification is a method of defining two related musical patterns as boolean conditions (true/false, yes/no etc.), such that one is considered contrary to the other by the listener. The final pattern set ideally comprises of two musical events that are closely enough related as to be considered a group, yet distinct enough to be perceived as separate entities. …
Weak Factorizations, Fractions And Homotopies, Alexander Kurz, Jiří Rosický
Weak Factorizations, Fractions And Homotopies, Alexander Kurz, Jiří Rosický
Engineering Faculty Articles and Research
We show that the homotopy category can be assigned to any category equipped with a weak factorization system. A classical example of this construction is the stable category of modules. We discuss a connection with the open map approach to bisimulations proposed by Joyal, Nielsen and Winskel.
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Honors Theses
Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.
Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.
This void is what inspired JeSS, Java …
Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto
Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto
Engineering Management & Systems Engineering Faculty Publications
The rapid and unprecedented growth in software has brought with it some of the most spectacular and costly project failures in modern history. How risk management is presented in the scholarly journals may give insight into the risk management methods and techniques in use on software development projects. This paper provides a glimpse into the risk management methods, methodologies and techniques available to those who are responsible for software development projects by conducting a non-experimental content analysis. The findings reveal that risk management has not received sufficient attention and does not appear to be widely accepted within the software engineering …
Analysis Of Data Sets Using Trio Sonification, Charlie Cullen, Eugene Coyle
Analysis Of Data Sets Using Trio Sonification, Charlie Cullen, Eugene Coyle
Conference papers
Recent advances in technology have suggested that sound and audio play a far greater part in our daily working lives than ever before. Mobile phone ring tones are now based upon polyphonic music sequences that allow relatively complex audio to be generated from a handset by way of conveying information (i.e. a call or message is incoming). This real world example of sonification suggests that far more could be made of sonification techniques for analysis- particularly in the business environment. One advantage of sonification is its relatively hands free nature in that once a sequence is being played it does …
Software For Seismic And Vibration Analysis, Raman K. Attri
Software For Seismic And Vibration Analysis, Raman K. Attri
Raman K. Attri
No abstract provided.
Orchestration Within The Sonification Of Basic Data Sets, Charlie Cullen, Eugene Coyle
Orchestration Within The Sonification Of Basic Data Sets, Charlie Cullen, Eugene Coyle
Conference papers
The use of sonification as a means of representing and analysing data has become a growing field of research in recent years and as such has become a far more accepted means of working with data. Existing work carried out as part of this research has focused primarily on the sonification of DNA/RNA sequences and their subsequent protein structures for the purposes of analysis. This sonification work raised many questions as regards the need for sequences to be set to music in a standard manner so that different strands could be analysed by comparison, and hence the orchestration and instrumentation …
Preface, Thomas Hildebrandt, Alexander Kurz
Preface, Thomas Hildebrandt, Alexander Kurz
Engineering Faculty Articles and Research
No abstract provided.
Algebraic Semantics For Coalgebraic Logics, Clemens Kupke, Alexander Kurz, Dirk Pattinson
Algebraic Semantics For Coalgebraic Logics, Clemens Kupke, Alexander Kurz, Dirk Pattinson
Engineering Faculty Articles and Research
With coalgebras usually being defined in terms of an endofunctor T on sets, this paper shows that modal logics for T-coalgebras can be naturally described as functors L on boolean algebras. Building on this idea, we study soundness, completeness and expressiveness of coalgebraic logics from the perspective of duality theory. That is, given a logic L for coalgebras of an endofunctor T, we construct an endofunctor L such that L-algebras provide a sound and complete (algebraic) semantics of the logic. We show that if L is dual to T, then soundness and completeness of the algebraic semantics immediately yield the …
Coalgebras And Modal Expansions Of Logics, Alexander Kurz, Alessandra Palmigiano
Coalgebras And Modal Expansions Of Logics, Alexander Kurz, Alessandra Palmigiano
Engineering Faculty Articles and Research
In this paper we construct a setting in which the question of when a logic supports a classical modal expansion can be made precise. Given a fully selfextensional logic S, we find sufficient conditions under which the Vietoris endofunctor V on S-referential algebras can be defined and we propose to define the modal expansions of S as the logic that arises from the V-coalgebras. As an example, we also show how the Vietoris endofunctor on referential algebras extends the Vietoris endofunctor on Stone spaces. From another point of view, we examine when a category of ‘spaces’ (X,A), ie sets X …
Development Of Software For Seismic & Vibration Analysis, Raman K. Attri
Development Of Software For Seismic & Vibration Analysis, Raman K. Attri
Raman K. Attri
Earthquake risk management is an issue of international priority since many countries in the world are affected adversely by sudden earthquake. Frequent earthquakes are being encountered in many parts of the world every year. Recently India had some earthquake in latur, chamoli, Utrakanshi, Bhuj regions. The occurrence of earthquake has been on increase due to geographical changes taking place under the earth crust all over world. The heavy and unpredictable loss of life and destruction of resources have forced the seismologist and instrumentation engineers to develop sophisticated earth quake monitoring instruments with quick data analysis software. The latest development in …
Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle
Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle
Conference papers
Sonification allows existing mathematical data to be used as the model for audio output, notably that the audio produced is related to or representative of that data in some way. Existing work in the field has been largely focused on the aesthetic tailoring of the output audio for compositional benefit rather than as a framework for audio representation and analysis. It is the goal of this research to apply existing techniques for pitch substitution to an analytical method that seeks to define and represent patterns within existing data sets (primarily DNA and RNA sequences). It is often the case that …
Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar
Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar
Journal of the Arkansas Academy of Science
The use of finite difference schemes in computational aeroacoustics requires the use of structured grids incomputational space. Complex geometries in the physical space can be modeled using multiple overlapping grids that are transformed into computational space. In this work, finite difference schemes are used that necessitate the addition of psuedo- or ghost-points in the overlap region of the grids for closure of the difference stencil. The functional values at these ghost points must be approximated from the values at the original grid points. This paper investigates interpolation techniques for these overset grids. An n th order interpolation scheme using Lagrange …
Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema
Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema
Engineering Faculty Articles and Research
In this paper we argue that the category of Stone spaces forms an interesting base category for coalgebras, in particular, if one considers the Vietoris functor as an analogue to the power set functor. We prove that the so-called descriptive general frames, which play a fundamental role in the semantics of modal logics, can be seen as Stone coalgebras in a natural way. This yields a duality between the category of modal algebras and that of coalgebras over the Vietoris functor. Building on this idea, we introduce the notion of a Vietoris polynomial functor over the category of Stone spaces. …
Automatic Human Face Detection In Color Images, Son Lam Phung
Automatic Human Face Detection In Color Images, Son Lam Phung
Theses: Doctorates and Masters
Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
Theses: Doctorates and Masters
Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Theses: Doctorates and Masters
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …
Manufacturing Interoperability, Steven Ray, Al Jones
Manufacturing Interoperability, Steven Ray, Al Jones
Steven R Ray
As manufacturing and commerce become ever more global in nature, companies are increasingly dependent upon the efficient and effective exchange of information with their partners, wherever they may be. Leading manufacturers rely upon computers to perform this information exchange, which must therefore be encoded for electronic transmission. Because no single company can dictate that all its partners use the same software, standards for how the information is represented become critical for cost-effective, errorfree transmission of data. This paper discusses some interoperability issues related to current standards, and describes two projects underway at the National Institute of Standards and Technology in …
Interoperability Standards In The Semantic Web, Steven Ray
Interoperability Standards In The Semantic Web, Steven Ray
Steven R Ray
The growth in the use of the Internet brings with it an increase in the number of interconnections among information systems supporting the manufacturing supply chain as well as other businesses. Each of these interconnections must be carefully prescribed to ensure interoperability. However, the sheer number of interconnections and the resulting complexity threaten to overwhelm the ability of the standards community or industry to provide the necessary specifications—a way out of this impasse must be found. This paper outlines the elements of an approach and the technology to move toward self-integrating systems, wherein the systems negotiate meaningful interfaces as needed …
Modal Predicates And Coequations, Alexander Kurz, Jiří Rosický
Modal Predicates And Coequations, Alexander Kurz, Jiří Rosický
Engineering Faculty Articles and Research
We show how coalgebras can be presented by operations and equations. This is a special case of Linton’s approach to algebras over a general base category X, namely where X is taken as the dual of sets. Since the resulting equations generalise coalgebraic coequations to situations without cofree coalgebras, we call them coequations. We prove a general co-Birkhoff theorem describing covarieties of coalgebras by means of coequations. We argue that the resulting coequational logic generalises modal logic.
Definability, Canonical Models, And Compactness For Finitary Coalgebraic Modal Logic, Alexander Kurz, Dirk Pattinson
Definability, Canonical Models, And Compactness For Finitary Coalgebraic Modal Logic, Alexander Kurz, Dirk Pattinson
Engineering Faculty Articles and Research
This paper studies coalgebras from the perspective of the finitary observations that can be made of their behaviours. Based on the terminal sequence, notions of finitary behaviours and finitary predicates are introduced. A category Behω(T) of coalgebras with morphisms preserving finitary behaviours is defined. We then investigate definability and compactness for finitary coalgebraic modal logic, show that the final object in Behω(T) generalises the notion of a canonical model in modal logic, and study the topology induced on a coalgebra by the finitary part of the terminal sequence.
Preface, Alexander Kurz
Preface, Alexander Kurz
Engineering Faculty Articles and Research
No abstract provided.
Identification Of Shapes Using A Nonlinear Dynamic System, Shaheen Hoque, Sanza Kazadi, Angel Li, Will Chen, Elvio Sadun