Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

System

Institution
Publication Year
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

Managing Inventory With A Database, David Bartlett Jan 2024

Managing Inventory With A Database, David Bartlett

Williams Honors College, Honors Research Projects

Large commercial companies often use warehouses to store and organize their product inventory. However, manually keeping track of inventory through physical means can be a tedious process and is at risk for a variety of potential issues. It is very easy for records to be inaccurate or duplicated, especially if large reorganizations are undertaken, as this can cause issues such as duplicate product ID numbers. Therefore, it was decided that an inventory management system utilizing a SQL database should be created. The system needed to have capabilities including allowing the entry of product information, the ability to search database records …


The Determination Of A Place Of Popular Tourism On The Island Of Madura Using Weighted Product (Wp), Sigit Susanto Putro, Eka Malasari Rochman, Aery Rachmad Dec 2023

The Determination Of A Place Of Popular Tourism On The Island Of Madura Using Weighted Product (Wp), Sigit Susanto Putro, Eka Malasari Rochman, Aery Rachmad

Elinvo (Electronics, Informatics, and Vocational Education)

This research explored the diverse aspects of Madura Island, including its cultural, societal, and touristic facets. The primary focus was on developing a recommendation system to identify Madura's most popular tourist destinations. Utilizing the Weighted Product (WP) method, a decision support system model, this study assessed the popularity of various tourist attractions in Madura, aiding tourists in selecting destinations through a multi-criteria weighting process. Key parameters included the number of both foreign and local visitors, proximity to the city center, and visitor ratings. The study encompassed 62 tourist sites across four districts in Madura, evaluating the most popular attractions in …


Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf Jun 2021

Object Manipulation With Modular Planar Tensegrity Robots, Maxine Perroni-Scharf

Dartmouth College Undergraduate Theses

This thesis explores the creation of a novel two-dimensional tensegrity-based mod- ular system. When individual planar modules are linked together, they form a larger tensegrity robot that can be used to achieve non-prehensile manipulation. The first half of this dissertation focuses on the study of preexisting types of tensegrity mod- ules and proposes different possible structures and arrangements of modules. The second half describes the construction and actuation of a modular 2D robot com- posed of planar three-bar tensegrity structures. We conclude that tensegrity modules are suitably adapted to object manipulation and propose a future extension of the modular 2D …


Automating Text Encapsulation Using Deep Learning, Anket Sah May 2021

Automating Text Encapsulation Using Deep Learning, Anket Sah

Master's Projects

Data is an important aspect in any form be it communication, reviews, news articles, social media data, machine or real-time data. With the emergence of Covid-19, a pandemic seen like no other in recent times, information is being poured in from all directions on the internet. At times it is overwhelming to determine which data to read and follow. Another crucial aspect is separating factual data from distorted data that is being circulated widely. The title or short description of this data can play a key role. Many times, these descriptions can deceive a user with unwanted information. The user …


Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov Jan 2021

Development Of A Real Time Human Face Recognition Software System, Askar Boranbayev, Seilkhan Boranbayev, Mukhamedzhan Amirtaev, Malik Baimukhamedov, Askar Nurbekov

Physics and Astronomy Faculty Publications and Presentations

In this study, a system for real-time face recognition was built using the Open Face tools of the Open CV library. The article describes the methodology for creating the system and the results of its testing. The Open CV library has various modules that perform many tasks. In this paper, Open CV modules were used for face recognition in images and face identification in real time. In addition, the HOG method was used to detect a person by the front of his face. After performing the HOG method, 128 face measurements were obtained using the image encoding method. A convolutional …


Towards Developing A Mobile-Based Care For Children With Asd Using Remote Experience Sampling Method (Mcare), Dipranjan Das Oct 2020

Towards Developing A Mobile-Based Care For Children With Asd Using Remote Experience Sampling Method (Mcare), Dipranjan Das

Master's Theses (2009 -)

Autism Spectrum Disorder (ASD) is the most prevalent among all of the neurodevelopmental disorders, which have increased 20-30 times in the last 50 years. A child with ASD requires regular monitoring, care, and support. But, the existing social-cultural-financial constraints and the scarcity of mental health care practitioners have deprived the families raising children with ASD in low-and middle-income countries (LMICs) like Bangladesh. However, the recent overwhelming adoption (~80%) of mobile phones has created an opportunity to improve the existing practice of care using affordable mobile applications. mCARE, a mobile-based care system, has been developed to reduce the gap between families …


Research On Clock Synchronization Of Simulation System Based On Ethernet And Optical Fiber Network, Yulin Meng, Shen Tao, Shuaihao Wang, Lüyi Zhao, Chengshi Tang Dec 2019

Research On Clock Synchronization Of Simulation System Based On Ethernet And Optical Fiber Network, Yulin Meng, Shen Tao, Shuaihao Wang, Lüyi Zhao, Chengshi Tang

Journal of System Simulation

Abstract: With the development of simulation communication and Ethernet clock synchronization technology, the traditional timing simulation method based on real-time operating system can not meet the accuracy requirements of clock synchronization between multi-simulation systems. A time synchronization method between simulation systems based on IEEE1588 clock synchronization protocol and optical fiber reflection memory network is proposed, in which the Beidou/GPS timing device periodically calibrates the real-time operating system, and the real-time operating system divides the frequency of the calibrated clock information and synchronizes the clock of each simulation system through the high-speed optical fiber reflection memory network. The clock synchronization …


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Feb 2019

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

International Journal of Business and Technology

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …


Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar Jun 2018

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science and Software Engineering

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Oct 2017

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

UBT International Conference

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …


Building Efficient Large-Scale Big Data Processing Platforms, Jiayin Wang May 2017

Building Efficient Large-Scale Big Data Processing Platforms, Jiayin Wang

Graduate Doctoral Dissertations

In the era of big data, many cluster platforms and resource management schemes are created to satisfy the increasing demands on processing a large volume of data. A general setting of big data processing jobs consists of multiple stages, and each stage represents generally defined data operation such as ltering and sorting. To parallelize the job execution in a cluster, each stage includes a number of identical tasks that can be concurrently launched at multiple servers. Practical clusters often involve hundreds or thousands of servers processing a large batch of jobs. Resource management, that manages cluster resource allocation and job …


Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett Aug 2016

Towards Building A Computer-Aided Accreditation System, Emmanuel Alejandro Santillana Fayett

Theses and Dissertations

Accreditation is a big subject. What is accreditation? Why should it matter to us? How many types of accreditation can an institution have? Is the government involved? What issues are present? How can we improve the accreditation process? All these questions will be covered in this paper. In addition, I will build towards a software that will apply the most important points in this paper, like applying the mission, objectives, and outcomes expected from the students in the form of a syllabus. This will help the faculty with the accreditation process and will help the students know what is expected …


Powerforecaster: Predicting Power Impact Of Mobile Sensing Applications At Pre-Installation Time, Chulhong Min, Youngki Lee, Chungkuk Yoo, Seungwoo Kang, Inseok Hwang, Junehwa Song Jan 2016

Powerforecaster: Predicting Power Impact Of Mobile Sensing Applications At Pre-Installation Time, Chulhong Min, Youngki Lee, Chungkuk Yoo, Seungwoo Kang, Inseok Hwang, Junehwa Song

Research Collection School Of Computing and Information Systems

Today's smartphone application (hereinafter 'app') markets miss a key piece of information, power consumption of apps. This causes a severe problem for continuous sensing apps as they consume significant power without users' awareness. Users have no choice but to repeatedly install one app after another and experience their power use. To break such an exhaustive cycle, we propose PowerForecaster, a system that provides users with power use of sensing apps at pre-installation time. Such advanced power estimation is extremely challenging since the power cost of a sensing app largely varies with users' physical activities and phone use patterns. We observe …


Using Database Management System Todevelop And Implement An Automated Vehicle Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, Naomi Timothy, Francis Ofere Jan 2014

Using Database Management System Todevelop And Implement An Automated Vehicle Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, Naomi Timothy, Francis Ofere

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

The automated motor vehicle management system is a system developed for managing the movement of vehicles in and out of an organization. Presently, movemnts of vehicles in most organisations are handled manually bythe security officials that are stationed at the gates. This system is associated with mismanaged data, inaccurate data or no data at all in some instances. Consequently, it is imperative to develop a computerized system to manage data taken from the large number of vehicles that move in and out of organisations in order to deal with cases of theft, proper monitoring of people and vehicles and to …


Skill Finder: Automated Job-Resume Matching System, Thimma Reddy Kalva Dec 2013

Skill Finder: Automated Job-Resume Matching System, Thimma Reddy Kalva

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

Skill Finder is a tool which ranks the student skills from the resumes to the job requirements from Employers, Department and Faculty looking for student interns, full-time employees and also Research, Graduate and Teaching Assistants. Skill Finder hosts student resumes, Academic history and contact information. Authorized users from the Department can post jobs, view job applicants and the Skill finder automatically sorts the students resumes based on the degree of match with the job. Skill finder also sends e-mail alerts to students about the jobs posted and keeps track of employer’s history by maintaining the complete history of jobs posted …


Design And Analysis Of Peer 2 Peer Operating System, Anudeep Meka Jan 2012

Design And Analysis Of Peer 2 Peer Operating System, Anudeep Meka

LSU Master's Theses

The peer to peer computing paradigm has become a popular paradigm for deploying distributed applications. Examples: Kadmelia, Chord, Skype, Kazaa, Big Table. Multiagent systems have become a dominant paradigm within AI for deploying reasoning and analytics applications. Such applications are compute-intensive. In disadvantaged networks the ad-hoc architecture is the most suitable one. Examples: military scenarios, disaster scenarios. We combine the paradigms of peer-to-peer computing, multiagent systems, cloud computing, and ad-hoc networks to create the new paradigm of ad-hoc peer-to-peer mobile agent cloud (APMA cloud) that can provide the computing power of a cloud in “disadvantaged” regions (e.g., through RF using …


Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello Dec 2011

Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

Information can be briefly defined as processed data. Information is crucial to the success of any organization because it must be exchanged in one form or the other before activities can be carried out. However, too much information can be overwhelming and lead to poor decision-making. Further, as organizations face an ever-growing wave of digital data, they need to analyze that data and make timely decisions to achieve effective management .Formerly, information was viewed simply as a means of expression, they now serve as the foundation for an organization’s effectiveness and efficiency. Additionally, increased pressures to manage information appropriately, communicate …


Evidential Recovery In A Rfid Business System, Brian Cusack, Ar Kar Ayaw Jan 2010

Evidential Recovery In A Rfid Business System, Brian Cusack, Ar Kar Ayaw

Australian Digital Forensics Conference

Efficient stock management in the commercial retail sector is being dominated by Radio Frequency Identification (RFID) tag implementations. Research reports of the security risk of RFID tags show that breaches are likely and that forensic readiness is a requirement. In this paper a RFID tag business simulation is reported that replicates previous research reports of security breaches with the purpose of identifying potential evidence after such attacks. A Read/Write Tag was cloned and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken to identify potential locations for evidential recovery. This paper …


System And Process For Providing Auxiliary Information For A Packet-Switched Network Of Shared Nodes Using Dedicated Associative Store, Kenneth L. Calver, James N. Griffieon Jan 2008

System And Process For Providing Auxiliary Information For A Packet-Switched Network Of Shared Nodes Using Dedicated Associative Store, Kenneth L. Calver, James N. Griffieon

Computer Science Faculty Patents

A system and process for providing auxiliary information about a distributed network of shared nodes, at least a plurality of the nodes being adapted for receiving at least one type of ESP-(associative ephemeral store processing) packet. Available for access at each of the plurality of ESP-adapted nodes is a dedicated associative store wherein a value, if bound to a tag, is only accessible as a bound (tag, value) pair for a short time period, τ. Different types of packets are contemplated for routing through the ESP-capable plurality of nodes such as those arbitrarily identified herein as a ‘first’ and ‘second’ …


Critical Infrastructure Systems Modelling: Benchmarking Cpntools, Graeme Pye, Matthew J. Warren Dec 2007

Critical Infrastructure Systems Modelling: Benchmarking Cpntools, Graeme Pye, Matthew J. Warren

Australian Information Warfare and Security Conference

This paper reports on the application of systems modelling benchmarks to determine the viability of systems modelling software and its suitability for modelling critical infrastructure systems. This research applies the earlier research that related to developing benchmarks that when applied to systems modelling software will indicate its likely suitability to modelling critical infrastructure systems. In this context, the systems modeling benchmarks will assess the practicality of CPNTools to the task of modelling critical infrastructure systems.