Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2935

Full-Text Articles in Computer Sciences

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao Dec 2018

Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao

Dissertations

Nowadays, with the growing availability of large-scale genomic datasets and advanced computational techniques, more and more data-driven computational methods have been developed to analyze genomic data and help to solve incompletely understood biological problems. Among them, deep learning methods, have been proposed to automatically learn and recognize the functional activity of DNA sequences from genomics data. Techniques for efficient mining genomic sequence pattern will help to improve our understanding of gene regulation, and thus accelerate our progress toward using personal genomes in medicine.

This dissertation focuses on the development of deep learning methods for mining genomic sequences. First, we compare …


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Polya Db3: A Database Cataloging Polyadenation Sites(Pas) Across Different Species And Their Conservation, Ram Mohan Nambiar Dec 2018

Polya Db3: A Database Cataloging Polyadenation Sites(Pas) Across Different Species And Their Conservation, Ram Mohan Nambiar

Theses

Polyadenation is an important process occurring in the messenger RNA that involves cleavage of 3 end nascent mRNAs and addition of poly(A) tails. For this thesis,I present PolyA DB3 ,a database cataloging cleavage and polyadenylation sites (PASs) in several genomes specifically for human,mouse,rat and chicken. This database is based on deep sequencing data. PASs are mapped by the 3’ region extraction and deep sequencing (3’READS) method, ensuring unequivocal PAS identification. Large volume of data based on diverse biological samples is used to increase PAS coverage and provide PAS usage information. Strand-specific RNA-seq data were used to extend annotated 3’ ends …


Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno Dec 2018

Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …


Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail Dec 2018

Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail

Elinvo (Electronics, Informatics, and Vocational Education)

Static CCTV facilities in class need to be optimized in classroom learning, especially in recording learning activities as implementation of learning in the 21st century and strategic steps to face the Industrial Revolution 4.0. Educators need to play a role in utilizing CCTV in learning. This article presents the development of YouTube Integrated Video Moving Surveillance devices using Raspberry Pi 3. The development stages consist of analysis, design, development and evaluation. The analysis shows that: (1) the limitations of CCTV motion are followed up with the addition of motorcycles; (2) limited access to video recording data is followed up by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno Dec 2018

Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …


Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia Dec 2018

Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia

Elinvo (Electronics, Informatics, and Vocational Education)

ABSTRAct

Information and Communication Technology (ICT) can improve the speed of information delivery, efficiency, global reach and transparency. One of the efforts to realize good corporate governance (GCG) governance in the era of regional autonomy is to use information and communication technology or popularly called e-Government. The implementation of e-Government the need for master plan information technology as a guide in the integration of information technology in Local Government, e-Government implementation is expected to help improve interaction between government, community and business, so as to encourage political and economic development. In this paper presents the determination of e-Government policy strategy …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Application Of Graphical Models In Protein-Protein Interactions And Dynamics, Amir Vajdi Hoojghan Dec 2018

Application Of Graphical Models In Protein-Protein Interactions And Dynamics, Amir Vajdi Hoojghan

Graduate Doctoral Dissertations

Every organism contains a few hundred to thousands of proteins. A protein is made of a sequence of molecular building blocks named amino acids. Amino acids will be referred to as residues. Every protein performs one or more functions in the cell. In order for a protein to do its job, it requires to bind properly to other partner proteins. Many genetic diseases such as cancer are caused by mutations (changes) of specific residues which cause disturbances in the functions of those proteins.

The problem of prediction of protein binding site is a crucial topic in computational biology. A protein …


Nonparametric Collective Spectral Density Estimation With An Application To Clustering The Brain Signals, Mehdi Maadooliat, Ying Sun, Tianbo Chen Dec 2018

Nonparametric Collective Spectral Density Estimation With An Application To Clustering The Brain Signals, Mehdi Maadooliat, Ying Sun, Tianbo Chen

Mathematics, Statistics and Computer Science Faculty Research and Publications

In this paper, we develop a method for the simultaneous estimation of spectral density functions (SDFs) for a collection of stationary time series that share some common features. Due to the similarities among the SDFs, the log‐SDF can be represented using a common set of basis functions. The basis shared by the collection of the log‐SDFs is estimated as a low‐dimensional manifold of a large space spanned by a prespecified rich basis. A collective estimation approach pools information and borrows strength across the SDFs to achieve better estimation efficiency. Moreover, each estimated spectral density has a concise representation using the …


The International Conference On Intelligent Biology And Medicine (Icibm) 2018: Bioinformatics Towards Translational Applications, Xiaoming Liu, Lei Xie, Zhijin Wu, Kai Wang, Zhongming Zhao, Jianhuan Ruan, Degui Zhi Dec 2018

The International Conference On Intelligent Biology And Medicine (Icibm) 2018: Bioinformatics Towards Translational Applications, Xiaoming Liu, Lei Xie, Zhijin Wu, Kai Wang, Zhongming Zhao, Jianhuan Ruan, Degui Zhi

Publications and Research

The 2018 International Conference on Intelligent Biology and Medicine (ICIBM 2018) was held on June 10–12, 2018, in Los Angeles, California, USA. The conference consisted of a total of eleven scientific sessions, four tutorials, one poster session, four keynote talks and four eminent scholar talks, which covered a wild range of aspects of bioinformatics, medical informatics, systems biology and intelligent computing. Here, we summarize nine research articles selected for publishing in BMC Bioinformatics.


Discerning Novel Splice Junctions Derived From Rna-Seq Alignment: A Deep Learning Approach, Yi Zhang, Xinan Liu, James N. Macleod, Jinze Liu Dec 2018

Discerning Novel Splice Junctions Derived From Rna-Seq Alignment: A Deep Learning Approach, Yi Zhang, Xinan Liu, James N. Macleod, Jinze Liu

Computer Science Faculty Publications

Background: Exon splicing is a regulated cellular process in the transcription of protein-coding genes. Technological advancements and cost reductions in RNA sequencing have made quantitative and qualitative assessments of the transcriptome both possible and widely available. RNA-seq provides unprecedented resolution to identify gene structures and resolve the diversity of splicing variants. However, currently available ab initio aligners are vulnerable to spurious alignments due to random sequence matches and sample-reference genome discordance. As a consequence, a significant set of false positive exon junction predictions would be introduced, which will further confuse downstream analyses of splice variant discovery and abundance estimation.

Results: …


Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan Dec 2018

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan

LSU Master's Theses

The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …


Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington Dec 2018

Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington

Journal of Spatial Information Science

Computer programming is becoming an increasingly important scientific skill, but geographers are not necessarily receiving this training as part of their formal education. While there are efforts to promote and support extracurricular introductory computer programming workshops, there remain questions about how best to deliver these workshops. Therefore, as part of a recent introductory programming extracurricular workshop I organized for non-programing geographers, I tried to understand more about their perceptions of computer programming. I identify that one of the most important aspects for geographers to learn to computer program is to have training that is domain specific to ensure that the …


Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan Dec 2018

Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan

Journal of Spatial Information Science

Area and volume values of buildings and building parts have been used in many applications including taxation, valuation and land use planning. Many countries maintain a national standard for representing the measurements of floor areas in buildings. The national standards generally use similar basis for measuring building floor areas, in fact, areas specified in national standards often have semantic differences. Therefore, a number of international standards have been developed for harmonizing floor area measurements; however, they also have differences. This study aims at harmonizing the floor areas defined in the international property measurement standards by revealing the semantic relations between …


Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi Dec 2018

Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi

Journal of Spatial Information Science

No abstract provided.


Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris Dec 2018

Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris

Journal of Spatial Information Science

Geographically weighted regression (GWR) is an inherently exploratory technique for examining process non-stationarity in data relationships. This paper develops and applies a hyper-local GWR which extends such investigations further. The hyper-local GWR simultaneously optimizes both local model selection (which covariates to include in each local regression) and local kernel bandwidth specification (how much data should be included locally). These are evaluated using a measure of model fit. The hyper-local GWR approach evaluates different kernel bandwidths at each location and selects the most parsimonious local regression model. By allowing models and bandwidths to vary locally, this approach extends and refines the …


Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani Dec 2018

Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani

Journal of Spatial Information Science

Place descriptions in everyday communication or in online text provide a rich source of spatial knowledge about places. Such descriptions typically consist of references to places and spatial relationships between them. An important step to utilize such knowledge in information systems is georeferencing the referred places. Beside place name disambiguation, another challenge is that a significant proportion of place references in such descriptions are not official place names indexed by gazetteers, thus cannot be resolved easily. This paper presents a novel approach for georeferencing places from collective descriptions using place graphs, regardless of whether they are referred to by gazetteered …