Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 2945

Full-Text Articles in Computer Sciences

Black Networks In Smart Cities, Shaibal Chakrabarty Dec 2018

Black Networks In Smart Cities, Shaibal Chakrabarty

Computer Science and Engineering Theses and Dissertations

In this dissertation, we present the Black Networks solution to protect both the data and the metadata for mobile ad-hoc Internet of Things (IoT) networks in Smart Cities. IoT networks are gaining popularity with billions of deployed nodes, and increasingly carrying mission-critical data, whose compromise can lead to catastrophic consequences. IoT nodes are resource-constrained and often exist within insecure environments, making them vulnerable to a broad range of active and passive attacks. Black IoT networks are designed to mitigate multiple communication-based attacks by encrypting the data and the metadata, within a communication frame or packet, while remaining compatible with the …


Facial Expression Recognition By De-Expression Residue Learning, Huiyuan Yang, Umur Ciftci, Lijun Yin Dec 2018

Facial Expression Recognition By De-Expression Residue Learning, Huiyuan Yang, Umur Ciftci, Lijun Yin

Computer Science Faculty Research & Creative Works

A facial expression is a combination of an expressive component and a neutral component of a person. In this paper, we propose to recognize facial expressions by extracting information of the expressive component through a de-expression learning procedure, called De-expression Residue Learning (DeRL). First, a generative model is trained by cGAN. This model generates the corresponding neutral face image for any input face image. We call this procedure de-expression because the expressive information is filtered out by the generative model; however, the expressive information is still recorded in the intermediate layers. Given the neutral face image, unlike previous works using …


Mercyhealth Internship: It As A Unit, Frenz Joshua Hayag Dec 2018

Mercyhealth Internship: It As A Unit, Frenz Joshua Hayag

Student Scholarship – Computer Science

This is a CSIS 494 Field Experience paper about an internship in a healthcare organization called MercyHealth. My internship would be described as generalized. The paper will be mainly talking about the different aspects of IT and how they all come together to create progress, and cohesiveness in the organization. I had the opportunity to see different aspects of their IT department by sitting down in project meetings. I was able to job shadow multiple staff from admins to PC techs to network engineers. I was able to see first-hand how an organization, and IT respond to disaster, and how …


Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han Dec 2018

Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han

Master's Projects

Cryptocurrencies are defined as a digital currency in which encryption techniques are utilized to regulate generation of units of currency and verify the transfer of funds, independent of a central governing body such as a bank. Due to the large number of cryptocurrencies currently available, there inherently exists many price discrepancies due to market inefficiencies. Market inefficiencies occur when the price of assets do not reflect their true value. In fact, these types of pricing discrepancies exist in other financial markets, including fiat currency exchanges and stock exchanges. However, these discrepancies are more significant in the cryptocurrency domain due to …


Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin Dec 2018

Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin

Master's Projects

In this project, we explore using a musical space to represent the properties of amino acids. We consider previous mappings and explore the limitations of these mappings. In this exploration, we will propose a new method of mapping into musical spaces that extends the properties that can be represented. For this work, we will use amino acid sequences as our example mapping. The amino acid properties we will use include mass, charge, structure, and hydrophobicity. Finally, we will show how the different musical properties can be compared for similarity.


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen Dec 2018

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …


Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale Dec 2018

Machine Learning Projects With Python - Nba Finals Live Stream, Wilder Vs Breazeale

NBA Finals Live Stream

This is, obviously, prompting a huge unforeseen of individuals who trust the Warriors are in reality happier without Durant. This sounds insane, and somehow or another I trust it is. Durant improves them toward the finish of shot clock and especially protectively and from an unadulterated profundity point of view.


Durant as it were, is the best protection arrangement in NBA history. He makes it so Curry doesn't need to be Superman for the Warriors to win titles. Be that as it may, when Curry IS Superman? All things considered, in the event …


Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom Dec 2018

Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom

Augsburg Honors Review

As the demand of computer processing grows, the burden placed on CPUs will increase as well. Computing systems produce heat, which is attracted to a metal heatsink where it is dissipated out of the system by a fan. Liquid cooling can be more effective, but is more expensive and increases the risk of damaging leaks. Peltier chips, electronic components which transfer heat into electricity, can be used in an effort to reclaim and reuse some of this waste heat. This experiment tested twelve heatsinks of various designs to maximize the effect of the Peltier chip. Variations in designs of the …


Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo Dec 2018

Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo

Information Systems and Quantitative Analysis Faculty Publications

Open Source ist ein zunehmend beliebter Kollaborationsmechanismus für die Entwicklung von Software, auch in Unternehmen. Unsere Arbeit schafft die fehlende Verbindung zwischen Open Source Projekten, Unternehmen und Märkten. Ohne diese Verbindung wurden Koordinations- und Finanzierungsprobleme sichtbar, die zu schwerwiegenden Sicherheitslücken führen. In diesem Paper entwickeln wir acht Design Features, die ein Marktplatz für Open Source haben sollte, um diese Probleme zu beseitigen. Wir begründen jedes Design Feature mit den bestehenden Praktiken von Open Source und stellen einen Prototypen vor. Abschließend diskutieren wir, welche Auswirkungen die Einführung eines solchen Marktplatzes haben könnte.

Translation: Marketplace to Coordinate and Finance Open Source Software …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


Complexity Results For Fourier-Motzkin Elimination, Delaram Talaashrafi Dec 2018

Complexity Results For Fourier-Motzkin Elimination, Delaram Talaashrafi

Electronic Thesis and Dissertation Repository

In this thesis, we propose a new method for removing all the redundant inequalities generated by Fourier-Motzkin elimination. This method is based on Kohler’s work and an improved version of Balas’ work. Moreover, this method only uses arithmetic operations on matrices. Algebraic complexity estimates and experimental results show that our method outperforms alternative approaches based on linear programming.


Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson Dec 2018

Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson

Theses and Dissertations

The realities of cyberattacks have become more and more prevalent in the world today. Due to the growing number of these attacks, the need for highly trained individuals has also increased. Because of a shortage of qualified candidates for these positions, there is an increasing need for cybersecurity education within high schools and universities. In this thesis, I discuss the development and evaluation of Cybermatics, an educational simulation, or playable case study, designed to help students learn and develop skills within the cybersecurity discipline.

This playable case study was designed to allow students to gain an understanding of the field …


Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby Dec 2018

Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby

Theses and Dissertations

Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity.

While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. This research focuses on the possibility of running cybersecurity competitions, specifically CCDC style competitions, in a public cloud environment. …


Multi-Task Zipping Via Layer-Wise Neuron Sharing, Xiaoxi He, Zimu Zhou, Lothar Thiele Dec 2018

Multi-Task Zipping Via Layer-Wise Neuron Sharing, Xiaoxi He, Zimu Zhou, Lothar Thiele

Research Collection School Of Computing and Information Systems

Future mobile devices are anticipated to perceive, understand and react to the world on their own by running multiple correlated deep neural networks on-device. Yet the complexity of these neural networks needs to be trimmed down both within-model and cross-model to fit in mobile storage and memory. Previous studies squeeze the redundancy within a single model. In this work, we aim to reduce the redundancy across multiple models. We propose Multi-Task Zipping (MTZ), a framework to automatically merge correlated, pre-trained deep neural networks for cross-model compression. Central in MTZ is a layer-wise neuron sharing and incoming weight updating scheme that …


Change Descriptors For Determining Nodule Malignancy In Lung Ct Screening Images, Benjamin Geiger Dec 2018

Change Descriptors For Determining Nodule Malignancy In Lung Ct Screening Images, Benjamin Geiger

USF Tampa Graduate Theses and Dissertations

Computed tomography (CT) imagery is an important weapon in the fight against lung cancer; various forms of lung cancer are routinely diagnosed from CT imagery. The growth of the suspect nodule is known to be a prognostic factor in the diagnosis of pulmonary cancer, but the change in other aspects of the nodule, such as its aspect ratio, density, spiculation, or other features usable for machine learning, may also provide prognostic information.

We hypothesized that adding combined feature information from multiple CT image sets separated in time could provide a more accurate determination of nodule malignancy. To this end, we …


User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson Dec 2018

User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson

Undergraduate Honors Theses

Simple password-based authentication provides insufficient protection against increasingly common incidents of online identity theft and data loss. Although two-factor authentication (2FA) provides users with increased protection against attackers, users have mixed feelings about the usability of 2FA. We surveyed the students, faculty, and staff of Brigham Young University (BYU) to measure user sentiment about DUO Security, the 2FA system adopted by BYU in 2017. We find that most users consider DUO to be annoying, and about half of those surveyed expressed a preference for authentication without using a second-factor. About half of all participants reported at least one instance of …


College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas Dec 2018

College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Historical Effects Of Electronic Interfaces, G James Mitchell Dec 2018

Historical Effects Of Electronic Interfaces, G James Mitchell

Publications and Research

Electronic interfaces are a primary tool for most professional and personal communication currently happening. Electronics, like the human mind, are limited by the understanding of executing will, or commands. This can be characterized as “interface limitations” of digital technology. Identifying this bottleneck in technological development has been critical in historical changes to both hardware and software technology. Recent medical research examines a novel user interface to reduce task load. I hypothesize, interface developments that take cues from nonverbal human communication enhance and sustain the significance of those technologies in society. By examining pivotal moments of historical technology we can identify …


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK …


Gmaim: An Analytical Pipeline For Microrna Splicing Profiling Using Generative Model, Kan Liu Dec 2018

Gmaim: An Analytical Pipeline For Microrna Splicing Profiling Using Generative Model, Kan Liu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

MicroRNAs (miRNAs) are a class of short (~22 nt) single strand RNA molecules predominantly found in eukaryotes. Being involved in many major biological processes, miRNAs can regulate gene expression by targeting mRNAs to facilitate their degradation or translational inhibition. The imprecise splicing of miRNA splicing which introduces severe variability in terms of sequences of miRNA products and their corresponding downstream gene expression regulation. For example, to study biogenesis of miRNAs, usually, biologists can deplete a gene in the miRNA biogenesis pathway and study the change of miRNA sequences, which can cause impression of miRNAs. Although high-throughput sequencing technologies such as …


Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub Dec 2018

Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub

Arkansas Law Review

No abstract provided.


Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith

Information Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Facepet: Enhancing Bystanders’ Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jason A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders’ Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jason A. Mouloud, Scott Griffith

Computer Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Enabling Auditing And Intrusion Detection Of Proprietary Controller Area Networks, Brent C. Stone Dec 2018

Enabling Auditing And Intrusion Detection Of Proprietary Controller Area Networks, Brent C. Stone

Theses and Dissertations

The goal of this dissertation is to provide automated methods for security researchers to overcome ‘security through obscurity’ used by manufacturers of proprietary Industrial Control Systems (ICS). `White hat' security analysts waste significant time reverse engineering these systems' opaque network configurations instead of performing meaningful security auditing tasks. Automating the process of documenting proprietary protocol configurations is intended to improve independent security auditing of ICS networks. The major contributions of this dissertation are a novel approach for unsupervised lexical analysis of binary network data flows and analysis of the time series data extracted as a result. We demonstrate the utility …


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …


Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage Dec 2018

Multi-Label Classification Using Higher-Order Label Clusters, Dilanga Lakshitha Bandara Abeyrathna Galapita Mudiyanselage

Student Work

Multi-label classification (MLC) is one of the major classification approaches in the context of data mining where each instance in the dataset is annotated with a set of labels. The nature of multiple labels associated with one instance often demands higher computational power compared to conventional single-label classification tasks. A multi-label classification is often simplified by decomposing the task into single-label classification which ignores correlations among labels. Incorporating label correlations into classification task can be hard since correlations may be missing, or may exist among a pair or a large subset of labels. In this study, a novel MLC approach …


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …


A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan Dec 2018

A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan

Theses and Dissertations

The parking industry produces an enormous amount of data every day that, properly analyzed, will change the way the industry operates. The collected data form patterns that, in most cases, would allow parking operators and property owners to better understand how to maximize revenue and decrease operating expenses and support the decisions such as how to set specific parking policies (e.g. electrical charging only parking space) to achieve the sustainable and eco-friendly parking.

However, there lacks an intelligent tool to assess the layout design and operational performance of parking lots to reduce the externalities and increase the revenue. To address …


The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley Dec 2018

The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley

Graduate Theses and Dissertations

In the realm of additive manufacturing there is an increasing trend among makers to create designs that allow for end-users to alter them prior to printing an artifact. Online design repositories have tools that facilitate the creation of such artifacts. There are currently no rules for how to create a good customizable design or a way to measure the degree of customization within a design. This work defines three types of customizations found in additive manufacturing and presents three metrics to measure the degree of customization within designs based on the three types of customization. The goal of this work …