Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Software Engineering (261)
- Engineering (185)
- Databases and Information Systems (171)
- OS and Networks (169)
- Graphics and Human Computer Interfaces (166)
-
- Social and Behavioral Sciences (150)
- Computer Engineering (146)
- Theory and Algorithms (144)
- Information Security (121)
- Arts and Humanities (116)
- Other Computer Sciences (113)
- Programming Languages and Compilers (103)
- Business (99)
- Computer and Systems Architecture (91)
- Artificial Intelligence and Robotics (90)
- Communication (89)
- Library and Information Science (88)
- Communication Technology and New Media (84)
- Art and Design (82)
- Business Administration, Management, and Operations (81)
- Architecture (79)
- Economics (79)
- Graphic Design (79)
- Public Economics (79)
- Accounting (78)
- Chemistry (78)
- Corporate Finance (78)
- Institution
-
- SelectedWorks (117)
- Selected Works (102)
- Portland State University (68)
- Singapore Management University (49)
- University of Dayton (31)
-
- Western University (26)
- University of Arkansas, Fayetteville (25)
- Dakota State University (24)
- City University of New York (CUNY) (22)
- San Jose State University (21)
- California Polytechnic State University, San Luis Obispo (20)
- Old Dominion University (17)
- Governors State University (14)
- University of Massachusetts Amherst (14)
- Air Force Institute of Technology (13)
- Kennesaw State University (13)
- Florida International University (12)
- Edith Cowan University (11)
- University of Nebraska - Lincoln (10)
- University of Nevada, Las Vegas (10)
- University of Tennessee, Knoxville (10)
- Loyola University Chicago (9)
- California State University, San Bernardino (8)
- Embry-Riddle Aeronautical University (7)
- Munster Technological University (6)
- Western Michigan University (6)
- Michigan Technological University (5)
- Nova Southeastern University (5)
- Purdue University (5)
- The University of Akron (5)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (73)
- Cloud computing (20)
- Computer science (20)
- Data mining (19)
- Information Theory (18)
-
- Multivariate analysis discrete multivariate modeling (18)
- Probabilistic graphical modeling (18)
- Security (18)
- Reconstructability Analysis (17)
- Cybersecurity (12)
- Machine learning (12)
- Cloud Computing (10)
- IoT (9)
- Internet of Things (8)
- Performance (8)
- Software architecture (8)
- Computer architecture (7)
- Navigation (7)
- Out-of-turn interaction (7)
- Patents (7)
- System theory (7)
- Virtualization (7)
- Architecture (6)
- Big Data (6)
- Distributed Systems (6)
- Electronic data processing -- Distributed processing (6)
- HPC (6)
- Information Retrieval (6)
- Machine Learning (6)
- Privacy (6)
- Publication Year
- Publication
-
- Philadelphia University, Jordan (81)
- Research Collection School Of Computing and Information Systems (42)
- Computer Science Faculty Publications (33)
- Rudolf Kaehr (31)
- Systems Science Faculty Publications and Presentations (28)
-
- Computer Science Faculty Publications and Presentations (25)
- Masters Theses & Doctoral Dissertations (21)
- Graduate Theses and Dissertations (18)
- Saverio Perugini (18)
- Doctoral Dissertations (17)
- Open Educational Resources (17)
- All Capstone Projects (14)
- Master's Projects (14)
- Electronic Thesis and Dissertation Repository (13)
- Robert A Iannucci (13)
- Theses and Dissertations (13)
- Electrical and Computer Engineering Publications (11)
- FIU Electronic Theses and Dissertations (11)
- Faculty Publications (11)
- Master's Theses (10)
- Computer Science: Faculty Publications and Other Works (9)
- Jeremy Straub (8)
- Dissertations and Theses (7)
- Electronic Theses and Dissertations (7)
- Computer Engineering (6)
- Dissertations and Theses Collection (Open Access) (6)
- George K. Thiruvathukal (6)
- Masters Theses (6)
- Publications and Research (6)
- Theses (6)
- Publication Type
- File Type
Articles 1 - 30 of 822
Full-Text Articles in Systems Architecture
Codebase Relationship Visualizer: Visualizing Relationships Between Source Code Files, Jesse Hines
Codebase Relationship Visualizer: Visualizing Relationships Between Source Code Files, Jesse Hines
MS in Computer Science Project Reports
Understanding relationships between files and their directory structure is a fundamental part of the software development process. However, it can be hard to grasp these relationships without a convenient way to visualize how files are connected and how they fit into the directory structure of the codebase. In this paper we describe CodeBase Relationship Visualizer (CBRV), a Visual Studio Code extension that interactively visualizes the relationships between files. CBRV displays the relationships between files as arrows superimposed over a diagram of the codebase's directory structure. CBRV comes bundled with visualizations of the stack trace path, a dependency graph for Python …
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
National Training Aircraft Symposium (NTAS)
An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …
Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham
Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham
Faculty Publications
The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine learning models that identify software tasks. The proposed approach considers software task identification in hardware as a general problem with attacks treated as a subset of software tasks. Two lines of effort are presented. First, a data collection approach is described to extract sequences of control signals labeled by task identity during real (i.e., non-simulated) system operation. Second, experimental design is used to select hardware and software configuration to train and evaluate machine learning models. The …
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Symposium of Student Scholars
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage are the reasons for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Context-Aware Collaborative Neuro-Symbolic Inference In Internet Of Battlefield Things, Tarek Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance Kaplan, Mani Srivastava, Venugopal Veeravalli
Context-Aware Collaborative Neuro-Symbolic Inference In Internet Of Battlefield Things, Tarek Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance Kaplan, Mani Srivastava, Venugopal Veeravalli
ACI Journal Articles
IoBTs must feature collaborative, context-aware, multi-modal fusion for real-time, robust decision-making in adversarial environments. The integration of machine learning (ML) models into IoBTs has been successful at solving these problems at a small scale (e.g., AiTR), but state-of-the-art ML models grow exponentially with increasing temporal and spatial scale of modeled phenomena, and can thus become brittle, untrustworthy, and vulnerable when interpreting large-scale tactical edge data. To address this challenge, we need to develop principles and methodologies for uncertainty-quantified neuro-symbolic ML, where learning and inference exploit symbolic knowledge and reasoning, in addition to, multi-modal and multi-vantage sensor data. The approach features …
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Theses and Dissertations
Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …
Scalable Distributional Robustness In A Class Of Non Convex Optimization With Guarantees, Avinandan Bose, Arunesh Sinha, Tien Mai
Scalable Distributional Robustness In A Class Of Non Convex Optimization With Guarantees, Avinandan Bose, Arunesh Sinha, Tien Mai
Research Collection School Of Computing and Information Systems
Distributionally robust optimization (DRO) has shown lot of promise in providing robustness in learning as well as sample based optimization problems. We endeavor to provide DRO solutions for a class of sum of fractionals, non-convex optimization which is used for decision making in prominent areas such as facility location and security games. In contrast to previous work, we find it more tractable to optimize the equivalent variance regularized form of DRO rather than the minimax form. We transform the variance regularized form to a mixed-integer second order cone program (MISOCP), which, while guaranteeing near global optimality, does not scale enough …
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Electrical and Computer Engineering Publications
This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …
Algorithm-Based Fault Tolerance At Scale, Hayden Estes
Algorithm-Based Fault Tolerance At Scale, Hayden Estes
Summer Community of Scholars Posters (RCEU and HCR Combined Programs)
No abstract provided.
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Theses and Dissertations
Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …
Holistic Performance Analysis And Optimization Of Unified Virtual Memory, Tyler Allen
Holistic Performance Analysis And Optimization Of Unified Virtual Memory, Tyler Allen
All Dissertations
The programming difficulty of creating GPU-accelerated high performance computing (HPC) codes has been greatly reduced by the advent of Unified Memory technologies that abstract the management of physical memory away from the developer. However, these systems incur substantial overhead that paradoxically grows for codes where these technologies are most useful. While these technologies are increasingly adopted for use in modern HPC frameworks and applications, the performance cost reduces the efficiency of these systems and turns away some developers from adoption entirely. These systems are naturally difficult to optimize due to the large number of interconnected hardware and software components that …
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
University of New Orleans Theses and Dissertations
Parallel computing plays a crucial role in processing large-scale graph data. Complex network analysis is an exciting area of research for many applications in different scientific domains e.g., sociology, biology, online media, recommendation systems and many more. Graph mining is an area of interest with diverse problems from different domains of our daily life. Due to the advancement of data and computing technologies, graph data is growing at an enormous rate, for example, the number of links in social networks is growing every millisecond. Machine/Deep learning plays a significant role for technological accomplishments to work with big data in modern …
A Recommendation System Approach To Tune A Qubo Solver, Siong Thye Goh, Jianyuan Bo, Matthieu Parizy, Hoong Chuin Lau
A Recommendation System Approach To Tune A Qubo Solver, Siong Thye Goh, Jianyuan Bo, Matthieu Parizy, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
There are two major challenges to solving constrained optimization problems using a QuadraticUnconstrained Binary Optimization or QUBO solver (QS). First, we need to tune both the underlyingproblem parameters and the algorithm parameters. Second, the solution returned from a QSmight not be feasible. While it is common to use automated tuners such as SMAC and Hyperopt totune the algorithm parameters, the initial search ranges input for the auto tuner affect the performanceof the QS. In this paper, we propose a framework that resembles the Algorithm Selection(AS) framework to tune algorithm parameters for an annealing-based QS. To cope with constraints,we focus on …
Aligning The Transit Industry And Their Vendors In The Face Of Increasing Cyber Risk: Recommendations For Identifying And Addressing Cybersecurity Challenges, Scott Belcher, Terri Belcher, Kathryn Seckman, Brandon Thomas, Homayun Yaqub
Aligning The Transit Industry And Their Vendors In The Face Of Increasing Cyber Risk: Recommendations For Identifying And Addressing Cybersecurity Challenges, Scott Belcher, Terri Belcher, Kathryn Seckman, Brandon Thomas, Homayun Yaqub
Mineta Transportation Institute Publications
Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those experienced by larger, more prominent companies and critical infrastructure providers. The findings in this report focus on …
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs
UNO Student Research and Creative Activity Fair
Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Dartmouth College Undergraduate Theses
When consumers install Internet-connected "smart devices" in their homes, metadata arising from the communications between these devices and their cloud-based service providers enables adversaries privy to this traffic to profile users, even when adequate encryption is used. Internet service providers (ISPs) are one potential adversary privy to users’ incom- ing and outgoing Internet traffic and either currently use this insight to assemble and sell consumer advertising profiles or may in the future do so. With existing defenses against such profiling falling short of meeting user preferences and abilities, there is a need for a novel solution that empowers consumers to …
Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold
Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold
Master's Theses
We present a technique for out-of-core GPU path tracing of arbitrarily large scenes that is compatible with hardware-accelerated ray-tracing. Our technique improves upon previous works by subdividing the scene spatially into streamable chunks that are loaded using a priority system that maximizes ray throughput and minimizes GPU memory usage. This allows for arbitrarily large scaling of scene complexity. Our system required under 19 minutes to render a solid color version of Disney's Moana Island scene (39.3 million instances, 261.1 million unique quads, and 82.4 billion instanced quads at a resolution of 1024x429 and 1024spp on an RTX 5000 (24GB memory …
Information Provenance For Mobile Health Data, Taylor A. Hardin
Information Provenance For Mobile Health Data, Taylor A. Hardin
Dartmouth College Ph.D Dissertations
Mobile health (mHealth) apps and devices are increasingly popular for health research, clinical treatment and personal wellness, as they offer the ability to continuously monitor aspects of individuals' health as they go about their everyday activities. Many believe that combining the data produced by these mHealth apps and devices may give healthcare-related service providers and researchers a more holistic view of an individual's health, increase the quality of service, and reduce operating costs. For such mHealth data to be considered useful though, data consumers need to be assured that the authenticity and the integrity of the data has remained intact---especially …
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Masters Theses & Doctoral Dissertations
Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be …
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Masters Theses & Doctoral Dissertations
Information systems (IS), as a multi-disciplinary research area, emphasizes the complementary relationship between people, organizations, and technology and has evolved dramatically over the years. IS and the underlying Information Technology (IT) application and research play a crucial role in transforming the business world and research within the management domain. Consistent with this evolution and transformation, I develop a two-project dissertation on Information systems capabilities and organizational outcomes.
Project 1 examines the role of hospital operational effectiveness on the link between information systems capabilities and hospital performance. This project examines the cross-lagged effects on a sample of 217 hospitals measured over …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Development Of Classroom Tools For A Risc-V Embedded System, Lucas Phillips
Development Of Classroom Tools For A Risc-V Embedded System, Lucas Phillips
Undergraduate Honors Theses
RISC-V is an open-source instruction set that has been gaining popularity in recent years, and, with support from large chip manufacturers like Intel and the benefits of its open-source nature, RISC-V devices are likely to continue gaining momentum. Many courses in a computer science program involve development on an embedded device. Usually, this device is of the ARM architecture, like a Raspberry Pi. With the increasing use of RISC-V, it may be beneficial to use a RISC-V embedded device in one of these classroom environments. This research intends to assist development on the SiFive HiFive1 RevB, which is a RISC-V …
Computational Complexity Reduction Of Deep Neural Networks, Mee Seong Im, Venkat Dasari
Computational Complexity Reduction Of Deep Neural Networks, Mee Seong Im, Venkat Dasari
Mathematica Militaris
Deep neural networks (DNN) have been widely used and play a major role in the field of computer vision and autonomous navigation. However, these DNNs are computationally complex and their deployment over resource-constrained platforms is difficult without additional optimizations and customization.
In this manuscript, we describe an overview of DNN architecture and propose methods to reduce computational complexity in order to accelerate training and inference speeds to fit them on edge computing platforms with low computational resources.
Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore
Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore
Symposium of Student Scholars
Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …
Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Symposium of Student Scholars
Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by limiting maintenance …
Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Symposium of Student Scholars
The higher education sector has been heavily impacted financially by the economic downturn caused by the pandemic that has resulted a decline in student enrollments. Finding cost-effective novel technology for storing and sharing student's credentials among academic institutions and potential employers is a demand. Within the current conventional approach, ensuring authentication of a candidate’s credentials is costly and time-consuming which gives burdens to thousands of prospective students and potential employees. As a result, candidates fail to secure opportunities for either delay or non-submission of credentials all over the world. Blockchain technology has the potential for students' control over their credentials; …
A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjo Rodriguez-Cardenas, Jack Wright, Hossain Shahriar
A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjo Rodriguez-Cardenas, Jack Wright, Hossain Shahriar
Symposium of Student Scholars
The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.
In this work, we provide an overview of data mining and …