Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

35,389 Full-Text Articles 36,204 Authors 10,216,521 Downloads 309 Institutions

All Articles in Computer Sciences

Faceted Search

35,389 full-text articles. Page 1 of 1075.

Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha RAVI, Archan MISRA 2020 Singapore Management University

Practical Server-Side Indoor Localization: Tackling Cardinality & Outlier Challenges, Anuradha Ravi, Archan Misra

Research Collection School Of Information Systems

In spite of many advances in indoor localization techniques, practical implementation of robust deviceindependent, server-side Wi-Fi localization (i.e., without any active participation of client devices) remains a challenge. This work utilizes an operationally-deployed Wi-Fi based indoor location infrastructure, based on the classical RADAR algorithm, to tackle two such practical challenges: (a) low cardinality, whereby only the associated AP generates sufficient RSSI reports and (b) outlier identification, which requires explicit identification of mobile clients that are attached to the Wi-Fi network but outside the fingerprinted region. To tackle the low-cardinality problem, we present a technique that uses cardinality changes to ...


Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi CHEN, Christopher M. POSKITT, Jun SUN, Sridhar ADEPU, Fan ZHANG 2020 Singapore Management University

Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

Research Collection School Of Information Systems

The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing ...


Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, Oğuz Oz Buruk, Oğuzhan Özcan, Gökçe Elif Baykal, Tilbe Göksun, Selçuk Acar, Güler Akduman, Mehmet Aydın Baytaş, Ceylan Beşevli, Joe Best, Aykut Coşkun, Hüseyin Uğur Genç, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Yıldız 2020 Tampere University of Technology

Children In 2077: Designing Children’S Technologies In The Age Of Transhumanism, Oğuz Oz Buruk, Oğuzhan Özcan, Gökçe Elif Baykal, Tilbe Göksun, Selçuk Acar, Güler Akduman, Mehmet Aydın Baytaş, Ceylan Beşevli, Joe Best, Aykut Coşkun, Hüseyin Uğur Genç, Baki Kocaballi, Samuli Laato, Cássia Mota, Konstantinos Papangelis, Marigo Raftopoulos, Richard Ramchurn, Juan Sádaba, Mattia Thibault, Annika Wolff, Mert Yıldız

Presentations and other scholarship

What for and how will we design children’s technologies in the transhumanism age, and what stance will we take as designers? This paper aims to answer this question with 13 fictional abstracts from sixteen authors of different countries, institutions and disciplines. Transhumanist thinking envisions enhancing human body and mind by blending human biology with technological augmentations. Fundamentally, it seeks to improve the human species, yet the impacts of such movement are unknown and the implications on children’s lives and technologies were not explored deeply. In an age, where technologies can clearly be defined as transhumanist, such as under-skin ...


Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada 2020 USMA West Point & MIT

Passive Quadrupedal Gait Synchronization For Extra Robotic Legs Using A Dynamically Coupled Double Rimless Wheel Model, Daniel J. Gonzalez, Harry Asada

West Point Research Papers

The Extra Robotic Legs (XRL) system is a robotic augmentation worn by a human operator consisting of two articulated robot legs that walk with the operator and help bear a heavy backpack payload. It is desirable for the Human-XRL quadruped system to walk with the rear legs lead the front by 25% of the gait period, minimizing the energy lost from foot impacts while maximizing balance stability. Unlike quadrupedal robots, the XRL cannot command the human's limbs to coordinate quadrupedal locomotion. Connecting the XRL to the human using a passive coupler, we have found that the two bipeds converge ...


White-Box Fairness Testing Through Adversarial Sampling, Peixin ZHANG, Jingyi WANG, Jun SUN, Guoliang DONG, Xinyu WANG, Xingen WANG, Jin Song DONG, Dai TING 2020 Singapore Management University

White-Box Fairness Testing Through Adversarial Sampling, Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Dai Ting

Research Collection School Of Information Systems

No abstract provided.


Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph 2020 UA Little Rock Center for Arkansas History and Culture

Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph

Digital Initiatives Symposium

Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and ...


The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department 2020 University of Nebraska at Omaha

The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department

Computer Science Faculty Proceedings & Presentations

This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2020). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2020/.


Encryption Decrypted, Alex Ramsey 2020 University of Nebraska at Omaha

Encryption Decrypted, Alex Ramsey

Student Research and Creative Activity Fair

Encryption is a complex and bewildering process, yet it is absolutely foundational for secure and safe activities on the internet. Encryption, in its many forms, ultimately enables identity verification, password protection, secure conversation, cryptocurrency trade, and other online activities. Despite this widespread use, encryption is not a process easily explained to the layperson due to its complexity. Thus, the object of this research is to demystify the process of encryption and provide an understanding of one of the most common forms of modern encryption - RSA Encryption. This will be accomplished through the information provided on my poster as well as ...


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton 2020 University of Nebraska at Omaha

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs ...


Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan @ Ali MADJELISI MEGARGEL, Venky SHANKARARAMAN 2020 Singapore Management University

Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan @ Ali Madjelisi Megargel, Venky Shankararaman

Research Collection School Of Information Systems

As more organizations are placing cloud computing at the heart of their digital transformation strategy, it is important that they adopt appropriate architectures and development methodologies to leverage the full benefits of the cloud. A mere “lift and move” approach, where traditional monolith applications are moved to the cloud will not support the demands of digital services. While, monolithic applications may be easier to develop and control, they are inflexible to change and lack the scalability needed for cloud environments. Microservices architecture, which adopts some of the concepts and principles from service-oriented architecture, provides a number of benefits when developing ...


The Future Of Work Now—Medical Coding With Ai, Thomas H. DAVENPORT, Steven Mark MILLER 2020 Singapore Management University

The Future Of Work Now—Medical Coding With Ai, Thomas H. Davenport, Steven Mark Miller

Research Collection School Of Information Systems

The coding of medical diagnosis and treatment has always been a challenging issue. Translating a patient’s complex symptoms, and a clinician’s efforts to address them, into a clear and unambiguous classification code was difficult even in simpler times. Now, however, hospitals and health insurance companies want very detailed information on what was wrong with a patient and the steps taken to treat them— for clinical record-keeping, for hospital operations review and planning, and perhaps most importantly, for financial reimbursement purposes.


Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices, Lei Xu, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolah Shah University of Houston 2020 The University of Texas Rio Grande Valley

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices, Lei Xu, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolah Shah University Of Houston

Computer Science Faculty Publications and Presentations

The smart device owning rate such as smart phone and smart watch is higher than ever before and mobile payment has become one of the major payment methods in many different areas. At the same time, blockchain-based cryptocurrency is becoming a nonnegligible type of currency and the total value of all types of cryptocurrency has reached USD 200 billion. Therefore, it is a natural demand to support cryptocurrency payment on mobile devices. Considering the poor infrastructure and low penetration of financial service in developing countries, this combination is especially attractive. The high storage cost and payment processing latency are the ...


A Collaboration Between Neural Networks And Reinforcement Learning: Applying Concepts To A Brick Breaking Game, Bryce Kadrlik 2020 Augsburg College

A Collaboration Between Neural Networks And Reinforcement Learning: Applying Concepts To A Brick Breaking Game, Bryce Kadrlik

Augsburg Honors Review

The intent of this work is to explore the interactions of artificial neural networks and digital games. It details the development of an artificial neural network trained upon a brick breaking game like the Atari game Breakout. This network was designed with the goals of not dropping the ball and maximizing the game score. Full game and network integration was not completed. However, two versions of the network were developed to move the paddle to the right or left based on the ball's point of impact on the paddle. In preliminary testing using manual inputs, these networks eventually learned ...


Evaluation Of Text Mining Techniques Using Twitter Data For Hurricane Disaster Resilience, Joshua Eason, Sathish Kumar 2020 Creighton University

Evaluation Of Text Mining Techniques Using Twitter Data For Hurricane Disaster Resilience, Joshua Eason, Sathish Kumar

SDSU Data Science Symposium

Data obtained from social media microblogging websites such as Twitter provide the unique ability to collect and analyze conversations of the public in order to gain perspective on the thoughts and feelings of the general public. Sentiment and volume analysis techniques were applied to the dataset in order to gain an understanding of the amount and level of sentiment associated with certain disaster-related tweets, including a topical analysis of specific terms. This study showed that disaster-type events such as a hurricane can cause some strong negative sentiment in the period of time directly preceding the event, but ultimately returns quickly ...


An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic 2020 Dakota State University

An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic

SDSU Data Science Symposium

Any connection to the university’s network is a conduit that has the potential of being exploited by an attacker, resulting in the possibility of substantial harm to the infrastructure, to the university, and to the student body of whom the university serves. While organizations rightfully “baton down the hatches” by building firewalls, creating proxies, and applying important updates, the most significant vulnerability, that of the student, continues to be an issue due to lack of knowledge, insufficient motivation, and inadequate or misguided training. Utilizing the Design Science Research (DSR) methodology, this research effort seeks to address the latter concern ...


Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam 2020 Purdue University

Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam

Faculty Publications

Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring ...


Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann 2020 University of Minnesota Law School

Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann

Minnesota Journal of Law, Science & Technology

No abstract provided.


Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng 2020 Tianjin University

Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng

Publications

The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay ...


Noise Reduction Of Eeg Signals Using Autoencoders Built Upon Gru Based Rnn Layers, Esra Aynalı 2020 Technological University Dublin

Noise Reduction Of Eeg Signals Using Autoencoders Built Upon Gru Based Rnn Layers, Esra Aynalı

Dissertations

Understanding the cognitive and functional behaviour of the brain by its electrical activity is an important area of research. Electroencephalography (EEG) is a method that measures and record electrical activities of the brain from the scalp. It has been used for pathology analysis, emotion recognition, clinical and cognitive research, diagnosing various neurological and psychiatric disorders and for other applications. Since the EEG signals are sensitive to activities other than the brain ones, such as eye blinking, eye movement, head movement, etc., it is not possible to record EEG signals without any noise. Thus, it is very important to use an ...


Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi 2020 The University of Texas Rio Grande Valley

Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi

Computer Science Faculty Publications and Presentations

It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for ...


Digital Commons powered by bepress