Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,298 Full-Text Articles 30,098 Authors 7,711,165 Downloads 288 Institutions

All Articles in Computer Sciences

Faceted Search

30,298 full-text articles. Page 1 of 863.

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead 2019 Washington University in St. Louis

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead

Senior Honors Papers / Undergraduate Theses

As the use of wireless technology has increased around the world, Radio Frequency Interference (RFI) has become more and more of a problem for radio astronomers. Preventative measures exist to limit the presence of RFI, and programs exist to remove it from saved data, but the use of algorithms to detect and remove RFI as an observation is occurring is much less common. Such a method would be incredibly useful for observations in which the data must undergo several rounds of processing before being saved, as in pulsar timing studies. Strategies for real-time mitigation have been discussed and tested with ...


Generative Linguistics And Neural Networks At 60: Foundation, Friction, And Fusion, Joe Pater 2019 Selected Works

Generative Linguistics And Neural Networks At 60: Foundation, Friction, And Fusion, Joe Pater

Joe Pater

The birthdate of both generative linguistics and neural networks can be taken as 1957, the year of the publication of foundational work by both Noam Chomsky and Frank Rosenblatt. This paper traces the development of these two approaches to cognitive science, from their largely autonomous early development in their first thirty years, through their collision in the 1980s around the past tense debate (Rumelhart and McClelland 1986, Pinker and Prince 1988), and their integration in much subsequent work up to the present. Although this integration has produced a considerable body of results, the continued general gulf between these two lines ...


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg 2018 Utah State University

Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg

All Graduate Plan B and other Reports

Lie algebra cohomology is an important tool in many branches of mathematics. It is used in the Topology of homogeneous spaces, Deformation theory, and Extension theory. There exists extensive theory for calculating the cohomology of semi simple Lie algebras, but more tools are needed for calculating the cohomology of general Lie algebras. To calculate the cohomology of general Lie algebras, I used the symbolic software program called Maple. I wrote software to calculate the cohomology in several different ways. I wrote several programs to calculate the cohomology directly. This proved to be computationally expensive as the number of differential forms ...


Review Of: The World Of Scary Video Games: A Study In Videoludic Horror, Approaches To Digital Game Studies, 6, Matthew Murray 2018 University of Nevada, Las Vegas

Review Of: The World Of Scary Video Games: A Study In Videoludic Horror, Approaches To Digital Game Studies, 6, Matthew Murray

Library Faculty Publications

No abstract provided.


Improving Accuracy Of The Edgebox Approach, Kamna Yadav 2018 Utah State University

Improving Accuracy Of The Edgebox Approach, Kamna Yadav

All Graduate Theses and Dissertations

Object region detection plays a vital role in many domains ranging from self-driving cars to lane detection, which heavily involves the task of object detection. Improving the performance of object region detection approaches is of great importance and therefore is an active ongoing research in Computer Vision. Traditional sliding window paradigm has been widely used to identify hundreds of thousands of windows (covering different scales, angles, and aspect ratios for objects) before the classification step. However, it is not only computationally expensive but also produces relatively low accuracy in terms of the classifier output by providing many negative samples. Object ...


The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia 2018 University of Arkansas, Fayetteville

The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia

Theses and Dissertations

With the rising use of social media, people are increasingly experiencing, and responding to, identity threats online. This sometimes leads to online backlash via “cybermobs” or the creation of online social movements that traverse offline. Prior information systems (IS) research on identity threats and responses largely focuses on information communication technology (ICT) implementations within organizations in an offline context. Therefore, we lack understanding of ICT-mediated identity threats and responses and ways to promote healthier and productive interactions online. This two-essay dissertation seeks to fill this gap. Essay 1 combines a review of ICT-mediated identity threats with a qualitative study (based ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley 2018 Kennesaw State University

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady 2018 University of North Georgia

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Major Academic Discipline In Cybersecurity Postsecondary Education, wasim alhamdani 2018 University of the Cumberlands

Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Major Academic Discipline In Cybersecurity Postsecondary Education, Wasim Alhamdani

KSU Proceedings on Cybersecurity Education, Research and Practice

A suggested curriculum for Secondary and Major Academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed base on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy 2018 Nova Southeastern University

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black 2018 University of South Alabama

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley 2018 Kennesaw State University

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau 2018 Norfolk State University

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur sandhu, Kweku Muata A. Osei-Bryson 2018 Virginia Commonwealth University

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best ...


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards 2018 Jacksonville State University

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address ...


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros 2018 Oklahoma State University - Main Campus

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased ...


Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan 2018 North Carolina A&T State University

Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizations create a huge amount of sensitive and confidential data, which must be protected from unauthorized access or disclosure. Nowadays, most organizations store their business data in digital formats. With the increasing use of digital data, data breaches are more often and serious in recent years. Therefore, it is very important for next-generation engineers to be aware of the importance of information security, and be able to recognize vulnerabilities and threats to an information system and design user-friendly and effective security measures. To achieve it, two modules of information systems security, including lectures and in-class labs, were developed and taught ...


Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh 2018 Babson College

Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh

KSU Proceedings on Cybersecurity Education, Research and Practice

Using cybersecurity risk assessment techniques, organizations can gain a holistic and prioritized view of information security objectives. However, with current methods, cybersecurity risk assessments are cost-prohibitive for small and medium sized businesses (SMB). These organizations experience increased vulnerability to adverse cyber events, are stuck in a reactive cycle and scramble to meet compliance goals.

The ongoing research seeks to create a risk assessment tool using the NIST Cybersecurity Framework in conjunction with complementary innovations to reduce the cost of a cyber risk assessment exercise for SMBs and enable the effective communication of security controls to various stakeholders in small and ...


Digital Commons powered by bepress