Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,474 Full-Text Articles 30,085 Authors 7,711,165 Downloads 281 Institutions

All Articles in Computer Sciences

Faceted Search

30,474 full-text articles. Page 1 of 838.

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead 2019 Washington University in St. Louis

Real-Time Rfi Mitigation In Radio Astronomy, Emily Ramey, Nick Joslyn, Richard Prestage, Michael Lam, Luke Hawkins, Tim Blattner, Mark Whitehead

Senior Honors Papers / Undergraduate Theses

As the use of wireless technology has increased around the world, Radio Frequency Interference (RFI) has become more and more of a problem for radio astronomers. Preventative measures exist to limit the presence of RFI, and programs exist to remove it from saved data, but the use of algorithms to detect and remove RFI as an observation is occurring is much less common. Such a method would be incredibly useful for observations in which the data must undergo several rounds of processing before being saved, as in pulsar timing studies. Strategies for real-time mitigation have been discussed and tested with ...


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui ZHANG, Dong ZHENG, Robert H. DENG 2018 Singapore Management University

Security And Privacy In Smart Health: Efficient Policy-Hiding Attribute-Based Access Control, Yinghui Zhang, Dong Zheng, Robert H. Deng

Research Collection School Of Information Systems

With the rapid development of the Internet of Things (IoT) and cloud computing technologies, smart health (s-health) is expected to significantly improve the quality of health care. However, data security and user privacy concerns in s-health have not been adequately addressed. As a well-received solution to realize fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has the potential to ensure data security in s-health. Nevertheless, direct adoption of the traditional CP-ABE in s-health suffers two flaws. For one thing, access policies are in cleartext form and reveal sensitive health-related information in the encrypted s-health records (SHRs). For another, it usually supports ...


Domain-Specific Knowledge Exploration With Ontology Hierarchical Re-Ranking And Adaptive Learning And Extension, Grace G. Zhao 2018 The Graduate Center, City University of New York

Domain-Specific Knowledge Exploration With Ontology Hierarchical Re-Ranking And Adaptive Learning And Extension, Grace G. Zhao

All Dissertations, Theses, and Capstone Projects

The goal of this research project is the realization of an artificial intelligence-driven lightweight domain knowledge search framework that returns a domain knowledge structure upon request with highly relevant web resources via a set of domain-centric re-ranking algorithms and adaptive ontology learning models. The re-ranking algorithm, a necessary mechanism to counter-play the heterogeneity and unstructured nature of web data, uses augmented queries and a hierarchical taxonomic structure to get further insight into the initial search results obtained from credited generic search engines. A semantic weight scale is applied to each node in the ontology graph and in turn generates a ...


Rationality And Efficient Verifiable Computation, Matteo Campanelli 2018 The Graduate Center, City University of New York

Rationality And Efficient Verifiable Computation, Matteo Campanelli

All Dissertations, Theses, and Capstone Projects

In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the computation of a function f on input x to a worker, who receives a (possibly monetary) reward. Our goal is to design very efficient delegation schemes where a worker is economically incentivized to provide the correct result f(x). In this work we strive for not relying on cryptographic assumptions, in particular our results do not require the existence of one-way functions.

We provide several results within the framework of rational proofs introduced by ...


A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes 2018 Akademie der Wissenschaften zu Göttingen

A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes

College of the Pacific Faculty Presentations

We describe a new project publishing a freely available online dictionary for Coptic. The dictionary encompasses comprehensive cross-referencing mechanisms, including linking entries to an online scanned edition of Crum’s Coptic Dictionary, internal cross-references and etymological information, translated searchable definitions in English, French and German, and linked corpus data which provides frequencies and corpus look-up for headwords and multiword expressions. Headwords are available for linking in external projects using a REST API. We describe the challenges in encoding our dictionary using TEI XML and implementing linking mechanisms to construct a Web interface querying frequency information, which draw on NLP tools ...


Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp 2018 University of Colorado, Boulder

Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp

Keyboard Graduate Theses & Dissertations

Modern music tutoring software and mobile instructional applications have great potential to help students practice at home effectively. They can offer extensive feedback on what the student is getting right and wrong and have adopted a gamified design with levels, badges, and other game-like elements to help gain wider appeal among students. Despite their advantages for motivating students and creating a safe practice environment, no current music instruction software demonstrates any knowledge about a student’s level of mastery. This can lead to awkward pedagogy and user frustration. Applying Bayesian Knowledge Tracing to tutoring systems provides an ideal way to ...


A Deep Learning Approach To Recognizing Bees In Video Analysis Of Bee Traffic, Astha Tiwari 2018 Utah State University

A Deep Learning Approach To Recognizing Bees In Video Analysis Of Bee Traffic, Astha Tiwari

All Graduate Theses and Dissertations

Colony Collapse Disorder (CCD) has been a major threat to bee colonies around the world which affects vital human food crop pollination. The decline in bee population can have tragic consequences, for humans as well as the bees and the ecosystem. Bee health has been a cause of urgent concern for farmers and scientists around the world for at least a decade but a specific cause for the phenomenon has yet to be conclusively identified.

This work uses Artificial Intelligence and Computer Vision approaches to develop and analyze techniques to help in continuous monitoring of bee traffic which will further ...


Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson 2018 Utah State University

Use Of Verified Twitter Accounts During Crisis Events, Kai Anderson

All Graduate Theses and Dissertations

This thesis reports on the use of verified Twitter accounts during crisis events. Twitter is a social media platform that allows users to broadcast and exchange public text messages and it can be used as a communication tool during crisis events. Verified Twitter accounts are those accounts that Twitter has investigated and found to be genuinely maintained by the claimed owner. Celebrities, public officials, and other well-known persons or companies often seek this account status. The owners of these accounts are likely to provide more accurate or relevant information during a crisis event because they represent a brand, whether themselves ...


Word Recognition In Nutrition Labels With Convolutional Neural Network, Anuj Khasgiwala 2018 Utah State University

Word Recognition In Nutrition Labels With Convolutional Neural Network, Anuj Khasgiwala

All Graduate Theses and Dissertations

Nowadays, everyone is very busy and running around trying to maintain a balance between their work life and family, as the working hours are increasing day by day. In such hassled life people either ignore or do not give enough attention to a healthy diet. An imperative part of a healthy eating routine is the cognizance and maintenance of nourishing data and comprehension of how extraordinary sustenance and nutritious constituents influence our bodies. Besides in the USA, in many other countries, nutritional information is fundamentally passed on to consumers through nutrition labels (NLs) which can be found in all packaged ...


Teaching Landscape Construction Using Augmented Reality, Arshdeep Singh 2018 Utah State University

Teaching Landscape Construction Using Augmented Reality, Arshdeep Singh

All Graduate Theses and Dissertations

This thesis describes the design, development, and evaluation of an interactive Microsoft HoloLens application that projects landscape models in Augmented Reality. The application was developed using the Unity framework and 3D models created in Sketchup. Using the application, students can not only visualize the models in real space but can also interact with the models using gestures. The students can interact with the models using gaze and air-tap gestures.

Application testing was conducted with 21 students from the Landscape Architecture and Environmental Planning department at Utah State University. To evaluate the application, students completed a usability survey after using the ...


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak 2018 Penn State Berks

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of ...


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos 2018 San Jose State University

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in ...


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding 2018 The University of West Florida

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins 2018 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz 2018 University of North Georgia

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue ...


Social Engineering In Non-Linear Warfare, Bill Gardner 2018 Marshall University

Social Engineering In Non-Linear Warfare, Bill Gardner

Journal of Applied Digital Evidence

This paper explores the use of hacking, leaking, and trolling by Russia to influence the Russian 2016 United States Presidential Elections. These tactics have been called the “the weapons of the geek” by some researchers. By using proxy hackers and Russian malware to break into the email of the Democratic National Committee and then giving that email to Wilileaks to publish on the Internet, the Russian government attempted to swing the election in the favor of their preferred candidate. The source of the malware used in the DNC hacker was determined to be of Russian in nature and has been ...


Feeling Ai, 2018 Vocational Training Council

Feeling Ai

SIGNED: The Magazine of The Hong Kong Design Institute

We all develop emotional connections to the devices we use; the smartphone that is a constant companion or the office printer that is a constant source of frustration. Soon, these machines might be able to respond in kind


Sacred Heart Receives Grant For Engineering Program Development, 2018 Selected Works

Sacred Heart Receives Grant For Engineering Program Development

Tolga Kaya

Sacred Heart University has received a $25,000 grant from Sikorsky, a Lockheed Martin company, for development of the engineering program the University launched last fall. The grant will help fund materials and parts for designing autonomous vehicles—such as microcontrollers, sensors and electronics—that will be used in the introductory engineering courses offered to freshmen.


Digital Commons powered by bepress