Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,499 Full-Text Articles 2,072 Authors 1,051,912 Downloads 150 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,499 full-text articles. Page 1 of 66.

2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio 2021 University of Oulu

2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio

Presentations and other scholarship

Spatial experience is an important subject in various fields, and in HCI it has been mostly investigated in the urban scale. Research on human scale spaces has focused mostly on the personal meaning or aesthetic and embodied experiences in the space. Further, spatial experience is increasingly topical in envisioning how to build and interact with technologies in our everyday lived environments, particularly in so-called smart cities. This workshop brings researchers and practitioners from diverse fields to collaboratively discover new ways to understand and capture human scale spatial experience and envision its implications to future technological and creative developments in our ...


Standard Non-Uniform Noise Dataset, Andres Imperial, John M. Edwards 2021 Utah State University

Standard Non-Uniform Noise Dataset, Andres Imperial, John M. Edwards

Browse all Datasets

Fixed Pattern Noise Non-Uniformity Correction through K-Means Clustering

Fixed pattern noise removal from imagery by software correction is a practical approach compared to a physical hardware correction because it allows for correction post-capture of the imagery. Fixed pattern noise presents a unique challenge for de-noising techniques as the noise does not present itself where large number statistics are effective. Traditional noise removal techniques such as blurring or despeckling produce poor correction results because of a lack of noise identification. Other correction methods developed for fixed pattern noise can often present another problem of misidentification of noise. This problem can result ...


Software-Based Side Channel Attacks And The Future Of Hardened Microarchitecture, Nathaniel Hatfield 2021 Liberty University

Software-Based Side Channel Attacks And The Future Of Hardened Microarchitecture, Nathaniel Hatfield

Senior Honors Theses

Side channel attack vectors found in microarchitecture of computing devices expose systems to potentially system-level breaches. This thesis consists of a comprehensive report on current exploits of this nature, describing their fundamental basis and usage, paving the way to further research into hardware mitigations that may be utilized to combat these and future vulnerabilities. It will discuss several modern software-based side channel attacks, describing the mechanisms they utilize to gain access to privileged information. Attack vectors will be exemplified, along with applicability to various architectures utilized in modern computing. Finally, discussion of how future architectural changes must successfully harden chips ...


Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron 2021 Dakota State University

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized ...


A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth 2021 University of Arkansas, Fayetteville

A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth

Computer Science and Computer Engineering Undergraduate Honors Theses

There have been a multitude of word embedding techniques developed that allow a computer to process natural language and compare the relationships between different words programmatically. In this paper, similarity analysis, or the testing of words for synonymic relations, is used to compare several of these techniques to see which performs the best. The techniques being compared all utilize the method of creating word vectors, reducing words down into a single vector of numerical values that denote how the word relates to other words that appear around it. In order to get a holistic comparison, multiple analyses were made, with ...


Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi 2021 University of Arkansas, Fayetteville

Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi

Computer Science and Computer Engineering Undergraduate Honors Theses

Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated ...


Applying Emotional Analysis For Automated Content Moderation, John Shelnutt 2021 University of Arkansas, Fayetteville

Applying Emotional Analysis For Automated Content Moderation, John Shelnutt

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this project is to explore the effectiveness of emotional analysis as a means to automatically moderate content or flag content for manual moderation in order to reduce the workload of human moderators in moderating toxic content online. In this context, toxic content is defined as content that features excessive negativity, rudeness, or malice. This often features offensive language or slurs. The work involved in this project included creating a simple website that imitates a social media or forum with a feed of user submitted text posts, implementing an emotional analysis algorithm from a word emotions dataset, designing ...


Trunctrimmer: A First Step Towards Automating Standard Bioinformatic Analysis, Z. Gunner Lawless, Dana Dittoe, Dale R. Thompson, Steven C. Ricke 2021 University of Arkansas, Fayetteville

Trunctrimmer: A First Step Towards Automating Standard Bioinformatic Analysis, Z. Gunner Lawless, Dana Dittoe, Dale R. Thompson, Steven C. Ricke

Computer Science and Computer Engineering Undergraduate Honors Theses

Bioinformatic analysis is a time-consuming process for labs performing research on various microbiomes. Researchers use tools like Qiime2 to help standardize the bioinformatic analysis methods, but even large, extensible platforms like Qiime2 have drawbacks due to the attention required by researchers. In this project, we propose to automate additional standard lab bioinformatic procedures by eliminating the existing manual process of determining the trim and truncate locations for paired end 2 sequences. We introduce a new Qiime2 plugin called TruncTrimmer to automate the process that usually requires the researcher to make a decision on where to trim and truncate manually after ...


Implications Of The Quantum Dna Model For Information Sciences, F. Matthew Mihelic 2021 University of Tennessee Health Science Center

Implications Of The Quantum Dna Model For Information Sciences, F. Matthew Mihelic

Faculty Publications

The DNA molecule can be modeled as a quantum logic processor, and this model has been supported by pilot research that experimentally demonstrated non-local communication between cells in separated cell cultures. This modeling and pilot research have important implications for information sciences, providing a potential architecture for quantum computing that operates at room temperature and is scalable to millions of qubits, and including the potential for an entanglement communication system based upon the quantum DNA architecture. Such a system could be used to provide non-local quantum key distribution that could not be blocked by any shielding or water depth, would ...


Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr. 2021 Tashkent University of Information Technologies

Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.

Bulletin of TUIT: Management and Communication Technologies

In recent years, the world's population growth has been intensifying, resulting in specific problems related to the depletion of natural resources, food shortages, declining fertile lands, and changing weather conditions. This paper has been discussed the use of IoT technology as a solution to such problems.

At the same time, the emergence of IoT technology has given rise to a new research direction in agriculture. Soil analysis and monitoring using Zigbee wireless sensor network technology, which is part of the IoT, will enable the creation of an IoT ecosystem as well as the development of smart agriculture. In addition ...


Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan 2021 Syracuse University

Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan

Northeast Journal of Complex Systems (NEJCS)

Despite the large amount of literature on mitigation strategies for pandemic spread, in practice, we are still limited by na\"ive strategies, such as lockdowns, that are not effective in controlling the spread of the disease in long term. One major reason behind adopting basic strategies in real-world settings is that, in the early stages of a pandemic, we lack knowledge of the behavior of a disease, and so cannot tailor a more sophisticated response. In this study, we design different mitigation strategies for early stages of a pandemic and perform a comprehensive analysis among them. We then propose a ...


Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews 2021 Dakota State University

Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews

Masters Theses & Doctoral Dissertations

This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of ...


Scite: The Next Generation Of Citations, Sean Rife, Domenic Rosati, Joshua M. Nicholson 2021 Murray State University

Scite: The Next Generation Of Citations, Sean Rife, Domenic Rosati, Joshua M. Nicholson

Faculty & Staff Research and Creative Activity

Key points

  • While the importance of citation context has long been recognized, simple citation counts remain as a crude measure of importance.
  • Providing citation context should support the publication of careful science instead of headline‐grabbing and salami‐sliced non‐replicable studies.
  • Machine learning has enabled the extraction of citation context for the first time, and made the classification of citation types at scale possible.


Using A Hybrid Agent-Based And Equation Based Model To Test School Closure Policies During A Measles Outbreak, Elizabeth Hunter, John D. Kelleher 2021 Technological University Dublin

Using A Hybrid Agent-Based And Equation Based Model To Test School Closure Policies During A Measles Outbreak, Elizabeth Hunter, John D. Kelleher

Articles

Background

In order to be prepared for an infectious disease outbreak it is important to know what interventions will or will not have an impact on reducing the outbreak. While some interventions might have a greater effect in mitigating an outbreak, others might only have a minor effect but all interventions will have a cost in implementation. Estimating the effectiveness of an intervention can be done using computational modelling. In particular, comparing the results of model runs with an intervention in place to control runs where no interventions were used can help to determine what interventions will have the greatest ...


Video Games And Learning About Climate Change, Garrett W. Richards, Michael Long 2021 Grenfell Campus, Memorial University of Newfoundland

Video Games And Learning About Climate Change, Garrett W. Richards, Michael Long

Journal of Community Engagement and Scholarship

It is critical to pursue climate change education through a variety of methods, with a variety of audiences, and in a variety of contexts. This short perspectives article describes our experiences as an early-career climate change researcher and an independent game designer in responding to a community challenge posed by a nonprofit organization focused on the potential positive social impact of video games. This was an excellent opportunity to do some strategic thinking around climate change education (e.g., conceptualizing “butterfly effects”). However, we ultimately observed shortcomings in the supports available from educational and funding organizations for climate change knowledge ...


A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa 2021 Dakota State University

A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa

Masters Theses & Doctoral Dissertations

The Internet of Things (IoT) is an environment of connected physical devices and objects that communicate amongst themselves over the internet. The IoT is based on the notion of always-connected customers, which allows businesses to collect large volumes of customer data to give them a competitive edge. Most of the data collected by these IoT devices include personal information, preferences, and behaviors. However, constant connectivity and sharing of data create security and privacy concerns. Laws and regulations like the General Data Protection Regulation (GDPR) of 2016 ensure that customers are protected by providing privacy and security guidelines to businesses. Data ...


Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki 2021 Dakota State University

Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki

Masters Theses & Doctoral Dissertations

Numerous cybersecurity certifications are available both commercially and via institutes of higher learning. Hiring managers, recruiters, and personnel accountable for new hires need to make informed decisions when selecting personnel to fill positions. An incident responder or security analyst's role requires near real-time decision-making, pervasive knowledge of the environments they are protecting, and functional situational awareness. This concurrent mixed methods paper studies whether current commercial certifications offered in the cybersecurity realm, particularly incident response, provide useful indicators for a viable hiring candidate.

Managers and non-managers alike do prefer hiring candidates with an incident response certification. Both groups affirmatively believe ...


Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul 2021 Dakota State University

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Masters Theses & Doctoral Dissertations

This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion ...


Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto 2021 Portland State University

Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto

University Honors Theses

In my thesis, I describe the work done to implement several Group Theory concepts in the context of the Rubik’s cube. A simulation of the cube was constructed using Processing-Java and with help from a YouTube series done by TheCodingTrain. I reflect on the struggles and difficulties that came with creating this program along with the inspiration behind the project. The concepts that are currently implemented at this time are: Identity, Associativity, Order, and Inverses. The functionality of the cube is described as it moves like a regular cube but has extra keypresses that demonstrate the concepts listed. Each ...


A High-Precision Machine Learning Algorithm To Classify Left And Right Outflow Tract Ventricular Tachycardia, Jianwei Zhang, Guohua Fu, Islam Abudayyeh, Magdi Yacoub, Anthony Chang, William Feaster, Louis Ehwerhemuepha, Hesham el-Askary, Xianfeng Du, Bin He, Mingjun Feng, Yibo Yu, Binhao Wang, Jing Liu, Hai Yao, Hulmin Chu, Cyril Rakovski 2021 Chapman University

A High-Precision Machine Learning Algorithm To Classify Left And Right Outflow Tract Ventricular Tachycardia, Jianwei Zhang, Guohua Fu, Islam Abudayyeh, Magdi Yacoub, Anthony Chang, William Feaster, Louis Ehwerhemuepha, Hesham El-Askary, Xianfeng Du, Bin He, Mingjun Feng, Yibo Yu, Binhao Wang, Jing Liu, Hai Yao, Hulmin Chu, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Introduction: Multiple algorithms based on 12-lead ECG measurements have been proposed to identify the right ventricular outflow tract (RVOT) and left ventricular outflow tract (LVOT) locations from which ventricular tachycardia (VT) and frequent premature ventricular complex (PVC) originate. However, a clinical-grade machine learning algorithm that automatically analyzes characteristics of 12-lead ECGs and predicts RVOT or LVOT origins of VT and PVC is not currently available. The effective ablation sites of RVOT and LVOT, confirmed by a successful ablation procedure, provide evidence to create RVOT and LVOT labels for the machine learning model.

Methods: We randomly sampled training, validation, and testing ...


Digital Commons powered by bepress