Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,025 Full-Text Articles 1,298 Authors 597,978 Downloads 109 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,025 full-text articles. Page 1 of 43.

Web Technologies (Ggc), Shuting Xu, Shuhua Lai 2018 Georgia Gwinnett College

Web Technologies (Ggc), Shuting Xu, Shuhua Lai

Computer Science and Information Technology Grants Collections

This Grants Collection for Web Technologies was created under a Round Nine ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Accuracy Evaluation Of The Canadian Openstreetmap Road Networks, Hongyu Zhang, Jacek Malczewski 2018 The University of Western Ontario

Accuracy Evaluation Of The Canadian Openstreetmap Road Networks, Hongyu Zhang, Jacek Malczewski

International Journal of Geospatial and Environmental Research

Volunteered geographic information (VGI) has been applied in many fields such as participatory planning, humanitarian relief and crisis management. One of the reasons for popularity of VGI is its cost-effectiveness. However, the coverage and accuracy of VGI cannot be guaranteed. The issue of geospatial data quality in the OpenStreetMap (OSM) project has become a trending research topic because of the large size of the dataset and the multiple channels of data access. This paper focuses on a national study of the Canadian OSM road network data for the assessment of completeness, positional accuracy, attribute accuracy, semantic accuracy and lineage. The ...


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


An Adapted Framework For Environmental Sustainability Reporting Using Mobile Technologies, Andre P. Calitz, Jaco F. Zietsman 2018 Nelson Mandela University

An Adapted Framework For Environmental Sustainability Reporting Using Mobile Technologies, Andre P. Calitz, Jaco F. Zietsman

The African Journal of Information Systems

Corporate governance is the process by which organisations are directed and controlled. King IV is regarded as the cornerstone of corporate governance for businesses and emphasises the importance of sustainability reporting in South Africa. Sustainability reporting guidelines inform organisations how to disclose their most critical affects on the environment, society and the economy. The Global Reporting Initiative (GRI) G4 sustainability reporting framework recommends the Standard Disclosures that all organisations should use to report their sustainability impacts and performance. Sustainability reporting frameworks proposed for the Higher Education sector require reporting principles specific to the needs of Higher Education Institutions (HEIs). The ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth 2018 Technology Research Centre, DPG

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang 2018 Embry-Riddle Aeronautical University

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua MacMonagle 2018 East Central University, Ada Oklahoma

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D 2018 GJ Software Forensics

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy 2018 Norwegian Police University College

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is ...


Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther 2018 McGill University

Measuring Symmetry In Real-World Scenes Using Derivatives Of The Medial Axis Radius Function, Morteza Rezanejad, John D. Wilder, Kaleem Siddiqi, Sven Dickinson, Allan Jepson, Dirk B. Walther

MODVIS Workshop

Symmetry has been shown to be an important principle that guides the grouping of scene information. Previously, we have described a method for measuring the local, ribbon symmetry content of line-drawings of real-world scenes (Rezanejad, et al., MODVIS 2017), and we demonstrated that this information has important behavioral consequences (Wilder, et al., MODIVS 2017). Here, we describe a continuous, local version of the symmetry measure, that allows for both ribbon and taper symmetry to be captured. Our original method looked at the difference in the radius between successive maximal discs along a symmetric axis. The number of radii differences in ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac 2018 University of Texas at San Antonio

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Lokkal - A Group Location-Sharing Mobile Application, Kolby Fenster 2018 University of Wyoming

Lokkal - A Group Location-Sharing Mobile Application, Kolby Fenster

Honors Theses AY 17/18

As smart devices become more and more popular among the general population, their use as a tool of communication is no longer their primary functionality. These devices are being used and treated as miniature computers that provide access to entertainment, email, and many other services. We as a group decided to focus on the location-tracking aspect that many smart devices currently provide in hopes of addressing the problem of visiting a location with a group, splitting up, and being unable to know where other group members are. Our solution was to create a free and easy to use mobile application ...


Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman 2018 Chapman University

Player-Response: On The Nature Of Interactive Narratives As Literature, Lee Feldman

English Theses

In recent years, having evolved beyond solely play-based interactions, it is now possible to analyze video games alongside other narrative forms, such as novels and films. Video games now involve rich stories that require input and interaction on behalf of the player. This level of agency likens video games to a kind of modern hypertext, networking and weaving various narrative threads together, something which traditional modes of media lack. When examined from the lens of reader-response criticism, this interaction deepens even further, acknowledging the player’s experience as a valid interpretation of a video game’s plot. The wide freedom ...


Procedural Generation And Rendering Of Ink Bamboo Painting, Yangyang He 2018 College of William and Mary

Procedural Generation And Rendering Of Ink Bamboo Painting, Yangyang He

Undergraduate Honors Theses

This thesis describes an algorithm that generates various ink bamboo paintings. First, a completely procedural model is used to generate the geometric shape of bamboos. The model uses a grammar-like approach that recursively generates new parts of the bamboo in a randomized manner. The random parameters are bounded by rules that simulate the natural form of bamboo.

The structure of the bamboo is represented line segments with directions. Various ink stroke sprites of stalk, branch, or leaf shapes are mapped to line segments, using reverse mapping and bilinear sampling to eliminate aliasing effects. The sprites are mapped in different degrees ...


Ai-Human Collaboration Via Eeg, Adam Noack 2018 College of Saint Benedict/Saint John's University

Ai-Human Collaboration Via Eeg, Adam Noack

All College Thesis Program, 2016-present

As AI becomes ever more competent and integrated into our lives, the issue of AI-human goal misalignment looms larger. This is partially because there is often a rift between what humans explicitly command and what they actually mean. Most contemporary AI systems cannot bridge this gap. In this study we attempted to reconcile the goals of human and machine by using EEG signals from a human to help a simulated agent complete a task.


File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester 2018 East Tennessee State University

File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester

Undergraduate Honors Theses

This study explores the use of neural networks as universal models for classifying file fragments. This approach differs from previous work in its lossless feature representation, with fragments’ bits as direct input, and its use of feedforward, recurrent, and convolutional networks as classifiers, whereas previous work has only tested feedforward networks. Due to the study’s exploratory nature, the models were not directly evaluated in a practical setting; rather, easily reproducible experiments were performed to attempt to answer the initial question of whether this approach is worthwhile to pursue further, especially due to its high computational cost. The experiments tested ...


Investigation Of Alternatives For Migrating The One-Stop-Shop (Oss) Application To A Single, Web-Based Offering That Is Conducive For Both Desktop And Mobile Use., Sahiti Katragadda 2018 Utah State University

Investigation Of Alternatives For Migrating The One-Stop-Shop (Oss) Application To A Single, Web-Based Offering That Is Conducive For Both Desktop And Mobile Use., Sahiti Katragadda

All Graduate Plan B and other Reports

The One-Stop-Shop (OSS) application provides real-time data which is helpful for travelers in the Western United States in planning their travel. Included is traditional information (routing, imagery, weather), as well as points of interest and other route-specific information (elevations, rest areas, etc.). The system displays real-time data streams in a web-based application and in a separate mobile web application, which are presented to end users in a user-friendly format.

OSS web application and OSS mobile web application features have been examined and the best design features for the mobile application have been identified. Along with that, additional design features are ...


Putting Fürer's Algorithm Into Practice With The Bpas Library, Linxiao Wang 2018 The University of Western Ontario

Putting Fürer's Algorithm Into Practice With The Bpas Library, Linxiao Wang

Electronic Thesis and Dissertation Repository

Fast algorithms for integer and polynomial multiplication play an important role in scientific computing as well as other disciplines. In 1971, Schönhage and Strassen designed an algorithm that improved the multiplication time for two integers of at most n bits to O(log n log log n). In 2007, Martin Fürer presented a new algorithm that runs in O (n log n · 2 ^O(log* n)) , where log*n is the iterated logarithm of n. We explain how we can put Fürer’s ideas into practice for multiplying polynomials over a prime field Z/pZ, which characteristic is a Generalized ...


Digital Commons powered by bepress