Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

944 Full-Text Articles 1132 Authors 557972 Downloads 91 Institutions

All Articles in Other Computer Sciences

Faceted Search

944 full-text articles. Page 1 of 38.

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline 2017 North Carolina A & T State University

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline

KSU Proceedings on Cybersecurity Education, Research and Practice

Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications ...


A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin 2017 Illinois State University

A Cellular Automaton Modeling Approach To Chestnut Blight Canker Development, Samuel Iselin

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith 2017 Illinois State University

Land Cover Change Shows Little Effect On Migration Patterns Of Wood Storks And Great Egrets, Johanna Smith

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto 2017 Illinois State University

Cnemidophorus Sexlineatus And The Impacts The Environment Has On Its Population At The Braidwood Dunes, Jeremiah Soto

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh 2017 Chapman University

An Evaluation Of The Effects Of Intensity And Duration On Outcomes Across Treatment Domains For Children With Autism Spectrum Disorder, Erik J. Linstead, D. R. Dixon, E. Hong, C. O. Burns, Ryan French, M. N. Novack, D. Granpeesheh

Mathematics, Physics, and Computer Science Faculty Articles and Research

Applied behavior analysis (ABA) is considered an effective treatment for individuals with autism spectrum disorder (ASD), and many researchers have further investigated factors associated with treatment outcomes. However, few studies have focused on whether treatment intensity and duration have differential influences on separate skills. The aim of the current study was to investigate how treatment intensity and duration impact learning across different treatment domains, including academic, adaptive, cognitive, executive function, language, motor, play, and social. Separate multiple linear regression analyses were used to evaluate these relationships. Participants included 1468 children with ASD, ages 18 months to 12 years old, M ...


Comparing And Improving Facial Recognition Method, Brandon Luis Sierra 2017 California State University – San Bernardino

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra

Electronic Theses, Projects, and Dissertations

Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine ...


Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor 2017 The Graduate Center, City University of New York

Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor

All Graduate Works by Year: Dissertations, Theses, and Capstone Projects

Organisms are understood to be complex adaptive systems that evolved to thrive in hostile environments. Though widely studied, the phenomena of organism development and growth, and their relationship to organism dynamics is not well understood. Indeed, the large number of components, their interconnectivity, and complex system interactions all obscure our ability to see, describe, and understand the functioning of biological organisms.

Here we take a synthetic and computational approach to the problem, abstracting the organism as a cellular automaton. Such systems are discrete digital models of real-world environments, making them more accessible and easier to study then their physical world ...


Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury 2017 The University of Western Ontario

Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury

Electronic Thesis and Dissertation Repository

In recent years, there has been significant progress in Computer Vision based plant phenotyping (quantitative analysis of biological properties of plants) technologies. Traditional methods of plant phenotyping are destructive, manual and error prone. Due to non-invasiveness and non-contact properties as well as increased accuracy, imaging techniques are becoming state-of-the-art in plant phenotyping. Among several parameters of plant phenotyping, growth analysis is very important for biological inference. Automating the growth analysis can result in accelerating the throughput in crop production. This thesis contributes to the automation of plant growth analysis.

First, we present a novel system for automated and non-invasive/non-contact ...


Card Tricks: A Workflow For Scalability And Dynamic Content Creation Using Paper2d And Unreal Engine 4, Owen Gottlieb, Dakota Herold, Edward Amidon 2017 RIT (undergraduate student)

Card Tricks: A Workflow For Scalability And Dynamic Content Creation Using Paper2d And Unreal Engine 4, Owen Gottlieb, Dakota Herold, Edward Amidon

Presentations and other scholarship

In this paper, we describe the design and technological methods of

our dynamic sprite system in Lost & Found, a table-top-to-mobile

card game designed to improve literacy regarding prosocial

aspects of religious legal systems, specifically, collaboration and

cooperation. Harnessing the capabilities of Unreal Engine’s

Paper2D system, we created a dynamic content creation pipeline

that empowered our game designers so that they could rapidly

iterate on the game’s systems and balance externally from the

engine. Utilizing the Unreal Blueprint component system we were

also able to modularize each actor during runtime as data may be

changed. The technological approach behind ...


Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore 2017 Utah State University

Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore

All Graduate Plan B and other Reports

Let p be a prime positive integer and let α be a positive integer greater than 1. A method is given to reduce the problem of finding a nontrivial factorization of α to the problem of finding a solution to a system of modulo p polynomial congruences where each variable in the system is constrained to the set {0,...,p − 1}. In the case that p = 2 it is shown that each polynomial in the system can be represented by an ordered binary decision diagram with size less than 20.25log2(α)3 + 16.5log2(α)2 + 6log ...


Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra PhD 2017 Purdue University

Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra Phd

The Summer Undergraduate Research Fellowship (SURF) Symposium

Traditional drug discovery methodology uses a multitude of software packages to design and evaluate new drug-like compounds. While software packages implement a wide variety of methods, the serial (i.e. single core) implementation for many of these algorithms, prohibit large scale docking, such as proteome-wide docking (i.e. thousands of compounds with thousands of proteins). Several docking algorithms can be parallelized, significantly reducing the runtime of the calculations, thus enabling large-scale docking. Implementing algorithms that take advantage of the distributed nature of graphical processing units (GPUs) via the Compute Unified Device Architecture (CUDA) enables us to efficiently implement massively parallel ...


Accurate And Justifiable : New Algorithms For Explainable Recommendations., Behnoush Abdollahi 2017 University of Louisville

Accurate And Justifiable : New Algorithms For Explainable Recommendations., Behnoush Abdollahi

Electronic Theses and Dissertations

Websites and online services thrive with large amounts of online information, products, and choices, that are available but exceedingly difficult to find and discover. This has prompted two major paradigms to help sift through information: information retrieval and recommender systems. The broad family of information retrieval techniques has given rise to the modern search engines which return relevant results, following a user's explicit query. The broad family of recommender systems, on the other hand, works in a more subtle manner, and do not require an explicit query to provide relevant results. Collaborative Filtering (CF) recommender systems are based on ...


A Semi-Automated System For 3d Scene Analysis: From Detection And Tracking To Reconstruction, Anthony Trofe 2017 Susquehanna University

A Semi-Automated System For 3d Scene Analysis: From Detection And Tracking To Reconstruction, Anthony Trofe

Landmark Conference Summer Research Symposium

Detection and tracking of flags from a handheld video allows for the computation of distance between these flags in a three dimensional space. With this tool, scientific experiments requiring spatial arrangements indicated by markers would become easier to both map and determine the area. The initial video, composing of different sets of flags laid out, is run through a detection program which provides locations of flags inside of the frame. From these coordinates, a second program is run, which determines tracking. The tracking works by looking to see if there are points in sequential frames that are closer than a ...


Size Constancy In Virtual Reality, Anne Loeliger, Toshiro Kubota 2017 Susquehanna University

Size Constancy In Virtual Reality, Anne Loeliger, Toshiro Kubota

Landmark Conference Summer Research Symposium

This project studies human perception of size within a controlled virtual reality environment. When we open our eyes and glance at the surrounding, we see stable scenes that appear absolute. However, many argue that this is a pure illusion as nothing in our visual pathway is stable. Thus, our perceived size of an object may not reflect accurately the extent of the projection onto our retina. We do experience such false perception when we see celestial objects near the horizon. But are such misjudgments ubiquitous in our daily lives? With this in mind, the virtual reality scene has been created ...


Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy 2017 Rensselaer Polytechnic Institute

Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy

CSE Conference and Workshop Papers

We present a method based on header paths for efficient and complete extraction of labeled data from tables meant for humans. Although many table configurations yield to the proposed syntactic analysis, some require access to semantic knowledge. Clicking on one or two critical cells per table, through a simple interface, is sufficient to resolve most of these problem tables. Header paths, a purely syntactic representation of visual tables, can be transformed (“factored”) into existing representations of structured data such as category trees, relational tables, and RDF triples. From a random sample of 200 web tables from ten large statistical web ...


End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth 2017 Rensselaer Polytechnic Institute

End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth

CSE Conference and Workshop Papers

Automating the conversion of human-readable HTML tables into machine-readable relational tables will enable end-user query processing of the millions of data tables found on the web. Theoretically sound and experimentally successful methods for index-based segmentation, extraction of category hierarchies, and construction of a canonical table suitable for direct input to a relational database are demonstrated on 200 heterogeneous web tables. The methods are scalable: the program generates the 198 Access compatible CSV files in ~0.1s per table (two tables could not be indexed).


An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Fei Wang, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross 2017 Dublin Institute of Technology

An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Fei Wang, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross

Conference papers

Silhouette is one of the most popular and effective internal measures for the evaluation of clustering validity. Simplified Silhouette is a computationally simplified version of Silhouette. However, to date Simplified Silhouette has not been systematically analysed in a specific clustering algorithm. This paper analyses the application of Simplified Silhouette to the evaluation of k-means clustering validity and compares it with the k-means Cost Function and the original Silhouette from both theoretical and empirical perspectives. The theoretical analysis shows that Simplified Silhouette has a mathematical relationship with both the k-means Cost Function and the original Silhouette, while empirically, we show that ...


Educational Magic Tricks Based On Error-Detection Schemes, Ronald I. Greenberg 2017 Loyola University Chicago

Educational Magic Tricks Based On Error-Detection Schemes, Ronald I. Greenberg

Computer Science: Faculty Publications and Other Works

Magic tricks based on computer science concepts help grab student attention and can motivate them to delve more deeply. Error detection ideas long used by computer scientists provide a rich basis for working magic; probably the most well known trick of this type is one included in the CS Unplugged activities. This paper shows that much more powerful variations of the trick can be performed, some in an unplugged environment and some with computer assistance. Some of the tricks also show off additional concepts in computer science and discrete mathematics.


(Dis)Enchanted: (Re)Constructing Love And Creating Community In The, Shannon A. Suddeth 2017 University of South Florida

(Dis)Enchanted: (Re)Constructing Love And Creating Community In The, Shannon A. Suddeth

Graduate Theses and Dissertations

This thesis examines a queer fan community for the television show Once Upon a Time (OUAT) that utilizes the social networking site Tumblr as their primary base of fan activity. The Swan Queen fan community is comprised of individuals that collectively support and celebrate a non-canon romantic relationship between two of the female lead characters of the show rather than the canonic, heterocentric relationships that occur between the two women and their respective male love interests. I answer two research questions in this study: First, how are members of the Swan Queen fan community developing counter narratives of love by ...


Travel Mode Identification With Smartphone Sensors, Xing Su 2017 The Graduate Center, City University of New York

Travel Mode Identification With Smartphone Sensors, Xing Su

All Graduate Works by Year: Dissertations, Theses, and Capstone Projects

Personal trips in a modern urban society typically involve multiple travel modes. Recognizing a traveller's transportation mode is not only critical to personal context-awareness in related applications, but also essential to urban traffic operations, transportation planning, and facility design. While the state of the art in travel mode recognition mainly relies on large-scale infrastructure-based fixed sensors or on individuals' GPS devices, the emergence of the smartphone provides a promising alternative with its ever-growing computing, networking, and sensing powers. In this thesis, we propose new algorithms for travel mode identification using smartphone sensors. The prototype system is built upon the ...


Digital Commons powered by bepress