Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

48,068 Full-Text Articles 58,785 Authors 18,956,363 Downloads 350 Institutions

All Articles in Computer Sciences

Faceted Search

48,068 full-text articles. Page 1653 of 1672.

Content Based Image Retrieval For Bio-Medical Images, Vikas Nahar 2010 Missouri University of Science and Technology

Content Based Image Retrieval For Bio-Medical Images, Vikas Nahar

Masters Theses

"Content Based Image Retrieval System (CBIR) is used to retrieve images similar to the query image. These systems have a wide range of applications in various fields. Medical subject headings, key words, and bibliographic references can be augmented with the images present within the articles to help clinicians to potentially improve the relevance of articles found in the querying process. In this research, image feature analysis and classification techniques are explored to differentiate images found in biomedical articles which have been categorized based on modality and utility. Examples of features examined in this research include: features based on different histograms …


Contribution-Based Priority Assessment In A Web-Based Intelligent Argumentation Network For Collaborative Software Development, Maithili Satyavolu 2010 Missouri University of Science and Technology

Contribution-Based Priority Assessment In A Web-Based Intelligent Argumentation Network For Collaborative Software Development, Maithili Satyavolu

Masters Theses

"Decision making is an important aspect of the collaborative software development process which usually involves complex process of conflict resolution. Stakeholders approach decision making process from multiple perspectives and their priorities play a vital role in it. The priority assessment methods used in the argumentation process so far are usually static. Priorities remain constant throughout the decision making process. In order to make the collaborative system more closely replicate real-world scenarios, this work incorporates dynamic priority assessment into a web-based collaborative system which is based on intelligent computational argumentation. It evaluates priorities dynamically for each cycle of decision process based …


Spreadsheets Grow Up: Three Spreadsheet Engineering Methodologies For Large Financial Planning Models, Thomas A. Grossman Jr., O Ozluk 2010 University of San Francisco

Spreadsheets Grow Up: Three Spreadsheet Engineering Methodologies For Large Financial Planning Models, Thomas A. Grossman Jr., O Ozluk

Business Analytics and Information Systems

Many large financial planning models are written in a spreadsheet programming language (usually Microsoft Excel) and deployed as a spreadsheet application. Three groups, FAST Alliance, Operis Group, and BPM Analytics (under the name “Spreadsheet Standards Review Board”) have independently promulgated standardized processes for efficiently building such models. These spreadsheet engineering methodologies provide detailed guidance on design, construction process, and quality control. We summarize and compare these methodologies. They share many design practices, and standardized, mechanistic procedures to construct spreadsheets. We learned that a written book or standards document is by itself insufficient to understand a methodology. These methodologies represent a …


Modeling And Analyzing Faults To Improve Election Process Robustness, B I. Simidchieva, Sophie J. Engle, M Clifford, A C. Jones, S Peisert, M Bishop, L A. Clarke, L J. Osterweil 2010 University of San Francisco

Modeling And Analyzing Faults To Improve Election Process Robustness, B I. Simidchieva, Sophie J. Engle, M Clifford, A C. Jones, S Peisert, M Bishop, L A. Clarke, L J. Osterweil

Computer Science

This paper presents an approach for continuous process improvement and illustrates its application to improving the robustness of election processes. In this approach, the Little-JIL process definition language is used to create a precise and detailed model of an election process. Given this process model and a potential undesirable event, or hazard, a fault tree is automatically derived. Fault tree analysis is then used to automatically identify combinations of failures that might allow the selected potential hazard to occur. Once these combinations have been identified, we iteratively improve the process model to increase the robustness of the election process against …


Sdre Optimal Control Of Drug Administration In Cancer Treatment, MEHMET İTİK, METİN UYMAZ SALAMCİ, STEPHEN PAUL BANKS 2010 TÜBİTAK

Sdre Optimal Control Of Drug Administration In Cancer Treatment, Mehmet İti̇k, Meti̇n Uymaz Salamci̇, Stephen Paul Banks

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, we apply State Dependent Riccati Equation (SDRE) based optimal control technique to a nonlinear tumor growth model. The model consists of three biological cells which are normal tissue, tumor and immune cells. The effect of chemotherapy treatment is also included in the model. Chemotherapy administration is considered as a control input to the nonlinear cancer dynamics and the amount of administered drug is determined by using SDRE optimal control. The optimal control is applied to the model in order not only to drive the tumor cells to the healthy equilibrium state but also to minimize the amount …


Design And Evaluation Of A Linear Switched Reluctance Actuator For Positioning Tasks, ANTÓNIO ESPÍRITO SANTO, ROSÁRIO CALADO, CARLOS CABRITA 2010 TÜBİTAK

Design And Evaluation Of A Linear Switched Reluctance Actuator For Positioning Tasks, António Espírito Santo, Rosário Calado, Carlos Cabrita

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents the development of a new linear switched reluctance actuator and confirms its applicability to perform positioning tasks. After the explanation of the actuator working principle and the presentation of its electromechanical topology, an analysis is accomplished using a finite elements tool. Based on the theoretical results, an experimental prototype that can develop 150 N was constructed. Its behaviour is observed under two different control methods implemented with microcontrollers. Initially, position is controlled applying a single pulse-driving scheme. Meanwhile, significant improvements are obtained with the introduction of a sliding-mode controller, allowing movements with 1 mm of resolution.


A Novel Weighted-Graph-Based Grouping Algorithm For Metadata Prefetching, Peng Gu, Jun Wang, Yifeng Zhu, Hong Jiang, Pengju Shang 2010 Microsoft Corporation

A Novel Weighted-Graph-Based Grouping Algorithm For Metadata Prefetching, Peng Gu, Jun Wang, Yifeng Zhu, Hong Jiang, Pengju Shang

CSE Journal Articles

Although data prefetching algorithms have been extensively studied for years, there is no counterpart research done for metadata access performance. Existing data prefetching algorithms, either lack of emphasis on group prefetching, or bearing a high level of computational complexity, do not work well with metadata prefetching cases. Therefore, an efficient, accurate, and distributed metadata-oriented prefetching scheme is critical to leverage the overall performance in large distributed storage systems. In this paper, we present a novel weighted-graph-based prefetching technique, built on both direct and indirect successor relationship, to reap performance benefit from prefetching specifically for clustered metadata servers, an arrangement envisioned …


Classroomwiki: A Collaborative Wiki For Instructional Use With Multiagent Group Formation, Nobel Khandaker, Leen-Kiat Soh 2010 University of Nebraska- Lincoln

Classroomwiki: A Collaborative Wiki For Instructional Use With Multiagent Group Formation, Nobel Khandaker, Leen-Kiat Soh

CSE Journal Articles

Abstract—Wikis today are being used as a tool to conduct collaborative writing assignments in classrooms. However, typical Wikis do not adequately address the assessment of individual student contributions toward their groups or provide any automated group formation mechanism. To improve these aspects, we have designed and implemented ClassroomWiki – a Web-based collaborative Wiki writing tool. For the students, ClassroomWiki provides a Web interface for writing and revising their group’s Wiki and a topic-based forum for discussing their ideas during collaboration. When the students collaborate, ClassroomWiki tracks all student activities and builds detailed student models that represent their contributions toward their …


Xlp: A Cross-Layer Protocol For Efficient Communication In Wireless Sensor Networks, Mehmet C. Vuran, Ian F. Akyildiz 2010 IEEE

Xlp: A Cross-Layer Protocol For Efficient Communication In Wireless Sensor Networks, Mehmet C. Vuran, Ian F. Akyildiz

CSE Journal Articles

Severe energy constraints of battery-powered sensor nodes necessitate energy-efficient communication in Wireless Sensor Networks (WSNs). However, the vast majority of the existing solutions is based on classical layered protocols approach, which leads to significant overhead. It is much more efficient to have a unified scheme which blends common protocol layer functionalities into a cross-layer module. In this paper, a cross layer protocol (XLP) is introduced, which achieves congestion control, routing, and medium access control in a cross-layer fashion. The design principle of XLP is based on the cross-layer concept of initiative determination, which enables receiver-based contention, initiative-based forwarding, local …


Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin 2010 Edith Cowan University

Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin

Research outputs pre 2011

The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate ‘identities’ for different aspects of our on-line interactions. Proving beyond a reasonable doubt that an individual that is suspected of a crime that is based on the technologies that we increasingly rely on was the actual perpetrator has always been problematic. …


Evolving Group Strategies For Ipd, Philip Hingston 2010 Edith Cowan University

Evolving Group Strategies For Ipd, Philip Hingston

Research outputs pre 2011

The Iterated Prisoners Dilemma (IPD) is often used to model cooperation between self-interested agents. In an earlier study, we introduced a framework using IPD to study the effects of species-level competition on the evolution of cooperative behaviour. In this paper, we extend the previous work, using co-evolutionary simulations of interactions between species of IPD-playing agents to investigate how group strategies may evolve. We find that the ability to cooperate more with agents of the same species greatly increases the ferocity of competition between species.


Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli 2010 Edith Cowan University

Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

The paper examines the advice and support provided by seven major Internet Service Providers in Australia through late 2009 and early 2010 in relation to computer and network security. Previous research has indicated that many end-users will attempt to utilise the support provided by Internet Service Providers as a simple and effective method by which to obtain key information in regards to computer security. This paper demonstrates that in many cases the individuals working at the help desk are either reluctant to provide IT security support or have insufficient skill to provide the correct information.


A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng 2010 Edith Cowan University

A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng

Research outputs pre 2011

The identification of ballistics specimens from imaging systems is of paramount importance in criminal investigation. Binarization plays a key role in preprocess of recognizing cartridges in the ballistic imaging systems. Unfortunately, it is very difficult to get the satisfactory binary image using existing binary algorithms. In this paper, we utilize the global and local thresholds to enhance the image binarization. Importantly, we present a novel criterion for effectively detecting edges in the images. Comprehensive experiments have been conducted over sample ballistic images. The empirical results demonstrate the proposed method can provide a better solution than existing binary algorithms.


Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen 2010 Edith Cowan University

Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen

Research outputs pre 2011

This paper will propose a data mining framework for the identification of agricultural production areas ill WA. The data mining (DM) framework was developed with the aim of enhancing the analysis of agricultural datasets compared to currently used statistical methods. The DM framework is a synthesis of different technologies brought together for the purpose of enhancing the interrogation of these datasets. The DM framework is based on the data, information, knowledge and wisdom continuum as a horizontal axis, with DM and online analytical processing (OLAP) forming the vertical axis. In addition the DM framework incorporates aspects of data warehousing phases, …


An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell 2010 Edith Cowan University

An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell

Research outputs pre 2011

As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect yourself is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been directed at organizations, with a few national programs focused upon home users. Given people's use of technology is primarily focused upon those two areas: …


The Adsl Router Forensics Process, Patryk Szewczyk 2010 Edith Cowan University

The Adsl Router Forensics Process, Patryk Szewczyk

Research outputs pre 2011

In 2010 the number of threats targeting ADSL routers is continually increasing. New and emergent threats have been developed to bypass authentication processes and obtain admin privileges directly to the device. As a result many malicious attempts are being made to alter the configuration data and make the device subsequently vulnerable. This paper discusses the non-invasive digital forensics approach into extracting evidence from ADSL routers. Specifically it validates an identified digital forensic process of acquisition. The paper then discusses how the approach may be utilised to extract configuration data ever after a device has been compromised to the point where …


Structure Prediction For The Helical Skeletons Detected From The Low Resolution Protein Density Map, Kamal Al Nasr, Weitao Sun, Jing He 2010 Old Dominion University

Structure Prediction For The Helical Skeletons Detected From The Low Resolution Protein Density Map, Kamal Al Nasr, Weitao Sun, Jing He

Computer Science Faculty Publications

Background: The current advances in electron cryo-microscopy technique have made it possible to obtain protein density maps at about 6-10 Å resolution. Although it is hard to derive the protein chain directly from such a low resolution map, the location of the secondary structures such as helices and strands can be computationally detected. It has been demonstrated that such low-resolution map can be used during the protein structure prediction process to enhance the structure prediction.

Results: We have developed an approach to predict the 3-dimensional structure for the helical skeletons that can be detected from the low resolution protein density …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak 2010 University of South Australia

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma 2010 Metropolitan State University

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …


Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe 2010 Edith Cowan University

Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe

Research outputs pre 2011

A Photonic-based multi-wavelength sensor capable of discriminating objects is proposed and demonstrated for intruder detection and identification. The sensor uses a laser combination module for input wavelength signal multiplexing and beam overlapping, a custom-made curved optical cavity for multi-beam spot generation through internal beam reflection and transmission and a high-speed imager for scattered reflectance spectral measurements. Experimental results show that five different wavelengths, namely 473nm, 532nm, 635nm, 670nm and 785nm, are necessary for discriminating various intruding objects of interest through spectral reflectance and slope measurements. Objects selected for experiments were brick, cement sheet, cotton, leather and roof tile.


Digital Commons powered by bepress