Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

31,458 Full-Text Articles 31,455 Authors 7,711,165 Downloads 298 Institutions

All Articles in Computer Sciences

Faceted Search

31,458 full-text articles. Page 4 of 908.

Nba 2k, Joseph Saludo 2018 San Jose State University

Nba 2k, Joseph Saludo

ART 108: Introduction to Games Studies

The NBA 2K games have come a long way from an emerging basketball game to now becoming the biggest basketball game ever created. From its graphics, gameplay, community, and many more reasons why the game became so successful today, NBA 2K has evolved into the best basketball game by improving its overall structure every year-round.


Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg 2018 Utah State University

Calculating The Cohomology Of A Lie Algebra Using Maple And The Serre Hochschild Spectral Sequence, Jacob Kullberg

All Graduate Plan B and other Reports

Lie algebra cohomology is an important tool in many branches of mathematics. It is used in the Topology of homogeneous spaces, Deformation theory, and Extension theory. There exists extensive theory for calculating the cohomology of semi simple Lie algebras, but more tools are needed for calculating the cohomology of general Lie algebras. To calculate the cohomology of general Lie algebras, I used the symbolic software program called Maple. I wrote software to calculate the cohomology in several different ways. I wrote several programs to calculate the cohomology directly. This proved to be computationally expensive as the number of differential forms ...


Reducing The Tail Latency Of A Distributed Nosql Database, Jun Wu 2018 University of Nebraska - Lincoln

Reducing The Tail Latency Of A Distributed Nosql Database, Jun Wu

Computer Science and Engineering: Theses, Dissertations, and Student Research

The request latency is an important performance metric of a distributed database, such as the popular Apache Cassandra, because of its direct impact on the user experience. Specifically, the latency of a read or write request is defined as the total time interval from the instant when a user makes the request to the instant when the user receives the request, and it involves not only the actual read or write time at a specific database node, but also various types of latency introduced by the distributed mechanism of the database. Most of the current work focuses only on reducing ...


Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss 2018 University of Arkansas, Fayetteville

Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to develop a tool that uses machine learning techniques to make predictions about whether or not a given vulnerability will be exploited. Such a tool could help organizations such as electric utilities to prioritize their security patching operations. Three different models, based on a deep neural network, a random forest, and a support vector machine respectively, are designed and implemented. Training data for these models is compiled from a variety of sources, including the National Vulnerability Database published by NIST and the Exploit Database published by Offensive Security. Extensive experiments are conducted, including testing ...


Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman 2018 City University of New York (CUNY)

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman

Student Theses

This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies ...


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai 2018 University of Arkansas, Fayetteville

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing ...


Typing-Proof: Usable, Secure And Low-Cost Two-Factor Authentication Based On Keystroke Timings, Ximming LIU, Yingjiu LI, Robert H. DENG 2018 Singapore Management University

Typing-Proof: Usable, Secure And Low-Cost Two-Factor Authentication Based On Keystroke Timings, Ximming Liu, Yingjiu Li, Robert H. Deng

Research Collection School Of Information Systems

Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and incur high costs in deployments or operations. Recent 2FA mechanisms such as Sound-Proof, reduce or eliminate users' interactions for the proof of the second factor; however, they are not designed to be used in certain settings (e.g., quiet environments or PCs without built-in microphones), and they are not secure in the presence of certain ...


Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Secure Smart Health With Privacy-Aware Aggregate Authentication And Access Control In Internet Of Things, Yinghui ZHANG, Robert H. DENG, Gang HAN, Dong ZHENG 2018 Singapore Management University

Secure Smart Health With Privacy-Aware Aggregate Authentication And Access Control In Internet Of Things, Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng

Research Collection School Of Information Systems

With the rapid technological advancements in the Internet of Things (IoT), wireless communication and cloud computing, smart health is expected to enable comprehensive and qualified healthcare services. It is important to ensure security and efficiency in smart health. However, existing smart health systems still have challenging issues, such as aggregate authentication, fine-grained access control and privacy protection. In this paper, we address these issues by introducing SSH, a Secure Smart Health system with privacy-aware aggregate authentication and access control in IoT. In SSH, privacy-aware aggregate authentication is enabled by an anonymous certificateless aggregate signature scheme, in which users' identity information ...


Using Smart Card Data To Model Commuters’ Response Upon Unexpected Train Delays, Xiancai TIAN, Baihua ZHENG 2018 Singapore Management University

Using Smart Card Data To Model Commuters’ Response Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng

Research Collection School Of Information Systems

The mass rapid transit (MRT) network is playingan increasingly important role in Singapore’s transit network,thanks to its advantages of higher capacity and faster speed.Unfortunately, due to aging infrastructure, increasing demand,and other reasons like adverse weather condition, commuters inSingapore recently have been facing increasing unexpected traindelays (UTDs), which has become a source of frustration forboth commuters and operators. Most, if not all, existing workson delay management do not consider commuters’ behavior. Wededicate this paper to the study of commuters’ behavior duringUTDs. We adopt a data-driven approach to analyzing the sixmonth’ real data collected by automated fare collection ...


Eye Pressure Monitior, Andrea Nella Levy 2018 California Polytechnic State University, San Luis Obispo

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB ...


Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal 2018 Brigham Young University

Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal

All Theses and Dissertations

Most organizations use an increasing number of domain- or organization-specific words and phrases. A translation process, whether human or automated, must also be able to accurately and efficiently use these specific multilingual terminology collections. However, comparatively little has been done to explore the use of vetted terminology as an input to machine translation (MT) for improved results. In fact, no single established process currently exists to integrate terminology into MT as a general practice, and especially no established process for neural machine translation (NMT) exists to ensure that the translation of individual terms is consistent with an approved terminology collection ...


Sheaf Theory As A Foundation For Heterogeneous Data Fusion, Seyed M-H Mansourbeigi 2018 Utah State University

Sheaf Theory As A Foundation For Heterogeneous Data Fusion, Seyed M-H Mansourbeigi

All Graduate Theses and Dissertations

A major impediment to scientific progress in many fields is the inability to make sense of the huge amounts of data that have been collected via experiment or computer simulation. This dissertation provides tools to visualize, represent, and analyze the collection of sensors and data all at once in a single combinatorial geometric object. Encoding and translating heterogeneous data into common language are modeled by supporting objects. In this methodology, the behavior of the system based on the detection of noise in the system, possible failure in data exchange and recognition of the redundant or complimentary sensors are studied via ...


The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley 2018 University of Arkansas, Fayetteville

The Effect Of Incorporating End-User Customization Into Additive Manufacturing Designs, Jonathan D. Ashley

Theses and Dissertations

In the realm of additive manufacturing there is an increasing trend among makers to create designs that allow for end-users to alter them prior to printing an artifact. Online design repositories have tools that facilitate the creation of such artifacts. There are currently no rules for how to create a good customizable design or a way to measure the degree of customization within a design. This work defines three types of customizations found in additive manufacturing and presents three metrics to measure the degree of customization within designs based on the three types of customization. The goal of this work ...


Samu: Design And Implementation Of Frequency Selectivity-Aware Multi-User Mimo For Wlans, Yongjiu Du, Yan Shi, Ehsan Aryafar, Pengfei Cui, Joseph Camp, Mung Chiang 2018 Broadcom Limited

Samu: Design And Implementation Of Frequency Selectivity-Aware Multi-User Mimo For Wlans, Yongjiu Du, Yan Shi, Ehsan Aryafar, Pengfei Cui, Joseph Camp, Mung Chiang

Computer Science Faculty Publications and Presentations

The traffic demand of wireless networks is expected to increase 1000-fold over the next decade. In anticipation of such increasing data demand for dense networks with a large number of stations, IEEE 802.11ax has introduced key technologies for capacity improvement including Orthogonal Frequency-Division Multiple Access (OFDMA), multi-user multi-input multi-output (MU-MIMO), and greater bandwidth. However, IEEE 802.11ax has yet to fully define a specific scheduling framework, on which the throughput improvement of networks significantly depends. Even within a 20 MHz of bandwidth, users experience heterogeneous channel orthogonality characteristics across sub-carriers, which prevents access points (APs) from achieving the ideal ...


Computational Modeling Of Radiation Interactions With Molecular Nitrogen, Tyler Reese 2018 The University of Southern Mississippi

Computational Modeling Of Radiation Interactions With Molecular Nitrogen, Tyler Reese

Dissertations

The ability to detect radiation through identifying secondary effects it has on its surrounding medium would extend the range at which detections could be made and would be a valuable asset to many industries. The development of such a detection instrument requires an accurate prediction of these secondary effects. This research aims to improve on existing modeling techniques and help provide a method for predicting results for an affected medium in the presence of radioactive materials. A review of radioactivity and the interactions mechanisms for emitted particles as well as a brief history of the Monte Carlo Method and its ...


Agent Based Terrain Generator: Cruthú, Lawrence L. O'Boyle 2018 Grand Valley State University

Agent Based Terrain Generator: Cruthú, Lawrence L. O'Boyle

Masters Theses

Terrain generation models are applied in different industries and fields of study. Current techniques assist in planning transportation networks, visualizing population migrations, conducting epidemiology research, and training self-driving cars and drones. Many current applications and research models generate complex realistic artifacts, e.g., trees, rivers, coastlines, populations, and even cities. Unfortunately, most of these techniques are described and implemented separately. Techniques do not work together to generate a complete holistic view. This thesis proposes a model, Cruthú (Gaelic for "creation"), that provides a novel platform allowing for complete world generation by integrating existing research and algorithms. The model is inspired ...


The Intersection Of Literacy And Digital Literacy: Incorporating Writing Standards With Computer Technology Standards, Grace McPherson 2018 University of Tennessee at Chattanooga

The Intersection Of Literacy And Digital Literacy: Incorporating Writing Standards With Computer Technology Standards, Grace Mcpherson

Honors Theses

This project aims to increase access to computer science/computer technology education by providing teachers resources to enable them to teach computer science/computer technology. A survey was taken to discover the interests and needs of teachers in Hamilton County, Tennessee. The project resulted in the creation of several lesson plans that integrate English and computer science through hands-on web development exercises, computational thinking opportunities, and critical thinking.


Augmented Reality In Foreign Language Education: A Review Of Empirical Studies (增强现实技术在外语教学中的应用:文献综述性研究), Shenglan Zhang 2018 Iowa State University

Augmented Reality In Foreign Language Education: A Review Of Empirical Studies (增强现实技术在外语教学中的应用:文献综述性研究), Shenglan Zhang

World Languages and Cultures Publications

This literature review examines how Augmented Reality (AR) has been used in foreign language learning. AR is a live view of reality that is augmented by computer-generated sound, image, or videos. It allows the user to interact with the real physical environment in an enhanced way. This study provides an overview of what AR is, its history, different definitions, and how it has been used in education in general. It summarizes how AR has been used in all aspects of foreign language education, including skill development (listening, speaking, reading and writing), vocabulary, grammar, culture, the aspect of affect in language ...


The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia 2018 University of Arkansas, Fayetteville

The Role Of Information Communication Technologies (Icts) In Shaping Identity Threats And Responses, Mary Macharia

Theses and Dissertations

With the rising use of social media, people are increasingly experiencing, and responding to, identity threats online. This sometimes leads to online backlash via “cybermobs” or the creation of online social movements that traverse offline. Prior information systems (IS) research on identity threats and responses largely focuses on information communication technology (ICT) implementations within organizations in an offline context. Therefore, we lack understanding of ICT-mediated identity threats and responses and ways to promote healthier and productive interactions online. This two-essay dissertation seeks to fill this gap. Essay 1 combines a review of ICT-mediated identity threats with a qualitative study (based ...


Digital Commons powered by bepress