Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

31,112 Full-Text Articles 31,049 Authors 7,711,165 Downloads 299 Institutions

All Articles in Computer Sciences

Faceted Search

31,112 full-text articles. Page 5 of 895.

An Experimental Examination On Techniques To Mitigate The Spread Of Misinformation On Social Media Networks, Thomas Hayes 2018 University of North Georgia

An Experimental Examination On Techniques To Mitigate The Spread Of Misinformation On Social Media Networks, Thomas Hayes

Georgia Undergraduate Research Conference (GURC)

Emerging research has focused on finding ways to control the spread of misinformation on SMNs. SMNs have become increasingly weaponized for individual and societal harm. For example, the United States Intelligence Community (USIC) recently released a joint statement with the Department of Homeland Security implicating the Russian government in using major social media networks (SMNs) to influence the 2016 Presidential election with "information warfare" (Clark, 2018). This study focuses on examining SMN features that can potentially reduce the spread of misinformation. Through an experimental survey approach, this study measures the effectiveness of SMN features in influencing misperceptions of SMN users ...


26 - Using Cryptocurrencies To Hide Assets: Special Considerations In Divorce, Tax Evasion, And Money Laundering, Shaelyn Comiskey 2018 University of North Georgia

26 - Using Cryptocurrencies To Hide Assets: Special Considerations In Divorce, Tax Evasion, And Money Laundering, Shaelyn Comiskey

Georgia Undergraduate Research Conference (GURC)

The objective of this research is to further investigate the evolving issues regarding investments in cryptocurrencies for the purpose of divorcing spouses to divide or hide marital assets and for the purposes of tax evasion and fraud. Cryptocurrencies are digital currencies that do not require transactional approval by a third party like a bank. Instead, users are assigned a random, encrypted pseudonym that allows them to store and trade currency for goods and services in an anonymous and unregulated manner. Since the introduction of the first cryptocurrency, Bitcoin, in 2009, cryptocurrencies have significantly and revolutionarily altered the process of hiding ...


14 - Development And Evaluation Of “Chemaid”: A Mobile Computing Application For Enhancing Laboratory Experience, Hannah Turner, Mary Harrell 2018 Columbus State University

14 - Development And Evaluation Of “Chemaid”: A Mobile Computing Application For Enhancing Laboratory Experience, Hannah Turner, Mary Harrell

Georgia Undergraduate Research Conference (GURC)

As technology continues to develop and becomes more advanced, it opens up many opportunities for us to make everyday tools more accessible for those with disabilities. For instance, visually impaired students may find academically challenging courses like Chemistry difficult to participate in, but technological efforts can be made to provide more accessibility in the classroom. In this ongoing project, we are developing a website and an app called ChemAid, a learning tool aimed towards aiding visually impaired students in their science laboratory courses and research. To reach this goal, we will design a website and mobile app that will allow ...


Becoming Human: The Darwinian Evolution Of Ai, Alexander Aviles 2018 University of North Georgia

Becoming Human: The Darwinian Evolution Of Ai, Alexander Aviles

Georgia Undergraduate Research Conference (GURC)

Public fear about the rise of artificial intelligence (AI) has created growing interest in understanding the differences from what created humans and machines. This project contrasts the two major models for creating intelligent life, Darwin’s Theory of Evolution and the neural mapping use to construct AI. Beginning by defining the particulars of Darwinian evolution, the paper explains how evolution relies upon interaction between populations and environmental factors. Turning to research in computer science by the likes of Alan Turing and John McCarthy, the paper then explains how artificial neural networks are programmed to work locally to accomplish a set ...


A Tribute To Robert U. Ayres For A Lifetime Of Work In Technological Forecasting And Related Areas, Steven Mark MILLER 2018 Singapore Management University

A Tribute To Robert U. Ayres For A Lifetime Of Work In Technological Forecasting And Related Areas, Steven Mark Miller

Research Collection School Of Information Systems

Bob Ayres was born in the UnitedStates in 1932. For his university studies at the bachelors, masters and PhDlevels, he concentrated in physics and mathematics. When we think of Bob today,we think of his pioneering work across the areas of technological forecasting,industrial metabolism and industrial ecology, and the role of energy andthermodynamics in economic growth. How did a person with a strong fundamentaleducation as a physicist end up as a pioneering thinker and thought leader atthe intersection of energy, environment and economics?


From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich 2018 University of Texas at El Paso

From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich

Departmental Technical Reports (CS)

Modern economy has benefited from gig economy idea, where, instead of hiring permanent employees, a company assigns each task to the person who is the most efficient in performing this task. This way, each task is performed in the best possible way -- by a person who is the most suited for this job. Why not extend this idea to education? Every student deserves the best possible teacher in every topic. So why not have a teacher who is the best in town in explaining quadratic equations teach quadratic equations to all the students from the town? In this paper, we ...


Relativistic Effects Can Be Used To Achieve A Universal Square-Root (Or Even Faster) Computation Speedup, Olga Kosheleva, Vladik Kreinovich 2018 University of Texas at El Paso

Relativistic Effects Can Be Used To Achieve A Universal Square-Root (Or Even Faster) Computation Speedup, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In this paper, we show that special relativity phenomenon can be used to reduce computation time of any algorithm from T to square root of T. For this purpose, we keep computers where they are, but the whole civilization starts moving around the computer -- at an increasing speed, reaching speeds close to the speed of light. A similar square-root speedup can be achieved if we place ourselves near a growing black hole. Combining the two schemes can lead to an even faster speedup: from time T to the 4-th order root of T.


Supporting Diverse Customers And Prioritized Traffic In Next-Generation Passive Optical Networks, Naureen Hoque 2018 University of Nebraska - Lincoln

Supporting Diverse Customers And Prioritized Traffic In Next-Generation Passive Optical Networks, Naureen Hoque

Computer Science and Engineering: Theses, Dissertations, and Student Research

The already high demand for more bandwidth usage has been growing rapidly. Access network traffic is usually bursty in nature and the present traffic trend is mostly video-dominant. This motivates the need for higher transmission rates in the system. At the same time, the deployment costs and maintenance expenditures have to be reasonable. Therefore, Passive Optical Networks (PON) are considered promising next-generation access technologies. As the existing PON standards are not suitable to support future-PON services and applications, the FSAN (Full Service Access Network) group and the ITU-T (Telecommunication Standardization Sector of the International Telecommunication Union) have worked on developing ...


Computing With Words -- When Results Do Not Depend On The Selection Of The Membership Function, Christopher W. Tovar, Carlos Cervantes, Mario Delgado, Stephanie Figueroa, Caleb Gillis, Daniel Gomez, Andres Llausas, Julio C. Lopez Molinar, Mariana Rogriguez, Alexander Wieczkowski, Francisco Zapata, Vladik Kreinovich 2018 University of Texas at El Paso

Computing With Words -- When Results Do Not Depend On The Selection Of The Membership Function, Christopher W. Tovar, Carlos Cervantes, Mario Delgado, Stephanie Figueroa, Caleb Gillis, Daniel Gomez, Andres Llausas, Julio C. Lopez Molinar, Mariana Rogriguez, Alexander Wieczkowski, Francisco Zapata, Vladik Kreinovich

Departmental Technical Reports (CS)

Often, we need to transform natural-language expert knowledge into computer-understandable numerical form. One of the most successful ways to do it is to use fuzzy logic and membership functions. The problem is that membership functions are subjective. It is therefore desirable to look for cases when the results do not depend on this subjective choice. In this paper, after describing a known example of such a situation, we list several other examples where the results do not depend on the subjective choice of a membership function.


Secure Multi-Agent Quantum Communication: Towards The Most Efficient Scheme (A Pedagogical Remark), Olga Kosheleva, Vladik Kreinovich 2018 University of Texas at El Paso

Secure Multi-Agent Quantum Communication: Towards The Most Efficient Scheme (A Pedagogical Remark), Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many economic and financial applications, it is important to have secure communications. At present, communication security is provided mostly by RSA coding, but the emergent quantum computing can break this encoding, thus making it not secure. One way to make communications absolutely secure is to use quantum encryption. The existing schemes for quantum encryption are aimed at agent-to-agent communications; however, in practice, we often need secure multi-agent communications, where each of the agents has the ability to securely send messages to everyone else. In principle, we can repeat the agent-to-agent scheme for each pair of agents, but this requires ...


A Comprehensive Framework To Replicate Process-Level Concurrency Faults, Supat Rattanasuksun 2018 University of Nebraska-Lincoln

A Comprehensive Framework To Replicate Process-Level Concurrency Faults, Supat Rattanasuksun

Computer Science and Engineering: Theses, Dissertations, and Student Research

Concurrency faults are one of the most damaging types of faults that can affect the dependability of today’s computer systems. Currently, concurrency faults such as process-level races, order violations, and atomicity violations represent the largest class of faults that has been reported to various Linux bug repositories. Clearly, existing approaches for testing such faults during software development processes are not adequate as these faults escape in-house testing efforts and are discovered during deployment and must be debugged.

The main reason concurrency faults are hard to test is because the conditions that allow these to occur can be difficult to ...


Towards Optimal Implementation Of Decentralized Currencies: How To Best Select Probabilities In An Ethereum-Type Proof-Of-Stake Protocol, Thach N. Nguyen, Christian Servin, Vladik Kreinovich 2018 Banking University of Ho Chi Minh City

Towards Optimal Implementation Of Decentralized Currencies: How To Best Select Probabilities In An Ethereum-Type Proof-Of-Stake Protocol, Thach N. Nguyen, Christian Servin, Vladik Kreinovich

Departmental Technical Reports (CS)

Nowadays, most financial transactions are based on a centralized system, when all the transaction records are stored in a central location. This centralization makes the financial system vulnerable to cyber-attacks. A natural way to make the financial system more robust and less vulnerable is to switch to decentralized currencies. Such a transition will also make financial system more transparent. Historically first currency of this type -- bitcoin -- use a large amount of electric energy to mine new coins and is, thus, not scalable to the level of financial system as a whole. A more realistic and less energy-consuming scheme is provided ...


Symmetries Are Important, Vladik Kreinovich 2018 University of Texas at El Paso

Symmetries Are Important, Vladik Kreinovich

Departmental Technical Reports (CS)

This short article explains why symmetries are important, and how they influenced many research projects in which I participated.


Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich 2018 University of Texas at El Paso

Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich

Departmental Technical Reports (CS)

Traditional business theory promoted the ideal of business as a family: everyone should feel good about each other, all employees should feel good working together towards a joint goal. Recently, however, researchers claim that the well-promoted ideal is unattainable, it is a ruse causing everyone to overwork. Instead, these researchers propose a non-emotional collaboration of adults working temporarily on a joint project. In this paper, we show that this new trend is not just based on anecdotal evidence, it actually has a solid foundation in decision theory. So maybe we should apply this new trend to teaching too - and place ...


Optical Wireless Data Center Networks, Abdelbaset S. Hamza 2018 University of Nebraska - Lincoln

Optical Wireless Data Center Networks, Abdelbaset S. Hamza

Computer Science and Engineering: Theses, Dissertations, and Student Research

Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance ...


Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal 2018 Stanford University

Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when physical surveillance cameras went off-line during Hurricane Irma in 2017. Specifically, we collected and compared geo-tagged Instagram and Twitter posts in the state of Florida during times and in areas where public surveillance cameras went off-line. We report social media content ...


Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur 2018 Louisiana State University

Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur

LSU Doctoral Dissertations

Multivariate informational data, which are abstract as well as complex, are becoming increasingly common in many areas such as scientific, medical, social, business, and so on. Displaying and analyzing large amounts of multivariate data with more than three variables of different types is quite challenging. Visualization of such multivariate data suffers from a high degree of clutter when the numbers of dimensions/variables and data observations become too large. We propose multiple approaches to effectively visualize large datasets of ultrahigh number of dimensions by generalizing two standard multivariate visualization methods, namely star plot and parallel coordinates plot. We refine three ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley 2018 Kennesaw State University

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady 2018 University of North Georgia

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy 2018 Nova Southeastern University

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Digital Commons powered by bepress