Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,133 Full-Text Articles 29,963 Authors 7,711,165 Downloads 288 Institutions

All Articles in Computer Sciences

Faceted Search

30,133 full-text articles. Page 5 of 860.

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili 2018 Florida State University

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest ...


The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr. 2018 University of Nebraska at Omaha

The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of ...


Lessons Learned From A District-Wide Implementation Of A Computer Science Initiative In The District Of Columbia Public Schools, Kenneth Alonzo Anderson, Legand L. Burge III, Troy J. Shine, Marlon Mejias, Ketly Jean-Pierre 2018 Howard University

Lessons Learned From A District-Wide Implementation Of A Computer Science Initiative In The District Of Columbia Public Schools, Kenneth Alonzo Anderson, Legand L. Burge Iii, Troy J. Shine, Marlon Mejias, Ketly Jean-Pierre

Journal of Computer Science Integration

In this article, we use evidence to describe seven key lessons from a four-year district-wide computer science implementation project between Howard University and the District of Columbia Public Schools. These lessons are: (a) Get to know the school counselors (and other key personnel); (b) Expect personnel changes and strategic reorganization within school districts; (c) Be innovative to build and maintain community; (d) Be flexible when developing instruments and curricula; (e) Maintain a firm commitment to equity; (f) Develop tiered content and prepare to make philosophical adjustments; and (g) Identify markers of sustainability. We also include original curricula materials including the ...


Fake News Detection: A Deep Learning Approach, Aswini Thota, Priyanka Tilak, Simrat Ahluwalia, Nibrat Lohia 2018 Southern Methodist University

Fake News Detection: A Deep Learning Approach, Aswini Thota, Priyanka Tilak, Simrat Ahluwalia, Nibrat Lohia

SMU Data Science Review

Fake news is defined as a made-up story with an intention to deceive or to mislead. In this paper we present the solution to the task of fake news detection by using Deep Learning architectures. Gartner research [1] predicts that “By 2022, most people in mature economies will consume more false information than true information”. The exponential increase in production and distribution of inaccurate news presents an immediate need for automatically tagging and detecting such twisted news articles. However, automated detection of fake news is a hard task to accomplish as it requires the model to understand nuances in natural ...


A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes 2018 Akademie der Wissenschaften zu Göttingen

A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes

College of the Pacific Faculty Presentations

We describe a new project publishing a freely available online dictionary for Coptic. The dictionary encompasses comprehensive cross-referencing mechanisms, including linking entries to an online scanned edition of Crum’s Coptic Dictionary, internal cross-references and etymological information, translated searchable definitions in English, French and German, and linked corpus data which provides frequencies and corpus look-up for headwords and multiword expressions. Headwords are available for linking in external projects using a REST API. We describe the challenges in encoding our dictionary using TEI XML and implementing linking mechanisms to construct a Web interface querying frequency information, which draw on NLP tools ...


High Performance Sparse Multivariate Polynomials: Fundamental Data Structures And Algorithms, Alex Brandt 2018 The University of Western Ontario

High Performance Sparse Multivariate Polynomials: Fundamental Data Structures And Algorithms, Alex Brandt

Electronic Thesis and Dissertation Repository

Polynomials may be represented sparsely in an effort to conserve memory usage and provide a succinct and natural representation. Moreover, polynomials which are themselves sparse – have very few non-zero terms – will have wasted memory and computation time if represented, and operated on, densely. This waste is exacerbated as the number of variables increases. We provide practical implementations of sparse multivariate data structures focused on data locality and cache complexity. We look to develop high-performance algorithms and implementations of fundamental polynomial operations, using these sparse data structures, such as arithmetic (addition, subtraction, multiplication, and division) and interpolation. We revisit a sparse ...


Theory Of Computation Lecture Notes (Student Version), Kyle Burke 2018 Plymouth State University

Theory Of Computation Lecture Notes (Student Version), Kyle Burke

Open Educational Resources

Lecture notes for an undergraduate Theory of Computation course. These notes assume some back-ground in discrete math or set theory. The notes deviate from the normal topic order by covering all the machines first, then properties of the language classes, and finally non-inclusion into those classes. Many sections of the notes have yet to be completed.


Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang 2018 Kennesaw State University

Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang

Master of Science in Computer Science Theses

High efficiency Video Coding (HEVC) has been deemed as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The reference software (i.e., HM) have included the implementations of the guidelines in appliance with the new standard. The software includes both encoder and decoder functionality.

Machine learning (ML) works with data and processes it to discover patterns that can be later used to analyze new trends. ML can play a key role in a wide range of critical applications, such as data mining, natural language processing, image recognition, and ...


Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward 2018 Embry-Riddle Aeronautical University

Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward

National Training Aircraft Symposium (NTAS)

Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception ...


The Example Guru: Suggesting Examples To Novice Programmers In An Artifact-Based Context, Michelle Ichinco 2018 Washington University in St. Louis

The Example Guru: Suggesting Examples To Novice Programmers In An Artifact-Based Context, Michelle Ichinco

Engineering and Applied Science Theses & Dissertations

Programmers in artifact-based contexts could likely benefit from skills that they do not realize exist. We define artifact-based contexts as contexts where programmers have a goal project, like an application or game, which they must figure out how to accomplish and can change along the way. Artifact-based contexts do not have quantifiable goal states, like the solution to a puzzle or the resolution of a bug in task-based contexts. Currently, programmers in artifact-based contexts have to seek out information, but may be unaware of useful information or choose not to seek out new skills. This is especially problematic for young ...


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose 2018 Embry-Riddle Aeronautical University

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

National Training Aircraft Symposium (NTAS)

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used ...


Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair 2018 Seton Hall University

Mathchat: Computational Mathematics Via A Social Machine, Manfred Minimair

Manfred Minimair

The main question of this research is: How does a social machine discover algorithmic mathematical knowledge? A social machine is a system of humans and computers engaged in some purposeful activity. To address the main question question, an empiric and theoretical framework for algorithmic mathematical knowledge discovered by the social machine is proposed. The framework is derived from findings in Distributed Cognition documenting how collaborators evolve a mathematical algorithm. By combining Distributed  Cognition with the standard Message Passing Model of Distributed Computing, a formalism is introduced to specify the activities of the social machine and its algorithmic knowledge. Furthermore, the ...


Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor 2018 Australian Catholic University

Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor

2009 - 2018 ACER Research Conferences

Since computers first appeared in classrooms, educators have sought to integrate information communication technologies (ICT) into teaching and learning. In Australia, as elsewhere, ICT are widely regarded as critical facilitators of student learning. The ability to use ICT effectively is specified in Australia’s national curriculum as a required general capability. However, despite the educational environment being replete with ICT related programs, our understanding of how students use ICT for learning is still limited. This paper presents insights from the past 30 years of research, which suggest that even though the current ‘climate’ in Australian schools is favourable, teacher confidence ...


Automatic Knowledge Extraction From Ocr Documents Using Hierarchical Document Analysis, Mohammad Masum, Sai Kosaraju, Tanju Bayramoglu, Girish Modgil, Mingon Kang 2018 Kennesaw State University

Automatic Knowledge Extraction From Ocr Documents Using Hierarchical Document Analysis, Mohammad Masum, Sai Kosaraju, Tanju Bayramoglu, Girish Modgil, Mingon Kang

Grey Literature from PhD Candidates

Industries can improve their business efficiency by analyzing and extracting relevant knowledge from large numbers of documents. Knowledge extraction manually from large volume of documents is labor intensive, unscalable and challenging. Consequently, there have been a number of attempts to develop intelligent systems to automatically extract relevant knowledge from OCR documents. Moreover, the automatic system can improve the capability of search engine by providing application-specific domain knowledge. However, extracting the efficient information from OCR documents is challenging due to highly unstructured format. In this paper, we propose an efficient framework for a knowledge extraction system that takes keywords based queries ...


Semantic-Aware Stealthy Control Logic Infection Attack, Sushma kalle 2018 University of New Orleans, New Orleans

Semantic-Aware Stealthy Control Logic Infection Attack, Sushma Kalle

University of New Orleans Theses and Dissertations

In this thesis work we present CLIK, a new, automated, remote attack on the control logic of a programmable logic controller (PLC) in industrial control systems. The CLIK attack modifies the control logic running in a remote target PLC automatically to disrupt a physical process. We implement the CLIK attack on a real PLC. The attack is initiated by subverting the security measures that protect the control logic in a PLC. We found a critical (zero-day) vulnerability, which allows the attacker to overwrite password hash in the PLC during the authentication process. Next, CLIK retrieves and decompiles the original logic ...


Assessing Apache Spark Streaming With Scientific Data, Janak Dahal 2018 University of New Orleans

Assessing Apache Spark Streaming With Scientific Data, Janak Dahal

University of New Orleans Theses and Dissertations

Processing real-world data requires the ability to analyze data in real-time. Data processing engines like Hadoop come short when results are needed on the fly. Apache Spark's streaming library is increasingly becoming a popular choice as it can stream and analyze a significant amount of data. To showcase and assess the ability of Spark various metrics were designed and operated using data collected from the USGODAE data catalog. The latency of streaming in Apache Spark was measured and analyzed against many nodes in the cluster. Scalability was monitored by adding and removing nodes in the middle of a streaming ...


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick 2018 Purdue University

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – such as ...


Mass Spectrometry Image Creator (Msic): Ion Mobility / Mass Spectrometry Imaging Workflow In Python, Stephen Creger, Julia Laskin, Daniela Mesa Sanchez 2018 Purdue University

Mass Spectrometry Image Creator (Msic): Ion Mobility / Mass Spectrometry Imaging Workflow In Python, Stephen Creger, Julia Laskin, Daniela Mesa Sanchez

The Summer Undergraduate Research Fellowship (SURF) Symposium

Mass spectrometry (MS) is a powerful characterization technique that enables identification of compounds in complex mixtures. Acquiring mass spectra in a spatially-resolved manner (i.e. over a grid), allows the data to be used to generate images that show the spatial distribution and relative intensities of every compound in a sample. These images can be used to monitor and identify biomarkers, explore the metabolism of compounds within tissues, and much more. However, the limitations of mass spectrometry can result in ambiguous compound identifications. Another characterization tool, ion mobility spectrometry (IM) can be integrated into existing MS routines to address this ...


Deep Machine Learning For Mechanical Performance And Failure Prediction, Elijah Reber, Nickolas D. Winovich, Guang Lin 2018 Penn State University

Deep Machine Learning For Mechanical Performance And Failure Prediction, Elijah Reber, Nickolas D. Winovich, Guang Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

Deep learning has provided opportunities for advancement in many fields. One such opportunity is being able to accurately predict real world events. Ensuring proper motor function and being able to predict energy output is a valuable asset for owners of wind turbines. In this paper, we look at how effective a deep neural network is at predicting the failure or energy output of a wind turbine. A data set was obtained that contained sensor data from 17 wind turbines over 13 months, measuring numerous variables, such as spindle speed and blade position and whether or not the wind turbine experienced ...


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller 2018 School of Agricultural & Biological Engineering, Purdue University

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of ...


Digital Commons powered by bepress