Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

40,570 Full-Text Articles 45,134 Authors 14,916,241 Downloads 328 Institutions

All Articles in Computer Sciences

Faceted Search

40,570 full-text articles. Page 6 of 1308.

Gr-34 Defensive Neural Network, Hongkyu Lee 2021 Kennesaw State University

Gr-34 Defensive Neural Network, Hongkyu Lee

C-Day Computing Showcase

Machine learning (ML) algorithms require a massive amount of data. Firms such as Google and Facebook exploit user's data to deliver a more precise ML-based service. However, collecting users' data is a risky action because their private data can be leaked through the transmission. As a remedy, federated learning is introduced. In federated learning, a central server distributes a machine learning model to users. Each user trains the model to its data, and send the model back. Later the models are aggregated and distributed again. Federated learning is more secure in that it emancipates users from the risk of ...


Gr-33 Efficient Yet Robust Privacy Preservation \\For Mpeg-Dash Based Video Streaming, Luke A Cranfill 2021 Kennesaw State University

Gr-33 Efficient Yet Robust Privacy Preservation \\For Mpeg-Dash Based Video Streaming, Luke A Cranfill

C-Day Computing Showcase

MPEG-DASH is a video streaming standard that outlines protocols for sending audio and video content from a server to a client over HTTP. However, it creates an opportunity for an adversary to invade users' privacy. While a user is watching a video, information is leaked in the form of meta-data, the size and time that the server sent data to the user. After a fingerprint of this data is created, the adversary can use this to identify whether a target user is watching the corresponding video. Only one defense strategy has been proposed to deal with this problem: differential privacy ...


Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka 2021 Kennesaw State University

Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka

C-Day Computing Showcase

The Internet of Things (IoT) has been the key for many advancements in next-generation technologies for the past few years. With a conceptual grouping of ecosystem elements such as sensors, actuators, and smart objects connected to perform complex operations to perform environmental monitoring, intelligent transport system, smart building, smart cities, and endless other possibilities. Edge computing helps the IoT’s reach even further and be more robust by connecting multiple censored devices through the internet and forming powerful computational capabilities. Unfortunately, this computation level comes at a cost as the devices are constantly being used to communicate and perform specific ...


Gr-40 Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Baba M Traore 2021 Kennesaw State University

Gr-40 Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Baba M Traore

C-Day Computing Showcase

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing IoT technologies. Since the IoT industry has exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job market. That can be done by using containerization. There are many approaches in the ...


Gr-44 An Efficient Intrusion Detection Framework Based On Federated Learning For Iot Networks., Osama Shahid 2021 Kennesaw State University

Gr-44 An Efficient Intrusion Detection Framework Based On Federated Learning For Iot Networks., Osama Shahid

C-Day Computing Showcase

There are abundant number of IoT devices that are connected on over multiple networks. These devices can be exposed to multiple different types of network threats. Though, these devices do have security and software that does act as a wall of protection we purpose a Federated Learning (FL) approach that would allow detection of threats of a network for IoT devices. Federated Learning can be best described as decentralized training. Adhering to the GDPR rules that prevent data from being distributed, FL addressed the challenge by bringing the ML model to the data rather than the traditional method where the ...


Gr-45 Framework For Collecting Data From Specialized Iot Devices., MD SAIFUL ISLAM 2021 Kennesaw State University

Gr-45 Framework For Collecting Data From Specialized Iot Devices., Md Saiful Islam

C-Day Computing Showcase

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis ...


Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa 2021 Kennesaw State University

Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa

C-Day Computing Showcase

Studies show that the quality of the information collected during an elicitation interview, and consequently the quality of the software product that needs to be developed, highly depends on the interviewee's engagement. Because of social expectations, interviewees tend to hide if they are bored or not engaged. To overcome this problem and support the analyst during the interviews, this research uses biometric data and voice features, together with supervised machine learning algorithms, to predict the interviewee's engagement. We built our solution on an experiment consisted of interviewing 31 participants. We collected the data using an Empatica wristband and ...


Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk 2021 Kennesaw State University

Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk

C-Day Computing Showcase

Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study ...


Gr-64 How Could Iot Assist Healthcare System During Covid-19 Or Future Pandemics?, Mohammad Nasajpour Esfahani 2021 Kennesaw State University

Gr-64 How Could Iot Assist Healthcare System During Covid-19 Or Future Pandemics?, Mohammad Nasajpour Esfahani

C-Day Computing Showcase

The Internet of Things (IoT), a technology built upon sensors and devices, has shown great applicability among various domains, especially healthcare. This pandemic has critically impacted all parts of society including people, health centers, businesses, authorities, etc. Researchers are attempting to adopt different technologies to mitigate this virus faster and save more lives. Regarding the great benefits that Internet of Things (IoT) has brought into different areas within the healthcare domain, this technology has been performing several main tasks including diagnosing, monitoring, tracing, disinfecting, and vaccinating to combat this virus. Our research is conducted of the possible IoT solutions to ...


Gr-67 Representation Learning For Motion Sequence, Saisangararamaleengam Alagapan, Alexandru Malos, Roshni Kishor, Venkateswara Reddy Mosali 2021 Kennesaw State University

Gr-67 Representation Learning For Motion Sequence, Saisangararamaleengam Alagapan, Alexandru Malos, Roshni Kishor, Venkateswara Reddy Mosali

C-Day Computing Showcase

This research project proposes a new deep learning architecture that is used to align human poses to be used in an exercise assistant system. In short, the assistant system takes a video feed of a user doing exercise, then provides visual feedback by comparing the user’s current pose to a professional trainer’s pose that is stored in the system. We design a new deep architecture to accomplish this task and show better accuracy and efficiency.Advisors(s): Project Sponsors - Dr. Ying Xie & Dr. Linh Le Project Advisor- Dr. Meng HanTopic(s): Data/Data AnalyticsIT 7993


Gr-70 Defending Data Reconstruction Through Adaptive Image Augmentation, Seunghyeon Shin 2021 Kennesaw State University

Gr-70 Defending Data Reconstruction Through Adaptive Image Augmentation, Seunghyeon Shin

C-Day Computing Showcase

In this paper, we introduce a data augmentation-based defense strategy for preventing the reconstruction of training data through the exploitation of stolen model gradient. The collection of training data to a centralized server has been required for the training of neural networks in traditional machine learning. However, as privacy becomes a significant concern, the concept of Federated learning is introduced. In federated learning, a centralized server shares the well-trained neural network and participating end-users send the gradient back to the server after training without sharing the sensitive data itself. As the concept of federated learning does not share the original ...


Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse 2021 Kennesaw State University

Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse

C-Day Computing Showcase

Description: Our project "Information Recall For Kids With Autism" also known as the product name given by the client "Safe Kid" is an app to help children with autism understand basic contact information such as phone numbers, addresses, and names. This app is being created for our client Spectrum Behavioral Associates who specialize in helping kids and young adults who have autism, learning development delays, or other behavioral challenges. Motivation: To teach kids who have autism basic contact information in case of an emergency. Materials and Methods: The app we are creating is a local based app made within Unity ...


Uc-12 Comprehensive Security Solution For Small E-Commerce Business, Patrick McCollums, Hristo Bakalov, Philinda Morse, Tyler Phillips, Watson Day 2021 Kennesaw State University

Uc-12 Comprehensive Security Solution For Small E-Commerce Business, Patrick Mccollums, Hristo Bakalov, Philinda Morse, Tyler Phillips, Watson Day

C-Day Computing Showcase

Project Description: Create an e-commerce server and a comprehensive security program to protect a web server for a simulated small business. This server will include security tools such as intrusion detection, firewall, and network monitoring. The installation and maintenance of this solution will be documented as part of the final documentation package. The server will be reviewed for exploitation from other teams while we attempt the exploitation of their server(s). Research/Motivation: How to research, install, configure, and integrate various open-source software packages for information security, e-commerce, web hosting, and database. Our motivation for this project was to create ...


Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang 2021 Kennesaw State University

Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang

C-Day Computing Showcase

TeleClinic is a telemedicine web application that provides ease of access and a medium for interaction between patients and their respective doctors and administrators. In particular, this web portal includes a chat feature, an area for medical reports, an area for appointment requests, and an area for video recordings. Additionally, TeleClinic meets the requirements prescribed by the Health Insurance Portability and Accountability Act (H.I.P.A.A.) via upholding data privacy and safeguarding medical information. To maximize its overall utility, TeleClinic utilizes the React and React Redux libraries for its front-end and a NoSQL database in Google Firebase for ...


Uc-15 Malware Analysis Using Reverse Engineering, Shamour Jones, Cynthia S Marcellus, Andy pham, Nathan Rowe, Joshua Rowland 2021 Kennesaw State University

Uc-15 Malware Analysis Using Reverse Engineering, Shamour Jones, Cynthia S Marcellus, Andy Pham, Nathan Rowe, Joshua Rowland

C-Day Computing Showcase

The motivation for this project is driven by evaluation of the different tools on the market that allow for breaking down executables or binary files, and understanding what the malware is doing. By reverse-engineering the malware, we can understand its impact and how to protect against it. Our focus is to understand where different tools are stronger than others, as well as understand the evolving landscape of malware and security overall. For this capstone project, we utilized two different tools and many sample malware files. The methods used to debug the malware are detailed in our milestone two report and ...


Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali 2021 Kennesaw State University

Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali

C-Day Computing Showcase

Medication nonadherence is generally defined as a patient’s inability to take their medications correctly as prescribed by their doctors. Medication nonadherence adversely affects patient outcomes and increases healthcare costs. Prior research found that health system-, condition-, patient- (older age is one factor), therapy- and social/economic-related factors have been identified to show effect on non-adherence. Our goal is to analyze the NHIS data to understand the sociodemographic and health causes of medication nonadherence, as well as answer the following questions about our selected topic: What variables are the most relevant drivers of nonadherence? Does the direction and strength of ...


Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams 2021 Kennesaw State University

Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams

C-Day Computing Showcase

These past few years have introduced the most important time in history to study new faucets of online learning. Due to COVID's impact, online learning became a staple in millions of homes across the country. Guided by the research question, “Can a machine learning model be created and trained to detect student concentration level based on eye and facial data?”, we set out to contribute to society’s understanding of online learning under the guidance of Dr. Ying Xie and Dr. Linh Le. Our process involved recording ourselves participating in online classes to garnish eye and facial data. Each ...


Uc-25 Woodline Interiors Project Planning Application, Beniamin Costea, Iram Nawaz, Natan Beraki, Daniel Lopez, Carter Richter, Yeonkuk Woo 2021 Kennesaw State University

Uc-25 Woodline Interiors Project Planning Application, Beniamin Costea, Iram Nawaz, Natan Beraki, Daniel Lopez, Carter Richter, Yeonkuk Woo

C-Day Computing Showcase

Meeting with the client regularly, we’ve established one of the many solutions to their requirements. The client, WoodLine Interiors, needs a well-designed system that can solve product management, client communication, and project management. The main issue that the company is facing is in the area of managing multiple projects and tracking project progress. Their issue is commonly addressed by a large number of companies that create software solutions, but it’s not personalized for their appropriate needs in the field of cabinetry. As a result our solution created the perfect stages and states of the project so there is ...


Uc-26 Pose Extraction For Real-Time Workout Assist_Capstone Group_W01_Spring Semester, Royce Camp, Zach Christmas, Jonathon Segars, Amanda Mead, Cameron Page 2021 Kennesaw State University

Uc-26 Pose Extraction For Real-Time Workout Assist_Capstone Group_W01_Spring Semester, Royce Camp, Zach Christmas, Jonathon Segars, Amanda Mead, Cameron Page

C-Day Computing Showcase

Motion Intelligence Research Project We installed and tested many existing pose extraction technologies in many situations. We provided reports on the different software solutions and decided on a single solution that performed the best. We will extract key-points and track the movements across multiple dimensions. We will demonstrate the X and Y movements of everyone for our chosen software solution in a Business Intelligent tool (PowerBI). Given the current epidemic, we are not going to be able to compare against the professional KinaTrax software on campus. Although, Dr. Xie has given us other software packages to compare our given software ...


Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis 2021 Kennesaw State University

Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis

C-Day Computing Showcase

Cybercrimes are a billion-dollar industry that is rapidly growing by the day. One of the biggest threats faced by companies is the infection of malware. New forms of malware are created daily and ever evolving to evade detection methods. Understanding how malware infects your system and how it eludes detection is crucial to keeping a company's network and devices safe. During this project we will be using reverse engineering methods to better understand the functionality of malware, as well as how it eludes detection. We will be using IDAPro and WiDbg to perform the reverse engineering. Using this knowledge ...


Digital Commons powered by bepress