Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

32,018 Full-Text Articles 32,048 Authors 7,711,165 Downloads 298 Institutions

All Articles in Computer Sciences

Faceted Search

32,018 full-text articles. Page 7 of 928.

Virtual Robot Climbing Using Reinforcement Learning, Ujjawal Garg 2018 San Jose State University

Virtual Robot Climbing Using Reinforcement Learning, Ujjawal Garg

Master's Projects

Reinforcement Learning (RL) is a field of Artificial Intelligence that has gained a lot of attention in recent years. In this project, RL research was used to design and train an agent to climb and navigate through an environment with slopes. We compared and evaluated the performance of two state-of-the-art reinforcement learning algorithms for locomotion related tasks, Deep Deterministic Policy Gradients (DDPG) and Trust Region Policy Optimisation (TRPO). We observed that, on an average, training with TRPO was three times faster than DDPG, and also much more stable for the locomotion control tasks that we experimented. We conducted experiments and ...


Deep Visual Recommendation System, Raksha Sunil 2018 San Jose State University

Deep Visual Recommendation System, Raksha Sunil

Master's Projects

Recommendation system is a filtering system that predicts ratings or preferences that a user might have. Recommendation system is an evolved form of our trivial information retrieval systems. In this paper, we present a technique to solve new item cold start problem. New item cold start problem occurs when a new item is added to a shopping website like Amazon.com. There is no metadata for this item, no ratings and no reviews because it’s a new item in the system. Absence of data results in no recommendation or bad recommendations. Our approach to solve new item cold start ...


Iterated Belief Revision Under Resource Constraints: Logic As Geometry, Dan P. Guralnik, Daniel E. Koditschek 2018 University of Pennsylvania

Iterated Belief Revision Under Resource Constraints: Logic As Geometry, Dan P. Guralnik, Daniel E. Koditschek

Departmental Papers (ESE)

We propose a variant of iterated belief revision designed for settings with limited computational resources, such as mobile autonomous robots.

The proposed memory architecture---called the universal memory architecture (UMA)---maintains an epistemic state in the form of a system of default rules similar to those studied by Pearl and by Goldszmidt and Pearl (systems Z and Z+). A duality between the category of UMA representations and the category of the corresponding model spaces, extending the Sageev-Roller duality between discrete poc sets and discrete median algebras provides a two-way dictionary from inference to geometry, leading to immense savings in computation, at ...


Pantry: A Macro Library For Python, Derek Pang 2018 San Jose State University

Pantry: A Macro Library For Python, Derek Pang

Master's Projects

Python lacks a simple way to create custom syntax and constructs that goes outside of its own syntax rules. A paradigm that allows for these possibilities to exist within languages is macros. Macros allow for a shorter set of syntax to expand into a longer set of instructions at compile-time. This gives the capability to evolve the language to fit personal needs.

Pantry, implements a hygienic text-substitution macro system for Python. Pantry achieves this through the introduction of an additional preparsing step that utilizes parsing and lexing of the source code. Pantry proposes a way to simply declare a pattern ...


Pasnet: Pathway-Associated Sparse Deepneural Network For Prognosis Prediction From High-Throughput Data, Jie Hao, Youngsoon Kim, Tae-Kyung Kim, Mingon Kang 2018 Kennesaw State University

Pasnet: Pathway-Associated Sparse Deepneural Network For Prognosis Prediction From High-Throughput Data, Jie Hao, Youngsoon Kim, Tae-Kyung Kim, Mingon Kang

Faculty Publications

Background: Predicting prognosis in patients from large-scale genomic data is a fundamentally challenging problem in genomic medicine. However, the prognosis still remains poor in many diseases. The poor prognosis maybe caused by high complexity of biological systems, where multiple biological components and their hierarchical relationships are involved. Moreover, it is challenging to develop robust computational solutions with high-dimension, low-sample size data. Results: In this study, we propose a Pathway-Associated Sparse Deep Neural Network (PASNet) that not only predicts patients’ prognoses but also describes complex biological processes regarding biological pathways for prognosis. PASNet models a multilayered, hierarchical biological system of genes ...


Black Networks In Smart Cities, Shaibal Chakrabarty 2018 Southern Methodist University

Black Networks In Smart Cities, Shaibal Chakrabarty

Computer Science and Engineering Theses and Dissertations

In this dissertation, we present the Black Networks solution to protect both the data and the metadata for mobile ad-hoc Internet of Things (IoT) networks in Smart Cities. IoT networks are gaining popularity with billions of deployed nodes, and increasingly carrying mission-critical data, whose compromise can lead to catastrophic consequences. IoT nodes are resource-constrained and often exist within insecure environments, making them vulnerable to a broad range of active and passive attacks. Black IoT networks are designed to mitigate multiple communication-based attacks by encrypting the data and the metadata, within a communication frame or packet, while remaining compatible with the ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali 2018 The University of Western Ontario

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han 2018 San Jose State University

Intra-Exchange Cryptocurrency Arbitrage Bot, Eric Han

Master's Projects

Cryptocurrencies are defined as a digital currency in which encryption techniques are utilized to regulate generation of units of currency and verify the transfer of funds, independent of a central governing body such as a bank. Due to the large number of cryptocurrencies currently available, there inherently exists many price discrepancies due to market inefficiencies. Market inefficiencies occur when the price of assets do not reflect their true value. In fact, these types of pricing discrepancies exist in other financial markets, including fiat currency exchanges and stock exchanges. However, these discrepancies are more significant in the cryptocurrency domain due to ...


Mercyhealth Internship: It As A Unit, Frenz Joshua Hayag 2018 Olivet Nazarene University

Mercyhealth Internship: It As A Unit, Frenz Joshua Hayag

Student Scholarship - Computer Science

This is a CSIS 494 Field Experience paper about an internship in a healthcare organization called MercyHealth. My internship would be described as generalized. The paper will be mainly talking about the different aspects of IT and how they all come together to create progress, and cohesiveness in the organization. I had the opportunity to see different aspects of their IT department by sitting down in project meetings. I was able to job shadow multiple staff from admins to PC techs to network engineers. I was able to see first-hand how an organization, and IT respond to disaster, and how ...


Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin 2018 San Jose State University

Variations On A Theme: Using Amino Acid Sequences To Generate Music, Aaron Kosmatin

Master's Projects

In this project, we explore using a musical space to represent the properties of amino acids. We consider previous mappings and explore the limitations of these mappings. In this exploration, we will propose a new method of mapping into musical spaces that extends the properties that can be represented. For this work, we will use amino acid sequences as our example mapping. The amino acid properties we will use include mass, charge, structure, and hydrophobicity. Finally, we will show how the different musical properties can be compared for similarity.


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen 2018 San Jose State University

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain ...


Sns Use, Risk, And Executive Behavior, Andrew Green, James Parrish, James N. Smith, Jason B. Thatcher 2018 Kennesaw State University

Sns Use, Risk, And Executive Behavior, Andrew Green, James Parrish, James N. Smith, Jason B. Thatcher

Andrew Green


Organizations can suffer attacks designed to take advantage of employee vulnerabilities.  Successful attacks cause firms to suffer financial damage ranging from minor information breaches to severe financial losses.  Cybercriminals focus on organization executives, because the power and influence they wield affords access to more sensitive data and financial resources.  The purpose of this research in progress submission is to identify the types of executive behaviors that information security professionals believe introduce risk to an organization, as well as to explore the degree of risk organizations face as a result of these behaviors.


Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom 2018 Hamline University

Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom

Augsburg Honors Review

As the demand of computer processing grows, the burden placed on CPUs will increase as well. Computing systems produce heat, which is attracted to a metal heatsink where it is dissipated out of the system by a fan. Liquid cooling can be more effective, but is more expensive and increases the risk of damaging leaks. Peltier chips, electronic components which transfer heat into electricity, can be used in an effort to reclaim and reuse some of this waste heat. This experiment tested twelve heatsinks of various designs to maximize the effect of the Peltier chip. Variations in designs of the ...


Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo 2018 University of Nebraska at Omaha

Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo

Information Systems and Quantitative Analysis Faculty Publications

Open Source ist ein zunehmend beliebter Kollaborationsmechanismus für die Entwicklung von Software, auch in Unternehmen. Unsere Arbeit schafft die fehlende Verbindung zwischen Open Source Projekten, Unternehmen und Märkten. Ohne diese Verbindung wurden Koordinations- und Finanzierungsprobleme sichtbar, die zu schwerwiegenden Sicherheitslücken führen. In diesem Paper entwickeln wir acht Design Features, die ein Marktplatz für Open Source haben sollte, um diese Probleme zu beseitigen. Wir begründen jedes Design Feature mit den bestehenden Praktiken von Open Source und stellen einen Prototypen vor. Abschließend diskutieren wir, welche Auswirkungen die Einführung eines solchen Marktplatzes haben könnte.

Translation: Marketplace to Coordinate and Finance Open Source Software ...


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo 2018 University of Pennsylvania Law School

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

Faculty Scholarship at Penn Law

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the ...


Complexity Results For Fourier-Motzkin Elimination, Delaram Talaashrafi 2018 The University of Western Ontario

Complexity Results For Fourier-Motzkin Elimination, Delaram Talaashrafi

Electronic Thesis and Dissertation Repository

In this thesis, we propose a new method for removing all the redundant inequalities generated by Fourier-Motzkin elimination. This method is based on Kohler’s work and an improved version of Balas’ work. Moreover, this method only uses arithmetic operations on matrices. Algebraic complexity estimates and experimental results show that our method outperforms alternative approaches based on linear programming.


Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce 2018 Iowa State University

Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce

Civil, Construction and Environmental Engineering Publications

Engineering systems experiencing events of amplitudes higher than 100 gn for a duration under 100 ms, here termed high-rate dynamics, can undergo rapid damaging effects. If the structural health of such systems could be accurately estimated in a timely manner, preventative measures could be employed to minimize adverse effects. For complex high-rate problems, adaptive observers have shown promise due to their capability to deal with nonstationary, noisy, and uncertain systems. However, adaptive observers have slow convergence rates, which impede their applicability to the high-rate problems. To improve on the convergence rate, we propose a variable input space concept for ...


Regularity Radius: Properties, Approximation And A Not A Priori Exponential Algorithm, David Hartman, Milan Hladik 2018 Charles University, Faculty of Mathematics and Physics, Department of Applied Mathematics, Prague, Czech Republic and Institute of Computer Science, Czech Academy of Sciences, Prague, Czech Republic.

Regularity Radius: Properties, Approximation And A Not A Priori Exponential Algorithm, David Hartman, Milan Hladik

Electronic Journal of Linear Algebra

The radius of regularity, sometimes spelled as the radius of nonsingularity, is a measure providing the distance of a given matrix to the nearest singular one. Despite its possible application strength this measure is still far from being handled in an efficient way also due to findings of Poljak and Rohn providing proof that checking this property is NP-hard for a general matrix. There are basically two approaches to handle this situation. Firstly, approximation algorithms are applied and secondly, tighter bounds for radius of regularity are considered. Improvements of both approaches have been recently shown by Hartman and Hlad\'{i ...


User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson 2018 Brigham Young University

User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson

Undergraduate Honors Theses

Simple password-based authentication provides insufficient protection against increasingly common incidents of online identity theft and data loss. Although two-factor authentication (2FA) provides users with increased protection against attackers, users have mixed feelings about the usability of 2FA. We surveyed the students, faculty, and staff of Brigham Young University (BYU) to measure user sentiment about DUO Security, the 2FA system adopted by BYU in 2017. We find that most users consider DUO to be annoying, and about half of those surveyed expressed a preference for authentication without using a second-factor. About half of all participants reported at least one instance of ...


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa 2018 Chapman University

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK FOUND ...


Digital Commons powered by bepress