Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (174)
- TÜBİTAK (100)
- Embry-Riddle Aeronautical University (47)
- Selected Works (44)
- Singapore Management University (38)
-
- Washington University in St. Louis (23)
- Old Dominion University (22)
- SelectedWorks (18)
- University of Central Florida (18)
- University of Nebraska - Lincoln (16)
- University of Nevada, Las Vegas (15)
- University for Business and Technology in Kosovo (11)
- University of South Carolina (9)
- University of Wollongong (9)
- University of Tennessee, Knoxville (6)
- Air Force Institute of Technology (5)
- Portland State University (5)
- California Polytechnic State University, San Luis Obispo (4)
- University of Kentucky (4)
- University of South Florida (4)
- Chapman University (3)
- Technological University Dublin (3)
- University of New Haven (3)
- Wayne State University (3)
- San Jose State University (2)
- University of Arkansas, Fayetteville (2)
- University of Texas at El Paso (2)
- Western University (2)
- Florida International University (1)
- Iowa State University (1)
- Keyword
-
- Data representation (8)
- Robert Hooke (8)
- Scientific imaging (8)
- Security (8)
- Bayesian Networks (7)
-
- Department of Computer Science and Engineering (7)
- Emerging Technologies (6)
- Privacy (6)
- Wireless sensor networks (6)
- Algorithms (5)
- National Security (5)
- Optimization (5)
- Robotics (5)
- Android (4)
- Bayesian networks (4)
- Computer vision (4)
- Cyber (4)
- Digital forensics (4)
- Embedded systems (4)
- Feedback control (4)
- Image processing (4)
- Particle swarm optimization (4)
- Policing (4)
- Surveillance (4)
- Uberveillance (4)
- Uncertainty (4)
- Undergraduate students (4)
- Adaptive algorithms (3)
- Bayesian network (3)
- College seniors (3)
- Publication
-
- Computer Science & Engineering Syllabi (164)
- Turkish Journal of Electrical Engineering and Computer Sciences (100)
- Research Collection School Of Computing and Information Systems (36)
- Journal of Digital Forensics, Security and Law (33)
- All Computer Science and Engineering Research (23)
-
- Electronic Theses and Dissertations (19)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Dr Deogratias Harorimana (13)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (12)
- UBT International Conference (11)
- Associate Professor Katina Michael (9)
- Ole J Mengshoel (8)
- Professor Katina Michael (8)
- Section 5: Imaging at the Nano Scale (8)
- Browse all Theses and Dissertations (7)
- Electrical & Computer Engineering Faculty Publications (7)
- Jan Kallberg (7)
- College of Engineering: Graduate Celebration Programs (6)
- Dissertations and Theses (5)
- George J. Pappas (5)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (5)
- Doctoral Dissertations (4)
- Jeremy Straub (4)
- Rahul Mangharam (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Computer Engineering (3)
- Computer Science and Engineering Faculty Publications (3)
- Electrical & Computer Engineering Theses & Dissertations (3)
- Electrical & Computer Engineering and Computer Science Faculty Publications (3)
Articles 31 - 60 of 610
Full-Text Articles in Engineering
The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj
The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj
UBT International Conference
Visoka oilfield was explored in 1963 through the well G-622. In this oilfield had been drilled more than 170 production wells. Through all this years of its exploitation, mainly because of the outdated technology, the environmental pollution reached really dramatic values. The pollution extends on the Visoka village, affecting so the life for the entire community. The oil spills, the gas emissions and the formation water affected and polluted and ―k illed‖ the Gjanica River, its delta and the Adriatic coast in the Semani beach. Due to the technology and the completely wrong policies, used in the past, the wells …
Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi
Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi
UBT International Conference
The object of this paper is the research of agronomic and quality trains of winter varieties (hordeum vulgare L.) their adaptability and specific reactions towards growing conditions in the Republic of Kosovo. During three year trails on localities in Dukagjini area and area of Kosovo we researched 5 winter barley varieties. Environment has been explored together with estimation of significant parameters of grain yield, hectoliter weight, protein and starch content. Impact of year, location and variety on grain yield, hectoliter grain weight, protein and starch content has been estimated by analysis of variance. Environmental effects of planting barley cultivars in …
Towards Logical Linked Data Compression, Amit Krishna, Pascal Hitzler, Guozhu Dong
Towards Logical Linked Data Compression, Amit Krishna, Pascal Hitzler, Guozhu Dong
Computer Science and Engineering Faculty Publications
Linked data has experienced accelerated growth in recent years. With the continuing proliferation of structured data, demand for RDF compression is becoming increasingly important. In this study, we introduce a novel lossless compression technique for RDF datasets, called Rule Based compression (RB compression) that compresses datasets by generating a set of new logical rules from the dataset and removing triples that can be inferred from these rules. We employ existing frequent pattern mining algorithms for generating new logical rules. Unlike other compression techniques, our approach not only takes advantage of syntactic verbosity and data redundancy but also utilizes intra- and …
Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz
Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz
CSE Conference and Workshop Papers
This paper describes the challenges of data mining uncertain water reservoir data based on past human operations in order to learn from them reservoir policies that can be automated for the future operation of the water reservoirs. Records of human operations of water reservoirs often contain uncertain data. For example, the recorded amounts of water released and retained in the water reservoirs are typically uncertain, i.e., they are bounded by some minimum and maximum values. Moreover, the time of release is also uncertain, i.e., typically only monthly or weekly amounts are recorded. To increase the effectiveness of data mining of …
Cognitive Architectures And Autonomy: Commentary And Response, Włodzisław Duch, Ah-Hwee Tan, Stan Franklin
Cognitive Architectures And Autonomy: Commentary And Response, Włodzisław Duch, Ah-Hwee Tan, Stan Franklin
Research Collection School Of Computing and Information Systems
This paper provides a very useful and promising analysis and comparison of current architectures of autonomous intelligent systems acting in real time and specific contexts, with all their constraints. The chosen issue of Cognitive Architectures and Autonomy is really a challenge for AI current projects and future research. I appreciate and endorse not only that challenge but many specific choices and claims; in particular: (i) that “autonomy” is a key concept for general intelligent systems; (ii) that “a core issue in cognitive architecture is the integration of cognitive processes ....”; (iii) the analysis of features and capabilities missing in current …
Fashionask: Pushing Community Answers To Your Fingertips, Wei Zhang, Lei Pang, Chong-Wah Ngo
Fashionask: Pushing Community Answers To Your Fingertips, Wei Zhang, Lei Pang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
We demonstrate a multimedia-based question-answering system, named FashionAsk, by allowing users to ask questions referring to pictures snapped by mobile devices. Specifically, instead of asking verbose questions to depict visual instances, direct pictures are provided as part of questions. To answer these multi-modal questions, FashionAsk performs a large-scale instance search to infer the names of instances, and then matches with similar questions from communitycontributed QA websites as answers. The demonstration is conducted on a million-scale dataset of Web images and QA pairs in the domain of fashion products. Asking a multimedia question through FashionAsk can take as short as five …
Predicting Domain Adaptivity: Redo Or Recycle?, Ting Yao, Chong-Wah Ngo, Shiai Zhu
Predicting Domain Adaptivity: Redo Or Recycle?, Ting Yao, Chong-Wah Ngo, Shiai Zhu
Research Collection School Of Computing and Information Systems
Over the years, the academic researchers have contributed various visual concept classifiers. Nevertheless, given a new dataset, most researchers still prefer to develop large number of classifiers from scratch despite expensive labeling efforts and limited computing resources. A valid question is why not multimedia community “embrace the green” and recycle off-the-shelf classifiers for new dataset. The difficulty originates from the domain gap that there are many different factors that govern the development of a classifier and eventually drive its performance to emphasize certain aspects of dataset. Reapplying a classifier to an unseen dataset may end up GIGO (garbage in, garbage …
Community As A Connector: Associating Faces With Celebrity Names In Web Videos, Zhineng Chen, Chong-Wah Ngo, Juan Cao, Wei Zhang
Community As A Connector: Associating Faces With Celebrity Names In Web Videos, Zhineng Chen, Chong-Wah Ngo, Juan Cao, Wei Zhang
Research Collection School Of Computing and Information Systems
Associating celebrity faces appearing in videos with their names is of increasingly importance with the popularity of both celebrity videos and related queries. However, the problem is not yet seriously studied in Web video domain. This paper proposes a Community connected Celebrity Name-Face Association approach (CCNFA), where the community is regarded as an intermediate connector to facilitate the association. Specifically, with the names and faces extracted from Web videos, C-CNFA decomposes the association task into a three-step framework: community discovering, community matching and celebrity face tagging. To achieve the goal of efficient name-face association under this umbrella, algorithms such as …
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr
How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr
Dr Deogratias Harorimana
This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …
Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam
Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …
Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam
Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …
Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic
Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic
Rahul Mangharam
Embedded wireless networks have largely focused on open loop sensing and monitoring. To address actuation in closed loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), a …
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …
Cs 1010: Introduction To Computers And Office Productivity Software, Terri Bauer
Cs 1010: Introduction To Computers And Office Productivity Software, Terri Bauer
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including intermediate word processing, spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 1150-01: Introduction To Computer Science, Karen Meyer
Cs 1150-01: Introduction To Computer Science, Karen Meyer
Computer Science & Engineering Syllabi
The Introduction to Computer Science course will expose students to the scientific method as implemented in computer science. The course will show students how the scientific method as implemented in computer science can be used as a problem-solving tool. The course requires students to apply and extend the concepts in a laboratory setting. The concepts will include the study of and methodology of algorithm discovery, design, application, and fundamentals of networks. Lecture and Lab
Cs 1160: Introduction To Computer Programming I, Vanessa Starkey
Cs 1160: Introduction To Computer Programming I, Vanessa Starkey
Computer Science & Engineering Syllabi
Basic concepts of computer programming with an emphasis on structured programming techniques. Includes an introduction to object-oriented programing. Integrated lecture/lab.
Cs 1160: Introduction To Computer Programming I, David M. Hutchison
Cs 1160: Introduction To Computer Programming I, David M. Hutchison
Computer Science & Engineering Syllabi
CS 1160 is the first in a sequence of two programming classes. This course will introduce students to the basic concepts of programming. Examples are from business applications with an emphasis on problem solving with the computer as a tool.
Cs 7840: Soft Computing, John C. Gallagher
Cs 7840: Soft Computing, John C. Gallagher
Computer Science & Engineering Syllabi
No abstract provided.
Cs 1180-06: Computer Programming - I, Jay Dejongh
Cs 1180-06: Computer Programming - I, Jay Dejongh
Computer Science & Engineering Syllabi
Basic concepts of programming and programming languages are introduced. Emphasis is on problem solving and object oriented programming. This course provides a general introduction to the fundamentals of computer science and programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language. Students must register for both lecture and one laboratory section. 4 credit hours.
Cs 1181: Computer Science Ii, Mateen M. Rizki
Cs 1181: Computer Science Ii, Mateen M. Rizki
Computer Science & Engineering Syllabi
This is the second course in a two-semester sequence introducing fundamental concepts and techniques for computer science and engineering. The course focuses on problem analysis, advanced programming concepts using JAVA and fundamental data structures. Students learn to analyze problems and evaluate potential solutions with respect to choice of data structures and computational efficiency. Student are exposed to the underlying implementation of basic data structures available in JAVA libraries and develop the skilled needs to extend existing data structures and design new data structures to solve increasingly complex problems.
Cs 1200: Introduction To Discrete Structures, Pascal Hitzler
Cs 1200: Introduction To Discrete Structures, Pascal Hitzler
Computer Science & Engineering Syllabi
No abstract provided.
Cs 2160: Visual Basic Programming, Eric Saunders
Cs 2160: Visual Basic Programming, Eric Saunders
Computer Science & Engineering Syllabi
This course will cover the fundamentals of object-oriented computer programming; with an emphasis on design, structure, debugging, and testing. Visual Basic 2010 will be used for developing programs.
Cs 3100/5100: Data Structures And Algorithms, Keke Chen
Cs 3100/5100: Data Structures And Algorithms, Keke Chen
Computer Science & Engineering Syllabi
This course will cover the fundamentals of algorithm design and analysis, the implementation of classical data structures and control structures, and the basic problem solving techniques.
Cs 2800: Web Design Fundamentals, Mohamed B. Ali
Cs 2800: Web Design Fundamentals, Mohamed B. Ali
Computer Science & Engineering Syllabi
Introduction to basic web design, development, and information management. Topics include design principles, page layout, hierarchal organization, content management, use of color and graphics, privacy policies, accessibility and site organization. HTML, and modern web programming tools are included in the course.
Cs 3180/5180: Comparative Languages, Krishnaprasad Thirunarayan
Cs 3180/5180: Comparative Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java, C#, C++), a functional language (e.g., Scheme, and get introduced to multiparadigm languages (e.g., Python, Scala). The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will largely be coded in Java and in Scheme, and optionally in Python or Scala.
Cs 3200/5200: Theoretical Foundations Of Computing, Guozhu Dong
Cs 3200/5200: Theoretical Foundations Of Computing, Guozhu Dong
Computer Science & Engineering Syllabi
CS 3200/5200 is an introduction to (a) formal language and automata theory and (b) computability. For (a), we will examine mechanisms for defining syntax of languages and devices for recognizing languages. Along with the fundamentals of these two topics, the course will investigate the relationships between language definition mechanisms and language recognition devices. For (b), we will study decision problems, the Church-Turing thesis, the undecidability of the Halting Problem, and problem reduction and undecidability. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science, by Thomas Sudkamp.
Cs 4700/6700: Introduction To Database Management Systems, Soon M. Chung
Cs 4700/6700: Introduction To Database Management Systems, Soon M. Chung
Computer Science & Engineering Syllabi
Survey of logical and physical aspects of database management systems. Entity Relationship and relational models for databases are presented. Physical database design methods, formal DB design concepts, and operating principles of database systems are discussed.
Cs 4810: Algorithms For Bioinformatics, Michael L. Raymer
Cs 4810: Algorithms For Bioinformatics, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.