Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Department of Computer Science and Engineering (7)
- Department of Computer Science (6)
- Semantic Sensor Web (5)
- Computer Science (4)
- Semantic Web (4)
-
- Twitter (4)
- Coordination (3)
- Semantic Perception (3)
- Biomedicine (2)
- Cloud Computing (2)
- Crisis Computing (2)
- Crisis Informatics (2)
- Emergency Response (2)
- IExplore (2)
- Machine Perception (2)
- Mobile Computing (2)
- Sensor Data (2)
- Social Media (2)
- Social Networks (2)
- Abstraction (1)
- Activity-Influence-Diffusion (AID) Identity (1)
- Ad-Hoc Registration (1)
- Adaptive Oscillator (1)
- Analogy and Similarity-Based Reasoning (1)
- Anomaly Detection (1)
- Attribute Behavior Similarity (1)
- Attribute Usage Diversity (1)
- BKR (1)
- Behavioral Signatures (1)
- Beta-PDF (1)
- Publication
- Publication Type
Articles 211 - 226 of 226
Full-Text Articles in Physical Sciences and Mathematics
Cs 790-02: Advanced Data Mining, Guozhu Dong
Cs 790-02: Advanced Data Mining, Guozhu Dong
Computer Science & Engineering Syllabi
This advanced data mining course covers concepts and techniques in data mining.
Cs 765-01: Foundations Of Neurocomputation, John C. Gallagher
Cs 765-01: Foundations Of Neurocomputation, John C. Gallagher
Computer Science & Engineering Syllabi
This course is designed to help you develop a solid understanding of neural network algorithms and architectures. At the end of this course you should be able to read and critically evaluate most neural network papers published in major journals, (e.g. IEEE Transaction on Neural Networks, Neural Networks, and Neural Computation). In addition, you should be able to implement a broad range of network architectures and learning algorithms for a variety of applications.
Ceg 402/602: Computer Networks, Bin Wang
Ceg 402/602: Computer Networks, Bin Wang
Computer Science & Engineering Syllabi
This course provides an introduction to basic concepts of communication networks, different types of networks, protocols over different layers, and network applications, through lectures, labs, homework, and reading on relevant materials.
Ceg 210: Pc Networking I, Jerry Hensley
Ceg 210: Pc Networking I, Jerry Hensley
Computer Science & Engineering Syllabi
Introduction to networking technologies including infrastructure and architectures, standards, protocols and directory services, administration, security and management. Integrated lecture and lab.
Ceg 460/660: Introduction To Software Computer Engineering, Thomas C. Hartrum
Ceg 460/660: Introduction To Software Computer Engineering, Thomas C. Hartrum
Computer Science & Engineering Syllabi
This course is concerned with the techniques of designing and constructing large programs. Some of the required basic concepts necessarily have to be developed using small programs as examples. To this extent, we also study programming-in-the-small. The overall objectives are to present an overview of issues in the development of software, to discuss terminology, to illustrate via example case studies, and to give sufficiently detailed advice on how to develop quality software. Hands-on experience is emphasized through the use of homework and a class project.
Ceg 411/611: Microprocessor-Based System Design, Jack Jean
Ceg 411/611: Microprocessor-Based System Design, Jack Jean
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 320/520: Computer Organization, Michael L. Raymer
Ceg 320/520: Computer Organization, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Open And Transparent: The Review Process Of The Semantic Web Journal, Krzysztof Janowicz, Pascal Hitzler
Open And Transparent: The Review Process Of The Semantic Web Journal, Krzysztof Janowicz, Pascal Hitzler
Computer Science and Engineering Faculty Publications
While open access is established in the world of academic publishing, open reviews are rare. The Semantic Web journal goes further than just open review by implementing an open and transparent review process in which reviews are publicly available, and the assigned editors and reviewers are known by name, and are published together with accepted manuscripts. In this article we introduce the steps to realize such a process from the conceptual design, over the implementation, a overview of the results so far, and up to lessons learned.
Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda
Winding Resistance And Winding Power Loss Of High-Frequency Power Inductors, Rafal P. Wojda
Browse all Theses and Dissertations
The scope of this research is concentrated on analytical winding size optimization (thickness or diameter) of high-frequency power inductors wound with foil, solid-round wire, multi-strand wire, and litz-wire conductors.
The first part of this research concerns analytical optimization of the winding size (thickness or diameter) for the inductors conducting a sinusoidal current. Estimation of winding resistance in individual inductor layers made of foil, taking into account the skin and proximity effects is performed. Approximated equations for the winding power loss in each layer are given and the optimal values of foil thickness for each layer are derived.
A low- and …
Smart Card Based User Authentication, Brandon James
Smart Card Based User Authentication, Brandon James
Browse all Theses and Dissertations
User authentication plays a very important role in building a secure computing system. In this thesis, we first studied and investigated existing user authentication schemes and some basic concepts of smart cards. We then proposed and implemented an improved user authentication scheme based on the smart card, specifically, Java card. We simulated a web server, and implemented the user authentication scheme with the Java card by programming a Java card applet and a Java program to send commands and receive responses from the card.
The proposed user authentication scheme has two phases: the registration phase and the user authentication phase. …
Optimization Of Spectrum Allocation In Cognitive Radio And Dynamic Spectrum Access Networks, Tao Zhang
Optimization Of Spectrum Allocation In Cognitive Radio And Dynamic Spectrum Access Networks, Tao Zhang
Browse all Theses and Dissertations
Spectrum has become a treasured commodity. However, many licensed frequency bands exclusively assigned to the primary license holders (also called primary users) remain relatively unused or under-utilized for most of the time. Allowing other users (also called secondary users) without a license to operate in these bands with no interference becomes a promising way to satisfy the fast growing needs for frequency spectrum resources. A cognitive radio adapts to the environment it operates in by sensing the spectrum and quickly decides on appropriate frequency bands and transmission parameters to use in order to achieve certain performance goals. One of the …
Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron
Developing A Semantic Web Crawler To Locate Owl Documents, Ronald Dean Koron
Browse all Theses and Dissertations
The terms Semantic Web and OWL are relatively new and growing concepts in the World Wide Web. Because these concepts are so new there are relatively few applications and/or tools for utilizing the potential power of this new concept. Although there are many components to the Semantic Web, this thesis will focus on the research question, "How do we go about developing a web crawler for the Semantic Web that locates and retrieves OWL documents." Specifically for this thesis, we hypothesize that by giving URIs to OWL documents, including all URIs from within these OWL documents, priority over other types …
Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu
Knn-R: Building Secure And Efficient Outsourced Knn Query Service With The Rasp Encryption, Huiqi Xu
Browse all Theses and Dissertations
With the wide deployment of public cloud computing infrastructures, outsourcing database services to the cloud has become an appealing solution to save operating expense. However, some databases might be so sensitive or precious that the data owner does not want to move to the cloud unless the security is guaranteed. On the other hand, a secure outsourced service should still provide efficient query processing and significantly reduce the inhouse workload to fully realize the benefits of outsourcing. We summarize these key features for an outsourced service as the CPEL criteria: data Confidentiality, query Privacy, Efficient query processing, and Low inhouse …
Linked Open Data Alignment & Querying, Prateek Jain
Linked Open Data Alignment & Querying, Prateek Jain
Browse all Theses and Dissertations
The recent emergence of the "Linked Data" approach for publishing data represents a major step forward in realizing the original vision of a web that can "understand and satisfy the requests of people and machines to use the web content" i.e. the Semantic Web. This new approach has resulted in the Linked Open Data (LOD) Cloud, which includes more than 295 large datasets contributed by experts belonging to diverse communities such as geography, entertainment, and life sciences. However, the current interlinks between datasets in the LOD Cloud, as we will illustrate,are too shallow to realize much of the benefits promised. …
A Hardware Compact Genetic Algorithm For Hover Improvement In An Insect-Scale Flapping-Wing Micro Air Vehicle, Kathleen M. Timmerman
A Hardware Compact Genetic Algorithm For Hover Improvement In An Insect-Scale Flapping-Wing Micro Air Vehicle, Kathleen M. Timmerman
Browse all Theses and Dissertations
Wing and airframe damage to insect scale micro air vehicles potentially cause significant losses in pose and position control precision. Although one can imagine many possible means of adapting the flight controllers to restore precise pose and position control, severe limits on computational resources available on-board an insect sized vehicle render many of them impractical. Additionally, limits on sensory capability degrade any such vehicle's ability to critique its own performance. Any adaptive solutions one would propose to recover flight trajectory precision, therefore, would require a resource light implementation, preferably without need for relatively expensive floating-point operations, along with the capability …
Knowledge Acquisition In A System, Christopher J. Thomas
Knowledge Acquisition In A System, Christopher J. Thomas
Browse all Theses and Dissertations
I present a method for growing the amount of knowledge available on the Web using a hermeneutic method that involves background knowledge, Information Extraction techniques and validation through discourse and use of the extracted information.
I present the metaphor of the "Circle of Knowledge on the Web". In this context, knowledge acquisition on the web is seen as analogous to the way scientific disciplines gradually increase the knowledge available in their field.
Here, formal models of interest domains are created automatically or manually and then validated by implicit and explicit validation methods before the statements in the created models can …