Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (205)
- Singapore Management University (113)
- Edith Cowan University (81)
- Washington University in St. Louis (62)
- Brigham Young University (55)
-
- Regis University (51)
- University of Nebraska - Lincoln (44)
- Embry-Riddle Aeronautical University (41)
- Selected Works (40)
- University of Massachusetts Amherst (40)
- Georgia State University (37)
- Missouri University of Science and Technology (37)
- Air Force Institute of Technology (34)
- TÜBİTAK (34)
- California Polytechnic State University, San Luis Obispo (32)
- California State University, San Bernardino (25)
- New Jersey Institute of Technology (25)
- Dartmouth College (23)
- Purdue University (23)
- San Jose State University (21)
- Old Dominion University (19)
- University of Central Florida (18)
- City University of New York (CUNY) (16)
- SelectedWorks (16)
- Nova Southeastern University (13)
- University of Nebraska at Omaha (13)
- Technological University Dublin (12)
- Louisiana State University (11)
- Western University (10)
- Iowa State University (9)
- Keyword
-
- College for Professional Studies (51)
- MS Computer and Information Technology (47)
- School of Computer & Information Science (43)
- Regis University MSCIT thesis (31)
- [RSTDPub] (17)
-
- Security (16)
- Algorithms (13)
- Data mining (11)
- Privacy (11)
- Regis University MSCIT Thesis (11)
- Wireless (10)
- Computer science (9)
- Mobile computing (9)
- Computer Science (8)
- Information technology (8)
- Machine learning (8)
- Network (8)
- Ontology (7)
- School of Computer and Information Sciences (7)
- Services Computing (7)
- Algorithm (6)
- Database (6)
- Database design (6)
- Engineering (6)
- Fuzzy logic (6)
- Internet (6)
- Semantics (6)
- Simulation (6)
- #antcenter (5)
- 3-D shape measurement (5)
- Publication
-
- Computer Science & Engineering Syllabi (156)
- Research Collection School Of Computing and Information Systems (112)
- Theses and Dissertations (71)
- All Computer Science and Engineering Research (62)
- Regis University Student Publications (comprehensive collection) (51)
-
- Turkish Journal of Electrical Engineering and Computer Sciences (34)
- Journal of Digital Forensics, Security and Law (31)
- Kno.e.sis Publications (29)
- Computer Science and Software Engineering (26)
- Faculty Publications (25)
- Theses Digitization Project (25)
- Computer Science Theses (24)
- Australian Information Security Management Conference (23)
- Electronic Theses and Dissertations (23)
- Department of Computer Science Technical Reports (22)
- Computer Science Technical Reports (20)
- Computer Science Department Faculty Publication Series (19)
- Computer Science Faculty Research & Creative Works (19)
- Master's Projects (19)
- CSE Conference and Workshop Papers (18)
- Andrew McCallum (17)
- Australian Digital Forensics Conference (17)
- Australian Information Warfare and Security Conference (17)
- Computer Science Faculty Publications (17)
- Research outputs pre 2011 (17)
- Dissertations (16)
- Theses (15)
- CSE Technical Reports (14)
- CCE Theses and Dissertations (13)
- Electrical and Computer Engineering Faculty Research & Creative Works (13)
- Publication Type
- File Type
Articles 31 - 60 of 1337
Full-Text Articles in Physical Sciences and Mathematics
An Assessment Of Threats Of The Physical And Mac Address Layers In Wimax/802.16, Krishnun Sansurooah
An Assessment Of Threats Of The Physical And Mac Address Layers In Wimax/802.16, Krishnun Sansurooah
Australian Information Security Management Conference
This paper investigates the risks and vulnerabilities associated to the security of the WiMAX/802.16 broadband wireless technology. One of the other aspects of this document will be to review all the associated weaknesses to the Medium Access Control (MAC) layer and at the physical (PHY) layer. The risks and impacts are assessed according to a systematic approach. The approach or methodology is used is according to the European Telecommunication Standards Institute (ETSI). These threats are enumerated and classified accordingly to their risk levels.
The Reality Of Risks From Consented Use Of Usb Devices, Marwan Al-Zarouni
The Reality Of Risks From Consented Use Of Usb Devices, Marwan Al-Zarouni
Australian Information Security Management Conference
Physical security is considered an integral part of information systems security. The idea that small devices pose a security threat for enterprises is well established. On the other hand, consented and supervised access to USB ports via USB flash drives is sometimes allowed. This paper will highlight the risk associated with this kind of access by devices such as IPods and USB flash drives. It will show a proof of concept USB device that runs automatically once connected to a personal computer and copies files and folders from the victim's computer to its storage and executes potentially harmful code on …
Security Issues Of Ieee 802.16 (Wimax), Jamshed Hasan
Security Issues Of Ieee 802.16 (Wimax), Jamshed Hasan
Australian Information Security Management Conference
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technology, security was added later. Iin IEEE 802.16, security has been considered as the main issue during the design of the protocol. However, security mechanism of the IEEE 802.16 (WiMAX) still remains a question. WiMAX is relatively a new technology; not deployed widely to justify the evidence …
Telemedicine And The Digital Door Doctor, Darren Webb, Patricia A. Williams
Telemedicine And The Digital Door Doctor, Darren Webb, Patricia A. Williams
Australian Information Security Management Conference
Telemedicine is changing the way medicine can be practiced, and how medical knowledge is communicated, learnt and researched in today’s technologically oriented society. The adoption of internet based communication has significantly expanded the patients’ ability to access a multitude of world class medical information. Research has shown that patients would welcome the ability to consult a doctor using the same computing tools they use to communicate with family, friends and work colleagues. This paper discusses the use of telemedicine today and how it could be used to access medical services from home. Further, it investigates the incentives and barriers to …
Visualization Of Polymer Processing At The Continuum Level, Jeremy Hicks
Visualization Of Polymer Processing At The Continuum Level, Jeremy Hicks
All Theses
Computer animation, coupled with scientific experimentation and modeling, allows scientists to produce detailed visualizations that potentially enable more comprehensive perception of physical phenomena and ultimately, new discoveries. With the use of Maya, an animation and modeling program that incorporates the natural laws of physics to control the behavior of virtual objects in computer animation, data from the modeling of physical processes such as polymer fibers and films can be explored in the visual realm. Currently, few attempts have been made at the continuum level to represent polymer properties via computer animation using advanced graphics. As a result, scientists may be …
Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal
Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal
Computer Science Theses
Comparing protein sequences is an essential procedure that has many applications in the field of bioinformatics. The recent advances in computational capabilities and algorithm design, simplified the comparison procedure of protein sequences from several databases. Various algorithms have emerged using state of the art approaches to match protein sequences based on structural and functional properties of the amino acids. The matching involves structural alignment, and this alignment may be global; comprising of the whole length of the protein, or local; comprising of the sub-sequences of the proteins. Families of related proteins are found by clustering sequence alignments. The frequency distributions …
Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi
Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi
Computer Science Theses
The growth of wireless telecommunications has stipulated the interest for anywhere-anytime computing. The synergy between networking and mobility will engender new collaborative applications with mobile devices on heterogeneous platforms. One such middleware is “SYSTEM ON MOBILE DEVICES”, SYD developed by the Yamacraw Embedded Systems research team. This type of middleware is an opening step towards Peer-to-Peer mobile networks. This project envisioned collaborative applications among mobile devices and PDAs were used as servers. This thesis studies various existing architectures in mobile computing and their scalability issues. We also proposed new scalable flexible thick client proxy system FTCPS, an architecture suitable for …
An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju
An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju
Computer Science Theses
A multidatabase system (MDBMS) is a facility that allows users to access data located in multiple autonomous database management systems (DBMSs) at different sites. To ensure global atomicity for multidatabase transactions, a reliable global atomic commitment protocol is a possible solution. In this protocol a centralized transaction manager (TM) receives global transactions, submits subtransactions to the appropriate sites via AGENTS. An AGENT is a component of MDBS that runs on each site; AGENTS after receiving subtransactions from the transaction manager perform the transaction and send the results back to TM. We have presented a unique proof-of-concept, a JAVA application for …
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Computer Science Theses
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our method is based on research in cognitive psychology along with characteristics found in a majority of …
Compressed Text Indexing And Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S. Vitter
Compressed Text Indexing And Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S. Vitter
Department of Computer Science Technical Reports
No abstract provided.
Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks
Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks
Australian Information Warfare and Security Conference
The security industry comprises of diverse and multidisciplined practitioners, originating from many disciplines. It has been suggested that the industry has an undefined knowledge structure, although security experts contain a rich knowledge structure. There has also been limited research mapping security expert knowledge structure, reducing the ability of tertiary educators to provide industry focused teaching and learning. The study utilized multidimensional scaling (MDS) and expert interviews to map the consensual knowledge structure of security experts in their understanding of security risk. Security risk concepts were extracted and critiqued from West Australian university courses. Linguistic analysis categorised the more utilized security …
Design An Object-Oriented Home Inspection Application For A Portable Device, Dion M. Collier
Design An Object-Oriented Home Inspection Application For A Portable Device, Dion M. Collier
Regis University Student Publications (comprehensive collection)
Recent advancements in the personal digital assistant (PDA) Windows application programming methodology made it easier to develop PDA applications. The release of the Microsoft® Visual Studio 2005 .NET incorporated handheld programming support while the Microsoft® Mobile® 5.0 operating system dramatically improved the PDA's operation and hardware configuration. This paper researches and analyzes object-oriented languages, relational database and dynamic report generation technologies for the PDA as they apply to the development of a professional home inspection application. The focus of this paper is on the implementation of the most advanced PDA technologies for a high-end database PDA application design.
A Framework For Dynamic Terrain With Application In Off-Road Ground Vehicle Simulations, Anthony Scott Aquilio
A Framework For Dynamic Terrain With Application In Off-Road Ground Vehicle Simulations, Anthony Scott Aquilio
Computer Science Dissertations
The dissertation develops a framework for the visualization of dynamic terrains for use in interactive real-time 3D systems. Terrain visualization techniques may be classified as either static or dynamic. Static terrain solutions simulate rigid surface types exclusively; whereas dynamic solutions can also represent non-rigid surfaces. Systems that employ a static terrain approach lack realism due to their rigid nature. Disregarding the accurate representation of terrain surface interaction is rationalized because of the inherent difficulties associated with providing runtime dynamism. Nonetheless, dynamic terrain systems are a more correct solution because they allow the terrain database to be modified at run-time for …
Cad Tools For Dna Micro-Array Design, Manufacture And Application, Nisar Hundewale
Cad Tools For Dna Micro-Array Design, Manufacture And Application, Nisar Hundewale
Computer Science Dissertations
Motivation: As the human genome project progresses and some microbial and eukaryotic genomes are recognized, numerous biotechnological processes have attracted increasing number of biologists, bioengineers and computer scientists recently. Biotechnological processes profoundly involve production and analysis of highthroughput experimental data. Numerous sequence libraries of DNA and protein structures of a large number of micro-organisms and a variety of other databases related to biology and chemistry are available. For example, microarray technology, a novel biotechnology, promises to monitor the whole genome at once, so that researchers can study the whole genome on the global level and have a better picture of …
64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan
64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan
Computer Science Theses
ABSTRACT Due to the rapid progress in the field of VLSI, improvements in speed, power and area are quite evident. Research and development in this field are motivated by growing markets of portable mobile devices such as personal multimedia players, cellular phones, digital camcorders and digital cameras. Among the recently popular logic families, pass transistor logic is promising for low power applications as compared to conventional static CMOS because of lower transistor count. This thesis proposes four novel designs for Booth encoder and selector logic using pass logic principles. These new designs are implemented and used to build a 64 …
A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta
A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta
Computer Science Theses
In this thesis, we characterize the proprietary active scanning algorithm of several wireless network interface cards. Our experiments are the first of its kind to observe the complete scanning process as the wireless network interface cards probe all the channels in the 2.4GHz spectrum. We discuss the: 1) correlation of channel popularity during active scanning and access point channel deployment popularity; 2) number of probe request frames statistics on each channel; 3) channel probe order; and 4) dwell time. The knowledge gained from characterizing wireless network interface cards is important for the following reasons: 1) it helps one understand how …
An Enhanced Algorithm To Find Dominating Set Nodes In Ad Hoc Wireless Networks, Naresh Nanuvala
An Enhanced Algorithm To Find Dominating Set Nodes In Ad Hoc Wireless Networks, Naresh Nanuvala
Computer Science Theses
A wireless ad hoc network is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. A connection is achieved between two nodes through a single hop transmission if they are directly connected or multi-hop transmission if they are not. The wireless networks face challenges to form an optimal routing protocol. Some approaches are based on a dominating set, which has all the nodes either in the set or within its neighborhood. The proposed algorithm is an enhancement of the distributed algorithm proposed by Wu and Li. The simulation results …
A Domain Based Approach To Crawl The Hidden Web, Milan Pandya
A Domain Based Approach To Crawl The Hidden Web, Milan Pandya
Computer Science Theses
There is a lot of research work being performed on indexing the Web. More and more sophisticated Web crawlers are been designed to search and index the Web faster. But all these traditional crawlers crawl only the part of Web we call “Surface Web”. They are unable to crawl the hidden portion of the Web. These traditional crawlers retrieve contents only from surface Web pages which are just a set of Web pages linked by some hyperlinks and ignoring the hidden information. Hence, they ignore tremendous amount of information hidden behind these search forms in Web pages. Most of the …
Dct Implementation On Gpu, Serpil Tokdemir
Dct Implementation On Gpu, Serpil Tokdemir
Computer Science Theses
There has been a great progress in the field of graphics processors. Since, there is no rise in the speed of the normal CPU processors; Designers are coming up with multi-core, parallel processors. Because of their popularity in parallel processing, GPUs are becoming more and more attractive for many applications. With the increasing demand in utilizing GPUs, there is a great need to develop operating systems that handle the GPU to full capacity. GPUs offer a very efficient environment for many image processing applications. This thesis explores the processing power of GPUs for digital image compression using Discrete cosine transform.
Fuzzy-Granular Based Data Mining For Effective Decision Support In Biomedical Applications, Yuanchen He
Fuzzy-Granular Based Data Mining For Effective Decision Support In Biomedical Applications, Yuanchen He
Computer Science Dissertations
Due to complexity of biomedical problems, adaptive and intelligent knowledge discovery and data mining systems are highly needed to help humans to understand the inherent mechanism of diseases. For biomedical classification problems, typically it is impossible to build a perfect classifier with 100% prediction accuracy. Hence a more realistic target is to build an effective Decision Support System (DSS). In this dissertation, a novel adaptive Fuzzy Association Rules (FARs) mining algorithm, named FARM-DS, is proposed to build such a DSS for binary classification problems in the biomedical domain. Empirical studies show that FARM-DS is competitive to state-of-the-art classifiers in terms …
Management Of Requirements Changes In Sequence-Based Software Specifications, Lan Lin
Management Of Requirements Changes In Sequence-Based Software Specifications, Lan Lin
Doctoral Dissertations
The sequence-based software specification method was developed to convert ordinary, or typical requirements and requirements statements into mathematically precise specifications, at an acceptable level of abstraction, for deterministic systems. In view of the iterative nature of modern software developing process, requirements, once defined, are not frozen; changes are integrated continuously that need to be accommodated and validated.
The need for managing changes of requirements in sequence-based specifications arises both as a consequence of practicing this method and as a general topic in software requirements engineering. In this research we have explored the theoretical consequences of three major requirements changes in …
Scheduling Tasks With Precedence Constraints On Heterogeneous Distributed Computing Systems, Zhiao Shi
Scheduling Tasks With Precedence Constraints On Heterogeneous Distributed Computing Systems, Zhiao Shi
Doctoral Dissertations
Efficient scheduling is essential to exploit the tremendous potential of high performance computing systems. Scheduling tasks with precedence constraints is a well studied problem and a number of heuristics have been proposed.
In this thesis, we first consider the problem of scheduling task graphs in heterogeneous distributed computing systems (HDCS) where the processors have different capabilities. A novel, list scheduling-based algorithm to deal with this particular situation is proposed. The algorithm takes into account the resource scarcity when assigning the task node weights. It incorporates the average communication cost between the scheduling node and its node when computing the Earliest …
Mems Mobile Gis: A Spatially Enabled Fish Habitat Management System, Andrea Rizzini, Keith Gardiner, Michela Bertolotto, James Carswell
Mems Mobile Gis: A Spatially Enabled Fish Habitat Management System, Andrea Rizzini, Keith Gardiner, Michela Bertolotto, James Carswell
Conference papers
Spatially enabled computing can provide assistance to both web-based and mobile users by exploiting positional information and associated contextual knowledge. The Mobile Environmental Management System (MEMS) is a proof of concept prototype that has been developed in order to simplify administrative duties of biologists at the Department of Fisheries and Oceans (DFO), Canada. MEMS aims to deliver contextaware functionality aided by visualization, analysis and manipulation of spatial and attribute datasets. The resulting application delivers a set of functions and services that aids the DFO’s biologists in making everyday management decisions
Cheating To Get Better Roommates In A Random Stable Matching, Chien-Chung Huang
Cheating To Get Better Roommates In A Random Stable Matching, Chien-Chung Huang
Computer Science Technical Reports
This paper addresses strategies for the stable roommates problem, assuming that a stable matching is chosen at random. We investigate how a cheating man should permute his preference list so that he has a higher-ranking roommate probabilistically. In the first part of the paper, we identify a necessary condition for creating a new stable roommate for the cheating man. This condition precludes any possibility of his getting a new roommate ranking higher than all his stable roommates when everyone is truthful. Generalizing to the case that multiple men collude, we derive another impossibility result: given any stable matching in which …
Evaluating Next Cell Predictors With Extensive Wi-Fi Mobility Data, Libo Song, David Kotz, Ravi Jain, Xiaoning He
Evaluating Next Cell Predictors With Extensive Wi-Fi Mobility Data, Libo Song, David Kotz, Ravi Jain, Xiaoning He
Dartmouth Scholarship
Location is an important feature for many applications, and wireless networks can better serve their clients by anticipating client mobility. As a result, many location predictors have been proposed in the literature, though few have been evaluated with empirical evidence. This paper reports on the results of the first extensive empirical evaluation of location predictors, using a two-year trace of the mobility patterns of over 6,000 users on Dartmouth's campus-wide Wi-Fi wireless network. The surprising results provide critical evidence for anyone designing or using mobility predictors. \par We implemented and compared the prediction accuracy of several location predictors drawn from …
Data Management Plans: Stages, Components, And Activities, Abbas S. Tavakoli, Kirby Jackson, Linda Moneyham, Kenneth D. Phillips, Carolyn Murdaugh, Gene Meding
Data Management Plans: Stages, Components, And Activities, Abbas S. Tavakoli, Kirby Jackson, Linda Moneyham, Kenneth D. Phillips, Carolyn Murdaugh, Gene Meding
Applications and Applied Mathematics: An International Journal (AAM)
Data management strategies have become increasingly important as new computer technologies allow for larger and more complex data sets to be analyzed easily. As a consequence, data management has become a specialty requiring specific skills and knowledge. Many new investigators have no formal training in management of data sets. This paper describes common basic strategies critical to the management of data as applied to a data set from a longitudinal study. The stages of data management are identified. Moreover, key components and strategies, at each stage are described.
Towards Effective Content-Based Music Retrieval With Multiple Acoustic Feature Composition, Jialie Shen, John Shepherd, Ngu Ahh
Towards Effective Content-Based Music Retrieval With Multiple Acoustic Feature Composition, Jialie Shen, John Shepherd, Ngu Ahh
Research Collection School Of Computing and Information Systems
In this paper, we present a new approach to constructing music descriptors to support efficient content-based music retrieval and classification. The system applies multiple musical properties combined with a hybrid architecture based on principal component analysis (PCA) and a multilayer perceptron neural network. This architecture enables straightforward incorporation of multiple musical feature vectors, based on properties such as timbral texture, pitch, and rhythm structure, into a single low-dimensioned vector that is more effective for classification than the larger individual feature vectors. The use of supervised training enables incorporation of human musical perception that further enhances the classification process. We compare …
A Fuzzy Logic Controller For Autonomous Wheeled Vehicles, Mohamed Trabia, Linda Z. Shi, Neil Eugene Hodge
A Fuzzy Logic Controller For Autonomous Wheeled Vehicles, Mohamed Trabia, Linda Z. Shi, Neil Eugene Hodge
Mechanical Engineering Faculty Research
Autonomous vehicles have potential applications in many fields, such as replacing humans in hazardous environments, conducting military missions, and performing routine tasks for industry. Driving ground vehicles is an area where human performance has proven to be reliable. Drivers typically respond quickly to sudden changes in their environment. While other control techniques may be used to control a vehicle, fuzzy logic has certain advantages in this area; one of them is its ability to incorporate human knowledge and experience, via language, into relationships among the given quantities. Fuzzy logic controllers for autonomous vehicles have been successfully applied to address various …
Multiple Resolution Nonparametric Classifiers, David Laurence Beck
Multiple Resolution Nonparametric Classifiers, David Laurence Beck
Masters Theses
Bayesian discriminant functions provide optimal classification decision boundaries in the sense of minimizing the average error rate. An operational assumption is that the probability density functions for the individual classes are either known a priori or can be estimated from the data through the use of estimating techniques. The use of Parzen- windows is a popular and theoretically sound choice for such estimation. However, while the minimal average error rate can be achieved when combining Bayes Rule with Parzen-window density estimation, the latter is computationally costly to the point where it may lead to unacceptable run-time performance. We present the …
Retaining Information Technology Employees In Higher Education, Mary Holmes
Retaining Information Technology Employees In Higher Education, Mary Holmes
Dissertations
The retention of qualified Information Technology (IT) employees is at an all time low within higher education institutions. IT personnel are essential for higher education institutions to effectively integrate technology into their educational programs. These IT employees contribute to their institution's teaching/learning mission, while simultaneously supporting complex and highly visible administrative operations. Yet, all previous research regarding IT employee retention issues had only been conducted within corporate settings.
To examine factors related to IT employees' retention within public higher education, an internet-based study was sent to IT employees in all four-year public universities throughout Michigan. The survey included questions within …