Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Abusive Language (1)
- Accessibility (1)
- Audio (1)
- Autonomous Vehicles (1)
- BERT (1)
-
- Cloud Computing (1)
- Comparison (1)
- Decentralized Computing (1)
- Decentralized Storage (1)
- Distributed Computing (1)
- Earcon (1)
- Edge Computing (1)
- Experiment (1)
- Fog Computing (1)
- HCI (1)
- Human Computer Interface (1)
- InterPlanetary File System (1)
- Latency Problems (1)
- Machine Learning (1)
- NIDS (1)
- Natural Language Processing (1)
- Online Social Network (1)
- Performance (1)
- Rules (1)
- Service learning (1)
- Snort (1)
- Social Media (1)
- Solid Project (1)
- Suricata (1)
- Video Streaming (1)
Articles 1 - 5 of 5
Full-Text Articles in Systems Architecture
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Computer Science and Computer Engineering Undergraduate Honors Theses
As traditional centralized social media platforms face growing concerns over data privacy, censorship, and lack of user control, there has been an increasing interest in decentralized alternatives. This thesis explores the design and implementation of a decentralized social media application by integrating two key technologies: Solid and the InterPlanetary File System (IPFS). Solid, led by Sir Tim Berners-Lee, enables users to store and manage their personal data in decentralized "Pods," giving them ownership over their digital identities. IPFS, a peer-to-peer hypermedia protocol, facilitates decentralized file storage and sharing, ensuring content availability and resilience against censorship. By leveraging these technologies, the …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Applications Of Fog Computing In Video Streaming, Kyle Smith
Applications Of Fog Computing In Video Streaming, Kyle Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …
Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson
Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson
Computer Science and Computer Engineering Undergraduate Honors Theses
The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent …