Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

49,819 Full-Text Articles 61,324 Authors 20,541,680 Downloads 359 Institutions

All Articles in Computer Sciences

Faceted Search

49,819 full-text articles. Page 1 of 1751.

Ghostparty Video Game, Tyler Remlinger Hart 2024 California Polytechnic State University, San Luis Obispo

Ghostparty Video Game, Tyler Remlinger Hart

Computer Science and Software Engineering

GhostParty is a Unity game that uses a MongoDB database to store players' gameplay values. These values are used to create "Ghosts" that players can compete with in various mini-games. I found that this form of multiplayer using ghosts can create a good gameplay experience without live multiplayer interactions.


Key Communication Technologies, Applications, Protocols And Future Guides For Iot-Assisted Smart Grid Systems: A Review, Md Ohirul Qays, Iftekhar Ahmad, Ahmed Abu-Siada, Md Liton Hossain, Farhana Yasmin 2023 Edith Cowan University

Key Communication Technologies, Applications, Protocols And Future Guides For Iot-Assisted Smart Grid Systems: A Review, Md Ohirul Qays, Iftekhar Ahmad, Ahmed Abu-Siada, Md Liton Hossain, Farhana Yasmin

Research outputs 2022 to 2026

Towards addressing the concerns of conventional power systems including reliability and security, establishing modern Smart Grids (SGs) has been given much attention by the global electric utility applications during the last few years. One of the key advantageous of SGs is its ability for two-way communication and bi-directional power flow that facilitates the inclusion of distributed energy resources, real time monitoring and self-healing systems. As such, the SG employs a large number of digital devices that are installed at various locations to enrich the observability and controllability of the system. This calls for the necessity of employing Internet of Things …


Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis, Martin Kaltdorf, Tim Breitenbach, Stefan Karl, Maximilian Fuchs, David Komla Kessie, Eric Psota, Martina Prelog, Edita Sarukhanyan, Regina Ebert, Franz Jakob, Gudrun Dandekar, Muhammad Naseem, Chunguang Liang, Thomas Dandekar 2023 Biozentrum der Universität Würzburg

Software Jimenae Allows Efficient Dynamic Simulations Of Boolean Networks, Centrality And System State Analysis, Martin Kaltdorf, Tim Breitenbach, Stefan Karl, Maximilian Fuchs, David Komla Kessie, Eric Psota, Martina Prelog, Edita Sarukhanyan, Regina Ebert, Franz Jakob, Gudrun Dandekar, Muhammad Naseem, Chunguang Liang, Thomas Dandekar

All Works

The signal modelling framework JimenaE simulates dynamically Boolean networks. In contrast to SQUAD, there is systematic and not just heuristic calculation of all system states. These specific features are not present in CellNetAnalyzer and BoolNet. JimenaE is an expert extension of Jimena, with new optimized code, network conversion into different formats, rapid convergence both for system state calculation as well as for all three network centralities. It allows higher accuracy in determining network states and allows to dissect networks and identification of network control type and amount for each protein with high accuracy. Biological examples demonstrate this: (i) High plasticity …


Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms, Murad Al-Rajab, Samia Loucif, Yazan Al Risheh 2023 Abu Dhabi University

Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms, Murad Al-Rajab, Samia Loucif, Yazan Al Risheh

All Works

The world's population is projected to grow 32% in the coming years, and the number of Muslims is expected to grow by 70%—from 1.8 billion in 2015 to about 3 billion in 2060. Hijri is the Islamic calendar, also known as the lunar Hijri calendar, which consists of 12 lunar months, and it is tied to the Moon phases where a new crescent Moon marks the beginning of each month. Muslims use the Hijri calendar to determine important dates and religious events such as Ramadan, Haj, Muharram, etc. Till today, there is no consensus on deciding on the beginning of …


Cyber Attack Surface Mapping For Offensive Security Testing, Douglas Everson 2023 Clemson University

Cyber Attack Surface Mapping For Offensive Security Testing, Douglas Everson

All Dissertations

Security testing consists of automated processes, like Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST), as well as manual offensive security testing, like Penetration Testing and Red Teaming. This nonautomated testing is frequently time-constrained and difficult to scale. Previous literature suggests that most research is spent in support of improving fully automated processes or in finding specific vulnerabilities, with little time spent improving the interpretation of the scanned attack surface critical to nonautomated testing. In this work, agglomerative hierarchical clustering is used to compress the Internet-facing hosts of 13 representative companies as collected by the Shodan search …


Form Auto Generation: An Analysis Of Gui Generation, Jedadiah McFarland 2023 University of Nebraska at Omaha

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland

Theses/Capstones/Creative Projects

Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh 2023 Edith Cowan University

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy 2023 American University in Cairo

The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy

Theses and Dissertations

Artificial Intelligence (AI) is an emerging technology that is transforming various aspects of society, including higher education. This paper examines faculty perspectives from five different institutions; The American University in Cairo (AUC), The German University in Cairo (GUC), The Arab Academy for Science and Technology (AAST), Ain Shams University, and Cairo University, on the use of AI in higher education in teaching and learning in Egypt, with all its challenges and resources available to support it, and how it can be used to achieve equity and accessibility. This research was conducted through a qualitative study using semi-structured one- on-one interviews …


The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki 2023 Portland State University

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki

University Honors Theses

Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.


Job Management Portal Software Review, Ruchir Elukurthy 2023 Portland State University

Job Management Portal Software Review, Ruchir Elukurthy

University Honors Theses

This essay provides an overview of a computer science capstone project focused on developing a website for Abilities At Work, a non-profit organization. The website aims to assist employment specialists in managing clients' information and tracking their job application in finding meaningful employment. The essay highlights the various stages of the project, understanding requirements, selecting tools and technologies, creating an application architecture, and writing code. Also, this essay focuses on the challenges encountered during the project, along with the valuable lessons learned. This essay emphasizes how the project closely resembles real-world software development, offering insights for prospective students and professionals. …


Aisha: A Custom Ai Library Chatbot Using The Chatgpt Api, Yrjo Lappalainen, Nikesh Narayanan 2023 Zayed University

Aisha: A Custom Ai Library Chatbot Using The Chatgpt Api, Yrjo Lappalainen, Nikesh Narayanan

All Works

This article focuses on the development of a custom chatbot for Zayed University Library (United Arab Emirates) using Python and the ChatGPT API. The chatbot, named Aisha, was designed to provide quick and efficient reference and support services to students and faculty outside the library's regular operating hours. The article also discusses the benefits of chatbots in academic libraries, and reviews the early literature on ChatGPT's applicability in this field. The article describes the development process, perceived capabilities and limitations of the bot, and plans for further development. This project represents the first fully reported attempt to explore the potential …


Cyber Creative Generative Adversarial Network For Novel Malicious Packets, John Pavlik, Nathaniel D. Bastian 2023 Army Cyber Institute, U.S. Military Academy

Cyber Creative Generative Adversarial Network For Novel Malicious Packets, John Pavlik, Nathaniel D. Bastian

ACI Journal Articles

Machine learning (ML) requires both quantity and variety of examples in order to learn generalizable patterns. In cybersecurity, labeling network packets is a tedious and difficult task. This leads to insufficient labeled datasets of network packets for training ML-based Network Intrusion Detection Systems (NIDS) to detect malicious intrusions. Furthermore, benign network traffic and malicious cyber attacks are always evolving and changing, meaning that the existing datasets quickly become obsolete. We investigate generative ML modeling for network packet synthetic data generation/augmentation to improve NIDS detection of novel, but similar, cyber attacks by generating well-labeled synthetic network traffic. We develop a Cyber …


Planning For The Preservation Of Biodiversity And Environmental Assets In Support Of Sustainable Planning In Urban Areas, Case Study: Batu Licin City, Tanah Bumbu Regency, South Kalimantan, Dharma Kalsuma, Hendricus Andy Simarmata 2023 Master Program of Urban and Regional Planning, Faculty of Engineering, Universitas Indonesia

Planning For The Preservation Of Biodiversity And Environmental Assets In Support Of Sustainable Planning In Urban Areas, Case Study: Batu Licin City, Tanah Bumbu Regency, South Kalimantan, Dharma Kalsuma, Hendricus Andy Simarmata

Smart City

Planning for preserving biodiversity and environmental assets in urban areas is crucial in supporting sustainable planning. This study aims to design a strategy for preserving biodiversity and environmental assets in Batu Licin, Tanah Bumbu Regency, South Kalimantan, to support sustainable urban planning. The method used is field observation and literature study. The results showed that the Batu Licin area has a relatively high potential for biodiversity and environmental assets. However, along with the growth of the Batu Licin urban area in the future, it will undoubtedly be a source of pressure on biodiversity. Several strategies can be implemented to overcome …


Data-Efficient, Federated Learning For Raw Network Traffic Detection, Mikal Willeke, David A. Bierbrauer, Nathaniel D. Bastian 2023 Army Cyber Institute, United States Military Academy

Data-Efficient, Federated Learning For Raw Network Traffic Detection, Mikal Willeke, David A. Bierbrauer, Nathaniel D. Bastian

ACI Journal Articles

Traditional machine learning (ML) models used for enterprise network intrusion detection systems (NIDS) typically rely on vast amounts of centralized data with expertly engineered features. Previous work, however, has shown the feasibility of using deep learning (DL) to detect malicious activity on raw network traffic payloads rather than engineered features at the edge, which is necessary for tactical military environments. In the future Internet of Battlefield Things (IoBT), the military will find itself in multiple environments with disconnected networks spread across the battlefield. These resource-constrained, data-limited networks require distributed and collaborative ML/DL models for inference that are continually trained both …


The Dilemma Of Disclosure: Designing Interpersonal Informatics Tools For Mood Tracking, Daniel Earl Westphal 2023 Dartmouth College

The Dilemma Of Disclosure: Designing Interpersonal Informatics Tools For Mood Tracking, Daniel Earl Westphal

Computer Science Senior Theses

Mental health is a serious issue that affects people of all ages, but is especially prevalent amongst college age youth. In the 2020-2021 school year, researchers found that around 60% of college students met the criteria for at least one mental health condition, such as major depression or generalized anxiety disorder. Many digital interventions have been innovated in order to help address this issue. These range in type and functionality from teletherapy to medication tracking applications. Some of these digital interventions include social features that allow users to interact with other users, friends, family, or doctors; however, having social features …


How Photorealistic Images Are Generated, Nahom Ketema 2023 Portland State University

How Photorealistic Images Are Generated, Nahom Ketema

University Honors Theses

The field of computer graphics looks into how computers can be used to generate images. From using some trigonometry to plot 3D objects to using rays to calculate the lighting of an object, there are a variety of ways that we can use to draw objects onto a screen. For this thesis, we will be looking at a few of those methods to determine how photorealistic images are generated.


Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach D. Yost 2023 Portland State University

Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach D. Yost

University Honors Theses

This essay looks to reflect back upon the successes and failures of the EPL Card Reader capstone project, sponsored by Edward Ivory, head of Portland State University’s Electronics Prototyping Lab. The EPL Card Reader’s goal is to provide a means of tracking and updating student activity and training on the various machines in the lab. Using a local computer port to host this web app a lab administrator or manager is able to scan a student’s access badge to review which machines they have been trained on as well as update that training status. The app also has a running …


On Correspondences Between Feedforward Artificial Neural Networks On Finite Memory Automata And Classes Of Primitive Recursive Functions, Vladimir A. Kulyukin 2023 Utah State University

On Correspondences Between Feedforward Artificial Neural Networks On Finite Memory Automata And Classes Of Primitive Recursive Functions, Vladimir A. Kulyukin

Computer Science Faculty and Staff Publications

When realized on computational devices with finite quantities of memory, feedforward artificial neural networks and the functions they compute cease being abstract mathematical objects and turn into executable programs generating concrete computations. To differentiate between feedforward artificial neural networks and their functions as abstract mathematical objects and the realizations of these networks and functions on finite memory devices, we introduce the categories of general and actual computabilities and show that there exist correspondences, i.e., bijections, between functions computable by trained feedforward artificial neural networks on finite memory automata and classes of primitive recursive functions.


Space Operations Risk Tool, Robert Musante IV, James Vuille-Kowing, Patrick Connor, Angela Tejada-Soliz, Zachary Kudlak, Eric Peterson 2023 United States Coast Guard Academy

Space Operations Risk Tool, Robert Musante Iv, James Vuille-Kowing, Patrick Connor, Angela Tejada-Soliz, Zachary Kudlak, Eric Peterson

Mathematica Militaris

Currently, the United States Coast Guard (USCG) has developed the Space Operations Assessment of Risk (SOAR) tool which was created for USCG Atlantic Area Command (LANTAREA). However, LANTAREA is far more established in its space operations than USCG Pacific Area Command (PACAREA); as a result, the current SOAR tool is better suited for LANTAREA than it is for PACAREA. With the increase of space launches and recoveries in the Pacific Ocean, USCG District 11 wishes to advise space companies and government agencies on risks to mariners associated with potential launch and recovery locations in the Pacific Ocean. We sought to …


Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation, Nick Littlefield 2023 University of Southern Maine

Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation, Nick Littlefield

Thinking Matters Symposium

Deep learning models can be difficult to train because they require large amounts of data, which we usually do not have or are too expensive to get or annotate. To overcome this problem, we can use few-shot meta-learning, which allows us to train deep learning models with little data. Using a few examples, meta-learning, or learning-to-learn, aims to use the experience learned during training to generalize to unknown tasks. Medical imaging is an industry where it is particularly useful, as there is limited publicly available data due to patient privacy concerns and annotating costs.

This project examines how meta-learning performs …


Digital Commons powered by bepress