Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

54,557 Full-Text Articles 70,712 Authors 20,935,862 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

54,557 full-text articles. Page 1 of 1978.

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji 2024 East Tennessee State University

Detection And Classification Of Diabetic Retinopathy Using Deep Learning Models, Aishat Olatunji

Electronic Theses and Dissertations

Healthcare analytics leverages extensive patient data for data-driven decision-making, enhancing patient care and results. Diabetic Retinopathy (DR), a complication of diabetes, stems from damage to the retina’s blood vessels. It can affect both type 1 and type 2 diabetes patients. Ophthalmologists employ retinal images for accurate DR diagnosis and severity assessment. Early detection is crucial for preserving vision and minimizing risks. In this context, we utilized a Kaggle dataset containing patient retinal images, employing Python’s versatile tools. Our research focuses on DR detection using deep learning techniques. We used a publicly available dataset to apply our proposed neural network and …


Detection Of Jamming Attacks In Vanets, Thomas Justice 2024 East Tennessee State University

Detection Of Jamming Attacks In Vanets, Thomas Justice

Undergraduate Honors Theses

A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …


Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas 2024 Utah State University

Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas

All Graduate Theses and Dissertations, Fall 2023 to Present

Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.

Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …


Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham 2024 Utah State University

Pedestrian Pathing Prediction Using Complex Contextual Behavioral Data In High Foot Traffic Settings, Laurel Bingham

All Graduate Theses and Dissertations, Fall 2023 to Present

Ensuring the safe integration of autonomous vehicles into real-world environments requires a comprehensive understanding of pedestrian behavior. This study addresses the challenge of predicting the movement and crossing intentions of pedestrians, a crucial aspect in the development of fully autonomous vehicles.

The research focuses on leveraging Honda's TITAN dataset, comprising 700 unique clips captured by moving vehicles in high-foot-traffic areas of Tokyo, Japan. Each clip provides detailed contextual information, including human-labeled tags for individuals and vehicles, encompassing attributes such as age, motion status, and communicative actions. Long Short-Term Memory (LSTM) networks were employed and trained on various combinations of contextual …


Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, Tianqi LI, Guansong PANG, Xiao BAI, Jin ZHENG, Lei ZHOU, Xin NING 2024 Singapore Management University

Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, Tianqi Li, Guansong Pang, Xiao Bai, Jin Zheng, Lei Zhou, Xin Ning

Research Collection School Of Computing and Information Systems

Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes with only their side semantic information presented during training. It cannot handle real-life, open-world scenarios where there are test samples of unknown classes for which neither samples (e.g., images) nor their side semantic information is known during training. Open-Set Recognition (OSR) is dedicated to addressing the unknown class issue, but existing OSR methods are not designed to model the semantic information of the unseen classes. To tackle this combined ZSL and OSR problem, we consider the case of “Zero-Shot Open-Set Recognition” (ZS-OSR), where a model is trained under the ZSL …


Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura 2024 Utah State University

Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura

Publications

This paper presents a novel approach for predicting the outcomes of elementary students’ participation in computer science (CS) instruction by using exit tickets, a type of practical measure, where students provide rapid feedback on their instructional experiences. Such feedback can help teachers to inform ongoing teaching and instructional practices. We fit a Structural Equation Model to examine whether students' perceptions of enjoyment, ease, and connections between mathematics and CS in an integrated lesson predicted their affective outcomes in self-efficacy, interest, and CS identity, collected in a pre- post- survey. We found that practical measures can validly measure student experiences.


Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation, Xuejian LI, Shiqiang MA, Junhai XU, Jijun TANG, Shengfeng HE, Fei GUO 2024 Central South University

Transiam: Aggregating Multi-Modal Visual Features With Locality For Medical Image Segmentation, Xuejian Li, Shiqiang Ma, Junhai Xu, Jijun Tang, Shengfeng He, Fei Guo

Research Collection School Of Computing and Information Systems

Automatic segmentation of medical images plays an important role in the diagnosis of diseases. On single-modal data, convolutional neural networks have demonstrated satisfactory performance. However, multi-modal data encompasses a greater amount of information rather than single-modal data. Multi-modal data can be effectively used to improve the segmentation accuracy of regions of interest by analyzing both spatial and temporal information. In this study, we propose a dual-path segmentation model for multi-modal medical images, named TranSiam. Taking into account that there is a significant diversity between the different modalities, TranSiam employs two parallel CNNs to extract the features which are specific to …


Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen YUAN, Heyan HUANG, Yixin CAO, Qianwen CAO 2024 Singapore Management University

Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen Yuan, Heyan Huang, Yixin Cao, Qianwen Cao

Research Collection School Of Computing and Information Systems

Lexically constrained text generation (CTG) is to generate text that contains given constrained keywords. However, the text diversity of existing models is still unsatisfactory. In this paper, we propose a lightweight dynamic refinement strategy that aims at increasing the randomness of inference to improve generation richness and diversity while maintaining a high level of fluidity and integrity. Our basic idea is to enlarge the number and length of candidate sentences in each iteration, and choose the best for subsequent refinement. On the one hand, different from previous works, which carefully insert one token between two words per action, we insert …


Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. YU, Nabila Y. SALSABILA, Shih-W LIN, Aldy GUNAWAN 2024 Singapore Management University

Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. Yu, Nabila Y. Salsabila, Shih-W Lin, Aldy Gunawan

Research Collection School Of Computing and Information Systems

This research investigates the Set Team Orienteering Problem with Time Windows (STOPTW), a new variant of the well-known Team Orienteering Problem with Time Windows and Set Orienteering Problem. In the STOPTW, customers are grouped into clusters. Each cluster is associated with a profit attainable when a customer in the cluster is visited within the customer's time window. A Mixed Integer Linear Programming model is formulated for STOPTW to maximizing total profit while adhering to time window constraints. Since STOPTW is an NP-hard problem, a Simulated Annealing with Reinforcement Learning (SARL) algorithm is developed. The proposed SARL incorporates the core concepts …


Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao XIANG, Zhongming WANG, Biwen CHEN, Xiaoguo LI, Peng WANG, Fei CHEN 2024 Singapore Management University

Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen

Research Collection School Of Computing and Information Systems

Public key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., untrusted server) might launch inside keyword-guessing attacks (IKGA) to guess keywords from the trapdoors. In recent years, public key authenticated encryption with keyword search (PAEKS) has become a promising primitive to counter the IKGA. However, existing PAEKS schemes focus on the concrete construction of PAEKS, making them unable to support modular construction, intuitive proof, or flexible extension. In this paper, our proposal called “StopGuess” …


Relocating Lubra Village And Visualizing Himalayan Flood Damages With Remote Sensing, Ronan Wallace, Yungdrung Tsewang Gurung, Ryan Kastner 2024 Macalester College

Relocating Lubra Village And Visualizing Himalayan Flood Damages With Remote Sensing, Ronan Wallace, Yungdrung Tsewang Gurung, Ryan Kastner

Journal of Critical Global Issues

As weather patterns change worldwide, isolated communities impacted by climate change go unnoticed and we need community-driven solutions. In Himalayan Mustang, Nepal, indigenous Lubra Village faces threats of increasing flash flooding. After every flood, residual muddy sediment hardens across the riverbed like concrete, causing the riverbed elevation to rise. As elevation increases, sediment encroaches on Lubra’s agricultural fields and homes, magnifying flood vulnerability. In the last monsoon season alone, the Lubra community witnessed floods swallowing several agricultural fields and damaging two homes. One solution considers relocating the village to a new location entirely. However, relocation poses a challenging task, as …


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee 2024 Bridgewater State University

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz 2024 University of South Florida

The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz

International Journal of Cybersecurity Intelligence & Cybercrime

According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …


Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones 2024 NA

Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones

International Journal of Cybersecurity Intelligence & Cybercrime

Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.


The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein 2024 Liberty University

The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein

Doctoral Dissertations and Projects

As internet technology proliferate in volume and complexity, the ever-evolving landscape of malicious cyberattacks presents unprecedented security risks in cyberspace. Cybersecurity challenges have been further exacerbated by the continuous growth in the prevalence and sophistication of cyber-attacks. These threats have the capacity to disrupt business operations, erase critical data, and inflict reputational damage, constituting an existential threat to businesses, critical services, and infrastructure. The escalating threat is further compounded by the malicious use of artificial intelligence (AI) and machine learning (ML), which have increasingly become tools in the cybercriminal arsenal. In this dynamic landscape, the emergence of offensive AI introduces …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. 2024 University of North Texas

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger 2024 College of Southern Maryland

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo 2024 University of Johannesburg

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Investigations Of The Eutectic Formation And Skin Rejuvenation By Hyaluronan - Kojic Acid Dipalmitate System, Syed Waqar Hussain Shah, Sumbal Imran, Iram Bibi, Kashif Ali, Nadia Bashir 2024 Department of Chemistry, Hazara University, Mansehra, Pakistan

Investigations Of The Eutectic Formation And Skin Rejuvenation By Hyaluronan - Kojic Acid Dipalmitate System, Syed Waqar Hussain Shah, Sumbal Imran, Iram Bibi, Kashif Ali, Nadia Bashir

Karbala International Journal of Modern Science

Eutectic phenomenon has been investigated in binary system based on biopolymer hyaluronan (HN) and kojic acid dipalmitate (KAD). Solid-liquid phase diagram showed a significant dependence of melting points on weight fraction of KAD up to KAD < 0.5. A negligible regain to melting temperature of pure KAD occurred later. Simulations of molecular mechanics using a four-unit segment of HN and KAD revealed the interaction between carbonyl of KAD with 4-OH on N-acetylglucosamine unit of oligomer. Infrared vibrational spectroscopy also endorsed the existence of a weakly interacting system. Such behavior was expected due to steric hinderance and rigidity of biopolymer. The thermal decomposition temperature of HN (i.e., 215 °C) was increased to 322 °C in HK50 having HN and KAD in 1:50 w/w. Bioelectric impedance analysis revealed that these green materials could promote skin health in humans.


Synthesis And Characterization Of Renewable Heterogeneous Catalyst Zno Supported Biogenic Silica From Pineapple Leaves Ash For Sustainable Biodiesel Conversion, Nadila Pratiwi, Suriati Eka Putri, Yulia Shinta, Arya Ibnu Batara, Diana Eka Pratiwi, Abd Rahman, Nur Ahmad, Heryanto Heryanto 2024 Department of Chemistry, Faculty of Mathematics and Natural Science, Universitas Negeri Makassar, Makassar, South Sulawesi, Indonesia;

Synthesis And Characterization Of Renewable Heterogeneous Catalyst Zno Supported Biogenic Silica From Pineapple Leaves Ash For Sustainable Biodiesel Conversion, Nadila Pratiwi, Suriati Eka Putri, Yulia Shinta, Arya Ibnu Batara, Diana Eka Pratiwi, Abd Rahman, Nur Ahmad, Heryanto Heryanto

Karbala International Journal of Modern Science

This study reports on the first case of the low-cost and environmentally friendly ZnO/SiO2 heterogeneous catalyst from pineapple leaves ash (PLA). Catalyst shows excellent performance in catalyzing the transesterification of waste cooking oil (WCO) with methanol for biodiesel conversion. This study focuses on assessing the influence of Zn content on physicochemical characteristics, using XRD, FTIR, SEM, and N2 adsorption-desorption methods. In addition, three different Zn content levels (20, 25, and 30 %wt) were applied. The results showed that all ZnO/SiO2 samples exhibited characteristics suitable for use as catalyst with an average crystallite size of 31.83-34.15 nm, and a surface area …


Digital Commons powered by bepress