Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,814 Full-Text Articles 2,584 Authors 1,363,804 Downloads 167 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,814 full-text articles. Page 1 of 82.

The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran 2023 nQube Data Science Inc.

The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran

International Conference on Gambling & Risk Taking

Abstract

It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …


Understanding Data Mining And Its Relation To Information Systems, Malak Alammari 2023 CUNY New York City College of Technology

Understanding Data Mining And Its Relation To Information Systems, Malak Alammari

Publications and Research

This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …


Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard 2023 University of Arkansas, Fayetteville

Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard

Computer Science and Computer Engineering Undergraduate Honors Theses

I first give a brief introduction to formal models of computation. I then present three different approaches for computation in the aTAM. I later detail generating systems of crisscross slats given an arbitrary algorithm encoded in the form of a Turing machine. Crisscross slats show potential due to their high levels of cooperativity, so it is hoped that implementations utilizing slats are more robust to various growth errors compared to the aTAM. Finally, my software converts arbitrary crisscross slat systems into various physical representations that assist in analyzing their potential to be realized in experiments.


A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen 2023 East Tennessee State University

A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen

Electronic Theses and Dissertations

The Plant Hardiness Zone Map consists of thirteen geographical zones that describe whether a plant can survive based on average annual minimal temperatures. As climate change progresses, minimum temperatures in all regions are expected to change. This work programmatically evaluates predicted future climate projection data and converts it to United States Department of Agriculture-defined hardiness zones. Through the next 80 years, hardiness zones are projected to move poleward; in effect, colder zones will lose area and warmer zones will gain area globally. Some implications include changes in crop growing degree days, which could alter crop productivity, migration and settlement of …


Linux Malware Obfuscation, Brian Roden 2023 University of Arkansas, Fayetteville

Linux Malware Obfuscation, Brian Roden

Computer Science and Computer Engineering Undergraduate Honors Theses

Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux …


A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine 2023 University of Arkansas, Fayetteville

A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine

Computer Science and Computer Engineering Undergraduate Honors Theses

Vulnerability scanners are a tool used by many organizations and developers as part of their vulnerability management. These scanners aid in the security of applications, databases, networks, etc. There are many different options available for vulnerability scanners that vary in the analysis method they encompass or target for which they scan, among many other features. This thesis explores the different types of scanners available and aims to ease the burden of selecting the ideal vulnerability scanner for one’s needs by conducting a survey and comparative analysis of vulnerability scanners. Before diving into the vulnerability scanners available, background information is provided …


Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau 2023 East Tennessee State University

Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau

Undergraduate Honors Theses

Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …


Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger 2023 William & Mary

Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger

Undergraduate Honors Theses

Phishing scams are a billion-dollar problem. According to Threatpost, in 2020, business email compromise phishing attacks cost the US economy $ 1.8 billion. Social media phishing scams are also on the rise with 74% of companies experiencing social media attacks in 2021 according to Proofpoint. Educating users about phishing scams is an effective strategy for reducing phishing attacks. Despite efforts to combat phishing, the number of attacks continues to rise, likely indicative of a reticence of users to change online behaviors. Existing research into predicting vulnerable social media users that are susceptible to phishing mostly focuses on content analysis of …


From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches, Gennady M. Verkhivker, Mohammed Alshahrani, Grace Gupta, Sian Xiao, Peng Tao 2023 Chapman University

From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches, Gennady M. Verkhivker, Mohammed Alshahrani, Grace Gupta, Sian Xiao, Peng Tao

Mathematics, Physics, and Computer Science Faculty Articles and Research

The recent advances in artificial intelligence (AI) and machine learning have driven the design of new expert systems and automated workflows that are able to model complex chemical and biological phenomena. In recent years, machine learning approaches have been developed and actively deployed to facilitate computational and experimental studies of protein dynamics and allosteric mechanisms. In this review, we discuss in detail new developments along two major directions of allosteric research through the lens of data-intensive biochemical approaches and AI-based computational methods. Despite considerable progress in applications of AI methods for protein structure and dynamics studies, the intersection between allosteric …


Counterventions: A Reparative Reflection On Interventionist Hci, Rua Mae Williams, LouAnne E. Boyd, Juan E. Gilbert 2023 Purdue University

Counterventions: A Reparative Reflection On Interventionist Hci, Rua Mae Williams, Louanne E. Boyd, Juan E. Gilbert

Engineering Faculty Articles and Research

Research in HCI applied to clinical interventions relies on normative assumptions about which bodies and minds are healthy, valuable, and desirable. To disrupt this normalizing drive in HCI, we define a “counterventional approach” to intervention technology design informed by critical scholarship and community perspectives. This approach is meant to unsettle normative assumptions of intervention as urgent, necessary, and curative. We begin with a historical overview of intervention in HCI and its critics. Then, through reparative readings of past HCI projects in autism intervention, we illustrate the emergent principles of a counterventional approach and how it may manifest research outcomes that …


Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Rasmus Bro, David Kotz 2023 University of Granada

Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Rasmus Bro, David Kotz

Dartmouth Scholarship

There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows …


Incel Bonding: Masculinity And Storytelling In Online Misogynist Spaces, Gunnar Eastman 2023 University of Maine - Main

Incel Bonding: Masculinity And Storytelling In Online Misogynist Spaces, Gunnar Eastman

Honors College

The incel subculture, short for “involuntary celibate,” is one that exists mostly online, but boasts a relatively large number of dedicated members. The goal of this research is to determine how the incel subculture shares their ideology and develops a sense of group identity. The study reviewed 76 threads of posts across two incel forum websites, and was able to conduct three interviews of members from one of those sites. That content was analyzed iteratively for cohesive themes. Several themes emerged, chief among them was the activity of storytelling, which appeared to be done in three different major ways, with …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) 2023 Central University of South Bihar, Panchanpur, Gaya, Bihar

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Completeness Of Nominal Props, Samuel Balco, Alexander Kurz 2023 Runtime Verication Inc.

Completeness Of Nominal Props, Samuel Balco, Alexander Kurz

Engineering Faculty Articles and Research

We introduce nominal string diagrams as string diagrams internal in the category of nominal sets. This leads us to define nominal PROPs and nominal monoidal theories. We show that the categories of ordinary PROPs and nominal PROPs are equivalent. This equivalence is then extended to symmetric monoidal theories and nominal monoidal theories, which allows us to transfer completeness results between ordinary and nominal calculi for string diagrams.


Defense Of A Small Network, Isabella Adkins 2023 The University of Akron

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States, Kelly M. Entrekin 2023 Georgia Southern University

A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States, Kelly M. Entrekin

Honors College Theses

Fine particulate matter or PM2.5 can be described as a pollution particle that has a diameter of 2.5 micrometers or smaller. These pollution particle values are measured by monitoring sites installed across the United States throughout the year. While these values are helpful, a lot of areas are not accounted for as scientists are not able to measure all of the United States. Some of these unmeasured regions could be reaching high PM2.5 values over time without being aware of it. These high values can be dangerous by causing or worsening health conditions, such as cardiovascular and lung diseases. Within …


Small Business Office Network, Michael Gerome 2023 The University of Akron

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Crosshair Optimizer, Jason Torrence 2023 Central Washington University

Crosshair Optimizer, Jason Torrence

All Master's Theses

Metaheuristic optimization algorithms are heuristics that are capable of creating a "good enough'' solution to a computationally complex problem. Algorithms in this area of study are focused on the process of exploration and exploitation: exploration of the solution space and exploitation of the results that have been found during that exploration, with most resources going toward the former half of the process. The novel Crosshair optimizer developed in this thesis seeks to take advantage of the latter, exploiting the best possible result as much as possible by directly searching the area around that best result with a stochastic approach. This …


Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides 2023 Old Dominion University

Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides

The Graduate School Posters

Edge Detection is one of the computationally intensive modules in image analysis. It is used to find important landmarks by identifying a significant change (or “edge”) between pixels and voxels. We present a hybrid Quantum Edge Detection method by improving three aspects of an existing widely referenced implementation, which for our use cases generates incomprehensible results for the type and size of images we are required to process. Our contributions are in the pre- and post-processing (i.e., classical phase) and a quantum edge detection circuit: (1) we use space- filling curves to eliminate image artifacts introduced by the image decomposition, …


Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations, Muntabir H. Choudhury, Lamia Salsabil, Himarsha R. Jayanetti, Jian Wu 2023 Old Dominion University

Metaenhance: Metadata Quality Improvement For Electronic Theses And Dissertations, Muntabir H. Choudhury, Lamia Salsabil, Himarsha R. Jayanetti, Jian Wu

College of Sciences Posters

Metadata quality is crucial for digital objects to be discovered through digital library interfaces. Although DL systems have adopted Dublin Core to standardize metadata formats (e.g., ETD-MS v1.11), the metadata of digital objects may contain incomplete, inconsistent, and incorrect values [1]. Most existing frameworks to improve metadata quality rely on crowdsourced correction approaches, e.g., [2]. Such methods are usually slow and biased toward documents that are more discoverable by users. Artificial intelligence (AI) based methods can be adopted to overcome this limit by automatically detecting, correcting, and canonicalizing the metadata, featuring quick and unbiased responses to document metadata. …


Digital Commons powered by bepress