Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,807 Full-Text Articles 2,554 Authors 1,393,215 Downloads 169 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,807 full-text articles. Page 1 of 82.

Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson 2023 University of Minnesota Morris

Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.


(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking, G. Ayyappan, G. Archana 2023 Puducherry Technological University

(R2051) Analysis Of Map/Ph1, Ph2/2 Queueing Model With Working Breakdown, Repairs, Optional Service, And Balking, G. Ayyappan, G. Archana

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, a classical queueing system with two types of heterogeneous servers has been considered. The Markovian Arrival Process (MAP) is used for the customer arrival, while phase type distribution (PH) is applicable for the offering of service to customers as well as the repair time of servers. Optional service are provided by the servers to the unsatisfied customers. The server-2 may get breakdown during the busy period of any type of service. Though the server- 2 got breakdown, server-2 has a capacity to provide the service at a slower rate to the current customer who is receiving service …


The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran 2023 nQube Data Science Inc.

The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran

International Conference on Gambling & Risk Taking

Abstract

It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …


Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha 2023 University of San Diego

Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha

Undergraduate Honors Theses

Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …


Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke 2023 Seattle Pacific University

Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke

Honors Projects

Project Contrast is a video game that explores how the unique traits inherent to video games might engage reflective player responses to qualitative experience. Project Contrast does this through suspension of disbelief, avatar projection, presence, player agency in storytelling, visual perception, functional gameplay, and art. Considering the difficulty in researching qualitative experience due to its subjectivity and circular explanations, I created Project Contrast not to analyze qualia, though that was my original hope. I instead created Project Contrast as an avenue for player self-reflection and learning about qualitative experience. While video games might be just code and art on a …


Understanding Data Mining And Its Relation To Information Systems, Malak Alammari 2023 CUNY New York City College of Technology

Understanding Data Mining And Its Relation To Information Systems, Malak Alammari

Publications and Research

This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …


Areas Of Same Cardinal Direction, Periyandy Thunendran 2023 The University of Maine

Areas Of Same Cardinal Direction, Periyandy Thunendran

Electronic Theses and Dissertations

Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …


Procedural Level Generation For A Top-Down Roguelike Game, Kieran Ahn, Tyler Edmiston 2023 Loyola Marymount University

Procedural Level Generation For A Top-Down Roguelike Game, Kieran Ahn, Tyler Edmiston

Honors Thesis

In this file, I present a sequence of algorithms that handle procedural level generation for the game Fragment, a game designed for CMSI 4071 and CMSI 4071 in collaboration with students from the LMU Animation department. I use algorithms inspired by graph theory and implementing best practices to the best of my ability. The full level generation sequence is comprised of four algorithms: the terrain generation, boss room placement, player spawn point selection, and enemy population. The terrain generation algorithm takes advantage of tree traversal methods to create a connected graph of walkable tiles. The boss room placement algorithm randomly …


Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman 2023 University of Nebraska at Omaha

Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman

Theses/Capstones/Creative Projects

This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …


The State And Use Of Virtual Tutors, Thomas Anthone 2023 University of Nebraska at Omaha

The State And Use Of Virtual Tutors, Thomas Anthone

Theses/Capstones/Creative Projects

Virtual tutoring is the process by which students and teachers participate in the learning experience in an online, virtual, or networked environment. This process can not only separate the participants from each other in a physical space, but it can also separate them by time. Virtual tutoring can take the form of the group of students coming together synchronously in an online setting and receiving lessons from a single tutor, or by asynchronous learning in which the teacher pre-plans lessons in advance that the students consume on their own time. The advent of online learning technologies and virtual learning environments …


Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard 2023 University of Arkansas, Fayetteville

Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard

Computer Science and Computer Engineering Undergraduate Honors Theses

I first give a brief introduction to formal models of computation. I then present three different approaches for computation in the aTAM. I later detail generating systems of crisscross slats given an arbitrary algorithm encoded in the form of a Turing machine. Crisscross slats show potential due to their high levels of cooperativity, so it is hoped that implementations utilizing slats are more robust to various growth errors compared to the aTAM. Finally, my software converts arbitrary crisscross slat systems into various physical representations that assist in analyzing their potential to be realized in experiments.


A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen 2023 East Tennessee State University

A Programmatic Geographic Information Systems Analysis Of Plant Hardiness Zones, Andrew Bowen

Electronic Theses and Dissertations

The Plant Hardiness Zone Map consists of thirteen geographical zones that describe whether a plant can survive based on average annual minimal temperatures. As climate change progresses, minimum temperatures in all regions are expected to change. This work programmatically evaluates predicted future climate projection data and converts it to United States Department of Agriculture-defined hardiness zones. Through the next 80 years, hardiness zones are projected to move poleward; in effect, colder zones will lose area and warmer zones will gain area globally. Some implications include changes in crop growing degree days, which could alter crop productivity, migration and settlement of …


Linux Malware Obfuscation, Brian Roden 2023 University of Arkansas, Fayetteville

Linux Malware Obfuscation, Brian Roden

Computer Science and Computer Engineering Undergraduate Honors Theses

Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux …


A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine 2023 University of Arkansas, Fayetteville

A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine

Computer Science and Computer Engineering Undergraduate Honors Theses

Vulnerability scanners are a tool used by many organizations and developers as part of their vulnerability management. These scanners aid in the security of applications, databases, networks, etc. There are many different options available for vulnerability scanners that vary in the analysis method they encompass or target for which they scan, among many other features. This thesis explores the different types of scanners available and aims to ease the burden of selecting the ideal vulnerability scanner for one’s needs by conducting a survey and comparative analysis of vulnerability scanners. Before diving into the vulnerability scanners available, background information is provided …


Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger 2023 William & Mary

Identifying Social Media Users That Are Susceptible To Phishing Attacks, Zoe Metzger

Undergraduate Honors Theses

Phishing scams are a billion-dollar problem. According to Threatpost, in 2020, business email compromise phishing attacks cost the US economy $ 1.8 billion. Social media phishing scams are also on the rise with 74% of companies experiencing social media attacks in 2021 according to Proofpoint. Educating users about phishing scams is an effective strategy for reducing phishing attacks. Despite efforts to combat phishing, the number of attacks continues to rise, likely indicative of a reticence of users to change online behaviors. Existing research into predicting vulnerable social media users that are susceptible to phishing mostly focuses on content analysis of …


Procedural City Generation With Combined Architectures For Real-Time Visualization, Griffin Poyck 2023 Clemson University

Procedural City Generation With Combined Architectures For Real-Time Visualization, Griffin Poyck

All Theses

The work and research of this paper sought to build upon traditional city generation and simulation in creating a tool that both realistically simulates cities and their prominent features and also creates aesthetic and artistically rich cities using assets that combine several contemporary or near contemporary architectural styles. The major city features simulated are the surrounding terrain, road networks, individual buildings, and building placement. The tools used to both create and integrate these features were created in Houdini with Unreal Engine 5 as the intended final destination. This research was influenced by the city, town, and road networking of Ghost …


Survey Of Input Modalities In The Western World, John Ezat Sadik 2023 University of Tennessee, Knoxville

Survey Of Input Modalities In The Western World, John Ezat Sadik

Masters Theses

Having your account compromised can lead to serious complications in your life. One
way accounts become compromised is through the security risks associated with weak
passwords and reused passwords [22,23]. In this thesis, we seek to understand how
entering passwords on non-PC devices contributes to the problems of weak and reused
passwords. To do so, we conducted a survey that was distributed to people in the
the Western World. In our survey results, we found that users commented about
how the current password model was not created with a variety of device types in
mind, which created frustrations and complexity …


Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau 2023 East Tennessee State University

Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau

Undergraduate Honors Theses

Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …


From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches, Gennady M. Verkhivker, Mohammed Alshahrani, Grace Gupta, Sian Xiao, Peng Tao 2023 Chapman University

From Deep Mutational Mapping Of Allosteric Protein Landscapes To Deep Learning Of Allostery And Hidden Allosteric Sites: Zooming In On “Allosteric Intersection” Of Biochemical And Big Data Approaches, Gennady M. Verkhivker, Mohammed Alshahrani, Grace Gupta, Sian Xiao, Peng Tao

Mathematics, Physics, and Computer Science Faculty Articles and Research

The recent advances in artificial intelligence (AI) and machine learning have driven the design of new expert systems and automated workflows that are able to model complex chemical and biological phenomena. In recent years, machine learning approaches have been developed and actively deployed to facilitate computational and experimental studies of protein dynamics and allosteric mechanisms. In this review, we discuss in detail new developments along two major directions of allosteric research through the lens of data-intensive biochemical approaches and AI-based computational methods. Despite considerable progress in applications of AI methods for protein structure and dynamics studies, the intersection between allosteric …


Counterventions: A Reparative Reflection On Interventionist Hci, Rua Mae Williams, LouAnne E. Boyd, Juan E. Gilbert 2023 Purdue University

Counterventions: A Reparative Reflection On Interventionist Hci, Rua Mae Williams, Louanne E. Boyd, Juan E. Gilbert

Engineering Faculty Articles and Research

Research in HCI applied to clinical interventions relies on normative assumptions about which bodies and minds are healthy, valuable, and desirable. To disrupt this normalizing drive in HCI, we define a “counterventional approach” to intervention technology design informed by critical scholarship and community perspectives. This approach is meant to unsettle normative assumptions of intervention as urgent, necessary, and curative. We begin with a historical overview of intervention in HCI and its critics. Then, through reparative readings of past HCI projects in autism intervention, we illustrate the emergent principles of a counterventional approach and how it may manifest research outcomes that …


Digital Commons powered by bepress