Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,865 Full-Text Articles 2,710 Authors 1,393,215 Downloads 173 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,865 full-text articles. Page 5 of 85.

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru 2023 San Jose State University

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru

Master's Projects

Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …


A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi 2023 University of Kentucky

A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi

Theses and Dissertations--Computer Science

Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …


Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull 2023 Old Dominion University

Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull

Philosophy Faculty Publications

Hypothetical thought experiments allow researchers to gain insights into widespread moral intuitions and provide opportunities for individuals to explore their moral commitments. Previous thought experiment studies in virtual reality (VR) required participants to come to an on-site laboratory, which possibly restricted the study population, introduced an observer effect, and made internal reflection on the participants’ part more difficult. These shortcomings are particularly crucial today, as results from such studies are increasingly impacting the development of artificial intelligence systems, self-driving cars, and other technologies. This paper explores the viability of deploying thought experiments in commercially available in-home VR headsets. We conducted …


Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni 2023 San Jose State University

Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni

Master's Projects

Social media platforms are one of the primary resources for information as it is easily accessible, low in cost, and provides a high rate of information spread. Online social media (OSM) have become the main source of news information around the world, but because of the distributed nature of the web, it has increased the risk of fake news spread. Fake news is misleading information that is published as real news. Therefore, identifying fake news and flagging them as such, as well as detecting sources that generate them is an ongoing task for researchers and OSM companies. Bots are artificial …


Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani 2023 San Jose State University

Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani

Master's Projects

Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …


Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar 2023 San Jose State University

Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar

Master's Projects

Neural Networks are now emerging in every industry. All the industries are trying their best to exploit the benefits of neural networks and deep learning to make predictions or simulate their ongoing process with the use of their generated data. The purpose of this report is to study the heating pattern of a silicon wafer and make predictions using various machine learning techniques. The heating of the silicon wafer involves various factors ranging from number of lamps, wafer properties and points taken in consideration to capture the heating temperature. This process involves dynamic inputs which facilitates the heating of the …


Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade 2023 San Jose State University

Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade

Master's Projects

Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …


Sensor Relationship Inference In Single Resident Smart Homes Using Time Series, Samuel Nack 2023 Missouri State University

Sensor Relationship Inference In Single Resident Smart Homes Using Time Series, Samuel Nack

MSU Graduate Theses

Determining sensor relationships in smart environments is complex due to the variety and volume of time series information they provide. Moreover, identifying sensor relationships to connect them with actuators is difficult for smart home users who may not have technical experience. Yet, gathering information on sensor relationships is a crucial intermediate step towards more advanced smart home applications such as advanced policy generation or automatic sensor configuration. Therefore, in this thesis, I propose a novel unsupervised learning approach, named SeReIn, to automatically group sensors by their inherent relationships solely using time series data for single resident smart homes. SeReIn extracts …


The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta 2023 San Jose State University

The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta

Master's Projects

EBooks are a form of multimedia applications that encourage cognitive learning. Multimedia can also influence readers to have a deeper connection to the story. Understanding the influence of a static picture book versus an animated and audio guided eBook can prove valuable in developing learning media and other forms of content. In this research we take a published children's book and apply the content into a multimedia eBook. The purpose of the creation of the eBook is to compare the interest of a reader on a story when static format, when some multimedia is added and when the story is …


Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung 2023 San Jose State University

Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung

Master's Projects

With the growing demand for gender-related data on diverse applications, including security systems for ascertaining an individual’s identity for border crossing, as well as marketing purposes of digging the potential customer and tailoring special discounts for them, gender classification has become an essential task within the field of computer vision and deep learning. There has been extensive research conducted on classifying human gender using facial expression, exterior appearance (e.g., hair, clothes), or gait movement. However, within the scope of our research, none have specifically focused gender classification on two-dimensional body joints. Knowing this, we believe that a new prediction pipeline …


Automated Evaluation For Distributed System Assignments, Nimesh Nischal 2023 San Jose State University

Automated Evaluation For Distributed System Assignments, Nimesh Nischal

Master's Projects

A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …


Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala 2023 San Jose State University

Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala

Master's Projects

Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …


Crosshair Optimizer, Jason Torrence 2023 Central Washington University

Crosshair Optimizer, Jason Torrence

All Master's Theses

Metaheuristic optimization algorithms are heuristics that are capable of creating a "good enough'' solution to a computationally complex problem. Algorithms in this area of study are focused on the process of exploration and exploitation: exploration of the solution space and exploitation of the results that have been found during that exploration, with most resources going toward the former half of the process. The novel Crosshair optimizer developed in this thesis seeks to take advantage of the latter, exploiting the best possible result as much as possible by directly searching the area around that best result with a stochastic approach. This …


Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa 2023 Michigan Technological University

Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa

Dissertations, Master's Theses and Master's Reports

An Invasive species is a species that is alien or non-native to the ecosystem which causes harm to economic, environmental, or human health (E.O. 13112 of Feb 3, 1999). Invasive species have posed a serious threat to ecosystems across the globe. These invasive species have impacts on the biodiversity and productivity of invaded forests. Remotely sensed data is a valuable resource for understanding and addressing issues related to invasive species. This study presents a novel approach for mapping the distribution of two invasive plant species, Common and Glossy Buckthorn, using unmanned aerial vehicles (UAVs), machine learning algorithms, geographic information systems …


Exploring High Performance And Energy Efficient Graph Processing On Gpu, Robert P. Watling 2023 Michigan Technological University

Exploring High Performance And Energy Efficient Graph Processing On Gpu, Robert P. Watling

Dissertations, Master's Theses and Master's Reports

Parallel graph processing is central to analytical computer science applications, and GPUs have proven to be an ideal platform for parallel graph processing. Existing GPU graph processing frameworks present performance improvements but often neglect two issues: the unpredictability of a given input graph and the energy consumption of the graph processing. Our prototype software, EEGraph (Energy Efficiency of Graph processing), is a flexible system consisting of several graph processing algorithms with configurable parameters for vertex update synchronization, vertex activation, and memory management along with a lightweight software-based GPU energy measurement scheme. We observe relationships between different configurations of our software, …


Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif 2023 West Virginia University

Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif

Graduate Theses, Dissertations, and Problem Reports

Biometric technology is a rapidly evolving field with applications that range from access to devices to border crossing and entry/exit processes. Large-scale applications to collect biometric data, such as border crossings result in multimodal biometric databases containing thousands of identities. However, due to human operator error, these databases often contain many instances of image labeling and classification; this is due to the lack of training and throughput pressure that comes with human error. Multiple entries from the same individual may be assigned to a different identity. Rolled fingerprints may be labeled as flat images, a face image entered into a …


Scene Representation And Matching For Visual Localization In Hybrid Camera Scenarios, Marcela A. Mera Trujillo 2023 West Virginia University

Scene Representation And Matching For Visual Localization In Hybrid Camera Scenarios, Marcela A. Mera Trujillo

Graduate Theses, Dissertations, and Problem Reports

Scene representation and matching are crucial steps in a variety of tasks ranging from 3D reconstruction to virtual/augmented/mixed reality applications, to robotics, and others. While approaches exist that tackle these tasks, they mostly overlook the issue of efficiency in the scene representation, which is fundamental in resource-constrained systems and for increasing computing speed. Also, they normally assume the use of projective cameras, while performance on systems based on other camera geometries remains suboptimal. This dissertation contributes with a new efficient scene representation method that dramatically reduces the number of 3D points. The approach sets up an optimization problem for the …


Defense Of A Small Network, Isabella Adkins 2023 The University of Akron

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Discord Api Wrapper, Joshua Brown 2023 The University of Akron

Discord Api Wrapper, Joshua Brown

Williams Honors College, Honors Research Projects

Discordwrap is a Python library that abstracts the Discord API so that developers can easily integrate their existing projects with Discord. This paper outlines Discordwrap's creation, from start to finish, including implementation as well as key design decisions, such as the decision to provide a functional library interface rather than an object-oriented one.


A Different Way To Penetrate Nba Defenses, Trey Trucksis 2023 The University of Akron

A Different Way To Penetrate Nba Defenses, Trey Trucksis

Williams Honors College, Honors Research Projects

This project proposal will document the design, configuration, and penetration testing of a network consisting of three routers (labeled as Lakers, Celtics, Cavaliers), one switch (labeled as NBA), and three end devices (labeled as Kali, Windows 10, and Ubuntu) each connected to one of three routers present on the network. Each router will be attached to a different subnet on the network. The network will be secured using encrypted passwords on the router interfaces, OSPF MD5 authentication between the routers, port security on the switch, as well as Access Control Lists to to control the privileges of each subnetwork accordingly. …


Digital Commons powered by bepress