Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,879 Full-Text Articles 2,728 Authors 1,435,520 Downloads 174 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,879 full-text articles. Page 7 of 86.

The History Of The Enigma Machine, Jenna Siobhan Parkinson 2022 Western University

The History Of The Enigma Machine, Jenna Siobhan Parkinson

History Publications

The history of the Enigma machine begins with the invention of the rotor-based cipher machine in 1915. Various models for rotor-based cipher machines were developed somewhat simultaneously in different parts of the world. However, the first documented rotor machine was developed by Dutch naval officers in 1915. Nonetheless, the Enigma machine was officially invented following the end of World War I by Arthur Scherbius in 1918 (Faint, 2016).


Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero 2022 Stephen F Austin State University

Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero

Electronic Theses and Dissertations

Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets.

In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with …


Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby 2022 University of South Alabama

Analyzing Business-Focused Social Networks In Hiring: The Influence Of A Job Candidate's Network On A Recruiter's Hiring Recommendation, Hannah V. Kibby

<strong> Theses and Dissertations </strong>

Social media has altered the ways in which people interact. Business-focused social media profiles, such as those on LinkedIn, can act as a proxy for a traditional resume. However, these websites differ from a traditional resume in that information presented is sometimes informal, personal, and irrelevant to the member’s career. Furthermore, HR employees are able to view a job candidate’s social network. This research investigates the influence of a recruiter’s knowledge of an applicant’s professional network on the recruiter’s perception of the applicant’s trustworthiness and hence their willingness to take risk in the hiring relationship. A review of the literature …


Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson 2022 University of South Alabama

Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson

<strong> Theses and Dissertations </strong>

Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …


Computer Engineering Education, Marilyn Wolf 2022 University of Nebraska-Lincoln

Computer Engineering Education, Marilyn Wolf

CSE Conference and Workshop Papers

Computer engineering is a rapidly evolving discipline. How should we teach it to our students?

This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.


A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar 2022 United Arab Emirates University

A Blockchain Based Policy Framework For The Management Of Electronic Health Record (Ehrs), Aysha Ali Mohammed Murad Qambar

Theses

The rapid development of information technology during the last decade has greatly influenced all aspects of society, including individuals and enterprise organizations. Adopting new technologies by individuals and organizations depends on several factors, such as usability, available resources, support needed for adoption benefits, and return on investment, to mention a few. When it comes to the adoption of new technologies, one of the main challenges faced by organizations is the ability to effectively incorporate such technologies into their enterprise solutions to maximize the expected benefits. For the last several years, Blockchain technology has become a popular trend in a variety …


Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia 2022 University of Massachusetts Amherst

Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia

Doctoral Dissertations

Research studies show that sleep deprivation causes severe fatigue, impairs attention and decision making, and affects our emotional interpretation of events, which makes it a big threat to public safety, and mental and physical well-being. Hence, it would be most desired if we could continuously measure one’s drowsiness and fatigue level, their emotion while making decisions, and assess their sleep quality in order to provide personalized feedback or actionable behavioral suggestions to modulate sleep pattern and alertness levels with the aim of enhancing performance, well-being, and quality of life. While there have been decades of studies on wearable devices, we …


Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre 2022 University of Massachusetts Amherst

Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre

Doctoral Dissertations

Many neurological diseases cause motor impairments that limit autonomy and reduce health-related quality of life. Upper-limb motor impairments, in particular, significantly hamper the performance of essential activities of daily living, such as eating, bathing, and changing clothing. Assessment of impairment is necessary for tracking disease progression, measuring the efficacy of interventions, and informing clinical decision making. Impairment is currently assessed by trained clinicians using semi-quantitative rating scales that are limited by their reliance on subjective, visual assessments. Furthermore, existing scales are often burdensome to administer and do not capture patients' motor performance in home and community settings, resulting in a …


Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns 2022 University of Massachusetts Amherst

Communicative Information Visualizations: How To Make Data More Understandable By The General Public, Alyxander Burns

Doctoral Dissertations

Although data visualizations have been around for centuries and are encountered frequently by the general public, existing evidence suggests that a significant portion of people have difficulty understanding and interpreting them. It might not seem like a big problem when a reader misreads a weather map and finds themselves without an umbrella in a rainstorm, but for those who lack the means, experience, or ability to make sense of data, misreading a data visualization concerning public health and safety could be a matter of life and death. However, figuring out how to make visualizations truly usable for a diverse audience …


Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang LIU, Fei ZHANG 2022 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China

Computing Concept: Genealogy Potential, Power, Arithmetic, Algorithm And Ritual Of Computation, Yuhang Liu, Fei Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the new era, China needs more rational, firm, dialectical, and practical cultural confidence in the field of computational technology. The study conducted rigorous literature research, and established the correspondence between the ancient Chinese ideologies and different focuses of computation. The study proposes the computation concept genealogy (i.e., potential, power, arithmetic, algorithm, and ritual of computation) to deepen the multi-dimensional understanding of the concept of computation, and gives some suggestions for cultivating the computational culture that is facing the world and is of Chinese characteristics.


An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson 2022 The University of Western Ontario

An Investigation Into Time Gazed At Traffic Objects By Drivers, Kolby R. Sarson

Electronic Thesis and Dissertation Repository

Several studies have considered driver’s attention for a multitude of distinct purposes, ranging from the analysis of a driver’s gaze and perception, to possible use in Advanced Driving Assistance Systems (ADAS). These works typically rely on simple definitions of what it means to “see,” considering a driver gazing upon an object for a single frame as being seen. In this work, we bolster this definition by introducing the concept of time. We consider a definition of ”seen” which requires an object to be gazed upon for a set length of time, or frames, before it can be considered as seen …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi AlMahamid, Hanan Lutfiyya, Katarina Grolinger 2022 Western University

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi AlMahamid, Katarina Grolinger 2022 Western University

Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger

Electrical and Computer Engineering Publications

Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify …


Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti 2022 Chapman University

Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti

Engineering Faculty Articles and Research

Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …


(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini 2022 Graphic Era Deemed to be University

(Si10-124) Inverse Reconstruction Methodologies: A Review, Deepika Saini

Applications and Applied Mathematics: An International Journal (AAM)

The three-dimensional reconstruction problem is a longstanding ill-posed problem, which has made enormous progress in the field of computer vision. This field has attracted increasing interest and demonstrated an impressive performance. Due to a long era of increasing evolution, this paper presents an extensive review of the developments made in this field. For the three dimensional visualization, researchers have focused on the developments of three dimensional information and acquisition methodologies from two dimensional scenes or objects. These acquisition methodologies require a complex calibration procedure which is not practical in general. Hence, the requirement of flexibility was much needed in all …


Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel 2022 Southern Methodist University

Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel

SMU Data Science Review

Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model …


A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks 2022 University of Louisville

A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks

The Cardinal Edge

Understanding and preventing virtual reality sickness(VRS), or cybersickness, is vital in removing barriers for the technology's adoption. Thus, this article aims to synthesize a variety of academic sources to demonstrate the modes by which VRS occurs, the metrics by which it is judged, and the methods to mitigate it. The predominant theories on the biological origins of VRS are discussed, as well as the individual factors which increase the likelihood of a user developing VRS. Moreover, subjective and physiological measurements of VRS are discussed in addition to the development of a predictive model and conceptual framework. Finally, several methodologies of …


Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri 2022 University of Nebraska - Lincoln

Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to automatically derive …


Algorithm-Based Fault Tolerance At Scale, Hayden Estes 2022 University of Alabama in Huntsville

Algorithm-Based Fault Tolerance At Scale, Hayden Estes

Summer Community of Scholars Posters (RCEU and HCR Combined Programs)

No abstract provided.


Implementing Github Actions Continuous Integration To Reduce Error Rates In Ecological Data Collection, Albert Y. Kim, Valentine Herrmann, Ross Barreto, Brianna Calkins, Erika Gonzalez-Akre, Daniel J. Johnson, Jennifer A. Jordan, Lukas Magee, Ian R. McGregor, Nicolle Montero, Karl Novak, Teagan Rogers, Jessica Shue, Kristina J. Anderson-Teixeira 2022 Smith College

Implementing Github Actions Continuous Integration To Reduce Error Rates In Ecological Data Collection, Albert Y. Kim, Valentine Herrmann, Ross Barreto, Brianna Calkins, Erika Gonzalez-Akre, Daniel J. Johnson, Jennifer A. Jordan, Lukas Magee, Ian R. Mcgregor, Nicolle Montero, Karl Novak, Teagan Rogers, Jessica Shue, Kristina J. Anderson-Teixeira

Statistical and Data Sciences: Faculty Publications

Accurate field data are essential to understanding ecological systems and forecasting their responses to global change. Yet, data collection errors are common, and data analysis often lags far enough behind its collection that many errors can no longer be corrected, nor can anomalous observations be revisited. Needed is a system in which data quality assurance and control (QA/QC), along with the production of basic data summaries, can be automated immediately following data collection.

Here, we implement and test a system to satisfy these needs. For two annual tree mortality censuses and a dendrometer band survey at two forest research sites, …


Digital Commons powered by bepress