Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,825 Full-Text Articles 2,594 Authors 1,377,463 Downloads 168 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,825 full-text articles. Page 9 of 82.

Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman 2022 University of New Hampshire, Durham

Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman

Honors Theses and Capstones

Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …


Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa 2022 Colby College

Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa

Honors Theses

In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …


Interpretable Machine Learning For Self-Service High-Risk Decision Making, Charles Recaido 2022 Central Washington University

Interpretable Machine Learning For Self-Service High-Risk Decision Making, Charles Recaido

All Master's Theses

This research contributes to interpretable machine learning via visual knowledge discovery in General Line Coordinates (GLC). The concepts of hyperblocks as interpretable dataset units and GLC are combined to create a visual self-service machine learning model. Two variants of GLC known as Dynamic Scaffold Coordinates (DSC) are proposed. DSC1 and DSC2 can map in a lossless manner multiple dataset attributes to a single two-dimensional (X, Y) Cartesian plane using a dynamic scaffolding graph construction algorithm.

Hyperblock analysis is used to determine visually appealing dataset attribute orders and to reduce line occlusion. It is shown that hyperblocks can generalize decision tree …


Virtual Machine For Spartangold, William Wang 2022 San Jose State University

Virtual Machine For Spartangold, William Wang

Master's Projects

The field of blockchain and cryptocurrencies can be both difficult to grasp and improve upon, which makes aids that can assist in these tasks very useful. SpartanGold is a simplified blockchain-based cryptocurrency created at San Jose State University as a learning aid for blockchain and cryptocurrencies. In its current state, it closely resembles Bitcoin, and it is also easily expandable to implement other features.

This project extends SpartanGold with a virtual machine resembling the Ethereum Virtual Machine. Implementing this feature results in SpartanGold having Ethereum- related features, which would allow the cryptocurrency to both be a helpful learning aid for …


Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns, Devinesh Singh 2022 San Jose State University

Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns, Devinesh Singh

Master's Projects

CoV-2 pandemic prompted lockdown measures to be implemented worldwide; these directives were implemented nationwide to stunt the spread of the infection. Throughout the lockdowns, millions of individuals resorted to social media for entertainment, communicate with friends and family, and express their opinions about the pandemic. Simultaneously, social media aided in the dissemination of misinformation, which has proven to be a threat to global health. Sentiment analysis, a technique used to analyze textual data, can be used to gain an overview of public opinion behind CoV-2 from Twitter and TikTok. The primary focus of the project is to build a deep …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan 2022 University of New Haven

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha 2022 Department of Computer Information Technology, Purdue University

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow 2022 The University of Hong Kong, Department of Computer Science

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, PhD 2022 Bachelor of Information Security, MEPhI; Moscow, Russia

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik 2022 Purdue University

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang 2022 School of Science, Edith Cowan University

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Sportiasts, Yuvraj Subedi 2022 The University of Akron

Sportiasts, Yuvraj Subedi

Williams Honors College, Honors Research Projects

Sportiasts is an online platform that connects sports enthusiasts. This platform explores the most recent back-end tool: Django and PostgreSQL to provide sports enthusiasts a platform to connect with each other. This platform is versatile and dynamic for the users to have their best experience connecting with sports communities. Anyone with sports interests can use this application to explore, connect, and create sports communities.


Urdu Text Summarization Using Machine Learning, Nabeel Hassan 2022 Institute of Business Administration

Urdu Text Summarization Using Machine Learning, Nabeel Hassan

MSCS Research Projects/Theses

Text summarization is a formidable challenge in Natural Language Processing (NLP) because it requires precise text analysis, such as semantic and lexical analysis, to produce a good summary. A good summary must contain valuable information and must be concise while considering aspects such as non-redundancy, relevance, coverage, coherence, and readability.

A lot of research, time, effort, and funding has been invested in the English language, as it is the global language for communication, but not so much in low resource languages like Urdu. This project intends to develop an application that addresses this problem. It also provides Parts of Speech …


Predicting League Of Legends Ranked Games Outcome, Ngoc Linh Chi Nguyen 2022 Bard College

Predicting League Of Legends Ranked Games Outcome, Ngoc Linh Chi Nguyen

Senior Projects Spring 2022

League of Legends (LoL) is the one of most popular multiplayer online battle arena (MOBA) games in the world. For LoL, the most competitive way to evaluate a player’s skill level, below the professional Esports level, is competitive ranked games. These ranked games utilize a matchmaking system based on the player’s ranks to form a fair team for each game. However, a rank game's outcome cannot necessarily be predicted using just players’ ranks, there are a significant number of different variables impacting a rank game depending on how well each team plays. In this paper, I propose a method to …


¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva 2022 Bard College

¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva

Senior Projects Spring 2022

With efforts to broaden participation in computing by integrating CS education into humanities and developing more critical pedagogy, this research focuses on teaching computing in a post-secondary Spanish literature class through analyzing Afro-Cuban poetry. Its goal was to evaluate how participants may use Twine to reflect on Afro-Cuban poetry and their own identities. A group of 5 participants, one professor, and five students, learned how to use Twine to create interactive narratives reflecting on “El apellido,” a poem by Afro-Cuban poet Nicolás Guillén. Through analyzing researcher notes, participants’ projects, post-workshop surveys, and interviews, the research revealed that students were able …


Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto 2022 University of Denver

Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto

Electronic Theses and Dissertations

Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …


Poriferal Vision: Deep Transfer Learning-Based Sponge Spicules Identification & Taxonomic Classification, Sudhin Domala 2022 San Jose State University

Poriferal Vision: Deep Transfer Learning-Based Sponge Spicules Identification & Taxonomic Classification, Sudhin Domala

Master's Projects

The phylum Porifera includes the aquatic organisms known as sponges. Sponges are classified into four classes: Calcarea, Hexactinellida, Demospongiae, and Homoscleromorpha. Within Demospongiae and Hexactinellida, sponges’ skeletons are needle-like spicules made of silica. With a wide variety of shapes and sizes, these siliceous spicules’ morphology plays a pivotal role in assessing and understanding sponges' taxonomic diversity and evolution. In marine ecosystems, when sponges die their bodies disintegrate over time, but their spicules remain in the sediments as fossilized records that bear ample taxonomic information to reconstruct the evolution of sponge communities and sponge phylogeny.

Traditional methods of identifying spicules from …


Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray 2022 West Virginia University

Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray

Graduate Theses, Dissertations, and Problem Reports

Deep learning models with convolutional neural networks are being used to solve some of the most difficult problems in computing today. Complicating factors to the use and development of deep learning models include lack of availability of large volumes of data, lack of problem specific samples, and the lack variations in the specific samples available. The costs to collect this data and to compute the models for the task of detection remains a inhibitory condition for all but the most well funded organizations. This thesis seeks to approach deep learning from a cost reduction and hybrid perspective — incorporating techniques …


Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy 2022 West Virginia University

Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy

Graduate Theses, Dissertations, and Problem Reports

Blood glucose monitoring is a key process in the prevention and management of certain chronic diseases, such as diabetes. Currently, glucose monitoring for those interested in their blood glucose levels are confronted with options that are primarily invasive and relatively costly. A growing topic of note is the development of non-invasive monitoring methods for blood glucose. This development holds a significant promise for improvement to the quality of life of a significant portion of the population and is overall met with great enthusiasm from the scientific community as well as commercial interest. This work aims to develop a potential pipeline …


Proxy Re-Encryption In Blockchain-Based Application, Wangcheng Yuan 2022 San Jose State University

Proxy Re-Encryption In Blockchain-Based Application, Wangcheng Yuan

Master's Projects

Nowadays, blockchain-based technology has risen to a new dimension. With the advantage of the decentralized identity, data are transferred through decentralized and public ledgers. Those new contracts provide great visibility. However, there is still a need to keep some data private in many cases. Those private data should be encrypted while still benefiting from the decentralized on-chain protocol. Securing those private data in such a decentralized blockchain-based system is thus a critical problem. Our solution provides a decentralized protocol that lets users grant access to their private data with proxy re-encryption in SpartanGold (a blockchain-based cryptocurrency). We implement a third-party …


Digital Commons powered by bepress