Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 10921 - 10950 of 12808
Full-Text Articles in Physical Sciences and Mathematics
Sheep Updates 2007 - Part 4, Dean Thomas, Dominique Blache, Dean Revell, Hayley Norman, Phil Vercoe, Zoey Durmic, Serina Digby, Di Mayberry, Megan Chadwick, Martin Sillence, David Masters, R. Silberstein, F. Byrne, P. G. H. Nichols, J. Young, L. Aitkins, M. G. Wilmot, A. J. Rintoul, T. Lambert, D. R. Mcclements, P. Raper, P. Ward, C. Walton, T. York, David Pethick, David Hopkins, Malcolm Mcphee, D. B. Savage, J. V. Nolan, I. R. Godwin, A. Aoetpah, T. Nguyen, N. Baillie, C. Lawler, Ken Geenty, John Smith, Darryl Smith, Tim Dyall, Grant Uphill, John Young, Michael Paton, John Dorrian
Sheep Updates 2007 - Part 4, Dean Thomas, Dominique Blache, Dean Revell, Hayley Norman, Phil Vercoe, Zoey Durmic, Serina Digby, Di Mayberry, Megan Chadwick, Martin Sillence, David Masters, R. Silberstein, F. Byrne, P. G. H. Nichols, J. Young, L. Aitkins, M. G. Wilmot, A. J. Rintoul, T. Lambert, D. R. Mcclements, P. Raper, P. Ward, C. Walton, T. York, David Pethick, David Hopkins, Malcolm Mcphee, D. B. Savage, J. V. Nolan, I. R. Godwin, A. Aoetpah, T. Nguyen, N. Baillie, C. Lawler, Ken Geenty, John Smith, Darryl Smith, Tim Dyall, Grant Uphill, John Young, Michael Paton, John Dorrian
Sheep Updates
This session covers eight papers from different authors:
GRAZING
1. The impact of high dietary salt and its implications for the management of livestock grazing saline land, Dean Thomas, Dominique Blache, Dean Revell, Hayley Norman, Phil Vercoe, Zoey Durmic, Serina Digby, Di Mayberry, Megan Chadwick, Martin Sillence and David Masters, CRC for Plant-based Management of Dryland Salinity, Faculty of Natural & Agricultural Sciences, The University of Western Australia, WA.
2. Sustainable Grazing on Saline Lands - outcomes from the WA1 research project, H.C. Norman1,2, D.G. Masters1,2, R. Silberstein1,2, F. Byrne2,3, P.G.H. Nichols …
Cs 240: Computer Science I, Travis E. Doom
Cs 240: Computer Science I, Travis E. Doom
Computer Science & Engineering Syllabi
Basic concepts of programming and programming languages are introduced. Emphasis is on structured programming and stepwise refinement. Prerequisite: MTH 130 or MPL 5.
Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros
Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 205-07: Introduction To Computers And Office Productivity Software, John P. Herzog
Cs 205-07: Introduction To Computers And Office Productivity Software, John P. Herzog
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 415: Social Implications Of Computing, Leo Finkelstein
Cs 415: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 205-01, 02: Introduction To Computers And Office Productivity Software, Terri Bauer
Cs 205-01, 02: Introduction To Computers And Office Productivity Software, Terri Bauer
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required.
Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java), and a functional language (e.g., scheme). The overall goal is to enable comparison and evaluation of existing languages. The programming assignments wi11 be coded in Java 5 and in Scheme.
Ceg 404/604-01: Wireless Sensor Networks, Bin Wang
Ceg 404/604-01: Wireless Sensor Networks, Bin Wang
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 220-01: Introduction To C Programming For Engineers - I, Ronald F. Taylor
Ceg 220-01: Introduction To C Programming For Engineers - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. Some programming assignments may involve complex arithmetic and trigonometric and exponential functions. 4 credit hours.
Ceg 460/660-01: Introduction To Software Computer Engineering, Eric Maston
Ceg 460/660-01: Introduction To Software Computer Engineering, Eric Maston
Computer Science & Engineering Syllabi
This course is concerned with the techniques of designing and constructing large programs. Some of the required basic concepts necessarily have to be developed using small programs as examples. To this extent, we also study programming-in-the-small. The overall objectives are to present an overview of issues in the development of software, to discuss terminology, to illustrate via example case studies, and to give sufficiently detailed advice on how to develop quality software. Hands-on experience is emphasized through the use of homework and a class project.
Ceg 720-01: Computer Architecture, Jack Jean
Ceg 720-01: Computer Architecture, Jack Jean
Computer Science & Engineering Syllabi
No abstract provided.
Cs 765: Foundations Of Neurocomputation, Mateen M. Rizki
Cs 765: Foundations Of Neurocomputation, Mateen M. Rizki
Computer Science & Engineering Syllabi
This course is designed to help you develop a solid understanding of neural network algorithms and architectures. At the end of this course you should be able to read and critically evaluate most neural network papers published in major journals, (e.g. IEEE Transaction on Neural Networks, Neural Networks, and Neural Computation). In addition, you should be able to implement a broad range of network architectures and learning algorithms for a variety of applications.
Cs 241: Introduction To Computer Science Ii, Haiyun Bian
Cs 241: Introduction To Computer Science Ii, Haiyun Bian
Computer Science & Engineering Syllabi
This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. Concepts introduced in CS 240 are developed in greater detail and depth with the Java programming language. Topics include object oriented programming, basic sorting algorithms, recursion, graphics, development of user interfaces and exception handling. Student must register for one lecture section and one lab section.
Cs 141: Computer Programming I, Eric Maston
Cs 141: Computer Programming I, Eric Maston
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language.
Towards Optimal Bag-Of-Features For Object Categorization And Semantic Video Retrieval, Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang
Towards Optimal Bag-Of-Features For Object Categorization And Semantic Video Retrieval, Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang
Research Collection School Of Computing and Information Systems
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as reliability and scalability of visual classification, nevertheless, remains uncertain due to various implementation choices. In this paper, we evaluate various factors which govern the performance of BoF. The factors include the choices of detector, kernel, vocabulary size and weighting scheme. We offer some practical insights in how to optimize the performance by choosing good keypoint detector and kernel. For the weighting scheme, we propose a novel soft-weighting method to assess the significance of a visual word …
Analysis Of Beam Propagation In 90-Degree Holographic Recording And Readout Using Transfer Functions And Numerical 2-D-Laplace Inversion, Monish Ranjan Chatterjee, Partha P. Banerjee, George Nehmetallah
Analysis Of Beam Propagation In 90-Degree Holographic Recording And Readout Using Transfer Functions And Numerical 2-D-Laplace Inversion, Monish Ranjan Chatterjee, Partha P. Banerjee, George Nehmetallah
Electrical and Computer Engineering Faculty Publications
Recently, 2-D-Laplace analysis of recording and readout of edge-holograms was reported. Numerical Laplace inversion was examined for simple test cases. Inversion algorithms are applied to examine beam shaping and distortion in photovoltaic and photorefractive materials.
Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth
Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth
Theses and Dissertations
We report on a parallel version of the Fast Multipole Method (FMM) implemented in the classical molecular dynamics code, NAMD (Not Another Molecular Dynamics program). This novel implementation of FMM aims to minimize interprocessor communication through the modification of the FMM grid to match the hybrid force and spatial decomposition scheme already present in NAMD. This new implementation has the benefit of replacing all-to-all communications broadcasts with direct communications between nearest neighbors. This results in a significant reduction in the amount of communication compared to earlier attempts to integrate FMM into common molecular dynamics programs. The early performance of FMM …
Maximizing Broadcast And Multicast Traffic Load Through Link-Rate Diversity In Wireless Mesh Networks, Chun Tung Chou, Bao Hua Liu, Archan Misra
Maximizing Broadcast And Multicast Traffic Load Through Link-Rate Diversity In Wireless Mesh Networks, Chun Tung Chou, Bao Hua Liu, Archan Misra
Research Collection School Of Computing and Information Systems
This paper studies some of the fundamental challenges and opportunities associated with the network-layer broadcast and multicast in a multihop multirate wireless mesh network (WMN). In particular, we focus on exploiting the ability of nodes to perform link-layer broadcasts at different rates (with correspondingly different coverage areas). We first show how, in the broadcast wireless medium, the available capacity at a mesh node for a multicast transmission is not just a function of the aggregate pre-existing traffic load of other interfering nodes, but intricately coupled to the actual (sender, receiver) set and the link-layer rate of each individual transmission. We …
Design Of A Gas Tight Water Sampler For Auv Operations, Christopher Roman, R. Camilli
Design Of A Gas Tight Water Sampler For Auv Operations, Christopher Roman, R. Camilli
Christopher N. Roman
This paper presents the design and preliminary test results for a small gas tight water sampler intended to work on scientific AUVs. In recent years AUVs have developed into reliable platforms capable of carrying a wide variety of environmental sensors for in-situ chemical measurements. Physical sample collection however remains difficult, due to the combination of space, power and complexity constraints inherent in working with autonomous platforms. The AUV sampler is a small (12 cm times 85 cm) cylindrical package designed to collect eight 20 ml gas tight volumes of water, with each sample maintained at high pressure to depths of …
Unwoven Aspect Analysis, Morgan G. Deters
Unwoven Aspect Analysis, Morgan G. Deters
All Computer Science and Engineering Research
Various languages and tools supporting advanced separation of concerns (such as aspect-oriented programming) provide a software developer with the ability to separate functional and non-functional programmatic intentions. Once these separate pieces of the software have been specified, the tools automatically handle interaction points between separate modules, relieving the developer of this chore and permitting more understandable, maintainable code. Many approaches have left traditional compiler analysis and optimization until after the composition has been performed; unfortunately, analyses performed after composition cannot make use of the logical separation present in the original program. Further, for modular systems that can be configured with …
Comparing Features Of Three-Dimensional Object Models Using Registration Based On Surface Curvature Signatures, Timothy David Gatzke, Cindy M. Grimm
Comparing Features Of Three-Dimensional Object Models Using Registration Based On Surface Curvature Signatures, Timothy David Gatzke, Cindy M. Grimm
All Computer Science and Engineering Research
This dissertation presents a technique for comparing local shape properties for similar three-dimensional objects represented by meshes. Our novel shape representation, the curvature map, describes shape as a function of surface curvature in the region around a point. A multi-pass approach is applied to the curvature map to detect features at different scales. The feature detection step does not require user input or parameter tuning. We use features ordered by strength, the similarity of pairs of features, and pruning based on geometric consistency to efficiently determine key corresponding locations on the objects. For genus zero objects, the corresponding locations are …
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Annual ADFSL Conference on Digital Forensics, Security and Law
As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Annual ADFSL Conference on Digital Forensics, Security and Law
Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.
Keywords: computer forensics education, network forensics, protocol analysis
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Annual ADFSL Conference on Digital Forensics, Security and Law
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.
Keywords: hard disk forensics, geocoding, geolocation
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Annual ADFSL Conference on Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Annual ADFSL Conference on Digital Forensics, Security and Law
In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …