Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 11071 - 11100 of 12808
Full-Text Articles in Physical Sciences and Mathematics
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Journal of Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler
Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the third Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Umts-Hsdpa In High Altitude Platforms (Haps) Communications, Bazil Taha Ahmed, Miguel Calvo Ramon, Leandro De Haro-Ariet
Umts-Hsdpa In High Altitude Platforms (Haps) Communications, Bazil Taha Ahmed, Miguel Calvo Ramon, Leandro De Haro-Ariet
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, the performance of HAPs (High Altitudes Platforms) UMTS HSDPA (High Speed Downlink Packet Access) is studied for different HAPs height h, different cells radius R and two directions (0° and 30°) within the cell. The network under study is assumed to have 61 ground cells. It is noticed that, for urban zone users, the effective range is lower than the effective range for users in rural zones for a given modulation scheme. Also it is noticed that in rural zone, the HSDPA can support higher modulation schemes. It is noticed that, when 80% of the base station …
A New Relaying Algorithm To Detect Loss Of Excitation Of Synchronous Generators, Ömer Usta, M. H. Musa, M. Bayrak, M.A. Redfern
A New Relaying Algorithm To Detect Loss Of Excitation Of Synchronous Generators, Ömer Usta, M. H. Musa, M. Bayrak, M.A. Redfern
Turkish Journal of Electrical Engineering and Computer Sciences
A new digital relaying algorithm is introduced for the protection of synchronous generators against loss of excitation conditions. The new algorithm is based on measuring of the 3-phase reactive power output of the machines, and monitors the direction and magnitude of leading reactive power at the generator terminal. The protection algorithm is designed such that it can provide reliable protection against loss of field conditions and remains stable during recoverable power system swing conditions. While the new relay produces a trip signal for partial loss of field conditions causing the machine to lose its stability, it remains stable for the …
Study Of The Warranty Cost Model For Software Reliability With An Imperfect Debugging Phenomenon, D.R. Prince Williams
Study Of The Warranty Cost Model For Software Reliability With An Imperfect Debugging Phenomenon, D.R. Prince Williams
Turkish Journal of Electrical Engineering and Computer Sciences
Software reliability is one of the most important characteristics of software quality. Its measurement and management technologies employed during the software life-cycle are essential for producing and maintaining quality/reliable software systems. Herein, we discuss a modified approach to calculating the delivery cost of a software product, when warranty is to be provided, with an imperfect debugging phenomenon. Unlike existing cost models, here the strategy was to consider maintenance support given to the customer with an imperfect debugging phenomenon. The optimal release time can be calculated for various reliability levels by minimizing the cost. The delivery cost, reliability of the software …
Cs 891-01: Information Retrieval, Extraction, And Management, Krishnaprasad Thirunarayan
Cs 891-01: Information Retrieval, Extraction, And Management, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course expects an advanced Ph.D. student to (i) review background material in the area of Information Retrieval, Extraction, and Management, and (ii) develop/deliver a presentation on a mutually acceptable topic.
Cs 790-01: Multimedia Coding And Communication (I), Yong Pei
Cs 790-01: Multimedia Coding And Communication (I), Yong Pei
Computer Science & Engineering Syllabi
No abstract provided.
Cs 790-02: Advanced Data Mining, Guozhu Dong
Cs 790-02: Advanced Data Mining, Guozhu Dong
Computer Science & Engineering Syllabi
In this course we will cover advanced topics in data mining. We will study some classic papers as well as some important recent papers, on different types of applications, in this fast evolving field. Topics include: sequence mining, text mining, graph mining, data warehouse/cube mining, micro-array gene expression mining, privacy w.r.t. data mining, sensor network mining, data stream mining, time series mining, web mining, etc. The aim is to prepare you for advanced data mining research and application development.
Cs 480/680-01: Comparative Programming Languages, Michael L. Raymer
Cs 480/680-01: Comparative Programming Languages, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Cs 415-01: Social Implications Of Computing, Leo Finkelstein
Cs 415-01: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 400/600-01: Data Structures And Software Design, Michael L. Raymer
Cs 400/600-01: Data Structures And Software Design, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Cs 302-01: Client Server Databases, Karen Meyer
Cs 302-01: Client Server Databases, Karen Meyer
Computer Science & Engineering Syllabi
No abstract provided.
Cs 241-01: Introduction To Computer Science Ii, Mateen M. Rizki
Cs 241-01: Introduction To Computer Science Ii, Mateen M. Rizki
Computer Science & Engineering Syllabi
No abstract provided.
Cs 240-01: Computer Science I, L. Jane Lin
Cs 240-01: Computer Science I, L. Jane Lin
Computer Science & Engineering Syllabi
No abstract provided.
Cs 214-01: Visual Basic Programming, Michael Ondrasek
Cs 214-01: Visual Basic Programming, Michael Ondrasek
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of object computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. However, students should have a familiarity with programming concepts. The concepts covered will be applied in the Visual Basic programming language. 4 credit hours.
Cs 208-01: Computer Programming For Business I, Dennis Kellermeier
Cs 208-01: Computer Programming For Business I, Dennis Kellermeier
Computer Science & Engineering Syllabi
CS 208 is the first of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming. This course assumes students have never written a program before.
Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros
Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheet database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 206-01: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Cs 206-01: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Computer Science & Engineering Syllabi
By the end of this course, the students will have a greater depth of understanding in the areas of word processing, spreadsheets, databases, and presentation software and web design using Microsoft Word, Microsoft FrontPage, Microsoft Excel, Access, and PowerPoint covering the following topics.
Microsoft Word 2003:
Tutorial 5: Creating Styles, Outlines, Tables, and Tables of Contents
Tutorial 6: Creating Form Letters and Mailing Labels
Microsoft Excel 2003:
Tutorial 5: Working with Excel Lists
Tutorial 6: Working with Multiple Worksheets and Workbooks
Tutorial 7: Working with Excel's Editing and Web Tools
Tutorial 8: Developing an Excel Application Appendix A: Working with …
Ceg 416-01: Matrix Computations, Ronald F. Taylor
Ceg 416-01: Matrix Computations, Ronald F. Taylor
Computer Science & Engineering Syllabi
This course is a survey of numerical methods in linear algebra for application to problems in engineering and the sciences. Emphasis is on using modem software tools on high performance computing systems. This course covers the mathematics of linear equations, eigenvalue problems, singular value decomposition, and least squares. Material covered will be relevant to applications areas such as structural analysis, heat transfer, neural networks, mechanical vibrations, and image processing in biomedical engineering. A familiarity with MATLAB is useful, and the ability to program in languages such as CIC++ or Fortran is very important. A basic knowledge of matrix algebra is …
Ceg 260-01: Digital Computer Hardware, Sridhar Ramachandran
Ceg 260-01: Digital Computer Hardware, Sridhar Ramachandran
Computer Science & Engineering Syllabi
Digital Computer Hardware. Topics include switching algebra and switching functions, logic design of combinational and sequential circuits using TTL, combinational logic design with MSI and LSI, busing, storage elements, and instrumentation. 3 hours lecture, 2 hours lab. Prerequisite: CS 241.
Ceg 726-01: Pattern Recognition, Arthur A. Goshtasby
Ceg 726-01: Pattern Recognition, Arthur A. Goshtasby
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 498-01: Design Experience, Thomas C. Hartrum
Ceg 498-01: Design Experience, Thomas C. Hartrum
Computer Science & Engineering Syllabi
CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minimum of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journals and on the quality of their collective efforts as reflected in group generated products.
Ceg 477/677-01: Computer Graphics Ii, John A. Reisner
Ceg 477/677-01: Computer Graphics Ii, John A. Reisner
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 435/635-01: Distributed Computing And Systems, Yong Pei
Ceg 435/635-01: Distributed Computing And Systems, Yong Pei
Computer Science & Engineering Syllabi
Study of process coordination, client-server computing, network and distributed operating systems, network and distributed file systems, concurrency control, recovery of distributed transactions, and fault-tolerant computing.
Ceg 210-01: Pc Networking I, Karen Meyer
Ceg 210-01: Pc Networking I, Karen Meyer
Computer Science & Engineering Syllabi
Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration.
Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs
Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs
Theses
The thesis research proposed herein will model, analyse and implement strategies for the development of personalised services. The goal of the research work is to design and implement a framework which supports developers by minimising the effort required in implementing personalised services. This includes the ability to react to localisation changes and to present proper information. An overall design goal is the independency of most components from each other which will be attained through the use of standard technologies and protocols and the consistent use of a component model. The result will include the proposed framework and the analyses of …
Real-Time Query Scheduling For Wireless Sensor Networks, Octav Chipara, Chenyang Lu, Gruia-Catalin Roman
Real-Time Query Scheduling For Wireless Sensor Networks, Octav Chipara, Chenyang Lu, Gruia-Catalin Roman
All Computer Science and Engineering Research
Recent years have seen the emergence of wireless sensor network (WSN) systems that require high data rate real-time communication. This paper proposes Real-Time Query Scheduling (RTQS), a novel approach to conflict-free transmission scheduling for real-time queries in WSNs. We show that there is an inherent trade-off between prioritization and throughput in conflict-free query scheduling. RTQS provides three new real-time scheduling algorithms. The non-preemptive query scheduling algorithm achieves high throughput while introducing priority inversions. The preemptive query scheduling algorithm eliminates priority inversion at the cost of reduced throughput. The slack stealing query scheduling algorithm combines the benefits of preemptive and non-preemptive …
Mlds: A Flexible Location Directory Service For Tiered Sensor Networks, Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman
Mlds: A Flexible Location Directory Service For Tiered Sensor Networks, Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman
All Computer Science and Engineering Research
Many emergent distributed sensing applications need to keep track of mobile entities across multiple sensor networks connected via an IP network. To simplify the realization of such applications, we present MLDS, a Multi-resolution Location Directory Service for tiered sensor networks. MLDS provides a rich set of spatial query services ranging from simple queries about entity location, to complex nearest neighbor queries. Furthermore, MLDS supports multiple query granularities which allow an application to achieve the desired tradeoff between query accuracy and communication cost. We implemented MLDS on Agimone, a unified middleware for sensor and IP networks. We then deployed and evaluated …