Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 11251 - 11280 of 12808
Full-Text Articles in Physical Sciences and Mathematics
Ceg 260-01: Digital Computer Hardware, Travis E. Doom
Ceg 260-01: Digital Computer Hardware, Travis E. Doom
Computer Science & Engineering Syllabi
Digital Computer Hardware. Topics include switching algebra and switching functions, logic design of combinational and sequential circuits using TTL, combinational logic design with MSI and LSI, busing, storage elements, and instrumentation. 3 hours lecture, 2 hours lab. Prerequisite: CS 241.
Cs 765: Foundations Of Neurocomputation, Mateen M. Rizki
Cs 765: Foundations Of Neurocomputation, Mateen M. Rizki
Computer Science & Engineering Syllabi
This course is designed to help you develop a solid understanding of neural network algorithms and architectures. At the end of this course you should be able to read and critically evaluate most neural network papers published in major journals, (e.g. IEEE Transaction on Neural Networks, Neural Networks, and Neural Computation). In addition, you should be able to implement a broad range of network architectures and learning algorithms for a variety of applications.
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java), and a functional language (e.g., Scheme). The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will be coded in Java 5 and in Scheme.
Cs 466/666: Formal Languages And Automata, Krishnaprasad Thirunarayan
Cs 466/666: Formal Languages And Automata, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course introduces the theory of formal languages and automata. The primary focus is on the two methods of defining languages: using generators (e.g., grammars/regular expressions) and using recognizers (e.g., finite state machines). Along with presenting the fundamentals, this course will develop and examine relationships among the various specification methods for the regular languages and the context-free languages, in detail. Overall, we plan to cover the first seven chapters of the text book.
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Computer Science & Engineering Syllabi
CS 209 is the second of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming.
Cs 240: Computer Science - I, Ronald F. Taylor
Cs 240: Computer Science - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
Basic concepts of programming and programming languages are introduced. Emphasis is on structured programming and stepwise refinement. For CS/CEG majors with familiarity of a high-level programming language. Prerequisite: MTH 130 (Precalculus) or MPL 5. 4 credit hours.
Cs 205-07: Computer Literacy And Office Automation, John P. Herzog
Cs 205-07: Computer Literacy And Office Automation, John P. Herzog
Computer Science & Engineering Syllabi
Basic computer terminology, word processing, spreadsheets, databases, and graphics.
Ceg 720-01: Computer Architecture, Jack Jean
Ceg 720-01: Computer Architecture, Jack Jean
Computer Science & Engineering Syllabi
No abstract provided.
An Operational Model For Mobile Sensor Cloud Management, Indrajeet Kalyankar
An Operational Model For Mobile Sensor Cloud Management, Indrajeet Kalyankar
Electrical & Computer Engineering Theses & Dissertations
Mobile sensors provide a safe, cost effective method for gathering information in hazardous environments. When the hazardous environment is either unexplored, such as the surface of Mars, or unanticipated, such as the result of chemical contamination, it is desirable for a system to gather information with a minimal amount of outside control (localization, decision control, etc.) and prepositioned sensors. If one takes a look at the number of the sensors deployed on a scale, at the lower end is the sole, multipurpose sensor unit. The upper end deals with hordes of inexpensive, expendable sensors. In the middle, a cluster of …
Gaussian Mixture Models And Neural Networks For Automatic Speaker Identification, Usha Gayatri Chalkapally
Gaussian Mixture Models And Neural Networks For Automatic Speaker Identification, Usha Gayatri Chalkapally
Electrical & Computer Engineering Theses & Dissertations
Automatic Speaker Recognition is the process of automatically recognizing who is speaking on the basis of individual information contained in speech signals. This technique of Automatic Speaker Recognition makes it possible to use the speaker's voice to verify their identity and control access to services such as voice dialing, banking by telephone, telephone shopping, database access services, information services, voice mail, security control for confidential information areas, and remote access to computers.
In this thesis, the techniques of Gaussian Mixture Models and Neural Networks for Automatic Speaker Identification are presented. Algorithms for Speaker Identification using Gaussian Mixture Models were developed, …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 22, Number 8, June 2006, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 22, Number 8, June 2006, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Adaptive Interpolation Algorithms For Temporal-Oriented Datasets, Jun Gao
Adaptive Interpolation Algorithms For Temporal-Oriented Datasets, Jun Gao
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Spatiotemporal datasets can be classified into two categories: temporal-oriented and spatial-oriented datasets depending on whether missing spatiotemporal values are closer to the values of its temporal or spatial neighbors. We present an adaptive spatiotemporal interpolation model that can estimate the missing values in both categories of spatiotemporal datasets. The key parameters of the adaptive spatiotemporal interpolation model can be adjusted based on experience.
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 22, Number 7, May 2006, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 22, Number 7, May 2006, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Consistency Based Error Evaluation For Deep Sea Bathymetric Mapping With Robotic Vehicles, Christopher Roman, Hanumant Singh
Consistency Based Error Evaluation For Deep Sea Bathymetric Mapping With Robotic Vehicles, Christopher Roman, Hanumant Singh
Christopher N. Roman
This paper presents a method to evaluate the mapping error present in point cloud terrain maps created using robotic vehicles and range sensors. This work focuses on mapping environments where no a priori ground truth is available and self consistency is the only available check against false artifacts and errors. The proposed error measure is based on a disparity measurement between common sections of the environment that have been imaged multiple times. This disparity measure highlights inconsistency in the terrain map by showing regions where multiple overlapping point clouds do not fit together well. This error measure provides the map …
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Annual ADFSL Conference on Digital Forensics, Security and Law
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Annual ADFSL Conference on Digital Forensics, Security and Law
This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Annual ADFSL Conference on Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.
Design Concepts And Process Analysis For Transmuter Fuel Manufacturing: Quarterly Progress Report #6, Kamalakar Alluri, Georg F. Mauer
Design Concepts And Process Analysis For Transmuter Fuel Manufacturing: Quarterly Progress Report #6, Kamalakar Alluri, Georg F. Mauer
Fuels Campaign (TRP)
Project Milestones
• Completed a systematic study seeking to arrive at an optimized plant configuration, using value engineering techniques in January 2006.
• Vision-based robot serving and automated plant safety monitoring is currently in progress.
2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla
2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla
Undergraduate Research Conference at Missouri S&T
No abstract provided.
Cs 142: Computer Programming - Ii, Ronald F. Taylor
Cs 142: Computer Programming - Ii, Ronald F. Taylor
Computer Science & Engineering Syllabi
Concepts introduced in CS 141 are developed in greater detail and depth with the Java programming language. Topics include object oriented programming, graphics, development of user interfaces and handling runtime errors with an emphasis on program verification and testing. Students must register for both lecture and one laboratory section. 4 credit hours. Prerequisite: CS 141 (Computer Programming I) and MTH 127 (College Algebra) or equivalent.
Cs 206: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Cs 206: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Computer Science & Engineering Syllabi
By the end of this course, the students will have a greater depth of understanding in the areas of spreadsheets, databases, and presentation software using Microsoft Excel, Access, and PowerPoint.
Cs 205-08: Computer Literacy And Office Automation, Kim Gros
Cs 205-08: Computer Literacy And Office Automation, Kim Gros
Computer Science & Engineering Syllabi
No abstract provided.
Cs 208: Computer Programming For Business I, Dennis Kellermeier
Cs 208: Computer Programming For Business I, Dennis Kellermeier
Computer Science & Engineering Syllabi
No abstract provided.
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Computer Science & Engineering Syllabi
No abstract provided.
Cs 240: Introduction To Computer Science I, Praveen Kakumanu
Cs 240: Introduction To Computer Science I, Praveen Kakumanu
Computer Science & Engineering Syllabi
This course is the first in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. This course presents a general introduction to C++ programming language. It introduces the fundamental capabilities of C++ language as a problem solving tool. Topics include data representation. debugging and program verification. Note: For all CS 24X students, concurrent registration into CS 24X lab is a must.
Cs 214: Object-Based Programming, Eric Maston
Cs 214: Object-Based Programming, Eric Maston
Computer Science & Engineering Syllabi
This course is a basic introduction to object oriented programming utilizing the Visual Basic programming language.
Cs 241-01: Computer Science Ii, L. Jane Lin
Cs 241-01: Computer Science Ii, L. Jane Lin
Computer Science & Engineering Syllabi
This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on tools for building abstract data types (using structure and class concepts in C++) and Object-Oriented Programming. We also begin the study of data structures in this course. For All CS 241 students, concurrent registration into CS 241 lab is a must.