Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (356)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (59)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 9931 - 9960 of 12812
Full-Text Articles in Physical Sciences and Mathematics
Ceg 260-01: Digital Computer Hardware/Switching Circuits, Meilin Liu
Ceg 260-01: Digital Computer Hardware/Switching Circuits, Meilin Liu
Computer Science & Engineering Syllabi
We will discuss and cover basic digital, combinational and sequential logic systems. Labs will be used to gain valuable practical experience in implementing elementary circuits and logic designs.
Wireless Sensing Without Sensors: An Experimental Study Of Motion/Intrusion Detection Using Rf Irregularity, Wei Qi Lee, Winston K. G. Seah, Hwee-Pink Tan, Zexi Yao
Wireless Sensing Without Sensors: An Experimental Study Of Motion/Intrusion Detection Using Rf Irregularity, Wei Qi Lee, Winston K. G. Seah, Hwee-Pink Tan, Zexi Yao
Research Collection School Of Computing and Information Systems
Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform …
Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen
Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen
Electrical & Computer Engineering Theses & Dissertations
A wavelet neural network (WNN) technique rs developed for electroencephalogram (EEG) artifact removal without electrooculographic (EOG) recordings. The algorithm combines the universal approximation characteristics of neural networks and the time/frequency property of wavelet, where the neural network was trained on a simulated dataset with known ground truths. The contribution of this thesis is two-fold. First, many EEG artifact removal algorithms, including regression based methods, require reference EOG signals, which are not always available. To remove EEG ai1ifacts, a WNN tries to learn the characteristics of the artifacts first and does not need reference EOG signals once trained. Second, WNNs are …
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard
Theses and Dissertations
As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …
Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey
Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey
Theses and Dissertations
This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Faculty Publications
Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. In this work we describe a framework to assist non-expert users by providing personalized query recommendations. The querying behavior of the …
Personal Vs. Social, Magdalini Eirinaki
Personal Vs. Social, Magdalini Eirinaki
Faculty Publications
The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Dissertations
The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.
Although, the adoption …
Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili
Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
The iPhone mobile is used worldwide due to its enhanced computing capabilities, increased storage capacity as well as its attractive touch interface. These characteristics made the iPhone a popular smart phone device. The increased use of the iPhone lead it to become a potential source of digital evidence in criminal investigations. Therefore, iPhone forensics turned into an essential practice for forensic and security practitioners today. This research aimed at investigating and examining the logical backup acquisition of the iPhone 3GS mobile device using the Apple iTunes backup utility. It was found that significant data of forensic value such as e-mail …
Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy
Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy
USF Tampa Graduate Theses and Dissertations
Power gating is a technique commonly used for runtime leakage reduction in digital CMOS circuits. In microprocessors, power gating can be implemented by using sleep transistors to selectively deactivate circuit modules when they are idle during program execution. In this dissertation, a framework for power gating arithmetic functional units in embedded microprocessors with architecture and compiler support is proposed. During compile time, program regions are identified where one or more functional units are idle and sleep instructions are inserted into the code so that those units can be put to sleep during program execution. Subsequently, when their need is detected …
Performance Measures In Acousto-Optic Chaotic Signal Encryption System Subject To Parametric Variations And Additive Noise, Monish Ranjan Chatterjee, Anjan K. Ghosh, Mohammed A. Al-Saedi
Performance Measures In Acousto-Optic Chaotic Signal Encryption System Subject To Parametric Variations And Additive Noise, Monish Ranjan Chatterjee, Anjan K. Ghosh, Mohammed A. Al-Saedi
Electrical and Computer Engineering Faculty Publications
Signal encryption and recovery using chaotic optical waves has been a subject of active research in the past 10 years. Since an acousto-optic Bragg cell with zeroth- and first-order feedback exhibits chaotic behavior past the threshold for bistability, such a system was recently examined for possible chaotic encryption using a low-amplitude sinusoidal signal applied via the bias input of the sound cell driver.
Subsequent recovery of the message signal was carried out via a heterodyne strategy employing a locally generated chaotic carrier, with threshold parameters matched to the transmitting Bragg cell. The simulation results, though encouraging, were limited to relatively …
Investigating Perceptions Of A Location-Based Annotation System, Huynh Nhu Hop Quach, Khasfariyati Razikin, Dion Hoe-Lian Goh, Thi Nhu Quynh Kim, Tan Phat Pham, Yin-Leng Theng, Ee-Peng Lim
Investigating Perceptions Of A Location-Based Annotation System, Huynh Nhu Hop Quach, Khasfariyati Razikin, Dion Hoe-Lian Goh, Thi Nhu Quynh Kim, Tan Phat Pham, Yin-Leng Theng, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
We introduce MobiTOP, a Web-based system for organizing and retrieving hierarchical location-based annotations. Each annotation contains multimedia content (such as text, images, video) associated with a location, and users are able to annotate existing annotations to an arbitrary depth, in effect creating a hierarchy. An evaluation was conducted on a group of potential users to ascertain their perceptions of the usability of the application. The results were generally positive and the majority of the participants saw MobiTOP as a useful platform to share location-based information. We conclude with implications of our work and opportunities for future research.
On The Annotation Of Web Videos By Efficient Near-Duplicate Search, Wan-Lei Zhao, Xiao Wu, Chong-Wah Ngo
On The Annotation Of Web Videos By Efficient Near-Duplicate Search, Wan-Lei Zhao, Xiao Wu, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
With the proliferation of Web 2.0 applications, usersupplied social tags are commonly available in social media as a means to bridge the semantic gap. On the other hand, the explosive expansion of social web makes an overwhelming number of web videos available, among which there exists a large number of near-duplicate videos. In this paper, we investigate techniques which allow effective annotation of web videos from a data-driven perspective. A novel classifier-free video annotation framework is proposed by first retrieving visual duplicates and then suggesting representative tags. The significance of this paper lies in the addressing of two timely issues …
Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz
Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
The exploration of online social networks whose members share mutual recommendations and interactions is a time-dependent and contextual-based process which aims to predict the social status among members, ultimately improving the network's discoverability to achieve societal gain. To address the difficulties associated with the process, this article presents an integrated recommender model whose statements are time-dependent, interaction-aware, and social context-sensitive. The originality of the proposed model stems from the integration of the predictive recommender, social networks, and interaction components. Each model is developed based on: (1) a time history and decay algorithm to consider the decreasing intensity of recommendations among …
An Empirical Study On The Procedure To Derive Software Quality Estimation Models, Jie Xu, Danny Ho, Luiz Fernando Capretz
An Empirical Study On The Procedure To Derive Software Quality Estimation Models, Jie Xu, Danny Ho, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Software quality assurance has been a heated topic for several decades. If factors that influence software quality can be identified, they may provide more insight for better software development management. More precise quality assurance can be achieved by employing resources according to accurate quality estimation at the early stages of a project. In this paper, a general procedure is proposed to derive software quality estimation models and various techniques are presented to accomplish the tasks in respective steps. Several statistical techniques together with machine learning method are utilized to verify the effectiveness of software metrics. Moreover, a neuro-fuzzy approach is …
Simsight: A Virtual Machine Based Dynamic Call Graph Generator, Xueling Chen
Simsight: A Virtual Machine Based Dynamic Call Graph Generator, Xueling Chen
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
One problem with using component-based software development approach is that once software modules are reused over generations of products, they form legacy structures that can be challenging to understand, making validating these systems difficult. Therefore, tools and methodologies that enable engineers to see interactions of these software modules will enhance their ability to make these software systems more dependable. To address this need, we propose SimSight, a framework to capture dynamic call graphs in Simics, a widely adopted commercial full-system simulator. Simics is a software system that simulates complete computer systems. Thus, it performs nearly identical tasks to …
Jvm-Based Techniques For Improving Java Observability, Peng Du
Jvm-Based Techniques For Improving Java Observability, Peng Du
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Observability measures the support of computer systems to accurately capture, analyze, and present (collectively observe) the internal information about the systems. Observability frameworks play important roles for program understanding, troubleshooting, performance diagnosis, and optimizations. However, traditional solutions are either expensive or coarse-grained, consequently compromising their utility in accommodating today’s increasingly complex software systems. New solutions are emerging for VM-based languages due to the full control language VMs have over program executions. Existing such solutions, nonetheless, still lack flexibility, have high overhead, or provide limited context information for developing powerful dynamic analyses. In this thesis, we present a VM-based infrastructure, called …
Managing Large Data Sets Using Support Vector Machines, Ranjini Srinivas
Managing Large Data Sets Using Support Vector Machines, Ranjini Srinivas
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Hundreds of Terabytes of CMS (Compact Muon Solenoid) data are being accumulated for storage day by day at the University of Nebraska-Lincoln, which is one of the eight US CMS Tier-2 sites. Managing this data includes retaining useful CMS data sets and clearing storage space for newly arriving data by deleting less useful data sets. This is an important task that is currently being done manually and it requires a large amount of time. The overall objective of this study was to develop a methodology to help identify the data sets to be deleted when there is a requirement for …
A Framework For Automatically Repairing Gui Test Suites, Si Huang
A Framework For Automatically Repairing Gui Test Suites, Si Huang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Testing is an effective means for assuring the quality of software. In programs with Graphical User Interfaces (GUIs), event sequences serve as test cases for executing system tests. To aid in the test generation process, researchers have developed methods that automatically derive graph models from GUIs, which can then be traversed to create sequences for testing. Recent advances using these graph models incorporate combinatorial interaction testing sampling techniques to generate longer GUI test cases, which exercise more event interactions and have been shown to improve fault detection. However, because the models extracted are only approximations of the actual event interactions, …
Consideration Of Dispersion And Group Velocity Dispersion In The Determination Of Velocities Of Electromagnetic Propagation, Monish Ranjan Chatterjee, Partha P. Banerjee
Consideration Of Dispersion And Group Velocity Dispersion In The Determination Of Velocities Of Electromagnetic Propagation, Monish Ranjan Chatterjee, Partha P. Banerjee
Electrical and Computer Engineering Faculty Publications
Electromagnetic (EM) propagation velocities play an important role in the determination of power and energy flow in materials and interfaces. It is well known that group and phase velocities need to be in opposition in order to achieve negative refractive index.
Recently, we have shown that considerable differences may exist in phase, group and signal/energy velocities for normal and anomalous dispersion, especially near dielectric resonances. This paper examines the phase and group velocities in the presence of normal and anomalous dispersion, and group velocity dispersion (GVD), which requires introduction of the second order coefficient in the permittivity and permeability models.
Asynchronous Mips Processors: Educational Simulations, Robert L. Webb
Asynchronous Mips Processors: Educational Simulations, Robert L. Webb
Master's Theses
The system clock has been omnipresent in most mainstream chip designs. While simplifying many design problems the clock has caused the problems of clock skew, high power consumption, electromagnetic interference, and worst-case performance. In recent years, as the timing constraints of synchronous designs have been squeezed ever tighter, the efficiencies of asynchronous designs have become more attractive. By removing the clock, these issues can be mitigated. How- ever, asynchronous designs are generally more complex and difficult to debug. In this paper I discuss the advantages of asynchronous processors and the specifics of some asynchronous designs, outline the roadblocks to asynchronous …
Cs 205: Introduction To Computers And Office Productivity Software, Terri Bauer
Cs 205: Introduction To Computers And Office Productivity Software, Terri Bauer
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including intermediate word processing, spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 480/680: Comparative Programming Languages, Michael L. Raymer
Cs 480/680: Comparative Programming Languages, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Cs 240: Computer Programming I, Travis E. Doom
Cs 240: Computer Programming I, Travis E. Doom
Computer Science & Engineering Syllabi
Basic concepts of programming and programming languages are introduced. Emphasis is on structured programming and stepwise refinement. Prerequisite: MTH 130 or MPL 5.
Cs 142: Computer Programming Ii, Vanessa Starkey
Cs 142: Computer Programming Ii, Vanessa Starkey
Computer Science & Engineering Syllabi
Concepts introduced in CS 141 are developed in greater detail and depth.
Emphasis on verification and testing of programs. Three hours of lecture, two hours lab.
Ceg 210-01: Pc Networking I, Karen Meyer
Ceg 210-01: Pc Networking I, Karen Meyer
Computer Science & Engineering Syllabi
Introduction to networking technologies including infrastructure and architectures, standards, protocols and directory services, administrations, security and management. Integrated lecture and lab.
Ceg 220-01: Introduction To C Programming For Engineers - I, Ronald F. Taylor
Ceg 220-01: Introduction To C Programming For Engineers - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. Some programming assignments may involve complex arithmetic and trigonometric and exponential functions. 4 credit hours. The course includes a scheduled laboratory section for which you must register.
Ceg 433/633-01: Operating Systems, Bin Wang
Ceg 433/633-01: Operating Systems, Bin Wang
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 730-01: Distributed Computing Principles, Yong Pei
Ceg 730-01: Distributed Computing Principles, Yong Pei
Computer Science & Engineering Syllabi
No abstract provided.
Cs 415: Social Implications Of Computing, Leo Finkelstein
Cs 415: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.