Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (356)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (59)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 9991 - 10020 of 12812
Full-Text Articles in Physical Sciences and Mathematics
Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson
Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson
Annual ADFSL Conference on Digital Forensics, Security and Law
There are a number of factors that impact a digital forensics investigation. These factors include: the digital media in question, implemented processes and methodologies, the legal aspects, and the individuals involved in the investigation. This paper presents the initial idea that Digital Forensic Practice (DFP) recommendations can potentially improve how organizations handle digital evidence. The recommendations are derived from an in-depth survey conducted with practitioners in both commercial organizations and law enforcement along with supporting literature. The recommendations presented in this paper can be used to assess an organization’s existing digital forensics practices and a guide to Digital Forensics Improvement …
A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry
A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry
Annual ADFSL Conference on Digital Forensics, Security and Law
The physical interview process in crime investigation produces an extremely large amount of data, particularly in big cases. In comparison, examiners of digital evidence have enormous amounts of data to search through whilst looking for data relating to the investigation. However, the links between their results are limited. Whilst investigators need to refute or support their hypothesis throughout, digital evidence examiners often use search based keywords. These keywords are usually created from evidence taken from the physical investigation reports and this basic method has been found to have many shortcomings and limitations. This paper proposes a highly automatic framework to …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Annual ADFSL Conference on Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University
Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Developing A Baccalaureate Digital Forensics Major, John H. Riley
Developing A Baccalaureate Digital Forensics Major, John H. Riley
Annual ADFSL Conference on Digital Forensics, Security and Law
As colleges and universities consider instituting a bachelor’s degree in digital forensics or computer forensics, there are numerous questions to be addressed. While some of these normally occur in the development of any new major, there are aspects of digital forensics which do not often (if ever) occur in other majors. We discuss the issues that should be resolved in the development of a baccalaureate degree program in digital forensics.
Keywords: Digital forensics major. Computer forensics major.
Open Innovation In Platform Competition, Mei Lin
Open Innovation In Platform Competition, Mei Lin
Research Collection School Of Computing and Information Systems
We examine the competition between a proprietary platform and an open platform,where each platform holds a two-sided market consisted of app developers and users.The open platform cultivates an innovative environment by inviting public efforts todevelop the platform itself and permitting distribution of apps outside of its own appmarket; the proprietary platform restricts apps sales solely within its app market. Weuse a game theoretic model to capture this competitive phenomenon and analyze theimpact of growth of the open source community on the platform competition. We foundthat growth of the open community mitigates the platform rivalry, and balances the developernetwork sizes on …
Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal
Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …
Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger
Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger
Master's Theses
As the Internet continues to expand, the global default-free zone (DFZ) forwarding table has begun to grow faster than hardware can economically keep pace with. Various policies are in place to mitigate this growth rate, but current projections indicate policy alone is inadequate. As such, a number of technical solutions have been proposed. This work builds on many of these proposed solutions, and furthers the debate surrounding the resolution to this problem. It discusses several design decisions necessary to any proposed solution, and based on these tradeoffs it proposes a Hierarchical Inter-Domain Routing Architecture - HIDRA, a comprehensive architecture with …
Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng
Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng
CSE Technical Reports
Explosive growth in volume and complexity of data exacerbates the key challenge to effectively and efficiently manage data in a way that fundamentally improves the ease and efficacy of their use. Existing large-scale file systems rely on hierarchically structured namespace that leads to severe performance bottlenecks and renders it impossible to support real-time queries on multi-dimensional attributes. This paper proposes a novel semantic-sensitive scheme, called Rapport, to provide dynamic and adaptive namespace management and support complex queries. The basic idea is to build files’ namespace by utilizing their semantic correlation and exploiting dynamic evolution of attributes to support namespace management. …
Channel Characterization For Wireless Underground Sensor Networks, Agnelo R. Silva
Channel Characterization For Wireless Underground Sensor Networks, Agnelo R. Silva
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Wireless Underground Sensor Networks (WUSNs) are natural extensions of the established Wireless Sensor Network (WSN) phenomenon and consist of sensors buried underground which communicate through soil. WUSNs have the potential to impact a wide variety of applications including precision agriculture, environmental monitoring, border patrol, and infrastructure monitoring. The main difference between WUSNs and traditional wireless networks is the communication medium. However, a comprehensive wireless underground channel model for WUSNs has not been developed so far. In this thesis, the Soil Subsurface Wireless Communication (SSWC) channel model is developed based on an extensive empirical study in a large agriculture field. The …
Pretty Lights, Nicholas (Nick) Delmas, Matthew (Matt) Maniaci
Pretty Lights, Nicholas (Nick) Delmas, Matthew (Matt) Maniaci
Computer Engineering
Digital media players often include a visualization component that allows a user to watch a visualization synchronized to their music or videos. This project uses the visualization plugin API of an existing media playback program (WinAmp) but it displays its visuals using physical LED lights. Instead of outputting visuals to the computer screen, data is sent over USB to a micro controller that runs the LED lights. This project aims to give users a more visceral visual experience than traditional visualizations on the computer screen.
Ceg 730-01: Distributed Computing Principles, Soon M. Chung
Ceg 730-01: Distributed Computing Principles, Soon M. Chung
Computer Science & Engineering Syllabi
No abstract provided.
Cs 415: Social Implications Of Computing, Leo Finkelstein
Cs 415: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading material in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 142: Computer Programming - Ii, Michael Ondrasek
Cs 142: Computer Programming - Ii, Michael Ondrasek
Computer Science & Engineering Syllabi
The concepts introduced in CS 141 are developed in greater detail and depth with the Java programming language. Topics include object oriented programming, graphics, development, of user interfaces and handling runtime errors with an emphasis on program verification and testing. Students must register for both lecture and one laboratory section. 4 credit hours. Prerequisite: CS 141 (Computer Programming I) and MTH 127 (College Algebra) or equivalent.
Cs 207: Advanced Office Productivity Ii, Amanda Hood
Cs 207: Advanced Office Productivity Ii, Amanda Hood
Computer Science & Engineering Syllabi
This course covers post-advanced microcomputer applications including Microsoft Office Word 2007, Excel 2007, Access 2007, and PowerPoint 2007. Topics include: creating an online form, working with macros and Visual Basic for Applications (VBA), working with a master document, and index and a table of contents, linking an Excel, creating a PivotTable List, advanced Access report and form techniques, and creating a multipage form, administering a database system, creating a self-running presentation containing shapes, templates, and clips.
Cs 206: Computer Software Productivity Tools, John P. Herzog
Cs 206: Computer Software Productivity Tools, John P. Herzog
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including advanced topics in spreadsheets, database and presentation graphics, using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of advanced computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 241-01: Computer Programming Ii, Travis E. Doom
Cs 241-01: Computer Programming Ii, Travis E. Doom
Computer Science & Engineering Syllabi
A continuation of CS240. The emphasis is on data abstraction and software engineering. Prerequisite: CS240.
Cs 208-01: Computer Programming For Business I, David M. Hutchison
Cs 208-01: Computer Programming For Business I, David M. Hutchison
Computer Science & Engineering Syllabi
CS 208 is the first in a sequence of two programming classes required for MIS majors. This course will introduce students to the basic concepts of programming. Examples are from business applications and display graphics and emphasis is on problem solving with the computer as a tool.
Cs 242: Computer Programming Iii, Thomas Wischgoll
Cs 242: Computer Programming Iii, Thomas Wischgoll
Computer Science & Engineering Syllabi
No abstract provided.
Cs 340: Programming Language Workshop In Python, Krishnaprasad Thirunarayan
Cs 340: Programming Language Workshop In Python, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course is designed as a self-study in Python. You are expected to learn the language and solve a set of programming problems assigned to you from Budd's text using Python available from http://www.python.org. There are no exams. We officially meet only once in the quarter. However, I will be available in the posted office hours for clarifications and discussions about the programming problems.
Cs 271/Bio 371: Introduction To Bioinformatics, Michael L. Raymer, Dan E. Krane
Cs 271/Bio 371: Introduction To Bioinformatics, Michael L. Raymer, Dan E. Krane
Computer Science & Engineering Syllabi
The course web page will be the primary method for distributing important announcements, course material, class notes, etc. Please check the page often. Login to the campus WebCT system using your cats username and password. The URL is: http://wisdom.wright.edu
Cs 400/600: Data Structures And Software Design, Guozhu Dong
Cs 400/600: Data Structures And Software Design, Guozhu Dong
Computer Science & Engineering Syllabi
No abstract provided.
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Computer Science & Engineering Syllabi
CS 466/666 is an introduction to formal language and automata theory. In this course we will examine methods for defining syntax of languages and recognizing patterns: the syntax of languages can be defined using grammars and patterns accepted by finite state machines. Along with presenting the fundamentals of these tow topics, the course will develop and investigate the relationships between language definition and pattern recognition. The text will be the third edition of languages and Machines: An Introduction to the Theory of Computer Sciences, by Thomas Sudkamp.
Cs 712: Advanced Topics In Artificial Intelligence: Inference Graphical Models, Shaojun Wang
Cs 712: Advanced Topics In Artificial Intelligence: Inference Graphical Models, Shaojun Wang
Computer Science & Engineering Syllabi
This course will cover the fundamentals of graphical probability models, focusing on the key representations, algorithms and theories that have facilitated much recent progress in artificial intelligence research.
Cs 784: Programming Languages, Prabhaker Mateti
Cs 784: Programming Languages, Prabhaker Mateti
Computer Science & Engineering Syllabi
Programming paradigms and concepts for high level programming languages. Techniques for formal specification. 4.000 Credit hours. Prerequisites: CS 480/680.
Cs 405/605: Introduction To Database Management Systems, Keke Chen
Cs 405/605: Introduction To Database Management Systems, Keke Chen
Computer Science & Engineering Syllabi
No abstract provided.
Cs 801: Advanced Database Systems, Soon M. Chung
Cs 801: Advanced Database Systems, Soon M. Chung
Computer Science & Engineering Syllabi
Introduction of current trends and research issues in database systems.
Cs 772: Advanced Natural Language Processing Concepts, Shaojun Wang
Cs 772: Advanced Natural Language Processing Concepts, Shaojun Wang
Computer Science & Engineering Syllabi
No abstract provided.
Cs 499/699: Logic For Computer Scientists, Pascal Hitzler
Cs 499/699: Logic For Computer Scientists, Pascal Hitzler
Computer Science & Engineering Syllabi
Logic is often called the Calculus of Computer Science. Indeed, logic permeates most areas of Computer Science in one way or the other, sometimes more prominently, and sometimes as motivational or formal underpinning. Examples are database schema, program verification, semantics of programming languages, computer security, artificial intelligence, cognitive robotics, Web information systems, computer hardware circuitry, or modeling in software engineering.