Mobile Devices: The Case For Cyber Security Hardened Systems, 2016 University of Missouri - St Louis
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls ...
Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, 2015 Western Michigan University
Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed
Parallel Computing and Data Science Lab Technical Reports
Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage, transfer, analysis and visualization. Integrating these big data sets (NGS+MS) for proteogenomics studies compounds all of the associated computational problems. Existing sequential algorithms for these proteogenomics datasets analysis are inadequate for big data and high performance computing (HPC) solutions are almost non-existent. The purpose of ...
Professor Frank Breitinger's Full Bibliography, 2015 University of New Haven
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
No abstract provided.
Semantic Models As Knowledge Repositories For Data Modellers In The Financial Industry, 2015 Dublin Institute of Technology
Semantic Models As Knowledge Repositories For Data Modellers In The Financial Industry, Gary Thompson
Data modellers working in the financial industry are expected to use both technical and business knowledge to transform data into the information required to meet regulatory reporting requirements. This dissertation explores the role that semantic models such as ontologies and concept maps can play in the acquisition of financial and regulatory concepts by data modellers. While there is widespread use of semantic models in the financial industry to specify how information is exchanged between IT systems, there is limited use of these models as knowledge repositories. The objective of this research is to evaluate the use of a semantic model ...
A Novel And Domain-Specific Document Clustering And Topic Aggregation Toolset For A News Organisation, 2015 Dublin Institute of Technology
A Novel And Domain-Specific Document Clustering And Topic Aggregation Toolset For A News Organisation, Claire Mcmahon
Large collections of documents are becoming increasingly common in the news gathering industry. A review of the literature shows there is a growing interest in datadriven journalism and specifically that the journalism profession needs better tools to understand and develop actionable knowledge from large document sets. On a daily basis, journalists are tasked with searching a diverse range of document sets including news gathering services, emails, freedom of information requests, court records, government reports, press releases and many other types of generally unstructured documents. Document clustering techniques can help address problems of understanding the ever expanding quantities of documents available ...
Evaluating The Usability Of The Laboratory Information System (Lis) In Coombe Hospital And Hail Hospital, 2015 Dublin Institute of Technology
Evaluating The Usability Of The Laboratory Information System (Lis) In Coombe Hospital And Hail Hospital, Fahad Alanazi
Today, with the rapid evolution of technology, there has also been a rapid development of medical software and systems in hospitals. These systems and software are now being used globally in many hospitals by users of different languages and cultures. Governments and private hospitals pay large sums of money to utilise highly efficient technology. When systems are changed or updated, employees often find it difficult to deal with the characteristics of the new systems. Also, behavioral factors, such as the fear of committing simple errors, might affect system performance and prevent the full utilization of the staff potential. In this ...
An Exploration Of The Use Of Gamification In Agile Software Development, 2015 Dublin Institute of Technology
An Exploration Of The Use Of Gamification In Agile Software Development, Alan Mcclean
Although Project Management has existed for many millennia, software project management is relatively new. As a discipline, software project management is considered difficult. The reasons for this include that software development is non-deterministic; opaque and delivered under ever-increasing time pressure in a volatile environment. Evolving from Incremental and Iterative Development (IID), Agile methodologies have attempted to address these issues by focusing on frequent delivery; working closely with the customer; being responsive to change and preferring working software to extensive documentation. This focus on delivery rather than documentation has sometimes been misrepresented as no documentation, which has led to a shortfall ...
Maximizing Network Lifetime Of Wireless Sensor-Actuator Networks Under Graph Routing, 2015 Washington University in St Louis
Maximizing Network Lifetime Of Wireless Sensor-Actuator Networks Under Graph Routing, Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah, Mo Sha, Paras Tiwari, Chenyang Lu, Yixin Chen
All Computer Science and Engineering Research
Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. The dynamics of industrial environments and stringent reliability requirements necessitate high degrees of fault tolerance in routing. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. WirelessHART employs graph routing schemes to achieve network reliability through multiple paths. Since many industrial devices operate on batteries in harsh environments where changing batteries are prohibitively labor-intensive, WSANs need to achieve long network lifetime. To meet industrial demand for long-term reliable communication, this paper studies the problem of maximizing network lifetime for WSANs under graph routing. We ...
Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, 2015 Washington University in St Louis
Conflict-Aware Real-Time Routing For Industrial Wireless Sensor-Actuator Networks, Chengjie Wu, Dolvara Gunatilaka, Mo Sha, Chenyang Lu
All Computer Science and Engineering Research
Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. Real-time scheduling and delay analysis have been studied for WSAN extensively. End-to-end delay in WSANs highly depends on routing, which is still open problem. This paper presents the first real-time routing design for WSAN. We first discuss end-to-end delays of WSANs, then present our real-time routing design. We have implemented and experimented our routing designs on a wireless testbed of 69 nodes. Both experimental results and simulations show that our routing design can improve the ...
Network Analysis Of The Sardex Community Currency, 2015 Deparment of Electrical Engineering, and YINS, Yale University
Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis
Yale Day of Data
We present a transaction dataset and preliminary analysis results about Sardex, a complementary currency (CC) in Sardinia, Italy. Sardex is currently considered one of the most successful CCs in Europe, as it grows continuously in terms of transactions’ volume and membership, and has been already replicated in 8 other regions in Italy. We model Sardex as a transaction network and study its basic properties.
Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq
Passive Optical Networks (PON) technology brings an evolution in the industry of Telecommunication for the provisioning of High Speed Internet (HSI) and Triple Play bundled Services that includes Voice, Data, and Video Streaming throughout the world. In Pakistan most of the service providers are offering broadband services on traditional copper OSP (Outside Plant) network since 2000. Demand for the high speed internet and broadband is increasing rapidly, it is desired with great need to migrate from traditional copper based OSP network to PON – FTTx (Fiber To The x) infrastructure. Considering the geographical requirements in Pakistan a scalable fiber network is ...
Woodstocc: Extracting Latent Parallelism From A Dna Sequence Aligner On A Gpu, 2015 Washington University in St Louis
Woodstocc: Extracting Latent Parallelism From A Dna Sequence Aligner On A Gpu, Stephen V. Cole, Jacob R. Gardner, Jeremy D. Buhler
All Computer Science and Engineering Research
An exponential increase in the speed of DNA sequencing over the past decade has driven demand for fast, space-efficient algorithms to process the resultant data. The first step in processing is alignment of many short DNA sequences, or reads, against a large reference sequence. This work presents WOODSTOCC, an implementation of short-read alignment designed for Graphics Processing Unit (GPU) architectures. WOODSTOCC translates a novel CPU implementation of gapped short-read alignment, which has guaranteed optimal and complete results, to the GPU. Our implementation combines an irregular trie search with dynamic programming to expose regularly structured parallelism. We first describe this implementation ...
The Design And Implementation Of An Adaptive Chess Game, 2015 mehdi peiravi
The Design And Implementation Of An Adaptive Chess Game, Mehdi Peiravi
Electronic Theses, Projects, and Dissertations
In recent years, computer games have become a common form of entertainment. Fast advancement in computer technology and internet speed have helped entertainment software developers to create graphical games that keep a variety of players’ interest. The emergence of artificial intelligence systems has evolved computer gaming technology in new and profound ways. Artificial intelligence provides the illusion of intelligence in the behavior of NPCs (Non-Playable-Characters). NPCs are able to use the increased CPU, GPU, RAM, Storage and other bandwidth related capabilities, resulting in very difficult game play for the end user. In many cases, computer abilities must be toned down ...
Developing Java Programs On Android Mobile Phones Using Speech Recognition, 2015 California State University - San Bernardino
Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande
Electronic Theses, Projects, and Dissertations
Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program ...
An Intelligent Attitude Determination And Control System Concept For A Cubesat Class Spacecraft, Jeremy Straub
An attitude determination and control system (ADCS) is used to orient a spacecraft for a wide variety of purposes (e.g., to keep a camera facing Earth or orient the spacecraft for propulsion system use). The proposed intelligent ADCS has several key features: first, it can be used in multiple modes, spanning from passive stabilization of two axes and unconstrained spin on a third to three-axis full active stabilization. It also includes electromagnetic components to ‘dump’ spin from the reaction wheels. Second, the ADCS utilizes an incorporated autonomous control algorithm to characterize the effect of actuation of the system components ...
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, 2015 Enduring Conservation Outcomes
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Faculty Publications (Libraries)
Long-term monitoring and research projects are essential to understand ecological change and the effectiveness of management activities. An inherent characteristic of long-term projects is the need for consistent data collection over time, requiring rigorous attention to data management and quality assurance. Recent papers have provided broad recommendations for data management; however, practitioners need more detailed guidance and examples. We present general yet detailed guidance for the development of comprehensive, concise, and effective data management for monitoring projects. The guidance is presented as a graded approach, matching the scale of data management to the needs of the organization and the complexity ...
Elastic Highly Available Cloud Computing, 2015 The University of Western Ontario
Elastic Highly Available Cloud Computing, Hassan Hawilo
Electronic Thesis and Dissertation Repository
High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically ...
Software Metrics And Dashboard, 2015 Loyola University Chicago
Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward
Computer Science: Faculty Publications and Other Works
Software metrics are a critical tool which provide continuous insight to products and processes and help build reliable software in mission critical environments. Using software metrics we can perform calculations that help assess the effectiveness of the underlying software or process. The two types of metrics relevant to our work is complexity metrics and in-process metrics. Complexity metrics tend to focus on intrinsic code properties like code complexity. In-process metrics focus on a higher-level view of software quality, measuring information that can provide insight into the underlying software development process.
Our aim is to develop and evaluate a metrics dashboard ...
Integrity Coded Databases (Icdb) - An Evaluation Of Efficiency, Performance, And Practicality, 2015 Boise State University
Integrity Coded Databases (Icdb) - An Evaluation Of Efficiency, Performance, And Practicality, Jake Rodden, Jyh-Haw Yeh (Mentor), Elmer Duran, Dan Kondratyuk
Idaho Conference on Undergraduate Research
Recently, cloud database storage has become an inexpensive and convenient option to store information; however, this relatively new area of service can be vulnerable to security breaches. Storing data in a foreign location requires the owner to relinquish control of their information. This opens the possibility for internal, malicious attacks that can involve the manipulation, omission, or addition of data. Our research tests a potential solution for retaining data as it was intended to be stored (known as integrity) in these cloud-stored databases: by converting the original databases to Integrity-Coded Databases (ICDB). ICDBs utilize Integrity Codes: cryptographic codes created for ...
Implementation Of A Speech Recognition Algorithm To Facilitate Verbal Commands For Visual Analytics Law Enforcement Toolkit, Shubham S. Rastogi, David L. Wiszowaty, Hanye Xu, Abish Malik, David S. Ebert
The Summer Undergraduate Research Fellowship (SURF) Symposium
The VALET (Visual Analytics Law Enforcement Toolkit) system allows the user to visualize and predict crime hotspots and analyze crime data. Police officers have difficulty in using VALET in a mobile situation, since the system allows only conventional input interfaces (keyboard and mouse). This research focuses on introducing a new input interface to VALET in the form of speech recognition, which allows the user to interact with the software without losing functionality. First an Application Program Interface (API) that was compatible with the VALET system was found and initial code scripts to test its functionality were written. Next, the code ...