Bitrdf: Extending Rdf For Bitemporal Data, 2022 The Graduate Center, City University of New York
Bitrdf: Extending Rdf For Bitemporal Data, Di Wu
Dissertations, Theses, and Capstone Projects
The Internet is not only a platform for communication, transactions, and cloud storage, but it is also a large knowledge store where people as well as machines can create, manipulate, infer, and make use of data and knowledge. The Semantic Web was developed for this purpose. It aims to help machines understand the meaning of data and knowledge so that machines can use the data and knowledge in decision making. The Resource Description Framework (RDF) forms the foundation of the Semantic Web which is organized as the Semantic Web Layer Cake. RDF is limited and can only express a binary …
Artificial Justice: The Quandary Of Ai In The Courtroom, 2022 Duke Law
Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt
Judicature International
No abstract provided.
Towards Public Vaccination Data Resilience During Natural Disaster Using Blockchain-Based Decentralized Application, 2022 University of Indonesia
Towards Public Vaccination Data Resilience During Natural Disaster Using Blockchain-Based Decentralized Application, Riri Fitri Sari, Mokhammad Rizqi Herdiawan, Muhammad Hamzah, Muhammad Aljundi, Jauzak Hussaini Windiatmaja
Smart City
This paper presents a platform development plan for a public vaccination decentralized data base based on Blockchain technology. Vaccination is a medical practice that allows a human body to produce a specific antibody as a means of developing a preventive measure and reducing the risk of contracting a particular disease. Systematic vaccination data recording is an utmost important system that is required particularly during the Covid-19 pandemic. The recording mechanism should utilize the state-of-the-art information and communication technology (ICT). For faster vaccination data recording, it is common to use digital technology, making the health care process faster thus decreasing time …
Credit Card Fraud Detection Using Machine Learning Techniques, 2022 BIS Helwan University
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, 2022 Northwestern University
Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, Neel Shah
Swarthmore Undergraduate History Journal
This paper writes a social history of the programming language COBOL that focuses on its reception in academia. Through this focus, the paper seeks to understand the contentious relationship between data processing and the academy. In historicizing COBOL, the paper also illuminates the changing nature of the academy-industry-military triangle that was a mainstay of early computing.
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, 2022 Old Dominion University
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley
Engineering Management & Systems Engineering Faculty Publications
Systems engineering as a discipline has long had difficulty providing quantifiable evidence of its value (Honour 2004); DE transformation provides an opportunity to better measure its value. Transitioning from a document-based to a model-based approach is expensive, and organizations want to know if the effort and cost to adopt MBSE is worth it.
Finding Top-M Leading Records In Temporal Data, 2022 Singapore Management University
Finding Top-M Leading Records In Temporal Data, Yiyi Wang
Dissertations and Theses Collection (Open Access)
A traditional top-k query retrieves the records that stand out at a certain point in time. On the other hand, a durable top-k query considers how long the records retain their supremacy, i.e., it reports those records that are consistently among the top-k in a given time interval. In this thesis, we introduce a new query to the family of durable top-k formulations. It finds the top-m leading records, i.e., those that rank among the top-k for the longest duration within the query interval. Practically, this query assesses the records based on how long …
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, 2022 Internet Safety Labs
Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur
Publications and Research
What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.
Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …
Total Sky Imager Project, 2022 California Polytechnic State University, San Luis Obispo
Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. Mcgrath
Mechanical Engineering
Solar farms like the Gold Tree Solar Farm at Cal Poly San Luis Obispo have difficulty delivering a consistent level of power output. Cloudy days can trigger a significant drop in the utility of a farm’s solar panels, and an unexpected loss of power from the farm could potentially unbalance the electrical grid. Being able to predict these power output drops in advance could provide valuable time to prepare a grid and keep it stable. Furthermore, with modern data analysis methods such as machine learning, these predictions are becoming more and more accurate – given a sufficient data set. The …
Who Is Missing? Characterizing The Participation Of Different Demographic Groups In A Korean Nationwide Daily Conversation Corpus, 2022 Singapore Management University
Who Is Missing? Characterizing The Participation Of Different Demographic Groups In A Korean Nationwide Daily Conversation Corpus, Haewoon Kwak, Jisun An, Kunwoo Park
Research Collection School Of Computing and Information Systems
A conversation corpus is essential to build interactive AI applications. However, the demographic information of the participants in such corpora is largely underexplored mainly due to the lack of individual data in many corpora. In this work, we analyze a Korean nationwide daily conversation corpus constructed by the National Institute of Korean Language (NIKL) to characterize the participation of different demographic (age and sex) groups in the corpus.
Blockchain Storage – Drive Configurations And Performance Analysis, 2022 Harrisburg University of Science and Technology
Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones
Other Student Works
This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.
Data Management In Web Applications To Balance Performance And Security, 2022 University of Nebraska - Lincoln
Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux
Honors Theses
As web applications become increasingly popular, many are running several calculations and data processing on the client machine, it is important to consider data management practices on the front-end of these web applications. Typically, some data from the server is stored in the client's memory or hard disk. How much data should be stored for how long, as well as many other considerations, influence the time and space performance of the web application, as well as its security. In this thesis, we explore several challenges, solutions, and design patterns in web application data management through the lens of a senior …
Analysis Of Gpu Memory Vulnerabilities, 2022 University of Arkansas, Fayetteville
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, 2022 University of Arkansas, Fayetteville
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar
Information Systems Undergraduate Honors Theses
Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …
Benchmarking Library Recognition In Tweets, 2022 Singapore Management University
Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Software developers often use social media (such as Twitter) to shareprogramming knowledge such as new tools, sample code snippets,and tips on programming. One of the topics they talk about is thesoftware library. The tweets may contain useful information abouta library. A good understanding of this information, e.g., on thedeveloper’s views regarding a library can be beneficial to weigh thepros and cons of using the library as well as the general sentimentstowards the library. However, it is not trivial to recognize whethera word actually refers to a library or other meanings. For example,a tweet mentioning the word “pandas" may refer to …
Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, 2022 University of Arkansas, Fayetteville
Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns
Graduate Theses and Dissertations
Critical infrastructure systems have recently become more vulnerable to attacks on their data systems through internet connectivity. If an attacker is successful in breaching a system’s defenses, it is imperative that operations are restored to the system as quickly as possible. This thesis focuses on damage assessment and recovery following an attack. A literature review is first conducted on work done in both database protection and critical infrastructure protection, then the thesis defines how damage affects the relationships between data and software. Then, the thesis proposes a model using a graph construction to show the cascading affects within a system …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., 2022 University of Arkansas, Fayetteville
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, 2022 Singapore Management University
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv
Research Collection School Of Computing and Information Systems
Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also providing defense against different types of attacks, such as duplicate faking attack and brute-force attack. A typical MLE scheme only focuses on deduplication. On the other hand, supporting search operations on stored content is another essential requirement for cloud storage. In this article, we present a message-locked searchable encryption (MLSE) scheme in a dual-server setting, which achieves simultaneously the desirable features of supporting …
Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, 2022 Southern Adventist University
Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn
Campus Research Day
One of the primary challenges instructors face when educating scientists and engineers is the introduction of important theory, both to show its essential nature in research as well as its practicality. This paper analyzes two pedagogical methods for the instruction of database normal forms. The first of these methods is a theory-based approach that relies on written works and practices to introduce the concept. The second of these focuses on a project-based approach which aligns with normal form standards as students implement a database schema. This paper compares these in a small study and advises an appropriate method for educators.
Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, 2022 Kennesaw State University
Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore
Symposium of Student Scholars
Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …