Algorithmic Data Compression, 2016 University of Alabama in Huntsville
Algorithmic Data Compression, Maliha Lubna
Research Horizons Day Posters
No abstract provided.
“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, 2016 Liberty University
“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams
Senior Honors Theses
Alan Turing asked if machines can think, but intelligence is more than logic and reason. I ask if a machine can feel pain or joy, have visions and dreams, or paint a masterpiece. The human brain sets the bar high, and despite our progress, artificial intelligence has a long way to go. Studying neurology from a software engineer’s perspective reveals numerous uncanny similarities between the functionality of the brain and that of a computer. If the brain is a biological computer, then it is the embodiment of artificial intelligence beyond anything we have yet achieved, and its architecture is advanced …
An Integrated Framework For Patent Analysis And Mining, 2016 Florida International University
An Integrated Framework For Patent Analysis And Mining, Longhui Zhang
FIU Electronic Theses and Dissertations
Patent documents are important intellectual resources of protecting interests of individuals, organizations and companies. These patent documents have great research values, beneficial to the industry, business, law, and policy-making communities. Patent mining aims at assisting patent analysts in investigating, processing, and analyzing patent documents, which has attracted increasing interest in academia and industry. However, despite recent advances in patent mining, several critical issues in current patent mining systems have not been well explored in previous studies.
These issues include: 1) the query retrieval problem that assists patent analysts finding all relevant patent documents for a given patent application; 2) the …
Dual-Server Public-Key Encryption With Keyword Search For Secure Cloud Storage, 2016 Singapore Management University
Dual-Server Public-Key Encryption With Keyword Search For Secure Cloud Storage, Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang
Research Collection School Of Computing and Information Systems
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective …
Storage Management Of Data-Intensive Computing Systems, 2016 Florida International University
Storage Management Of Data-Intensive Computing Systems, Yiqi Xu
FIU Electronic Theses and Dissertations
Computing systems are becoming increasingly data-intensive because of the explosion of data and the needs for processing the data, and storage management is critical to application performance in such data-intensive computing systems. However, existing resource management frameworks in these systems lack the support for storage management, which causes unpredictable performance degradations when applications are under I/O contention. Storage management of data-intensive systems is a challenging problem because I/O resources cannot be easily partitioned and distributed storage systems require scalable management. This dissertation presents the solutions to address these challenges for typical data-intensive systems including high-performance computing (HPC) systems and big-data …
Flash Caching For Cloud Computing Systems, 2016 Florida International University
Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo
FIU Electronic Theses and Dissertations
As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared VM storage systems becomes a serious issue. Client-side flash-based caching has the potential to improve the performance of cloud VM storage by employing flash storage available on the VM hosts to exploit the locality inherent in VM IOs. However, there are several challenges to the effective use of flash caching in cloud systems. First, cache configurations such as size, write policy, metadata persistency and RAID level have significant impacts on flash caching. Second, the typical capacity of flash devices is …
Joining The Table: Advancing Digital Discussions At Gvsu, 2016 Grand Valley State University
Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
The Development Of Project Grade-Up, 2016 Southern Adventist University
The Development Of Project Grade-Up, Dalin Glenn Williams
MS in Computer Science Theses
The university classroom has greatly evolved from a simple syllabus and in class discussion to the modern online documentation and virtual classrooms. These developments have changed the way students review their grades and balance their workloads. With the plethora of new technologies, students are often burdened with a full school schedule, work, and social events, with few tools to help them effectively understand their grades or manage their time. Current solutions addressing this issue do not present data in an organized way that allows the student to easily comprehend their past performance or up coming work load. Our solution builds …
Data Center Load Forecast Using Dependent Mixture Model, 2016 South Dakota State University
Data Center Load Forecast Using Dependent Mixture Model, Md Riaz Ahmed Khan
Electronic Theses and Dissertations
The dependency on cloud computing is increasing day by day. With the boom of data centers, the cost is also increasing, which forces industries to come up with techniques and methodologies to reduce the data center energy use. Load forecasting plays a vital role in both efficient scheduling and operating a data center as a virtual power plant. In this thesis work a stochastic method, based on dependent mixtures is developed to model the data center load and is used for day-ahead forecast. The method is validated using three data sets from National Renewable Energy Laboratory (NREL) and one other …
Optimizing Virtual Machine I/O Performance In Cloud Environments, 2016 Virginia Commonwealth University
Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu
Theses and Dissertations
Maintaining closeness between data sources and data consumers is crucial for workload I/O performance. In cloud environments, this kind of closeness can be violated by system administrative events and storage architecture barriers. VM migration events are frequent in cloud environments. VM migration changes VM runtime inter-connection or cache contexts, significantly degrading VM I/O performance. Virtualization is the backbone of cloud platforms. I/O virtualization adds additional hops to workload data access path, prolonging I/O latencies. I/O virtualization overheads cap the throughput of high-speed storage devices and imposes high CPU utilizations and energy consumptions to cloud infrastructures. To maintain the closeness between …
Table Of Contents, 2016 California State University, San Bernardino
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, 2016 University of Nebraska at Kearney
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Journal of International Technology and Information Management
This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, 2016 Texas Woman's University
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Journal of International Technology and Information Management
Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …
Online Trust Cues: Perceptions And Application, 2016 Emporia State University
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Journal of International Technology and Information Management
This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, 2016 Tilburg University
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Journal of International Technology and Information Management
This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, 2016 Global ECommerce Service, Inc
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
Journal of International Technology and Information Management
The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, 2016 California State University, East Bay
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Journal of International Technology and Information Management
To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, 2016 University of North Florida
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii
UNF Graduate Theses and Dissertations
Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …
The Efficient Recovery Of Deleted Data From Nand Flash Memory, 2016 University of Northern Iowa
The Efficient Recovery Of Deleted Data From Nand Flash Memory, Lisa Diercks
Honors Program Theses
NAND flash memory is used in flash drives, smart phones, and memory cards for digital cameras. While there are ways to recover data from deleted memory, there are no universal or efficient ways to recover data from NAND flash memory. When a user clicks “delete” on a file in this type of memory, the file is not necessarily deleted, but may just be hidden. This means these files are still on the chip, but are inaccessible through normal means. The ability to recover this lost data could help computer forensic examiners during investigations and corporations working to use secure deletion …
In-Field Fuel Use And Load States Of Agricultural Field Machinery, 2016 University of Nebraska-Lincoln
In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer
Biological Systems Engineering: Papers and Publications
The ability to define in-field tractor load states offers the potential to better specify and characterize fuel consumption rate for various field operations. For the same field operation, the tractor experiences diverse load demands and corresponding fuel use rates as it maneuvers through straight passes, turns, suspended operation for adjustments, repair and maintenance, and biomass or other material transfer operations. It is challenging to determine the actual fuel rate and load states of agricultural machinery using force prediction models, and hence, some form of in-field data acquisition capability is required. Controller Area Networks (CAN) available on the current model tractors …