Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, 2017 Xidian University
Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu
Research Collection School Of Information Systems
Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...
Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, 2017 Singapore Management University
Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, Venky Shankararaman, Swapna Gottipati, Jeff Rongsheng Lin
Research Collection School Of Information Systems
At theend of each course, students are required to give feedback on the course andinstructor. This feedback includes quantitative rating using Likert scale andqualitative feedback as comments. Such qualitative feedback can providevaluable insights in helping the instructor enhance the course content andteaching delivery. However, the main challenge in analysing the qualitativefeedback is the perceived increase in time and effort needed to manually processthe textual comments. In this paper, we provide an automated solution foranalysing comments, specifically extracting implicit suggestions from thestudents’ qualitative feedback comments. The implemented solution leveragesexisting text mining and data visualization techniques and comprises three stages namely datapre-processing ...
How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, 2017 Montana State University-Bozeman
How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby
2017 Academic High Altitude Conference
The Irdium Satelitte Network has greatly increased safety in the ballooning field by enabling a greater span of control in flight awarness and termination. This enhanced awareness stems from accurate high interval GPS coordinates that can be integrated into ground station tracking software. The Iridium Network creates the ability to send activation commands remotely with high reliabilty using emails. Additionally this feature has the ability to use local rf transmiters and recievers to increase the flexibilty of cutdown designs. The Iridium Modems provides significant coverage regardless of altitude and loss of ground communication. It is marketed at econmical price point ...
2017 Eclipse Rfd-900 Still Image System, 2017 Montana State University-Bozeman
2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr
2017 Academic High Altitude Conference
As part of the NASA Space Grant 2017 Eclipse Ballooning Project, Montana Space Grant Consortium designed a camera system capable of transmitting still images from a balloon borne payload to a remote ground station via a RFD-900 radio. This payload consists of a Raspberry Pi, a Raspberry Pi camera, custom power supply and a RFD 900MHz radio. This system was designed to record pictures at high and low resolution at altitude. The low resolution images could be selected for downlinking back to the ground via the radio, while the high resolution pictures were saved to the Raspberry Pi memory card ...
Selfie-Takers Prefer Left Cheeks: Converging Evidence From The (Extended) Selfiecity Database, 2017 CUNY Graduate Center
Selfie-Takers Prefer Left Cheeks: Converging Evidence From The (Extended) Selfiecity Database, Lev Manovich, Vera Ferrari, Nicola Bruno
Publications and Research
According to previous reports, selfie takers in widely different cultural contexts prefer poses showing the left cheek more than the right cheek. This posing bias may be interpreted as evidence for a right-hemispheric specialization for the expression of facial emotions. However, earlier studies analyzed selfie poses as categorized by human raters, which raises methodological issues in relation to the distinction between frontal and three-quarter poses. Here, we provide converging evidence by analyzing the (extended) selfiecity database which includes automatic assessments of head rotation and of emotional expression. We confirm a culture- and sex-independent left-cheek bias and report stronger expression of ...
Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, 2017 Dublin Institute of Technology
Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe
This paper provides an overview of historic and current organizational limitations emerging in the Architecture, Engineering, Construction, Building Owner / Operations (AECOO) Industry. It then provides an overview of new technologies that attempt to mitigate these limitations. However, these technologies, taken together, appear to be converging and creating entirely new organizational structures in the AEC industries. This may be characterized by the emergence of what is called the Network Effect and it’s related calculus. This paper culminates with an introduction to Blockchain Technology (BT) and it’s integration with the emergence of groundbreaking technologies such as Internet of Things (IoT ...
The Practicality Of Cloud Computing, 2017 Sacred Heart University
The Practicality Of Cloud Computing, Xiaohua (Cindy) Li
Since its inception, cloud computing has become the current paradigm. Organizations of different size and type have embraced the concept because of its both technological and economic advantages. Sacred Heart University Library has recently published its newly designed website on the cloud. For a small academic library, what does it mean to put their online data on the cloud? This paper will analyze and discuss the advantages of cloud computing, and some potential obstacles created by it through the author’s observations. This paper hopes the uniqueness of the case will contribute to the improvement of cloud computing experience of ...
Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, 2017 University of Arkansas, Fayetteville
Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, Adrian Ordorica
Theses and Dissertations
Operating system (OS) identification tools, sometimes called fingerprinting tools, are essential for the reconnaissance phase of penetration testing. While OS identification is traditionally performed by passive or active tools that use fingerprint databases, very little work has focused on using machine learning techniques. Moreover, significantly more work has focused on IPv4 than IPv6. We introduce a collaborative neural network ensemble that uses a unique voting system and a random forest ensemble to deliver accurate predictions. This approach uses IPv6 features as well as packet metadata features for OS identification. Our experiment shows that our approach is valid and we achieve ...
Special Section: Technological Innovations For Communication And Collaboration In Social Spaces, 2017 Singapore Management University
Special Section: Technological Innovations For Communication And Collaboration In Social Spaces, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman, Thomas A. Weber
Research Collection School Of Information Systems
Research on social communication and collaboration is of high importance today in Information Systems, especially for interdisciplinary inquiry that emphasizes topics related to strategy, information, technology, economics, and society. The articles that are showcased in this special section of the Journal of Management Information Systems address issues that arise in a number of important contemporary contexts.
Utilizing Researchgate Social Network By Iranian Engineering, 2017 Shahid Beheshti University
Utilizing Researchgate Social Network By Iranian Engineering, Amir Reza Asnafi, Maryam Rahmani Ma In Knowledge And Information Scienc
Library Philosophy and Practice (e-journal)
This study aimed to assess the role of Researchgate in the development of scientific- scholarly activities among Faculty Members of University of Tehran's Engineering College. This study is Survey and descriptive research and data collection tools, including profiles of researchers at the Researchgate and questionnaire. The study population included faculty members of University of Tehran's Engineering College in 2016 was 242 researcher were earned RG score. The sample 144 subjects who were selected via stratified random sampling method and the questionnaire distributed 144 questionnaires were collected and then Results were analyzed using SPSS software From the perspective of ...
Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), 2017 University of Missouri - St Louis
Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson
How Technology Is Reshaping Financial Services: Essays On Consumer Behavior In Card, Channel And Cryptocurrency Services, 2017 Singapore Management University
How Technology Is Reshaping Financial Services: Essays On Consumer Behavior In Card, Channel And Cryptocurrency Services, Dan Geng
Dissertations and Theses Collection
The financial services sector has seen dramatic technological innovations in the last several years associated with the “fintech revolution.” Major changes have taken place in channel management, credit card rewards marketing, cryptocurren-cy, and wealth management, and have influenced consumers’ banking behavior in different ways. As a consequence, there has been a growing demand for banks to rethink their business models and operations to adapt to changing consumer be-havior and counter the competitive pressure from other banks and non-bank play-ers. In this dissertation, I study consumer behavior related to different aspects of financial innovation by addressing research questions that are motivated ...
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, 2017 Dublin Institute of Technology
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Professor
In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version ...
Autonomous Speed Control For Kia Optima, 2017 Kennesaw State University
Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall
The Kennesaw Journal of Undergraduate Research
The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able ...
The Dark Destiny Of Safety, 2017 Northwestern University
The Dark Destiny Of Safety, Max Rowe, Jose Trejos
Most people imagine hacking to be an exceedingly complex crime, requiring an understanding of computing systems that goes far beyond that of average, functionally literate PC users. While there are sophisticated hacking techniques which do fit this description, many forms of hacking require little more than the ability to install basic programs on a computer. Perhaps the simplest of all forms of hacking is DDoS , or Denial of Service attack. DDoS is a simple brute-force method that spams a server with millions of identical simple requests, which can cause sites and providers to be overloaded and temporarily shut down. Users ...
Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis
A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in ...
Smartgarden, 2017 California Polytechnic State University, San Luis Obispo
Smartgarden, Samuel S. Lees, Matthew T. Lindly
The problem that the SmartGarden project seeks to solve is the challenge of watering succulents correctly and maintaining consistent plant health. Too much water can cause root rot and drowning while too little water can cause dehydration and starvation.
The SmartGarden solves this common problem by configuring a Raspberry Pi to measure soil moisture, store the data to an AWS server in the cloud, and water the succulent when necessary, informing the user by providing both a web-interface and a variety of notifications.
Blend It Wine Blending Distribution System, 2017 California Polytechnic State University, San Luis Obispo
Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren
No abstract provided.
Micro-Spi Sediment Profile Imaging Micro-Inspector, 2017 California Polytechnic State University, San Luis Obispo
Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari
This project was proposed by Dr. Brian Paavo through a desire to more easily study the benthic sediment layers of the ocean. To do so, he asked us to build a simple and compact machine for use in sediment profile imagery (SPI). Although devices like this already exist, they are all large scale devices that require a ship with a crane to deploy, which is expensive and time consuming. Instead, he desired a “micro” SPI, which is capable of being deployed from a small vessel that can easily navigate shallow waters. Our interpretation of these requirements was as follows: a ...
An Analysis Of Heroku And Aws For Growing Startups, 2017 California Polytechnic State University, San Luis Obispo
An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper
This project presents information on the architecture of most modern cloud-hosting platforms, and gives a cost-benefit analysis of two common Platform-as-a-Service (PaaS) companies: Heroku and AWS.