Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Entire DC Network
Artificial Intelligence And Human Employment, Singapore Management University
Artificial Intelligence And Human Employment, Singapore Management University
Perspectives@SMU
AI will replace humans in repetitive tasks. Greater value can be created when it augments and complements the jobs people do
The Smart In Smart Cities: A Framework For Image Classification Using Deep Learning, Rabiah Al-Qudah, Yaser Khamayseh, Monther Aldwairi, Sarfraz Khan
The Smart In Smart Cities: A Framework For Image Classification Using Deep Learning, Rabiah Al-Qudah, Yaser Khamayseh, Monther Aldwairi, Sarfraz Khan
All Works
The need for a smart city is more pressing today due to the recent pandemic, lockouts, climate changes, population growth, and limitations on availability/access to natural resources. However, these challenges can be better faced with the utilization of new technologies. The zoning design of smart cities can mitigate these challenges. It identifies the main components of a new smart city and then proposes a general framework for designing a smart city that tackles these elements. Then, we propose a technology-driven model to support this framework. A mapping between the proposed general framework and the proposed technology model is then introduced. …
Canary: An Automated Approach To Security Scanning And Remediation, David Wiles
Canary: An Automated Approach To Security Scanning And Remediation, David Wiles
Masters Theses & Specialist Projects
Modern software has a smaller attack surface today than in the past. Memory-safe languages, container runtimes, virtual machines, and a mature web stack all contribute to the relative safety of the web and software in general compared to years ago. Despite this, we still see high-profile bugs, hacks, and outages which affect major companies and widely-used technologies. The extensive work that has gone into hardening virtualization, containerization, and commonly used applications such as Nginx still depends on the end-user to configure correctly to prevent a compromised machine.
In this paper, I introduce a tool, which I call Canary, which can …
“If I Could Do This, I Feel Anyone Could:” The Design And Evaluation Of A Two-Factor Authentication Manager, Garrett D. Smith
“If I Could Do This, I Feel Anyone Could:” The Design And Evaluation Of A Two-Factor Authentication Manager, Garrett D. Smith
Theses and Dissertations
Two-factor authentication (2FA) is a strong defense against account compromise. However, usability studies reveal challenges with 2FA setup. The process to manually setup and remove 2FA methods differs across websites. We present a system design for a 2FA manager to automatically setup and remove 2FA methods. Potential benefits are reduced time, fewer mistakes, consistent terminology, a single workflow for users to learn, and the ability to rapidly transition to a new 2FA method—e.g., when replacing a lost 2FA method. We create two proof-of-concept implementations of our design, one as a browser extension and one integrated as a feature in an …
Automation And Coupling Of Models For Coastal Flood Forecasting In South Texas, Cesar Davila Hernandez, Sara E. Davila, Martin Flores, Jungseok Ho, Dong-Chul Kim
Automation And Coupling Of Models For Coastal Flood Forecasting In South Texas, Cesar Davila Hernandez, Sara E. Davila, Martin Flores, Jungseok Ho, Dong-Chul Kim
Computer Science Faculty Publications and Presentations
Forecasting natural disasters such as inundations can be of great help for emergency bodies and first responders. In coastal communities, this risk is often associated with storm surge. To produce flood forecasts for coastal communities, a system must incorporate models capable of simulating such events based on forecasted weather conditions. In this work, a system for forecasting inundations based predominantly on storm surge is explored. An automation and a coupling strategy were implemented to produce forecasted flood maps automatically. The system leverages an ocean circulation model and a channel water flow model to estimate flood events in South Texas specially …
The Implementation Of Advanced Digitalization In The Oil And Gas Industry, Ensieh Rezafar
The Implementation Of Advanced Digitalization In The Oil And Gas Industry, Ensieh Rezafar
Walden Dissertations and Doctoral Studies
AbstractThe immature advanced digitalization in the oil and gas industry can limit access to the potential value of mature progressive digitalization. Oil and gas leaders must expedite the implementation of advanced digitalization to increase organizational proficiencies and reduce costs and losses. Grounded in Pettigrew and Whipp’s dimensions of strategic change theory, the purpose of this qualitative multiple case study was to explore strategies some leaders in the oil and gas industry used to implement advanced digitalization. The participants were seven leaders in two oil service companies in North America involved in the successful implementation of progressive digitalization. Data were collected …
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Engineering Management & Systems Engineering Faculty Publications
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …