Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Artificial Intelligence And Human Employment, Singapore Management University Sep 2022

Artificial Intelligence And Human Employment, Singapore Management University

Perspectives@SMU

AI will replace humans in repetitive tasks. Greater value can be created when it augments and complements the jobs people do


The Smart In Smart Cities: A Framework For Image Classification Using Deep Learning, Rabiah Al-Qudah, Yaser Khamayseh, Monther Aldwairi, Sarfraz Khan Jun 2022

The Smart In Smart Cities: A Framework For Image Classification Using Deep Learning, Rabiah Al-Qudah, Yaser Khamayseh, Monther Aldwairi, Sarfraz Khan

All Works

The need for a smart city is more pressing today due to the recent pandemic, lockouts, climate changes, population growth, and limitations on availability/access to natural resources. However, these challenges can be better faced with the utilization of new technologies. The zoning design of smart cities can mitigate these challenges. It identifies the main components of a new smart city and then proposes a general framework for designing a smart city that tackles these elements. Then, we propose a technology-driven model to support this framework. A mapping between the proposed general framework and the proposed technology model is then introduced. …


Canary: An Automated Approach To Security Scanning And Remediation, David Wiles May 2022

Canary: An Automated Approach To Security Scanning And Remediation, David Wiles

Masters Theses & Specialist Projects

Modern software has a smaller attack surface today than in the past. Memory-safe languages, container runtimes, virtual machines, and a mature web stack all contribute to the relative safety of the web and software in general compared to years ago. Despite this, we still see high-profile bugs, hacks, and outages which affect major companies and widely-used technologies. The extensive work that has gone into hardening virtualization, containerization, and commonly used applications such as Nginx still depends on the end-user to configure correctly to prevent a compromised machine.

In this paper, I introduce a tool, which I call Canary, which can …


“If I Could Do This, I Feel Anyone Could:” The Design And Evaluation Of A Two-Factor Authentication Manager, Garrett D. Smith Apr 2022

“If I Could Do This, I Feel Anyone Could:” The Design And Evaluation Of A Two-Factor Authentication Manager, Garrett D. Smith

Theses and Dissertations

Two-factor authentication (2FA) is a strong defense against account compromise. However, usability studies reveal challenges with 2FA setup. The process to manually setup and remove 2FA methods differs across websites. We present a system design for a 2FA manager to automatically setup and remove 2FA methods. Potential benefits are reduced time, fewer mistakes, consistent terminology, a single workflow for users to learn, and the ability to rapidly transition to a new 2FA method—e.g., when replacing a lost 2FA method. We create two proof-of-concept implementations of our design, one as a browser extension and one integrated as a feature in an …


Automation And Coupling Of Models For Coastal Flood Forecasting In South Texas, Cesar Davila Hernandez, Sara E. Davila, Martin Flores, Jungseok Ho, Dong-Chul Kim Mar 2022

Automation And Coupling Of Models For Coastal Flood Forecasting In South Texas, Cesar Davila Hernandez, Sara E. Davila, Martin Flores, Jungseok Ho, Dong-Chul Kim

Computer Science Faculty Publications and Presentations

Forecasting natural disasters such as inundations can be of great help for emergency bodies and first responders. In coastal communities, this risk is often associated with storm surge. To produce flood forecasts for coastal communities, a system must incorporate models capable of simulating such events based on forecasted weather conditions. In this work, a system for forecasting inundations based predominantly on storm surge is explored. An automation and a coupling strategy were implemented to produce forecasted flood maps automatically. The system leverages an ocean circulation model and a channel water flow model to estimate flood events in South Texas specially …


The Implementation Of Advanced Digitalization In The Oil And Gas Industry, Ensieh Rezafar Jan 2022

The Implementation Of Advanced Digitalization In The Oil And Gas Industry, Ensieh Rezafar

Walden Dissertations and Doctoral Studies

AbstractThe immature advanced digitalization in the oil and gas industry can limit access to the potential value of mature progressive digitalization. Oil and gas leaders must expedite the implementation of advanced digitalization to increase organizational proficiencies and reduce costs and losses. Grounded in Pettigrew and Whipp’s dimensions of strategic change theory, the purpose of this qualitative multiple case study was to explore strategies some leaders in the oil and gas industry used to implement advanced digitalization. The participants were seven leaders in two oil service companies in North America involved in the successful implementation of progressive digitalization. Data were collected …


Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng Jan 2022

Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng

Engineering Management & Systems Engineering Faculty Publications

A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …