Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 170

Full-Text Articles in Engineering

Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz Jun 2023

Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz

CCE Faculty Articles

This paper describes different E-Senses systems, such as Electronic Nose, Electronic Tongue, and Electronic Eyes, which were used to build several machine learning models and assess their performance in classifying a variety of Colombian herbal tea brands such as Albahaca, Frutos Verdes, Jaibel, Toronjil, and Toute. To do this, a set of Colombian herbal tea samples were previously acquired from the instruments and processed through multivariate data analysis techniques (principal component analysis and linear discriminant analysis) to feed the support vector machine, K-nearest neighbors, decision trees, naive Bayes, and random forests algorithms. The results of the E-Senses were validated using …


Pii-Codex: A Python Library For Pii Detection, Categorization, And Severity Assessment, Eidan J. Rosado Jun 2023

Pii-Codex: A Python Library For Pii Detection, Categorization, And Severity Assessment, Eidan J. Rosado

CCE Faculty Articles

[Summary] There have been a number of advancements in the detection of personal identifiable information (PII) and scrubbing libraries to aid developers and researchers in their detection and anonymization efforts. With the recent shift in data handling procedures and global policy implementations regarding identifying information, it is becoming more important for data consumers to be aware of what data needs to be scrubbed, why it’s being scrubbed, and to have the means to perform said scrubbing. PII-Codex is a collection of extended theoretical, conceptual, and policy works in PII categorization and severity assessment (Milne et al., 2016; Schwartz & Solove, …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci Jan 2021

Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci

CCE Theses and Dissertations

Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.

Kahneman introduced the concepts of …


A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman Jan 2021

A Study Of Factors That Influence Symbol Selection On Augmentative And Alternative Communication Devices For Individuals With Autism Spectrum Disorder, William Todd Dauterman

CCE Theses and Dissertations

According to the American Academy of Pediatrics (AAP), 1 in 59 children are diagnosed with Autism Spectrum Disorder (ASD) each year. Given the complexity of ASD and how it is manifested in individuals, the execution of proper interventions is difficult. One major area of concern is how individuals with ASD who have limited communication skills are taught to communicate using Augmentative and Alternative Communication devices (AAC). AACs are portable electronic devices that facilitate communication by using audibles, signs, gestures, and picture symbols. Traditionally, Speech-Language Pathologists (SLPs) are the primary facilitators of AAC devices and help establish the language individuals with …


An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel Jan 2021

An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel

CCE Theses and Dissertations

User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …


College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University Jan 2020

College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Nsu Student Handbook 2019-2020, Nova Southeastern University Jan 2019

Nsu Student Handbook 2019-2020, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


College Of Computing And Engineering Graduate Catalog 2019-2020, Nova Southeastern University Jan 2019

College Of Computing And Engineering Graduate Catalog 2019-2020, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Sr Education Group, A Leading Education Research Publisher, Ranked Nova Southeastern University (Nsu) Within Their 2019 Lists Of Best Online Colleges, Nova Southeastern University Jan 2019

Sr Education Group, A Leading Education Research Publisher, Ranked Nova Southeastern University (Nsu) Within Their 2019 Lists Of Best Online Colleges, Nova Southeastern University

College of Computing and Engineering News Archive

SR Education Group, a leading education research publisher, ranked Nova Southeastern University (NSU) within their 2019 lists of best online colleges. The group recognized NSU’s College of Computing and Engineering for its Master of Science in Computer Science and Engineering program, ranking it 13 out of 19 in “Best Online Master's in Computer Science Programs.” The college was also ranked 6 out of 8 for “Best Online Master's in Information Technology (IT) Degrees.”


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


Master Of Science In Computer Science, Nova Southeastern University Jun 2018

Master Of Science In Computer Science, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master In Management Information Systems, Nova Southeastern University Jun 2018

Master In Management Information Systems, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master Of Science In Computer Science, Nova Southeastern University Jan 2018

Master Of Science In Computer Science, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master Of Science In Cybersecurity Management, Nova Southeastern University Jan 2018

Master Of Science In Cybersecurity Management, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Doctor Of Philosophy In Computer Science, Nova Southeastern University Jan 2018

Doctor Of Philosophy In Computer Science, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master Of Science In Information Technology, Nova Southeastern University Jan 2018

Master Of Science In Information Technology, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master Of Science In Information Systems, Nova Southeastern University Jan 2018

Master Of Science In Information Systems, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Doctor Of Philosophy In Information Assurance, Nova Southeastern University Jan 2018

Doctor Of Philosophy In Information Assurance, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Doctor Of Philosophy In Information Systems, Nova Southeastern University Jan 2018

Doctor Of Philosophy In Information Systems, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach Jan 2018

Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach

CCE Theses and Dissertations

Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University Jan 2018

Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University Jan 2018

Master Of Science In Information Assurance And Cybersecurity, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Distinguished Alumni Luncheon With Dr. Wayne A. Brown, Nova Southeastern University Jan 2017

Distinguished Alumni Luncheon With Dr. Wayne A. Brown, Nova Southeastern University

College of Computing and Engineering News Archive

Last week on November 9th, 2017, Dr. Tao and Dr. Abramson had the pleasure of honoring CCE's distinguished alumni Dr. Wayne A. Brown as part of the NSU's Homecoming festivities.


Robert B. Batie Jr., Ph.D., Nova Southeastern University Jan 2017

Robert B. Batie Jr., Ph.D., Nova Southeastern University

College of Computing and Engineering News Archive

It’s a safe bet to say that Robert B. Batie Jr., Ph.D., has seen a thing or two. Given his 22 years in the U.S. Army, it’s pretty clear to understand why. That’s because in those 2+ decades he traveled to 33 foreign countries, 41 of the 50 states and visited every continent aside from Antarctica and Australia. And it was his chosen occupation while serving in the U.S. Army – Signal Corp as a Communications Security (COMSEC) Maintenance Chief – that led him to where he is today.


Cce Hosts Shbe Workshop, Nova Southeastern University Jan 2017

Cce Hosts Shbe Workshop, Nova Southeastern University

College of Computing and Engineering News Archive

Dr. Yong Tao, Dean and Professor, College of Computing and Engineering hosted the Interdisciplinary Data Structure for Collaborative Research in Sustainable Human-Building Ecosystems (SHBE) Workshop on June 5-6 at NSU Art Museum with the support from Bonnie Clearwater, Director and Chief Curator of NSU Art Museum. The workshop was aimed at bringing together professionals from multiple disciplines, i.e., architects, civil engineers, electrical engineers, mechanical engineers, computer scientists, social scientists, psychologists, and social/ public policy experts.


Cec Congratulates 2017 Dean's List, Nova Southeastern University Jan 2017

Cec Congratulates 2017 Dean's List, Nova Southeastern University

College of Computing and Engineering News Archive

College of Computing and Engineering at NSU (CCE) held its Fall 2017 Dean’s List reception on April 25. 18 undergraduate students major in computer science, computer engineering, information technology and engineering are on the 2017 Dean’s List and have achieved a minimum GPA of 3.8 for the semester. They are: Franco Criscola, Christopher Daniels, Maximiliano Hernandez, Liana Huynh, Abraham Kohn, Brogan O’Connor, Sagar Patel, Liam White, Karen Rita Ann D’Lima, Ashli Amoy Jarrett, Anthony DiFede, Corey Lee, Nicole Staley, Simon Wang, Lydia Warshaw, Albert Baldoni, Henry Koenig, Nikolas Kevorkian.