Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Series

2019

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 45

Full-Text Articles in Engineering

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …


Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah Dec 2019

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah

Publications

Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual …


Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr. Nov 2019

Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr.

Library Philosophy and Practice (e-journal)

We are witness to see exponential growth of the social media network since the year 2002. Leading social media networking sites used by people are Twitter, Snapchats, Facebook, Google, and Instagram, etc. The latest global digital report (Chaffey and Ellis-Chadwick 2019) states that there exist more than 800 million current online social media users, and the number is still exploding day by day. Users share their day to day activities such as their photos and locations etc. on social media platforms. This information gets consumed by third party users, like marketing companies, researchers, and government firms. Depending upon the purpose, …


Aspect And Opinion Aware Abstractive Review Summarization With Reinforced Hard Typed Decoder, Yufei Tian, Jianfei Yu, Jing Jiang Nov 2019

Aspect And Opinion Aware Abstractive Review Summarization With Reinforced Hard Typed Decoder, Yufei Tian, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

In this paper, we study abstractive review summarization. Observing that review summaries often consist of aspect words, opinion words and context words, we propose a two-stage reinforcement learning approach, which first predicts the output word type from the three types, and then leverages the predicted word type to generate the final word distribution. Experimental results on two Amazon product review datasets demonstrate that our method can consistently outperform several strong baseline approaches based on ROUGE scores.


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang Nov 2019

Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang

Research Collection School Of Computing and Information Systems

With the rapid development and popularization of mobile and wireless communication technologies, ridesourcing companies have been able to leverage internet-based platforms to operate e-hailing services in many cities around the world. These companies connect passengers and drivers in real time and are disruptively changing the transportation indus- try. As pioneers in a general sharing economy context, ridesourcing shared transportation platforms consist of a typical two-sided market. On the demand side, passengers are sensi- tive to the price and quality of the service. On the supply side, drivers, as freelancers, make working decisions flexibly based on their income from the platform …


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …


Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang Oct 2019

Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy, Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang

Research Collection School Of Computing and Information Systems

Cloud is a computing paradigm for allowing data owners to outsource their data to enjoy on-demand services and mitigate the burden of local data storage. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and has been widely applied in cloud-based applications. In this paper, we summarize the common properties of most of IBE and ABE and introduce a cryptographic primitive called ElGamal type cryptosystem. This primitive can be used to …


Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan Sep 2019

Improving The Sustainability Of The Built Environment By Training Its Workforce In More Efficient And Greener Ways Of Designing And Constructing Through The Horizon2020 Bimcert Project, Barry Mcauley, Avril Behan

Conference papers

The construction industry consumes up to 50% of mineral resources excavated from nature, generates about 33% of CO2 present in the atmosphere and is responsible for 40% of total global energy through both construction and operation of buildings. The realisation that current pervasive construction practices now face globalization, sustainability, and environmental concerns, as well as ever-changing legislation requirements and new skills needed for the information age has resulted in technologies such as Building Information Modelling (BIM) becoming a key enabler in navigating these barriers. To assist in overcoming these barriers, a number of funding initiatives have been put in place …


Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West Sep 2019

Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West

Conference papers

Like most sectors in today’s working world, construction businesses are challenged to work in an increasingly digitised world with sophisticated demands from intelligent clients. So much has been written about the inefficiencies of the construction industry, its fragmentation, lack of collaboration, low margins, adversarial pricing, poor productivity, financial fragility, lack of research and development, poor industry image and relatively weak use of digital solutions. The Irish government recognises the importance of digital innovation to address many of the challenges the construction industry faces. With recent high profile reports of escalating spend on signature public sector projects and weak productivity performance …


Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West Sep 2019

Bim In Ireland 2019: A Study Of Bim Maturity And Diffusion In Ireland, Barry Mcauley, Alan Hore, Roger West

Conference papers

In 2017, the BIM Innovation Capability Programme team applied five macro BIM maturity conceptual models to capture the capability of the Irish construction industry and assess its BIM maturity. The results found that while Ireland is mature for modelling processes, it is less developed with regards to collaboration processes and policies. Ireland also ranked poorly when it came to regulatory frameworks, measurements and benchmarks compared to a number of countries which also applied the same conceptual models. At the time, the findings highlighted that Ireland’s diffusion dynamic was middle out, meaning that larger organisations or industry associations were pushing the …


An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre Sep 2019

An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre

Conference papers

Previous research has established that multi-disciplinary collaboration will benefit a construction project throughout its lifecycle. While Lean Construction, Building Information Modelling (BIM), and Integrated Project Delivery (IPD) can all be viewed as separate processes which add independent value to a project, they are more effective when used in partnership with each other. In order to ensure the high levels of collaboration expected for these processes to work in unison, the early involvement of the Contractor is paramount. Early contractor involvement within the design process can ensure a more focused integrated project team, improvement of both constructability and cost certainty, as …


From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West Sep 2019

From Roadmap To Implementation: Lessons For Ireland’S Digital Construction Programme, Barry Mcauley, Alan Hore, Roger West

Conference papers

As part of their Future of Construction initiative in 2018 the World Economic Forum published an action plan to accelerate Building Information Modelling adoption. The WEF report highlighted actions that companies, industry organisations and governments are advised to implement to accelerate BIM adoption and better capitalise on delivering better project outcomes. According the authors of the report BIM is seen as the centrepiece of the construction industry’s digital transformation, however they acknowledged that BIM adoption globally remain slow. Anecdotal experience would suggest that BIM usage in Ireland is also very low and that a similar initiative or an adaptation of …


Why Reinventing The Wheels? An Empirical Study On Library Reuse And Re-Implementation, Bowen Xu, Le An, Ferdian Thung, Foutse Khomh, David Lo Sep 2019

Why Reinventing The Wheels? An Empirical Study On Library Reuse And Re-Implementation, Bowen Xu, Le An, Ferdian Thung, Foutse Khomh, David Lo

Research Collection School Of Computing and Information Systems

Nowadays, with the rapid growth of open source software (OSS), library reuse becomes more and more popular since a large amount of third- party libraries are available to download and reuse. A deeper understanding on why developers reuse a library (i.e., replacing self-implemented code with an external library) or re-implement a library (i.e., replacing an imported external library with self-implemented code) could help researchers better understand the factors that developers are concerned with when reusing code. This understanding can then be used to improve existing libraries and API recommendation tools for researchers and practitioners by using the developers concerns identified …


Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon Sep 2019

Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon

Other

In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.

This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.

The soil moisture sensor will systematically collect high …


On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen Sep 2019

On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen

Center for Cybersecurity

This paper will discuss whether bots, particularly chat bots, can be useful in public health research and health or pharmacy systems operations. Bots have been discussed for many years; particularly when coupled with artificial intelligence, they offer the opportunity of automating mundane or error-ridden processes and tasks by replacing human involvement. This paper will discuss areas where there are greater advances in the use of bots, as well as areas that may benefit from the use of bots, and will offer practical ways to get started with bot technology. Several popular bot applications and bot development tools along with practical …


Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii Aug 2019

Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii

Computer Science Faculty Publications and Presentations

Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are tricked into interacting with web pages that appear to be legitimate. In order to successfully fool a human user, these pages are designed to look like legitimate ones. Since humans are so susceptible to being tricked, automated methods of differentiating between phishing websites and their authentic counterparts are needed as an extra line of defense. The aim of this research is to develop these …


Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali Jul 2019

Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali

Library Philosophy and Practice (e-journal)

Presently, information professionals are progressively dependent on information and communication technologies to complete their everyday tasks. As, result dependence on PC frameworks, programming and data innovation-related technologies are increasing for better working and providing quality services. Therefore, to understand, analyze and evaluate the acceptance and use of this technology several models of technology acceptance and use have been formulated in information science literature. Using eight such models, Venkatesh, Morris, Davis and Davis proposed a unified model called the Unified Theory of Acceptance and Use of Technology or (UTAUT) model. The UTAUT model has been studied and analyzed in various spheres …


Gpu-Based Graph Traversal On Compressed Graphs, Mo Sha, Yuchen Li, Kian-Lee Tan Jul 2019

Gpu-Based Graph Traversal On Compressed Graphs, Mo Sha, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Graph processing on GPUs received much attention in theindustry and the academia recently, as the hardware accelerator offers attractive potential for performance boost. However, the high-bandwidth device memory on GPUs has limited capacity that constrains the size of the graph to be loadedon chip. In this paper, we introduce GPU-based graph traversal on compressed graphs, so as to enable the processingof graphs having a larger size than the device memory. Designed towards GPU’s SIMT architecture, we propose twonovel parallel scheduling strategies Two-Phase Traversal andTask-Stealing to handle thread divergence and workload imbalance issues when decoding the compressed graph. Wefurther optimize our …


A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney Jun 2019

A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney

FIU Electronic Theses and Dissertations

Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …


Creating A 3d Printed Bipedal Robot’S Ankle And Foot With Human-Like Motion, Tylise E. Fitzgerald Jun 2019

Creating A 3d Printed Bipedal Robot’S Ankle And Foot With Human-Like Motion, Tylise E. Fitzgerald

Undergraduate Research & Mentoring Program

Humanoid robots are being created to replace humans in dangerous situations, assist overworked humans, and improve our quality of life by completing chores. However, current bipedal robots haven’t matched the performance of humans and are still impractical for commercial use.

One of the Agile and Adaptive Robotics Lab’s goals is to create a humanoid robot whose anatomy is similar to the human body. If this can be accomplished, we can have a functioning model of the human body that we can adjust to improve both humanoid robots’ functions and the functionality of our own human bodies. This specific project looks …


Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove Jun 2019

Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove

Presentations

ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …


Material Parameter Estimation Of Thin Wafers With Terahertz Time-Domain Spectroscopy, Kirk R. Jungles Jun 2019

Material Parameter Estimation Of Thin Wafers With Terahertz Time-Domain Spectroscopy, Kirk R. Jungles

Undergraduate Research & Mentoring Program

Terahertz Time Domain Spectroscopy(THz TDS) is a spectroscopic technique that can be implemented to perform non destructive material parameter extraction on a variety of materials. Accuracy of these material parameters is often limited by statistical variation between measurements and insufficient knowledge of the thickness of the slabs being measured.

The goal of this project was to develop an in house procedure that would allow us to perform THz TDS on thin wafers using an up to date signal processing algorithm that would provide accurate predictions for the thickness of the wafers, reliable estimations of the wafer’s material parameters, and demonstration …


Omni-Gravity Hydroponics System For Spacecraft, Tara M. Prevo Jun 2019

Omni-Gravity Hydroponics System For Spacecraft, Tara M. Prevo

Undergraduate Research & Mentoring Program

Effective omni-gravity hydroponics will allow astronauts to supplement nutrition and further close the life cycle of water in orbit, lunar, and Martian conditions. This project determines the operational limits of the test cells for the Plant Water Management Hydroponics mission. A scaled 1-g channel was designed by Rihana Mungin to mimic full-scale performance in microgravity that could be tested terrestrially. This project sought to find the limits of operation of the 1-g test cells and identify failure modes that could pose a safety risk in space. The cells were filled at increments of 20% and cycled from 0.184 to 8.33 …


Simulation Of Human Balance Control Using An Inverted Pendulum Model, Joshua E. Caneer Jun 2019

Simulation Of Human Balance Control Using An Inverted Pendulum Model, Joshua E. Caneer

Undergraduate Research & Mentoring Program

The nervous system that human beings use to control balance is remarkably adaptable to a wide variety of environments and conditions. This neural system is likely a combination of many inputs and feedback control loops working together. The ability to emulate this system of balance could be of great value in understanding and developing solutions to proprioceptive disorders and other diseases that affect the human balance control system. Additionally, the process of emulating the human balance system may also have widespread applications to the locomotion capabilities of many types of robots, in both bipedal and non-bipedal configurations.

The goal of …


Matching Passengers And Drivers With Multiple Objectives In Ride Sharing Markets, Guodong Lyu, Chung Piaw Teo, Wangchi Cheung, Hai Wang Jun 2019

Matching Passengers And Drivers With Multiple Objectives In Ride Sharing Markets, Guodong Lyu, Chung Piaw Teo, Wangchi Cheung, Hai Wang

Research Collection School Of Computing and Information Systems

In many cities in the world, ride sharing companies, such as Uber, Didi, Grab and Lyft, have been able to leverage on Internet-based platforms to conduct online decision making to connect passengers and drivers. These online platforms facilitate the integration of passengers and drivers’ mobility data on smart phones in real-time, which enables a convenient matching between demand and supply in real time. These clear operational advantages have motivated many similar shared service business models in the public transportation arena, and have been a disruptive force to the traditional taxi industry.


Your Internet Data Is Rotting, Paul Royster May 2019

Your Internet Data Is Rotting, Paul Royster

UNL Libraries: Faculty Publications

The internet is growing, but old information continues to disappear daily.

Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.

Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then it …


Worker Demographics And Earnings On Amazon Mechanical Turk: An Exploratory Analysis, Kotaro Hara, Kristy Milland, Benjamin V. Hanrahan, Chris Callison-Burch, Abigail Adams, Saiph Savage, Jeffrey P. Bigham May 2019

Worker Demographics And Earnings On Amazon Mechanical Turk: An Exploratory Analysis, Kotaro Hara, Kristy Milland, Benjamin V. Hanrahan, Chris Callison-Burch, Abigail Adams, Saiph Savage, Jeffrey P. Bigham

Research Collection School Of Computing and Information Systems

Prior research reported that workers on Amazon Mechanical Turk (AMT) are underpaid, earning about $2/h. But the prior research did not investigate the difference in wage due to worker characteristics (e.g., country of residence). We present the first data-driven analysis on wage gap on AMT. Using work log data and demographic data collected via online survey, we analyse the gap in wage due to different factors. We show that there is indeed wage gap; for example, workers in the U.S. earn $3.01/h while those in India earn $1.41/h on average.


A Review On Mixed Criticality Methods, Alex Jenkel May 2019

A Review On Mixed Criticality Methods, Alex Jenkel

Recent Advances in Real-Time Systems

Within the study of mixed criticality scheduling, there are many different aspects that must be considered—resources, processor speeds, number of processors, etc.—that make scheduling theories difficult to produce. Two papers address specific aspects of mixed criticality scheduling, and this paper compares the two different methods and also builds upon them.


Incentivizing Collaboration In A Competition, Arunesh Sinha, Michael P. Wellman May 2019

Incentivizing Collaboration In A Competition, Arunesh Sinha, Michael P. Wellman

Research Collection School Of Computing and Information Systems

Research and design competitions aim to promote innovation or creative production, which are often best achieved through collaboration. The nature of a competition, however, typically necessitates sorting by individual performance. This presents tradeoffs for the competition designer, between incentivizing global performance and distinguishing individual capability. We model this situation in terms of an abstract collaboration game, where individual effort also benefits neighboring agents. We propose a scoring mechanism called LSWM that rewards agents based on localized social welfare. We show that LSWM promotes global performance, in that social optima are equilibria of the mechanism. Moreover, we establish conditions under which …