Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 109 of 109

Full-Text Articles in Engineering

Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith Jan 2016

Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith

Journal of International Technology and Information Management

Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …


It Centralization And The Innovation Value Chain In Higher Education: A Study For Promoting Key Innovations Through Innovation Management And Organizational Design, Edmund Udaya Clark Jan 2016

It Centralization And The Innovation Value Chain In Higher Education: A Study For Promoting Key Innovations Through Innovation Management And Organizational Design, Edmund Udaya Clark

All Graduate Theses, Dissertations, and Other Capstone Projects

The purpose of the present study was to investigate the impact of organizational centralization in higher education technology support units on institutional innovativeness. The centralization tools used for the present study included measures developed by Hage & Aiken (1971), Kaluzny, et al. (1974), and Ferrell & Skinner (1988). The innovativeness measures were established by Hansen & Birkinshaw's (2007) tool for evaluating innovation value chain activities in organizations. Data were gathered from a nation-wide sample (n = 303) of IT workers at 38 research one institutions in the United States. The results indicated that innovation value chain activities (idea generation, conversion, …


Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu Jan 2016

Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu

Theses and Dissertations

Maintaining closeness between data sources and data consumers is crucial for workload I/O performance. In cloud environments, this kind of closeness can be violated by system administrative events and storage architecture barriers. VM migration events are frequent in cloud environments. VM migration changes VM runtime inter-connection or cache contexts, significantly degrading VM I/O performance. Virtualization is the backbone of cloud platforms. I/O virtualization adds additional hops to workload data access path, prolonging I/O latencies. I/O virtualization overheads cap the throughput of high-speed storage devices and imposes high CPU utilizations and energy consumptions to cloud infrastructures. To maintain the closeness between …


A Reused Distance Based Analysis And Optimization For Gpu Cache, Dongwei Wang Jan 2016

A Reused Distance Based Analysis And Optimization For Gpu Cache, Dongwei Wang

Theses and Dissertations

As a throughput-oriented device, Graphics Processing Unit(GPU) has already integrated with cache, which is similar to CPU cores. However, the applications in GPGPU computing exhibit distinct memory access patterns. Normally, the cache, in GPU cores, suffers from threads contention and resources over-utilization, whereas few detailed works excavate the root of this phenomenon. In this work, we adequately analyze the memory accesses from twenty benchmarks based on reuse distance theory and quantify their patterns. Additionally, we discuss the optimization suggestions, and implement a Bypassing Aware(BA) Cache which could intellectually bypass the thrashing-prone candidates.

BA cache is a cost efficient cache design …


Context Aware Application Using Beacons, Abdullah Nasim Jan 2016

Context Aware Application Using Beacons, Abdullah Nasim

Senior Projects Spring 2016

With the growing popularity of mobile computing, as well as the increasing demand for location-based services, this paper introduces a design and implementation of a location-aware system using Beacons. This project comprises three parts: a web application, backend server and a mobile application client. The web application serves as a content management system by allowing users to manage projects, input data and create associations between Beacons and data. The backend server contains application logic and a database. The mobile application client interacts with the Beacons and provides location-specific services.


Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii Jan 2016

Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii

UNF Graduate Theses and Dissertations

Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …


Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor Jan 2016

Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor

Journal of International Technology and Information Management

This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.


Online Trust Cues: Perceptions And Application, Antonina A. Bauman Jan 2016

Online Trust Cues: Perceptions And Application, Antonina A. Bauman

Journal of International Technology and Information Management

This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …


Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa Jan 2016

Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa

Journal of International Technology and Information Management

This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani Jan 2016

The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani

Journal of International Technology and Information Management

The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …


Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan Jan 2016

Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan

Research Collection School Of Computing and Information Systems

We espouse a vision of small data-based immersive retail analytics, where a combination of sensor data, from personal wearable-devices and store-deployed sensors & IoT devices, is used to create real-time, individualized services for in-store shoppers. Key challenges include (a) appropriate joint mining of sensor & wearable data to capture a shopper’s product level interactions, and (b) judicious triggering of power-hungry wearable sensors (e.g., camera) to capture only relevant portions of a shopper’s in-store activities. To explore the feasibility of our vision, we conducted experiments with 5 smartwatch-wearing users who interacted with objects placed on cupboard racks in our lab (to …


A Novel Hierarchical Bag-Of-Words Model For Compact Action Representation, Qianru Sun, Qianru, Hong Liu, Hong Liu, Liqian Ma, Tianwei Zhang Jan 2016

A Novel Hierarchical Bag-Of-Words Model For Compact Action Representation, Qianru Sun, Qianru, Hong Liu, Hong Liu, Liqian Ma, Tianwei Zhang

Research Collection School Of Computing and Information Systems

Bag-of-Words (BOW) histogram of local space-time features is very popular for action representation due to its high compactness and robustness. However, its discriminant ability is limited since it only depends on the occurrence statistics of local features. Alternative models such as Vector of Locally Aggregated Descriptors (VLAD) and Fisher Vectors (FV) include more information by aggregating high-dimensional residual vectors, but they suffer from the problem of high dimensionality for final representation. To solve this problem, we novelly propose to compress residual vectors into low-dimensional residual histograms by the simple but efficient BoW quantization. To compensate the information loss of this …


Fog Computing With Go: A Comparative Study, Ellis H. Butterfield Jan 2016

Fog Computing With Go: A Comparative Study, Ellis H. Butterfield

CMC Senior Theses

The Internet of Things is a recent computing paradigm, de- fined by networks of highly connected things – sensors, actuators and smart objects – communicating across networks of homes, buildings, vehicles, and even people. The Internet of Things brings with it a host of new problems, from managing security on constrained devices to processing never before seen amounts of data. While cloud computing might be able to keep up with current data processing and computational demands, it is unclear whether it can be extended to the requirements brought forth by Internet of Things.

Fog computing provides an architectural solution to …


In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer Jan 2016

In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer

Department of Biological Systems Engineering: Papers and Publications

The ability to define in-field tractor load states offers the potential to better specify and characterize fuel consumption rate for various field operations. For the same field operation, the tractor experiences diverse load demands and corresponding fuel use rates as it maneuvers through straight passes, turns, suspended operation for adjustments, repair and maintenance, and biomass or other material transfer operations. It is challenging to determine the actual fuel rate and load states of agricultural machinery using force prediction models, and hence, some form of in-field data acquisition capability is required. Controller Area Networks (CAN) available on the current model tractors …


A Unit Design : Learning To Code With Finches, William V. Gruman Jan 2016

A Unit Design : Learning To Code With Finches, William V. Gruman

Graduate Research Papers

The purpose of this project was to develop a coding unit for students in grades 5-8 as an introductory programming course using the programming language SNAP! with a Finch robotics platform. The robotics platform provides a means of student engagement that allows them to complete computer programming challenges that drive interest and motivation. A series of five major learning activities were created as part of a middle school technology exploratory course. The beta testers included the four course instructors and around 30 of middle school student volunteers.

The designed unit was implemented once as a pilot, and was being implemented …


Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart Jan 2016

Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart

Theses and Dissertations

Today's cloud landscape has evolved computing infrastructure into a dynamic, high utilization, service-oriented paradigm. This shift has enabled the commoditization of large-scale storage and distributed computation, allowing engineers to tackle previously untenable problems without large upfront investment. A key enabler of flexibility in the cloud is the ability to transfer running virtual machines across subnets or even datacenters using live migration. However, live migration can be a costly process, one that has the potential to interfere with other applications not involved with the migration. This work investigates storage interference through experimentation with real-world systems and well-established benchmarks. In order to …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.