Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (20)
- Kansas State University Libraries (13)
- California Polytechnic State University, San Luis Obispo (11)
- Selected Works (8)
- Singapore Management University (8)
-
- Florida International University (4)
- University of Tennessee, Knoxville (4)
- University of Nebraska - Lincoln (3)
- Virginia Commonwealth University (3)
- Embry-Riddle Aeronautical University (2)
- Portland State University (2)
- Purdue University (2)
- Rochester Institute of Technology (2)
- University of Massachusetts Amherst (2)
- University of Pennsylvania Carey Law School (2)
- Western Michigan University (2)
- Bard College (1)
- Boise State University (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- James Madison University (1)
- Liberty University (1)
- Macalester College (1)
- Minnesota State University, Mankato (1)
- Old Dominion University (1)
- Southern Adventist University (1)
- Southern Illinois University Carbondale (1)
- The University of San Francisco (1)
- University of Arkansas, Fayetteville (1)
- Keyword
-
- Digital preservation (5)
- Cloud Computing (4)
- Cloud (3)
- Data mining (3)
- Digital collections (3)
-
- Linux (3)
- Live Migration (3)
- Security (3)
- Android (2)
- Assessment (2)
- Big data (2)
- Cache (2)
- Computer vision (2)
- Cyber Security (2)
- Digital curation (2)
- Distributed (2)
- Higher education (2)
- Information technology (2)
- Innovation (2)
- Performance (2)
- Performance evaluation (2)
- Social Media (2)
- Storage (2)
- Virtual Machine (2)
- 3D models (1)
- 3D printing (1)
- 3D scanning (1)
- 3DWebGIS (1)
- ADMM (1)
- AI (1)
- Publication
-
- Journal of International Technology and Information Management (19)
- Central Plains Network for Digital Asset Management (12)
- Research Collection School Of Computing and Information Systems (8)
- Computer Engineering (7)
- FIU Electronic Theses and Dissertations (4)
-
- Masters Theses (4)
- Matt Schultz (4)
- Theses and Dissertations (3)
- All Faculty Scholarship (2)
- Computer Science and Software Engineering (2)
- Master's Theses (2)
- ASA Multidisciplinary Research Symposium (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- Articles (1)
- Boise State University Theses and Dissertations (1)
- Business Analytics and Information Systems (1)
- CMC Senior Theses (1)
- Chancellor’s Honors Program Projects (1)
- Charleston Library Conference (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computational and Data Sciences Theses (1)
- Computer Architecture and Systems Research Laboratory (CASRL) (1)
- Content presented at the MAICS conference (1)
- Dan Mellamphy (1)
- Department of Anthropology: Faculty Publications (1)
- Department of Biological Systems Engineering: Papers and Publications (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Doctoral Dissertations (1)
- Electrical and Computer Engineering ETDs (1)
- Electronic Theses, Projects, and Dissertations (1)
- Publication Type
- File Type
Articles 91 - 109 of 109
Full-Text Articles in Engineering
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Journal of International Technology and Information Management
Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …
It Centralization And The Innovation Value Chain In Higher Education: A Study For Promoting Key Innovations Through Innovation Management And Organizational Design, Edmund Udaya Clark
It Centralization And The Innovation Value Chain In Higher Education: A Study For Promoting Key Innovations Through Innovation Management And Organizational Design, Edmund Udaya Clark
All Graduate Theses, Dissertations, and Other Capstone Projects
The purpose of the present study was to investigate the impact of organizational centralization in higher education technology support units on institutional innovativeness. The centralization tools used for the present study included measures developed by Hage & Aiken (1971), Kaluzny, et al. (1974), and Ferrell & Skinner (1988). The innovativeness measures were established by Hansen & Birkinshaw's (2007) tool for evaluating innovation value chain activities in organizations. Data were gathered from a nation-wide sample (n = 303) of IT workers at 38 research one institutions in the United States. The results indicated that innovation value chain activities (idea generation, conversion, …
Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu
Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu
Theses and Dissertations
Maintaining closeness between data sources and data consumers is crucial for workload I/O performance. In cloud environments, this kind of closeness can be violated by system administrative events and storage architecture barriers. VM migration events are frequent in cloud environments. VM migration changes VM runtime inter-connection or cache contexts, significantly degrading VM I/O performance. Virtualization is the backbone of cloud platforms. I/O virtualization adds additional hops to workload data access path, prolonging I/O latencies. I/O virtualization overheads cap the throughput of high-speed storage devices and imposes high CPU utilizations and energy consumptions to cloud infrastructures. To maintain the closeness between …
A Reused Distance Based Analysis And Optimization For Gpu Cache, Dongwei Wang
A Reused Distance Based Analysis And Optimization For Gpu Cache, Dongwei Wang
Theses and Dissertations
As a throughput-oriented device, Graphics Processing Unit(GPU) has already integrated with cache, which is similar to CPU cores. However, the applications in GPGPU computing exhibit distinct memory access patterns. Normally, the cache, in GPU cores, suffers from threads contention and resources over-utilization, whereas few detailed works excavate the root of this phenomenon. In this work, we adequately analyze the memory accesses from twenty benchmarks based on reuse distance theory and quantify their patterns. Additionally, we discuss the optimization suggestions, and implement a Bypassing Aware(BA) Cache which could intellectually bypass the thrashing-prone candidates.
BA cache is a cost efficient cache design …
Context Aware Application Using Beacons, Abdullah Nasim
Context Aware Application Using Beacons, Abdullah Nasim
Senior Projects Spring 2016
With the growing popularity of mobile computing, as well as the increasing demand for location-based services, this paper introduces a design and implementation of a location-aware system using Beacons. This project comprises three parts: a web application, backend server and a mobile application client. The web application serves as a content management system by allowing users to manage projects, input data and create associations between Beacons and data. The backend server contains application logic and a database. The mobile application client interacts with the Beacons and provides location-specific services.
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii
Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii
UNF Graduate Theses and Dissertations
Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Journal of International Technology and Information Management
This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Journal of International Technology and Information Management
This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Journal of International Technology and Information Management
This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
Journal of International Technology and Information Management
The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Research Collection School Of Computing and Information Systems
We espouse a vision of small data-based immersive retail analytics, where a combination of sensor data, from personal wearable-devices and store-deployed sensors & IoT devices, is used to create real-time, individualized services for in-store shoppers. Key challenges include (a) appropriate joint mining of sensor & wearable data to capture a shopper’s product level interactions, and (b) judicious triggering of power-hungry wearable sensors (e.g., camera) to capture only relevant portions of a shopper’s in-store activities. To explore the feasibility of our vision, we conducted experiments with 5 smartwatch-wearing users who interacted with objects placed on cupboard racks in our lab (to …
A Novel Hierarchical Bag-Of-Words Model For Compact Action Representation, Qianru Sun, Qianru, Hong Liu, Hong Liu, Liqian Ma, Tianwei Zhang
A Novel Hierarchical Bag-Of-Words Model For Compact Action Representation, Qianru Sun, Qianru, Hong Liu, Hong Liu, Liqian Ma, Tianwei Zhang
Research Collection School Of Computing and Information Systems
Bag-of-Words (BOW) histogram of local space-time features is very popular for action representation due to its high compactness and robustness. However, its discriminant ability is limited since it only depends on the occurrence statistics of local features. Alternative models such as Vector of Locally Aggregated Descriptors (VLAD) and Fisher Vectors (FV) include more information by aggregating high-dimensional residual vectors, but they suffer from the problem of high dimensionality for final representation. To solve this problem, we novelly propose to compress residual vectors into low-dimensional residual histograms by the simple but efficient BoW quantization. To compensate the information loss of this …
Fog Computing With Go: A Comparative Study, Ellis H. Butterfield
Fog Computing With Go: A Comparative Study, Ellis H. Butterfield
CMC Senior Theses
The Internet of Things is a recent computing paradigm, de- fined by networks of highly connected things – sensors, actuators and smart objects – communicating across networks of homes, buildings, vehicles, and even people. The Internet of Things brings with it a host of new problems, from managing security on constrained devices to processing never before seen amounts of data. While cloud computing might be able to keep up with current data processing and computational demands, it is unclear whether it can be extended to the requirements brought forth by Internet of Things.
Fog computing provides an architectural solution to …
In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer
In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer
Department of Biological Systems Engineering: Papers and Publications
The ability to define in-field tractor load states offers the potential to better specify and characterize fuel consumption rate for various field operations. For the same field operation, the tractor experiences diverse load demands and corresponding fuel use rates as it maneuvers through straight passes, turns, suspended operation for adjustments, repair and maintenance, and biomass or other material transfer operations. It is challenging to determine the actual fuel rate and load states of agricultural machinery using force prediction models, and hence, some form of in-field data acquisition capability is required. Controller Area Networks (CAN) available on the current model tractors …
A Unit Design : Learning To Code With Finches, William V. Gruman
A Unit Design : Learning To Code With Finches, William V. Gruman
Graduate Research Papers
The purpose of this project was to develop a coding unit for students in grades 5-8 as an introductory programming course using the programming language SNAP! with a Finch robotics platform. The robotics platform provides a means of student engagement that allows them to complete computer programming challenges that drive interest and motivation. A series of five major learning activities were created as part of a middle school technology exploratory course. The beta testers included the four course instructors and around 30 of middle school student volunteers.
The designed unit was implemented once as a pilot, and was being implemented …
Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart
Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart
Theses and Dissertations
Today's cloud landscape has evolved computing infrastructure into a dynamic, high utilization, service-oriented paradigm. This shift has enabled the commoditization of large-scale storage and distributed computation, allowing engineers to tackle previously untenable problems without large upfront investment. A key enabler of flexibility in the cloud is the ability to transfer running virtual machines across subnets or even datacenters using live migration. However, live migration can be a costly process, one that has the potential to interfere with other applications not involved with the migration. This work investigates storage interference through experimentation with real-world systems and well-established benchmarks. In order to …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
The Digital Dionysus: Nietzsche & The Network-Centric Condition
The Digital Dionysus: Nietzsche & The Network-Centric Condition
Dan Mellamphy
No abstract provided.