Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (10)
- Singapore Management University (10)
- Embry-Riddle Aeronautical University (4)
- Air Force Institute of Technology (3)
- Florida International University (3)
-
- Selected Works (3)
- University of Kentucky (3)
- California Polytechnic State University, San Luis Obispo (2)
- City University of New York (CUNY) (2)
- Louisiana State University (2)
- University of Nebraska - Lincoln (2)
- University of Nevada, Las Vegas (2)
- Dartmouth College (1)
- DePaul University (1)
- Kennesaw State University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Southern Methodist University (1)
- Technological University Dublin (1)
- University of Georgia School of Law (1)
- University of Louisville (1)
- University of Massachusetts Amherst (1)
- University of Minnesota Law School (1)
- University of Pennsylvania Carey Law School (1)
- Walden University (1)
- Western University (1)
- Keyword
-
- Blockchain (5)
- Big data (4)
- Internet of Things (4)
- ARIMA (2)
- Center_CCR (2)
-
- Data separation (2)
- Database (2)
- Digital forensics (2)
- Information management (2)
- Machine learning (2)
- Random Forest (2)
- Technology (2)
- ToC (2)
- ABA standards (1)
- APIs (1)
- AWS (1)
- Adaptive learning systems (1)
- Aeronautical engineering (1)
- Aerospace engineering (1)
- Algorithmic modeling (1)
- Alma (1)
- Anticipatory governance (1)
- Attitude (1)
- Authentication (1)
- Aviation engineering (1)
- Basket-Oriented Association (1)
- Basket-Sensitive Recommendation (1)
- Big Data (1)
- Bit errors (1)
- C-17 (1)
- Publication
-
- Journal of International Technology and Information Management (10)
- Research Collection School Of Computing and Information Systems (9)
- FIU Electronic Theses and Dissertations (3)
- Theses and Dissertations (3)
- African Conference on Information Systems and Technology (1)
-
- All Faculty Scholarship (1)
- Bulletin of TUIT: Management and Communication Technologies (1)
- CDM Annual Reports (1)
- Computer Engineering (1)
- Computer Science Faculty Research (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Dissertations and Theses (1)
- Dissertations and Theses Collection (Open Access) (1)
- Division of Infectious Diseases (1)
- Doctoral Dissertations (1)
- ENGS 86 Independent Projects (AB Students) (1)
- Electronic Thesis and Dissertation Repository (1)
- Environmental & Occupational Health Faculty Publications (1)
- Farzad Hashemi (1)
- Houbing Song (1)
- International Journal of Applied Management and Technology (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Digital Forensics, Security and Law (1)
- LSU Doctoral Dissertations (1)
- LSU Master's Theses (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Master's Theses (1)
- Minnesota Journal of Law, Science & Technology (1)
- Other (1)
- Presentations (1)
Articles 1 - 30 of 59
Full-Text Articles in Engineering
Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang
Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang
Computer Science Faculty Research
Background: Understanding the complex biological mechanisms of cancer patient survival using genomic and clinical data is vital, not only to develop new treatments for patients, but also to improve survival prediction. However, highly nonlinear and high-dimension, low-sample size (HDLSS) data cause computational challenges to applying conventional survival analysis. Results: We propose a novel biologically interpretable pathway-based sparse deep neural network, named Cox-PASNet, which integrates high-dimensional gene expression data and clinical data on a simple neural network architecture for survival analysis. Cox-PASNet is biologically interpretable where nodes in the neural network correspond to biological genes and pathways, while capturing the nonlinear …
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Electronic Thesis and Dissertation Repository
Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …
Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri
Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri
LSU Master's Theses
The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …
Algorithms For Designing Processes Of Electronic Interactive Services, Ozod Radjabov
Algorithms For Designing Processes Of Electronic Interactive Services, Ozod Radjabov
Bulletin of TUIT: Management and Communication Technologies
Today, the integration of electronic interactive services is based on the correct placement of algorithms to ensure solidarity in information systems, the design stages of information systems based on interactive services and the corresponding events, the implementation of functions in a strict sequence.
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid
FIU Electronic Theses and Dissertations
Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …
Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan
Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan
FIU Electronic Theses and Dissertations
Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.
Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …
On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou
On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou
LSU Doctoral Dissertations
Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.
In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the I/O performance behaviors …
Electronic Data Capture And Study Management, William A. Mattingly
Electronic Data Capture And Study Management, William A. Mattingly
Division of Infectious Diseases
Electronic Data Capture (EDC) is the process of recording data from a primary data source into a computerized system for improved reliability, security, and convenience. Data stored in EDC systems are used for analysis and, in the case of clinical studies, are an important part of the development pipeline for new drugs and medical devices. This text provides an introduction to data capture and the management of a scientific study using the popular EDC solution REDCap.
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay
FIU Electronic Theses and Dissertations
With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …
Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock
Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock
Research Collection School Of Computing and Information Systems
This paper tackles a rarely explored but critical problem within learning to hash, i.e., to learn hash codes that effectively discriminate hard similar and dissimilar examples, to empower large-scale image retrieval. Hard similar examples refer to image pairs from the same semantic class that demonstrate some shared appearance but have different fine-grained appearance. Hard dissimilar examples are image pairs that come from different semantic classes but exhibit similar appearance. These hard examples generally have a small distance due to the shared appearance. Therefore, effective encoding of the hard examples can well discriminate the relevant images within a small Hamming distance, …
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Houbing Song
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon
Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon
Other
In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.
This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.
The soil moisture sensor will systematically collect high …
Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen
Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen
Research Collection School Of Computing and Information Systems
We investigate whether additional photos beyond a single headshot makes a persona profile more informative without confusing the end user. We conduct an eye-tracking experiment and qualitative interviews with digital content creators after varying the persona in photos via a single headshot, a headshot and photo of the persona in different contexts, and a headshot with photos of different people with key persona attributes the gender and age. Findings show that contextual photos provide significantly more persona information to end users; however, showing photos of multiple people engenders confusion and lowers informativeness. Also, as anticipated, viewing additional photos requires more …
Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley
Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley
Minnesota Journal of Law, Science & Technology
No abstract provided.
Model-Driven Engineering For Big Data, Belachew Regane
Model-Driven Engineering For Big Data, Belachew Regane
African Conference on Information Systems and Technology
Accessing heterogeneous and huge amount of data through different sources heavily impacts users of data nowadays worldwide. Thus, Big Data has now become a hot emerging paradigm in computing environments. Issues in scalability, interoperability, platform independency, adaptability and reusability in big data systems are considered the main current challenges. This raises the need for appropriate software engineering approaches to develop effective and efficient Big Data system models, i.e. an approach which reduce investment cost and development time. Today, software engineering has emerged advanced methodologies to solve problems from different perspectives, while still further research is needed to overcome new challenges …
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Do Grant Funding And Pro-Environmental Spillovers Influence Household Hazardous Waste Collection?, Kustini Lim-Wavde, Robert J Kauffman, Tin Seong Kam, Gregory S. Dawsond
Do Grant Funding And Pro-Environmental Spillovers Influence Household Hazardous Waste Collection?, Kustini Lim-Wavde, Robert J Kauffman, Tin Seong Kam, Gregory S. Dawsond
Research Collection School Of Computing and Information Systems
Agency and state grant funding should be disseminated in ways so it will result in better management of household hazardous waste (HHW) and environmental sustainability. Since location seems to matter in HHW collection activities, it is important to consider pro-environmental spatial spillovers that occur, based on agency actions and waste collection behavior taking place in other locations. These may influence HHW-related practices in close-by regions. Using a county-level spatio-temporal dataset that consists of economic, demographic, and HHW data in California from 2004 to 2015, we evaluate the impact of HHW grants on HHW collection activities while considering pro-environmental spillovers. We …
The Impact Of Changes Mislabeled By Szz On Just-In-Time Defect Prediction, Yuanrui Fan, Xin Xia, Daniel A. Costa, David Lo, Ahmed E. Hassan, Shanping Li
The Impact Of Changes Mislabeled By Szz On Just-In-Time Defect Prediction, Yuanrui Fan, Xin Xia, Daniel A. Costa, David Lo, Ahmed E. Hassan, Shanping Li
Research Collection School Of Computing and Information Systems
Just-in-Time (JIT) defect prediction—a technique which aims to predict bugs at change level—has been paid more attention. JIT defect prediction leverages the SZZ approach to identify bug-introducing changes. Recently, researchers found that the performance of SZZ (including its variants) is impacted by a large amount of noise. SZZ may considerably mislabel changes that are used to train a JIT defect prediction model, and thus impact the prediction accuracy. In this paper, we investigate the impact of the mislabeled changes by different SZZ variants on the performance and interpretation of JIT defect prediction models. We analyze four SZZ variants (i.e., B-SZZ, …
Table Of Contents Jitim Vol 28 Issue 2, 2019
Table Of Contents Jitim Vol 28 Issue 2, 2019
Journal of International Technology and Information Management
Table of Contents JITIM 2, 2019
A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa
A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa
Journal of International Technology and Information Management
World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Farzad Hashemi
Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes the …
Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove
Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove
Presentations
ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …
A Database For Indexable Carbide Inserts, Andrew Yoder
A Database For Indexable Carbide Inserts, Andrew Yoder
Computer Engineering
The indexable inserts project is a collaborative effort to aggregate into a single database as many indexable carbide inserts from as many manufacturers as possible. Inserts are generally labeled with a part number following a specific standard determined by shapes and measurements, however specifications for certain aspects of carbide inserts—such as which materials they can cut—can vary by manufacturer. There currently is not a way to search a comprehensive database containing tools from multiple manufacturers for a handful of inserts that would satisfy some necessary parameters, making finding the correct tool in a shop a much more time-consuming process than …
Adversarial Contract Design For Private Data Commercialization, Parinaz Naghizadeh, Arunesh Sinha
Adversarial Contract Design For Private Data Commercialization, Parinaz Naghizadeh, Arunesh Sinha
Research Collection School Of Computing and Information Systems
The proliferation of data collection and machine learning techniques has created an opportunity for commercialization of private data by data aggregators. In this paper, we study this data monetization problem as a mechanism design problem, specifically using a contract-theoretic approach. Our proposed adversarial contract design framework provides a fundamental extension to the classic contract theory set-up in order to account for the heterogeneity in honest buyers’ demands for data, as well as the presence of adversarial buyers who may purchase data to compromise its privacy. We propose the notion of Price of Adversary (PoAdv) to quantify the effects of adversarial …
Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh
Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh
Journal of International Technology and Information Management
The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Student Theses
In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …
R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao
R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao
Research Collection School Of Computing and Information Systems
Representing procedure text such as recipe for crossmodal retrieval is inherently a difficult problem, not mentioning to generate image from recipe for visualization. This paper studies a new version of GAN, named Recipe Retrieval Generative Adversarial Network (R2GAN), to explore the feasibility of generating image from procedure text for retrieval problem. The motivation of using GAN is twofold: learning compatible cross-modal features in an adversarial way, and explanation of search results by showing the images generated from recipes. The novelty of R2GAN comes from architecture design, specifically a GAN with one generator and dual discriminators is used, which makes the …
Your Internet Data Is Rotting, Paul Royster
Your Internet Data Is Rotting, Paul Royster
UNL Libraries: Faculty Publications
The internet is growing, but old information continues to disappear daily.
Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.
Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then it …
Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo
Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo
Research Collection School Of Computing and Information Systems
In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with keyword search (PEKS) is an efficient solution to it. However, PEKS suffers from the complex key management problem in the public key infrastructure. Its variant in the identity-based setting addresses the drawback, however, almost all the schemes does not resist against offline keyword guessing attacks (KGA) by inside adversaries. In this work we introduce the notion of designated-server identity-based authenticated encryption with keyword search (dIBAEKS), in which the email sender authenticates the message while encrypting so that …
Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He
Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He
Journal of International Technology and Information Management
Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …