Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Internet

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 79

Full-Text Articles in Engineering

Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva Jan 2023

Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva

Conference Papers

Easy and uncontrolled access to the Internet provokes the wide propagation of false information, which freely circulates in the Internet. Researchers usually solve the problem of fake news detection (FND) in the framework of a known topic and binary classification. In this paper we study possibilities of BERT-based models to detect fake news in news flow with unknown topics and four categories: true, semi-true, false and other. The object of consideration is the dataset CheckThat! Lab proposed for the conference CLEF-2022. The subjects of consideration are the models SBERT, RoBERTa, and mBERT. To improve the quality of classification we use …


How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro Jan 2023

How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro

Articles

This article examines how the online discourse of art organisations forges relationships between the artworld and the fields of politics and economy. Combining elements of Pierre Bourdieu’s field analysis and Norman Fairclough’s critical discourse analysis, the article analyses an elite art magazine, e-flux, and an elite art museum, IMMA, and the activities of discourses, genres, and utterances on their about pages. Its results suggest that the about pages of these organisations forge links between the artworld and the fields of politics and economy by mobilising discourse in these fields and by incorporating discourse practices from these fields. The ideological tension …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce Mar 2020

Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce

Michigan Tech Publications

Internet-related electricity consumption is rising rapidly as global Internet users spend more than 6.5 h per day online. Open source ad blockers have the potential to reduce the time and thus electricity spent using computers by eliminating ads during Internet browsing and video streaming. In this study, three open source ad blockers are tested against a no-ad blocker control. Page load time is recorded for browsing a representative selection of the globally most-accessed websites, and the time spent watching ads on videos is quantified for both trending and non-trending content. The results show that page load time dropped 11% with …


False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan Jan 2020

False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan

Research outputs 2014 to 2021

The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are introduced into calculations of state variables and values. Due to the rapid growth of the Internet and associated complex adaptive systems, cyber attackers are interested in exploiting similar attacks in other application domains such as healthcare, finance, defense, governance, etc. In today’s increasingly perilous cyber world of complex adaptive systems, FDIA has become one of the top-priority issues to deal …


Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius Jan 2020

Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius

Faculty of Engineering and Information Sciences - Papers: Part B

The Internet of things (IoT), made up of a massive number of sensor devices interconnected, can be used for data exchange, intelligent identification, and management of interconnected “things.” IoT devices are proliferating and playing a crucial role in improving the living quality and living standard of the people. However, the real IoT is more vulnerable to attack by countless cyberattacks from the Internet, which may cause privacy data leakage, data tampering and also cause significant harm to society and individuals. Network security is essential in the IoT system, and Web injection is one of the most severe security problems, especially …


Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng Feb 2019

Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng

Information Science Faculty Publications

The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …


Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos Jan 2018

Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos

Computational Medicine Center Faculty Papers

MINTbase is a repository that comprises nuclear and mitochondrial tRNA-derived fragments ('tRFs') found in multiple human tissues. The original version of MINTbase comprised tRFs obtained from 768 transcriptomic datasets. We used our deterministic and exhaustive tRF mining pipeline to process all of The Cancer Genome Atlas datasets (TCGA). We identified 23 413 tRFs with abundance of ≥ 1.0 reads-per-million (RPM). To facilitate further studies of tRFs by the community, we just released version 2.0 of MINTbase that contains information about 26 531 distinct human tRFs from 11 719 human datasets as of October 2017. Key new elements include: the ability …


Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe Jan 2018

Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The initiative (since 2014) project described in this paper is a product of a joint innovative research and implementation effort of the Civil Engineering and Architecture Institute, Ural Federal University, the Science and Engineering Centre "Reliability and Safety of Large Systems and Machines", Ural Branch Russian Academy of Sciences (both Yekaterinburg), Start-up OptiCits, Barcelona, Spain and the Old Dominion University, Norfolk, VA, USA. The project is based on using the MAICS convergent technology [1] to create a versatile multi-purpose tool for optimizing the science and art of risk based governance of resilience-smart and sustainable city infrastructure and communities operating in …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Usability Simplified: A Basic Guide To Undertaking Effective Usability Testing, Garrison Reeves Apr 2016

Usability Simplified: A Basic Guide To Undertaking Effective Usability Testing, Garrison Reeves

Professional Writing and Information Design Capstone Projects

Usability can be complicated but I provide simple guidelines to effective usability. Every product has an intended purpose, and the scope and aim of usability testing is measuring if a product meets this purpose with regards to a user. Testing is used in many fields, but I intend to focus on user-centered interaction design and how to test when designing and developing such a product. I provide a simple head-start to usability testing based off of my research. Usability testing is a technique used for evaluating a product by testing the product on users who are part of the respective …


Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana Jan 2016

Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana

Conference papers

A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


The 6th Mode Of Transportation, Robert O. Walton Jan 2014

The 6th Mode Of Transportation, Robert O. Walton

Publications

The five modes of freight transportation are normally characterized as motor carriers, railroads, airlines, water carriers, and pipelines. This paper will attempt to position the Internet as the sixth mode of transportation. This paper compares the strengths and weaknesses of the traditional five modes of transportation against the proposed 6th mode of the Internet. Without including the Internet as a mode of transportation, and tracking the economic value that it adds to the economy, the economic impact of the Internet as a mode is not considered. The recommendation of this study is that the Internet should be added to the …


Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky Sep 2012

Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky

2012 Energy Justice Conference and Technology Exposition (September 17-18)

Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado

25 slides


Community-Based Internet Usage Policy Development, Mashael Alhawsah Jan 2011

Community-Based Internet Usage Policy Development, Mashael Alhawsah

Students Learning with Communities

The Internet is a tool for learning and obtaining a vast amount of information, but it is a tool which also has associated problems. The number of risks associated with the internet has been increasing both in number and in danger. As a result, protection measures must be developed to minimize the risks. One of the most important groups of such measures are Internet Usage Policies. An Internet Usage Policy addresses the problem by providing a set of guideline to be followed which minimize the risks. This dissertation investigates the development of Internet Usage Policy with the assistance of the …


The New Centurions, Lynn K. Stichnote, Mariesa Crow Jul 2010

The New Centurions, Lynn K. Stichnote, Mariesa Crow

Electrical and Computer Engineering Faculty Research & Creative Works

The current group of young people entering the workforce belong to the so-called "millennial generation." Each generation has certain characteristics that have defined its interaction with the world; the millennials have been called the "Net generation." They are the first generation that has never known life without the Internet. As a result of their protected, structured, and positively reinforced upbringing, the millennials are an exceptionally accomplished, positive, upbeat, and optimistic generation. The millennials are the quintessential multitaskers, and they are used to having the world at their fingertips through online search engines. If organizations use the best of the millennials' …


Some Skepticism About Search Neutrality, James Grimmelmann Jan 2010

Some Skepticism About Search Neutrality, James Grimmelmann

Faculty Scholarship

In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.

Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the term. …


Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi Jan 2010

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical and Computer Engineering Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Computer-Based Approach To Material And Process Selection, Manocher Djassemi Jan 2009

Computer-Based Approach To Material And Process Selection, Manocher Djassemi

Industrial Technology and Packaging

Purpose – The purpose of this paper is to provide a perspective of computer-aided material and process selection (MPS) software tools for product development purpose and present a practical approach for manufacturers and other decision makers involved in MPS.
Design/methodology/approach – A multi-criteria deductive approach for MPS is applied to a case study by taking into account the technical performances and environmental constraints. A resource-based cost modeling is also deployed to examine the implication of selected material and process on overall product cost.
Findings – The paper demonstrates the capabilities and shortcoming of existing computerized MPS software tools in assisting …


The Role Of 3pls Internet Technology In Supporting Extended Enterprise: An Exploratory Survey, Pietro Evangelista, Emilio Esposito, Edward Sweeney, Erica Staller Sep 2008

The Role Of 3pls Internet Technology In Supporting Extended Enterprise: An Exploratory Survey, Pietro Evangelista, Emilio Esposito, Edward Sweeney, Erica Staller

Conference papers

It is well accepted that ICT and Internet technology have the potential to facilitate firms’ innovation processes as it offers new and more effective support to conduct business operations. This is particularly true in the context of Extended Enterprise (EE) concept where new technologies are critical in ensuring the effective integration of physical and information flows among participating companies (Dresner et al., 1999). The role of third party logistics providers (3PLs) in logistics outsourcing has evolved along the last few years (McKinnon, 1999). Such companies are transforming their business configuration from simple transport service providers to supply chain integrators. Internet …


Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al. Jun 2007

Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.

Publications

This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware, both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1,7]. This paper is written in the context of [1,7] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Energy System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …