Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah Dec 2019

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah

Publications

Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual ...


Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg Nov 2019

Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg

Publications

Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet ...


Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian Oct 2019

Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian

Publications

Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing ...


Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala Sep 2019

Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala

Publications

Traffic management models that include route choice form the basis of traffic management systems. High-fidelity models that are based on rapidly evolving contextual conditions can have significant impact on smart and energy efficient transportation. Existing traffic/route choice models are generic and are calibrated on static contextual conditions. These models do not consider dynamic contextual conditions such as the location, failure of certain portions of the road network, the social network structure of population inhabiting the region, route choices made by other drivers, extreme conditions, etc. As a result, the model’s predictions are made at an aggregate level and ...


Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad Aug 2019

Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad

Publications

Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Jul 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Publications

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more ...


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results ...


Knowledge-Aware Assessment Of Severity Of Suicide Risk For Early Intervention, Manas Gaur, Amanuel Alambo, Joy Prakash Sain, Ugur Kursuncu, Krishnaprasad Thirunarayan, Ramakanth Kavuluru, Amit Sheth, Randon S. Welton, Jyotishman Pathak May 2019

Knowledge-Aware Assessment Of Severity Of Suicide Risk For Early Intervention, Manas Gaur, Amanuel Alambo, Joy Prakash Sain, Ugur Kursuncu, Krishnaprasad Thirunarayan, Ramakanth Kavuluru, Amit Sheth, Randon S. Welton, Jyotishman Pathak

Publications

Mental health illness such as depression is a significant risk factor for suicide ideation, behaviors, and attempts. A report by Substance Abuse and Mental Health Services Administration (SAMHSA) shows that 80% of the patients suffering from Borderline Personality Disorder (BPD) have suicidal behavior, 5-10% of whom commit suicide. While multiple initiatives have been developed and implemented for suicide prevention, a key challenge has been the social stigma associated with mental disorders, which deters patients from seeking help or sharing their experiences directly with others including clinicians. This is particularly true for teenagers and younger adults where suicide is the second ...


Multimodal Emotion Classification, Anurag Illendula, Amit Sheth May 2019

Multimodal Emotion Classification, Anurag Illendula, Amit Sheth

Publications

Most NLP and Computer Vision tasks are limited to scarcity of labelled data. In social media emotion classification and other related tasks, hashtags have been used as indicators to label data. With the rapid increase in emoji usage of social media, emojis are used as an additional feature for major social NLP tasks. However, this is less explored in case of multimedia posts on social media where posts are composed of both image and text. At the same time, w.e have seen a surge in the interest to incorporate domain knowledge to improve machine understanding of text. In this ...


Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun Jan 2019

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun

Publications

Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.

In this paper, we propose a new CPS design ...


Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd Jan 2019

Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd

Publications

The wide distribution and demographic composition of students seeking small unmanned aircraft system (sUAS) education presents a need to fully understand the capabilities, limitations, and dependencies of effective training tools. Concepts, practices, and technologies associated with modeling and simulation, immersive gaming, augmented and mixed-reality, and remote operation have demonstrated efficacy to support engaged student learning and objective satisfaction. Identification and comparison of key attributes critical to an aviation educational framework, such as competency-based training, enables educational designers to identify those tools with the highest potential to support successful learning. A series of factors, such as system performance, regulatory compliance, environmental ...


Determination Of Personalized Asthma Triggers From Multimodal Sensing And A Mobile App: Observational Study, Revathy Venkataramanan, Krishnaprasad Thirunarayan, Utkarshani Jaimini, Dipesh Kadariya, Hong Yung Yip, Maninder Kalra, Amit Sheth Jan 2019

Determination Of Personalized Asthma Triggers From Multimodal Sensing And A Mobile App: Observational Study, Revathy Venkataramanan, Krishnaprasad Thirunarayan, Utkarshani Jaimini, Dipesh Kadariya, Hong Yung Yip, Maninder Kalra, Amit Sheth

Publications

Background: Asthma is a chronic pulmonary disease with multiple triggers. It can be managed by strict adherence to an asthma care plan and by avoiding these triggers. Clinicians cannot continuously monitor their patients’ environment and their adherence to an asthma care plan, which poses a significant challenge for asthma management.

Objective: In this study, pediatric patients were continuously monitored using low-cost sensors to collect asthma-relevant information. The objective of this study was to assess whether kHealth kit, which contains low-cost sensors, can identify personalized triggers and provide actionable insights to clinicians for the development of a tailored asthma care plan ...


Identifying Key Topics Bearing Negative Sentiment On Twitter: Insights Concerning The 2015-2016 Zika Epidemic, Ravali Mamidi, Michele Miller, Tanvi Banerjee, William Romine, Amit Sheth Jan 2019

Identifying Key Topics Bearing Negative Sentiment On Twitter: Insights Concerning The 2015-2016 Zika Epidemic, Ravali Mamidi, Michele Miller, Tanvi Banerjee, William Romine, Amit Sheth

Publications

Background To understand the public sentiment regarding the Zika virus, social media can be leveraged to understand how positive, negative, and neutral sentiments are expressed in society. Specifically, understanding the characteristics of negative sentiment could help inform federal disease control agencies’ efforts to disseminate relevant information to the public about Zika-related issues.

Objective The purpose of this study was to analyze the public sentiment concerning Zika using posts on Twitter and determine the qualitative characteristics of positive, negative, and neutral sentiments expressed.

Methods Machine learning techniques and algorithms were used to analyze the sentiment of tweets concerning Zika. A supervised ...


Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi Jan 2019

Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi

Publications

The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC ...