Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (17)
- Singapore Management University (15)
- California Polytechnic State University, San Luis Obispo (10)
- University of Kentucky (8)
- University of Nebraska - Lincoln (7)
-
- Air Force Institute of Technology (6)
- Old Dominion University (6)
- Technological University Dublin (6)
- Selected Works (5)
- DePaul University (3)
- Embry-Riddle Aeronautical University (3)
- University of New Mexico (3)
- University of North Florida (3)
- City University of New York (CUNY) (2)
- Louisiana State University (2)
- Michigan Technological University (2)
- New Jersey Institute of Technology (2)
- University of Arkansas, Fayetteville (2)
- University of Pennsylvania Carey Law School (2)
- Western University (2)
- Cedarville University (1)
- East Tennessee State University (1)
- Edith Cowan University (1)
- Florida International University (1)
- Kennesaw State University (1)
- Liberty University (1)
- Montclair State University (1)
- Morehead State University (1)
- Seattle Pacific University (1)
- South Dakota State University (1)
- Keyword
-
- Cloud computing (4)
- Internet (4)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (3)
- Android (3)
- Communication (3)
-
- Controls (3)
- OpenFlow (3)
- Social media (3)
- Thesis; University of North Florida; UNF; Dissertations (3)
- App (2)
- Arduino (2)
- Automation (2)
- Biometrics (2)
- CAN (2)
- Chaos (2)
- Cloud security (2)
- Content analysis (2)
- Data analytics (2)
- Honeypot (2)
- Industrial control systems (2)
- MPI (2)
- Noise (2)
- Privacy (2)
- SDN (2)
- Security (2)
- Smartphones (2)
- #antcenter (1)
- AFN (1)
- Academic -- UNF -- Computing; Cloud Computing; Infrastructure-as-a-Service; Benchmarking; Performance evaluation (1)
- Academic -- UNF -- Computing; Cloud Platforms; HIbench tools; Big Data Applications; Performance Evaluations (1)
- Publication
-
- Journal of International Technology and Information Management (17)
- Research Collection School Of Computing and Information Systems (12)
- Information Science Faculty Publications (5)
- Theses and Dissertations (5)
- Conference papers (4)
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (3)
- Computer Science and Software Engineering (3)
- UNF Graduate Theses and Dissertations (3)
- 2017 Academic High Altitude Conference (2)
- All Faculty Scholarship (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (2)
- CSE Technical Reports (2)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Computer Engineering (2)
- Dissertations and Theses Collection (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Thesis and Dissertation Repository (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- LSU Doctoral Dissertations (2)
- Master's Theses (2)
- Matt Schultz (2)
- Mechanical Engineering (2)
- Publications and Research (2)
- The ITB Journal (2)
- Theses (2)
- AFIT Patents (1)
- CDM Annual Reports (1)
- Community & Leadership Development Faculty Publications (1)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
Articles 1 - 30 of 120
Full-Text Articles in Computer Engineering
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Electronic Thesis and Dissertation Repository
The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce …
Pubwc Bathroom Review App, Clay Jacobs
Pubwc Bathroom Review App, Clay Jacobs
Computer Science and Software Engineering
For my senior project, I developed an iOS application to allow users to find, rate, and review nearby public restrooms. The app takes advantage of crowdsourced data to collect bathroom and review information. I also created a REST API to interface with the backend database that could be used to port the application to other platforms.
Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu
Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu
Research Collection School Of Computing and Information Systems
Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have …
Meeting Real-Time Constraint Of Spectrum Management In Tv Black-Space Access, Zhongyuan Zhao
Meeting Real-Time Constraint Of Spectrum Management In Tv Black-Space Access, Zhongyuan Zhao
CSE Technical Reports
The TV set feedback feature standardized in the next generation TV system, ATSC 3.0, would enable opportunistic access of active TV channels in future Cognitive Radio Networks. This new dynamic spectrum access approach is named as black-space access, as it is complementary of current TV white space, which stands for inactive TV channels. TV black-space access can significantly increase the available spectrum of Cognitive Radio Networks in populated urban markets, where spectrum shortage is most severe while TV whitespace is very limited. However, to enable TV black-space access, secondary user has to evacuate a TV channel in a timely manner …
Commentary: Wanted - A New Generation Of Accountants, Poh Sun Seow, Gary Pan, Clarence Goh
Commentary: Wanted - A New Generation Of Accountants, Poh Sun Seow, Gary Pan, Clarence Goh
Research Collection School Of Accountancy
Facing a new wave of automation, young accountants must redefine their role and their value-add to their company, say three Singapore Management University observers.
Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei
Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The emergence of wearable and implantable machines manufactured artificially or synthesized biologically opens up a new horizon for patient-centered health services such as medical treatment, health monitoring, and rehabilitation with minimized costs and maximized popularity when provided remotely via the Internet. In particular, a swarm of machines at the scale of a single cell down to the nanoscale can be deployed in the body by the non-invasive or minimally invasive operation (e.g., swallowing and injection respectively) to perform various tasks. However, an individual machine is only able to perform basic tasks so it needs to exchange data with the others …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Table Of Contents Jitim Vol 26 Issue 4, 2017
Table Of Contents Jitim Vol 26 Issue 4, 2017
Journal of International Technology and Information Management
Table of Contents
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Master's Theses
Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches …
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
All Faculty Scholarship
Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …
Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson
Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Chase R. Johnson on November 13, 2017.
Bikemate: Bike Riding Behavior Monitoring With Smartphones, Weixi Gu, Zimu Zhou, Yuxun Zhou, Han Zou, Yunxin Liu, Costas J. Spanos, Lin Zhang
Bikemate: Bike Riding Behavior Monitoring With Smartphones, Weixi Gu, Zimu Zhou, Yuxun Zhou, Han Zou, Yunxin Liu, Costas J. Spanos, Lin Zhang
Research Collection School Of Computing and Information Systems
Detecting dangerous riding behaviors is of great importance to improve bicycling safety. Existing bike safety precautionary measures rely on dedicated infrastructures that incur high installation costs. In this work, we propose BikeMate, a ubiquitous bicycling behavior monitoring system with smartphones. BikeMate invokes smartphone sensors to infer dangerous riding behaviors including lane weaving, standing pedalling and wrong-way riding. For easy adoption, BikeMate leverages transfer learning to reduce the overhead of training models for different users, and applies crowdsourcing to infer legal riding directions without prior knowledge. Experiments with 12 participants show that BikeMate achieves an overall accuracy of 86.8% for lane …
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
LSU Doctoral Dissertations
Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.
In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …
A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu
A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu
LSU Doctoral Dissertations
A data center (DC) has been a fundamental infrastructure for academia and industry for many years. Applications in DC have diverse requirements on communication. There are huge demands on data center network (DCN) control frameworks (CFs) for coordinating communication traffic. Simultaneously satisfying all demands is difficult and inefficient using existing traditional network devices and protocols. Recently, the agile software-defined Networking (SDN) is introduced to DCN for speeding up the development of the DCNCF. Application-awareness preserves the application semantics including the collective goals of communications. Previous works have illustrated that application-aware DCNCFs can much more efficiently allocate network resources by explicitly …
An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim
An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Social media platforms are one of the fastest ways to disseminate information but they have also been used as a means to spread rumors. If left unchecked, rumors have serious consequences. Counter-rumors, messages used to refute rumors, are an important means of rumor curtailment. The objective of this paper is to examine the types of rumor and counter-rumor messages generated in Twitter in response to the falsely reported death of a politician, Lee Kuan Yew, who was Singapore’s first Prime Minister. Our content analysis of 4321Twitter tweets about Lee’s death revealed six categories of rumor messages, four categories ofcounter-rumor messages …
Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang Zhang, Lina Yao, Chaoran Huang, Quan Z. Sheng, Xianzhi Wang
Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang Zhang, Lina Yao, Chaoran Huang, Quan Z. Sheng, Xianzhi Wang
Research Collection School Of Computing and Information Systems
Electroencephalography (EEG) signal based intent recognition has recently attracted much attention in both academia and industries, due to helping the elderly or motor-disabled people controlling smart devices to communicate with outer world. However, the utilization of EEG signals is challenged by low accuracy, arduous and time-consuming feature extraction. This paper proposes a 7-layer deep learning model to classify raw EEG signals with the aim of recognizing subjects’ intents, to avoid the time consumed in pre-processing and feature extraction. The hyper-parameters are selected by an Orthogonal Array experiment method for efficiency. Our model is applied to an open EEG dataset provided …
Enabling Phased Array Signal Processing For Mobile Wifi Devices, Kun Qian, Chenshu Wu, Zheng Yang, Zimu Zhou, Xu Wang, Yunhao Liu
Enabling Phased Array Signal Processing For Mobile Wifi Devices, Kun Qian, Chenshu Wu, Zheng Yang, Zimu Zhou, Xu Wang, Yunhao Liu
Research Collection School Of Computing and Information Systems
Modern mobile devices are equipped with multiple antennas, which brings various wireless sensing applications such as accurate localization, contactless human detection, and wireless human-device interaction. A key enabler for these applications is phased array signal processing, especially Angle of Arrival (AoA) estimation. However, accurate AoA estimation on commodity devices is non-trivial due to limited number of antennas and uncertain phase offsets. Previous works either rely on elaborate calibration or involve contrived human interactions. In this paper, we aim to enable practical AoA measurements on commodity off-the-shelf (COTS) mobile devices. The key insight is to involve users’ natural rotation to formulate …
How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby
How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby
2017 Academic High Altitude Conference
The Irdium Satelitte Network has greatly increased safety in the ballooning field by enabling a greater span of control in flight awarness and termination. This enhanced awareness stems from accurate high interval GPS coordinates that can be integrated into ground station tracking software. The Iridium Network creates the ability to send activation commands remotely with high reliabilty using emails. Additionally this feature has the ability to use local rf transmiters and recievers to increase the flexibilty of cutdown designs. The Iridium Modems provides significant coverage regardless of altitude and loss of ground communication. It is marketed at econmical price point …
2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr
2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr
2017 Academic High Altitude Conference
As part of the NASA Space Grant 2017 Eclipse Ballooning Project, Montana Space Grant Consortium designed a camera system capable of transmitting still images from a balloon borne payload to a remote ground station via a RFD-900 radio. This payload consists of a Raspberry Pi, a Raspberry Pi camera, custom power supply and a RFD 900MHz radio. This system was designed to record pictures at high and low resolution at altitude. The low resolution images could be selected for downlinking back to the ground via the radio, while the high resolution pictures were saved to the Raspberry Pi memory card. …
Web Archiving At Gvsu, Annie Benefiel, Matt Schultz
Web Archiving At Gvsu, Annie Benefiel, Matt Schultz
Matt Schultz
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Computer Science ETDs
As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …
Access Update For Gvsu, Matt Schultz, Kyle Felker
Access Update For Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt
How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt
SPU Works
Researchers in many disciplines have turned to Google Street View to replace pedestrian- or carbased in-person observation of streetscapes. It is most prevalent within the research literature on the relationship between neighborhood environments and public health but has been used as diverse as disaster recovery, ecology and wildlife habitat, and urban design. Evaluations of the tool have found that the results of GSV-based observation are similar to the results from in-person observation although the similarity depends on the type of characteristic being observed. Larger, permanent and discrete features showed more consistency between the two methods and smaller, transient and judgmental …
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng
Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng
Research Collection School Of Computing and Information Systems
Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we characterize and investigate the root causes of such dynamics in cellular traffic through a big cellular usage dataset covering 1.5 million users and 5,929 cell towers in a major city of China. We reveal intensive spatio-temporal dependency even among distant cell towers, which is largely overlooked in …
Event And Time-Triggered Control Module Layers For Individual Robot Control Architectures Of Unmanned Agricultural Ground Vehicles, Tyler Troyer
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
Automation in the agriculture sector has increased to an extent where the accompanying methods for unmanned field management are becoming more economically viable. This manifests in the industry’s recent presentation of conceptual cab-less machines that perform all field operations under the high-level task control of a single remote operator. A dramatic change in the overall workflow for field tasks that historically assumed the presence of a human in the immediate vicinity of the work is predicted. This shift in the entire approach to farm machinery work provides producers increased control and productivity over high-level tasks and less distraction from operating …
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech
Journal of International Technology and Information Management
It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …
Table Of Contents Jitim Vol 26 Issue 3, 2017
Table Of Contents Jitim Vol 26 Issue 3, 2017
Journal of International Technology and Information Management
Table of Contents