Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (16)
- Air Force Institute of Technology (11)
- Singapore Management University (11)
- Purdue University (9)
- Portland State University (7)
-
- Embry-Riddle Aeronautical University (6)
- California Polytechnic State University, San Luis Obispo (5)
- City University of New York (CUNY) (5)
- University of Kentucky (5)
- Old Dominion University (4)
- Selected Works (4)
- University of Nebraska - Lincoln (4)
- University of New Mexico (4)
- University of Arkansas, Fayetteville (3)
- University of Massachusetts Amherst (3)
- West Virginia University (3)
- Western University (3)
- DePaul University (2)
- Florida International University (2)
- Northern Illinois University (2)
- Southern Methodist University (2)
- University of Missouri, St. Louis (2)
- University of Nebraska at Omaha (2)
- Brigham Young University (1)
- Bucknell University (1)
- Indian Statistical Institute (1)
- James Madison University (1)
- Kean University (1)
- Kennesaw State University (1)
- Lindenwood University (1)
- Keyword
-
- Blockchain (8)
- Internet of Things (6)
- Machine learning (6)
- Center_CCR (5)
- Digital Agriculture (5)
-
- Internet of Underground Things (5)
- Underground Communications (5)
- Wireless Underground Channel (5)
- Cybersecurity (4)
- Internet (4)
- Technology (4)
- Algorithms (3)
- Artificial intelligence (3)
- Authentication (3)
- Automation (3)
- Internet of Things (IoT) (3)
- IoT (3)
- V2V (3)
- Adaboost (2)
- Algorithm (2)
- Android (2)
- Application (2)
- Applications (2)
- Artificial Intelligence (2)
- Cloud Computing (2)
- Communication (2)
- Computer Science (2)
- Consumer (2)
- Cryptography (2)
- Data analysis (2)
- Publication
-
- Journal of International Technology and Information Management (16)
- Theses and Dissertations (14)
- Faculty Publications (8)
- Research Collection School Of Computing and Information Systems (7)
- Undergraduate Research & Mentoring Program (6)
-
- Computer Engineering (3)
- Doctoral Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Publications (3)
- Computer Science Faculty Publications (2)
- Computer Science Faculty Works (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Theses and Dissertations (2)
- FIU Electronic Theses and Dissertations (2)
- Graduate Research Theses & Dissertations (2)
- Houbing Song (2)
- Ilker Karaca (2)
- Information Science Faculty Publications (2)
- Library Philosophy and Practice (e-journal) (2)
- MITB Thought Leadership Series (2)
- Master's Theses (2)
- Publications and Research (2)
- Student Works (2)
- Theses (2)
- Theses and Dissertations--Computer Science (2)
- VMASC Publications (2)
- Biological and Agricultural Engineering Undergraduate Honors Theses (1)
- CDM Annual Reports (1)
- Center for Cybersecurity (1)
- Publication Type
Articles 61 - 90 of 141
Full-Text Articles in Computer Engineering
Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh
Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh
Journal of International Technology and Information Management
The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …
Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty
Multi-Vector Tracking Of Wifi And Zigbee Devices, Calvin Andrew Laverty
Master's Theses
Location privacy preservation has shifted to the forefront of discussions about next generation wireless networks. While pseudonym-changing schemes have been proposed to preserve an individual's privacy, simulation has shown that new association attack models render these schemes useless. The major contribution of this thesis is the implementation of a tracking network with commodity hardware on the California Polytechnic State University campus which leverages the combination of de-anonymization strategies on captured wireless network data to show the effectiveness of a pseudonym-changing scheme for wireless identification across WiFi and Zigbee protocols.
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
Certain HTTP Cookies on certain sites can be a source of content bias in archival crawls. Accommodating Cookies at crawl time, but not utilizing them at replay time may cause cookie violations, resulting in defaced composite mementos that never existed on the live web. To address these issues, we propose that crawlers store Cookies with short expiration time and archival replay systems account for values in the Vary header along with URIs.
Way-Finding: A New Approach To Studying Digital Communications, William Daniel Glade
Way-Finding: A New Approach To Studying Digital Communications, William Daniel Glade
Theses and Dissertations
This work further develops the way-finding model first proposed by Pearson and Kosicki (2017) which examines the flow of information in the digital age. Way-finding systems are online systems that help individuals find information—i.e. social media, search engines, email, etc. Using a grounded theory methodology, this new framework was explored in greater detail. Way-finding theory was created using the context of the elaboration likelihood model, gatekeeping theory, algorithmic gatekeepers, and the existence of the filter bubble phenomenon. This study establishes the three basic pillars of way-finding theory: the user’s mindset when accessing way-finding systems, the perception of how popular way-finding …
Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro
Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro
Theses
The latest 5G technology in wireless communication has led to an increasing demand for higher data rates and low latencies. The overall latency of the system in a cloud radio access network is greatly affected by the decoding latency in the uplink channel. Various proposed solutions suggest using network function virtualization (NFV). NFV is the process of decoupling the network functions from hardware appliances. This provides the exibility to implement distributed computing and network coding to effectively reduce the decoding latency and improve the reliability of the system. To ensure the system is cost effective, commercial off the shelf (COTS) …
Spring 2019
In The Loop
Lab Life: New and improved School of Computing labs inspire research in robotics and engineering; A Festival to Remember: Students thrive in film festival environments; Next Gen Data Scientists: Data Science Academy introduces high school students to the big world of data; A Well-Designed Design Colloquium; Game Face: "Sausage Sports Club: creator and CDM alumnus Chris Wade shares the story behind his playful Nintendo Switch game: Connected from Afar: Graduate student Sierra Sellman makes the most of her online degree program; Seen and Heard; Bravo! Bravo!
Your Internet Data Is Rotting, Paul Royster
Your Internet Data Is Rotting, Paul Royster
UNL Libraries: Faculty Publications
The internet is growing, but old information continues to disappear daily.
Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.
Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then it …
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Information Science Faculty Publications
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …
Twitter And Disasters: A Social Resilience Fingerprint, Benjamin A. Rachunok, Jackson B. Bennett, Roshanak Nateghi
Twitter And Disasters: A Social Resilience Fingerprint, Benjamin A. Rachunok, Jackson B. Bennett, Roshanak Nateghi
Purdue University Libraries Open Access Publishing Fund
Understanding the resilience of a community facing a crisis event is critical to improving its adaptive capacity. Community resilience has been conceptualized as a function of the resilience of components of a community such as ecological, infrastructure, economic, and social systems, etc. In this paper, we introduce the concept of a “resilience fingerprint” and propose a multi-dimensional method for analyzing components of community resilience by leveraging existing definitions of community resilience with data from the social network Twitter. Twitter data from 14 events are analyzed and their resulting resilience fingerprints computed. We compare the fingerprints between events and show that …
Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter
Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter
Senior Honors Projects, 2010-2019
Water quality monitoring traditionally occurs via resource intensive field surveys, such as when a researcher manually collects data in a stream. Limiting factors such as time, money, and accessibility often result in less oversight of impaired water bodies, significantly threatening ecosystemic health and related ecosystem services. According to the United States Environmental Protection Agency, 84% of rivers and streams within the United States remain unassessed, resulting in significant lapses in available data. Such lapses prohibit efficient and effective monitoring, restoration, and conservation efforts throughout the United States. The objective of this project was to employ an unmanned aerial vehicle to …
Granny Pod Virtual Assistant, David Connolly, Bing Chen
Granny Pod Virtual Assistant, David Connolly, Bing Chen
Theses/Capstones/Creative Projects
Dr. Chen is working on a sustainable small house (SSH) project, sometimes called the “Granny Pod”. Regulations will soon allow homeowners to house their parents on their property, which can be an opportunity live independently in a cheap, sustainable, and convenient alternative to a retirement community. To help achieve this vision, a Virtual Assistant system for the SSH was developed. The system uses a Google Home or Amazon Echo to respond to the voice command “Hey Google (or Alexa), I need help” by contacting the nearby homeowner or caretaker. It alerts the resident who is at the door when the …
The Future Robo-Advisor, Catalin Burlacu
The Future Robo-Advisor, Catalin Burlacu
MITB Thought Leadership Series
The accelerated digitalisation of both people and business around the world today is having a huge impact on the investment management and advisory space. The addition of new and vastly larger data sets, as well as exponentially more sophisticated analytical tools to turn that data into usable information is constantly changing the way investments are decided on, made and managed.
Applications Of Fog Computing In Video Streaming, Kyle Smith
Applications Of Fog Computing In Video Streaming, Kyle Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …
Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He
Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He
Journal of International Technology and Information Management
Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …
Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond
Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond
Journal of International Technology and Information Management
There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …
The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski
The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski
Journal of International Technology and Information Management
Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …
College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch
College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch
Journal of International Technology and Information Management
College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished using …
Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford
Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford
Biological and Agricultural Engineering Undergraduate Honors Theses
Low-Impact Development (LID) is an attempt to sustainably respond to the potential hazards posed by urban expansion. Green roofs are an example of LID design meant to reduce the amount of runoff from storm events that are becoming more intense and less predictable while also providing insulation to buildings. LID has not yet been widely adopted as it is often a more expensive alternative to conventional infrastructure (Bowman et. al., 2009). However, its benefits are apparent. The University of Arkansas Honors College awarded a grant to research the large green roof atop Hillside Auditorium. One part of this grant is …
Fashion Merchandising: An Augmented Reality, Naeha A. Sayed
Fashion Merchandising: An Augmented Reality, Naeha A. Sayed
Dissertations, Theses, and Capstone Projects
There is a continuous and constant transformation in the field of Augmented Reality (AR), both in the Retail, and the Manufacturing sector. It has started to influence everything from fashion runway shows to online shopping. Consumers dynamics have shifted in the fashion industry, the ways becoming more dominant than the old observant ones- the simple buying experience no longer satisfies them. Due to the emergence of the new digital platforms and technological enhancements, the consumers are looking for more- be it a more exciting buying experience or more user interaction or more enhanced products. This technological change starts with the …
University Of Rhode Island Course Information Assistant, Daniel Gauthier
University Of Rhode Island Course Information Assistant, Daniel Gauthier
Senior Honors Projects
Personal voice-interactive systems have become ubiquitous in daily life. There are many of these digital assistants such as Siri, Alexa, and Google Assistant. The chances are high you have access to one right now. This technology has reached a point where the context of a conversation can be maintained, which is a vast improvement over earlier technology. Interactions without conversational context can limit interactions greatly and this was the case for previous digital assistants. Every time someone would say something to an assistant, it was like they were constantly changing operators on a customer service line. The assistants can now …
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Chancellor’s Honors Program Projects
No abstract provided.
Efficient Private Information Retrieval, Konstantinos Nikolopoulos
Efficient Private Information Retrieval, Konstantinos Nikolopoulos
Dissertations, Theses, and Capstone Projects
A vast amount of today's Internet users' on line activities consists of queries to various types of databases. From traditional search engines to modern cloud based services, a person's everyday queries over a period of time on various data sources, will leave a trail visible to the query processor, which can reveal significant and possibly sensitive information about her. Private Information Retrieval (PIR) algorithms can be leveraged for providing perfect privacy to users' queries, though at a restrictive computational cost. In this work, we consider today's highly distributed computing environments, as well as certain secure-hardware devices, for optimizing existing PIR …
Emerging App Issue Identification From User Feedback: Experience On Wechat, Cuiyun Gao, Wujie Zheng, Yuetang Deng, David Lo, Jichuan Zeng, Michael R. Lyu, Irwin King
Emerging App Issue Identification From User Feedback: Experience On Wechat, Cuiyun Gao, Wujie Zheng, Yuetang Deng, David Lo, Jichuan Zeng, Michael R. Lyu, Irwin King
Research Collection School Of Computing and Information Systems
It is vital for popular mobile apps with large numbers of users to release updates with rich features while keeping stable user experience. Timely and accurately locating emerging app issues can greatly help developers to maintain and update apps. User feedback (i.e., user reviews) is a crucial channel between app developers and users, delivering a stream of information about bugs and features that concern users. Methods to identify emerging issues based on user feedback have been proposed in the literature, however, their applicability in industry has not been explored. We apply the recent method IDEA to WeChat, a popular messenger …
Community Discovery In Heterogeneous Social Networks, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Community Discovery In Heterogeneous Social Networks, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Research Collection School Of Computing and Information Systems
Discovering social communities of web users through clustering analysis of heterogeneous link associations has drawn much attention. However, existing approaches typically require the number of clusters a priori, do not address the weighting problem for fusing heterogeneous types of links, and have a heavy computational cost. This chapter studies the commonly used social links of users and explores the feasibility of the proposed heterogeneous data co-clustering algorithm GHF-ART, as introduced in Sect. 3.6, for discovering user communities in social networks. Contrary to the existing algorithms proposed for this task, GHF-ART performs real-time matching of patterns and one-pass learning, which guarantees …
Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah
Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah
Faculty Publications
The extra quantities of wastewater entering the pipes can cause backups that result in sanitary sewer overflows. Urban underground infrastructure monitoring is important for controlling the flow of extraneous water into the pipelines. By combining the wireless underground communications and sensor solutions, the urban underground IoT applications such as real time wastewater and storm water overflow monitoring can be developed. In this paper, the path loss analysis of wireless underground communications in urban underground IoT for wastewater monitoring has been presented. It has been shown that the communication range of up to 4 kilometers can be achieved from an underground …
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Master of Science in Software Engineering Theses
In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large scalable …
An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam
An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam
Faculty Publications
Underground sensing and propagation of Signals in the Soil (SitS) medium is an electromagnetic issue. The path loss prediction with higher accuracy is an open research subject in digital agriculture monitoring applications for sensing and communications. The statistical data are predominantly derived from site-specific empirical measurements, which is considered an impediment to universal application. Nevertheless, in the existing literature, statistical approaches have been applied to the SitS channel modeling, where impulse response analysis and the Friis open space transmission formula are employed as the channel modeling tool in different soil types under varying soil moisture conditions at diverse communication distances …
Interaction-Aware Arrangement For Event-Based Social Networks, Feifei Kou, Zimu Zhou, Hao Cheg, Junping Du, Yexuan Shi, Pan Xu
Interaction-Aware Arrangement For Event-Based Social Networks, Feifei Kou, Zimu Zhou, Hao Cheg, Junping Du, Yexuan Shi, Pan Xu
Research Collection School Of Computing and Information Systems
No abstract provided.
Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra
Performance Analysis Of Voting Algorithms In Wireless Sensor Networks, Aditi Mishra
Computer Science Graduate Research Workshop
No abstract provided.
The Applications Of Grid Cells In Computer Vision, Keaton Kraiger
The Applications Of Grid Cells In Computer Vision, Keaton Kraiger
Undergraduate Research & Mentoring Program
In this study we present a novel method for position and scale invariant object representation based on a biologically-inspired framework. Grid cells are neurons in the entorhinal cortex whose multiple firing locations form a periodic triangular array, tiling the surface of an animal’s environment. We propose a model for simple object representation that maintains position and scale invariance, in which grid maps capture the fundamental structure and features of an object. The model provides a mechanism for identifying feature locations in a Cartesian plane and vectors between object features encoded by grid cells. It is shown that key object features …