Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke May 2018

Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke

Library Staff Publications

No abstract provided.


Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas Apr 2018

Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas

Faculty Articles & Research

Library Awesome Sauce Undergraduate Research was a presentation at the 2018 CADRE Conference in Stillwater, OK. The presenters discussed their collaboration on a video project to film interviews of students giving progress reports about their software engineering projects. The videos were posted on the institutional repository.

The speakers discussed Student-Led research and the role that academic libraries play in facilitating student and faculty research and publishing for all disciplines on campus.


Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi Feb 2018

Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi

Library Philosophy and Practice (e-journal)

With introducing and developing AI logic, this science as a branch of computer science could impact and improve all sciences which used computer systems. LIS also could get benefit from AI in many areas. This paper survey applications of AI in library and information science and introduce the potential of library system to apply AI techniques. Intelligent systems have contributed for many librarian purposes like cataloging, indexing, information retrieval, reference, and other purposes. We applied Exploratory Factor Analysis (EFA) as a primer method for identification of the most applicable AI techniques categories in LIS. ESs are the most usable intelligent …


Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu Jan 2018

Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu

Journal of International Technology and Information Management

Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Table Of Contents Jitim Vol 27 Issue 2, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 2, 2018

Journal of International Technology and Information Management

ToC JITIM vol 27 - 2, 2018


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …


The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz Jan 2018

The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz

Open Access Theses & Dissertations

Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.

The computation offloading decision problem has been widely …