Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2018

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 47

Full-Text Articles in Computer Engineering

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The relationship between the adoption …


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris Dec 2018

Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris

Master's Theses

Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to …


Building A Smart Nation: Singapore's Digital Journey, Siu Loon Hoe Dec 2018

Building A Smart Nation: Singapore's Digital Journey, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Singapore’s smart nation journey began when the drive was officially announced by the country’s Prime Minister Lee Hsien Loong in November 2014 (Lee, 2014). The vision is to improve people’s lives and create more opportunities through information and communications technology (ICT). The smart nation drive is an effort by the government to co-create innovative, people-centric solutions with citizens and businesses. The three priority areas, underpinned by cyber security, are elderly, transportation and data. Since then, various digital strategies and policies have been further articulated, and digital programmes and projects implemented in the country.


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto Nov 2018

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Department of Anthropology: Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili Aug 2018

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest …


Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Aug 2018

Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the …


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow Aug 2018

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

All Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …


Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili Aug 2018

Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …


The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha Jul 2018

The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

The 4onse project studies non-conventional monitoring systems fully based on open technologies (hardware, standard protocols, software and data) for the management of resources and natural hazards in developing countries. After the design of hydro-meteorological stations and software for the collection, management and distribution of data, the study involves the installation of 30 stations in the Deduroya Oya river basin in Sri Lanka. The system will be analysed to fully understand the real cost of ownership, data quality and applicability in real situations. If properly validated, these systems can provide an alternative solution, effective and sustainable for the protection of property …


Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson Jul 2018

Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson

Electrical and Computer Engineering Faculty Publications

Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili Jul 2018

Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali Jul 2018

Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali

Dissertations and Theses Collection (Open Access)

The rapid increase in online social networking services over the last decade has pre- sented an unprecedented opportunity to observe users’ behaviour both on a societal and individual level. The insight gained from analysing such data can help foster a deeper understanding of social media users and the flow of information, while also offering valuable business applications. User relationships are among the most studied aspects of online behaviour. These relationships are not homogeneous. Past research has shown that people use social networks to both socialize and source in- formation. Hence, different types of links – used to socialize, gain information, …


Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young May 2018

Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young

Epidemiology and Environmental Health Faculty Publications

Background: Geosocial networking apps have made sexual partner-seeking easier for men who have sex with men, raising both challenges and opportunities for human immunodeficiency virus and sexually transmitted infection prevention and research. Most studies on men who have sex with men geosocial networking app use have been conducted in large urban areas, despite research indicating similar patterns of online- and app-based sex-seeking among men who have sex with men in rural and midsize cities.

Objective: The goal of our research was to examine the spatial distribution of geosocial networking app usage and characterize areas with increasing numbers of partner-seeking men …


Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González May 2018

Discovering The Needs Of People At The 10/40 Window With Data Science, Germán H. Alférez, Ceila M. González

Adventist Human-Subject Researchers Association

Abstract: We propose an approach to discover the needs of people in particular areas of Iraq, a country located at the 10/40 Window, by means of Data Science applied to Open Big Data. The resulting model predicts refugee crises and artillery attacks with high accuracy even in areas with scarce data.


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke May 2018

Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke

Library Staff Publications

No abstract provided.


Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay May 2018

Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

The Skill Builder application is assistive technology for helping individuals build skills through reminders and self-reporting feedback. The application has been built to support Android and iOS devices and followed a user-centric design methodology. Skill Builder’s architecture and development processes are set forth using cross-platform development environments and a native software development kit for the three different versions of the application that were built. The strengths and weaknesses of each of the platforms are explored.

Several studies have been proposed for helping individuals with different needs learn the skills to cope with their challenges. Applications of Skill Builder include students …


Security Analysis Of The Uconn Husky One Card, Trevor Phillips May 2018

Security Analysis Of The Uconn Husky One Card, Trevor Phillips

Honors Scholar Theses

The “Husky One Card” is the name given to student IDs at the University of Connecticut. It can identify students, faculty, and staff in a variety of situations. The One Card is used for meal plans, Husky Bucks (an equivalent of money, but valid only in the Storrs area), residence hall/ university facility access, and student health services. The current Husky One Card consists of a picture identification on the front and a standard 1-dimensional barcode and 3-track magnetic strip on the back.

The goal of this thesis is to investigate the feasibility of cloning Husky One Cards, the ease …


Building A Smart Nation: Singapore’S Digital Journey, Siu Loon Hoe May 2018

Building A Smart Nation: Singapore’S Digital Journey, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The journey towards smart city status is a strong global trend as governments around the world strive to harness technology to improve the quality of life for their citizens (United Nations, 2016). The widespread phenomenon of becoming “smart” is a key topic of discussion and research that continues to change as new digital technologies develop (Ishkineeva et al., 2015). The smart cities theme is important because it explores how governments, as providers of public goods, harness digital technologies to improve the lives of citizens around the world in the present and the future.


Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard Apr 2018

Comparative Study: Reducing Cost To Manage Accessibility With Existing Data, Claire Chu, Bill Kerneckel, Eric C. Larson, Nathan Mowat, Christopher Woodard

SMU Data Science Review

“Project Sidewalk” is an existing research effort that focuses on mapping accessibility issues for handicapped persons to efficiently plan wheelchair and mobile scooter friendly routes around Washington D.C. As supporters of this project, we utilized the data “Project Sidewalk” collected and used it to confirm predictions about where problem sidewalks exist based on real estate and crime data. We present a study that identifies correlations found between accessibility data and crime and housing statistics in the Washington D.C. metropolitan area. We identify the key reasons for increased accessibility and the issues with the current infrastructure management system. After a thorough …


Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas Apr 2018

Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas

Faculty Articles & Research

Library Awesome Sauce Undergraduate Research was a presentation at the 2018 CADRE Conference in Stillwater, OK. The presenters discussed their collaboration on a video project to film interviews of students giving progress reports about their software engineering projects. The videos were posted on the institutional repository.

The speakers discussed Student-Led research and the role that academic libraries play in facilitating student and faculty research and publishing for all disciplines on campus.


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …


Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi Feb 2018

Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi

Library Philosophy and Practice (e-journal)

With introducing and developing AI logic, this science as a branch of computer science could impact and improve all sciences which used computer systems. LIS also could get benefit from AI in many areas. This paper survey applications of AI in library and information science and introduce the potential of library system to apply AI techniques. Intelligent systems have contributed for many librarian purposes like cataloging, indexing, information retrieval, reference, and other purposes. We applied Exploratory Factor Analysis (EFA) as a primer method for identification of the most applicable AI techniques categories in LIS. ESs are the most usable intelligent …


The Construction Of Open Data Portal Using Dkan For Integrate To Multiple Japanese Local Government Open Data, Toshikazu Seto, Yoshihide Sekimoto Jan 2018

The Construction Of Open Data Portal Using Dkan For Integrate To Multiple Japanese Local Government Open Data, Toshikazu Seto, Yoshihide Sekimoto

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

In recent years, the Code for Japan, a civic tech community in Japan, has focused on the context of the FOSS4G. Consequently, the Japanese have published open data in more than 150 local governments, but these data are almost simply provided as a file on their website. And also CKAN portal are used less than 20 cities. In this study, we built open data platform that uses DKAN for integrated open data distribution of Japanese local governments.


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …