Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (19)
- Singapore Management University (15)
- Kansas State University Libraries (13)
- California Polytechnic State University, San Luis Obispo (12)
- Selected Works (5)
-
- Western University (5)
- Tennessee State University (4)
- University of Kentucky (3)
- University of Massachusetts Amherst (3)
- Claremont Colleges (2)
- Florida International University (2)
- Georgia Southern University (2)
- James Madison University (2)
- Kennesaw State University (2)
- Purdue University (2)
- Technological University Dublin (2)
- University of Nebraska - Lincoln (2)
- University of Pennsylvania Carey Law School (2)
- University of Tennessee, Knoxville (2)
- Air Force Institute of Technology (1)
- Edith Cowan University (1)
- Embry-Riddle Aeronautical University (1)
- La Salle University (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University (1)
- Maurer School of Law: Indiana University (1)
- Morehead State University (1)
- Old Dominion University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- Keyword
-
- Security (5)
- Android (3)
- Cloud Computing (3)
- Digital preservation (3)
- Networking (3)
-
- Arduino (2)
- Assessment (2)
- Bluetooth (2)
- Data mining (2)
- Digital collections (2)
- Digitization (2)
- Energy (2)
- IaaS (2)
- Internet (2)
- Internet of things (2)
- Iot (2)
- Key management (2)
- Localization (2)
- Low (2)
- Management (2)
- Mobile devices (2)
- Mobile sink (2)
- Network (2)
- Open source software (2)
- PaaS (2)
- Sensor (2)
- Servers (2)
- Smart Grid (2)
- Social Media (2)
- Ultrasound (2)
- Publication
-
- Journal of International Technology and Information Management (19)
- Research Collection School Of Computing and Information Systems (15)
- Central Plains Network for Digital Asset Management (12)
- Computer Engineering (9)
- Electronic Thesis and Dissertation Repository (5)
-
- Computer Science Faculty Research (4)
- Masters Theses (4)
- All Faculty Scholarship (2)
- Articles (2)
- FIU Electronic Theses and Dissertations (2)
- Master's Theses (2)
- Matt Schultz (2)
- ASA Multidisciplinary Research Symposium (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CMC Senior Theses (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Software Engineering (1)
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Elinvo (Electronics, Informatics, and Vocational Education) (1)
- HON499 projects (1)
- Harold Herzog, PhD (1)
- Honors College Theses (1)
- Honors Thesis (1)
- Human Factors and Applied Psychology Student Conference (1)
- Independent Study Project (ISP) Collection (1)
- Indiana Law Journal (1)
- Information Science Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 119
Full-Text Articles in Computer Engineering
Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto
Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto
Elinvo (Electronics, Informatics, and Vocational Education)
Sumber polusi udara salah satunya adalah gas buang kendaraan bermotor, gas yang dihasilkan dari pembakaran bahan bakar terjadi pada mesin kendaraan. Tingkat deteksi aplikasi dari sistem pembuangan kendaraan bermotor yang dibuat digunakan untuk mendeteksi jumlah kadar gas H2, gas EtOH dan gas CO dengan menggunakan sensor TGS2201. Data dari sensor diolah oleh arduino dan hasilnya ditampilkan pada PC melalui port serial, desain program aplikasi dengan menggunakan Bahasa C.
Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali
Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali
Electronic Thesis and Dissertation Repository
Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.
A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and …
Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park
Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park
Information Science Faculty Publications
Two of the most promising candidate solutions for realizing the next-generation all-IP mobile networks are Mobile IPv6 (MIPv6), which is the host-based and global mobility supporting protocol, and Proxy MIPv6 (PMIPv6), which is the network-based and localized mobility supporting protocol. However, the unprecedented growth of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) architecture by the Internet engineering task force DMM working group. The extension of the basic MIPv6 and PMIPv6 to support their distributed and scalable deployment in the future is one of the major goals of the DMM working group. We propose an …
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Computer Engineering
“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2
In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …
Rocket Stats, Kyle Cornelison
Rocket Stats, Kyle Cornelison
Computer Science and Software Engineering
An Android application to allow Rocket League players to view their stats and track progress.
Quantifying Parkinson's Disease Symptoms Using Mobile Devices, Charles R. Aylward
Quantifying Parkinson's Disease Symptoms Using Mobile Devices, Charles R. Aylward
Master's Theses
Current assessments for evaluating the progression of Parkinson’s Disease are largely qualitative and based on small sets of data obtained from occasional doctor-patient interactions. There is a clinical need to improve the techniques used for mitigating common Parkinson’s Disease symptoms. Available data sets for researching the disease are minimal, hindering advancement toward understanding the underlying causes and effectiveness of treatment and therapies. Mobile devices present an opportunity to continuously monitor Parkinson’s Disease patients and collect important information regarding the severity of symptoms. The evolution of digital technology has opened doors for clinical research to extend beyond the clinic by incorporating …
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Research Collection School Of Computing and Information Systems
Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
Research Collection School Of Computing and Information Systems
With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Matt Schultz
Cpn-Dam Business Meeting, Amanda Harlan
Cpn-Dam Business Meeting, Amanda Harlan
Central Plains Network for Digital Asset Management
CPN-DAM Business Meeting
Wednesday, November 16, 2016
3:55pm - 4:55pm CST
Agenda
3:55-4:05pm Introduction
4:05-4:10pm Announce Executive Committee members for 2017-2018
4:10-4:25pm Reports from the Planning and Design Committees
4:25-4:40pm Report from Ad Hoc Executive Committee
-
Summary of what was accomplished in 2016
-
Action Items for 2017
-
Become a nonprofit corporation
-
Finalize membership and fees
-
Set up standing committees
-
2017 conference and proceedings
-
Contacting vendor/sponsors/organizations for possible sponsorship
4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved
4:45-4:50pm Comments from audience
4:50-4:55pm Closing statements
Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau
Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau
Central Plains Network for Digital Asset Management
In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the …
Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh
Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh
Central Plains Network for Digital Asset Management
The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …
Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson
Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson
Central Plains Network for Digital Asset Management
Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.
This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …
Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez
Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez
Central Plains Network for Digital Asset Management
This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.
Digital Preservation Efforts At Usm, Elizabeth La Beaud
Digital Preservation Efforts At Usm, Elizabeth La Beaud
Central Plains Network for Digital Asset Management
The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …
3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh
3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh
Central Plains Network for Digital Asset Management
3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Central Plains Network for Digital Asset Management
Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …
Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness
Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness
Central Plains Network for Digital Asset Management
After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.
This poster presentation is the first 15 minutes of video with …
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Central Plains Network for Digital Asset Management
Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.
This session …
The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion
The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion
Central Plains Network for Digital Asset Management
In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …
The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor
The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor
Central Plains Network for Digital Asset Management
The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …
Rapid Deployment Indoor Localization Without Prior Human Participation, Han Xu, Zimu Zhou, Longfei Shangguan
Rapid Deployment Indoor Localization Without Prior Human Participation, Han Xu, Zimu Zhou, Longfei Shangguan
Research Collection School Of Computing and Information Systems
In this work, we propose RAD, a RApid Deployment localization framework without human sampling. The basic idea of RAD is to automatically generate a fingerprint database through space partition, of which each cell is fingerprinted by its maximum influence APs. Based on this robust location indicator, fine-grained localization can be achieved by a discretized particle filter utilizing sensor data fusion. We devise techniques for CIVD-based field division, graph-based particle filter, EM-based individual character learning, and build a prototype that runs on commodity devices. Extensive experiments show that RAD provides a comparable performance to the state-of-the-art RSSbased methods while relieving it …
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Kansas Library Association College and University Libraries Section Proceedings
K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)
Infrastructure-Free Secure Pairing Of Mobile Devices, Chunqiu Liu
Infrastructure-Free Secure Pairing Of Mobile Devices, Chunqiu Liu
Masters Theses
Mobile devices have advanced tremendously during the last ten years and have changed our daily life in various ways. Secure pairing of mobile devices has become a significant issue considering the huge quantity of active mobile device connections and mobile traffic. However, current commonly used file sharing mobile applications rely on servers completely that are always targeted by attackers. In this thesis work, an innovative mechanism is proposed to generate symmetric keys on both mobile devices independently from a shared movement in arbitrary pattern, which means no server needs to be involved and no data exchange needed. A secret wireless-communication …
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Masters Theses
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers defense mechanism based on a proof-of-work protocol. This thesis proposes a new protocol to protect controllers against such attacks, shows implementation of the system and analyze the its performance. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of work, its adjustable difficulty, its ability to work withmultiple network providers, and its use of existing TCP/IP header fields, ensure that this approach can be used in practice.
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
All Faculty Scholarship
Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
The Winthrop McNair Research Bulletin
The purpose of this study is to further understand the relationship of family background and how it affects self-esteem and the perception of gender roles in online imagery. This study focuses on how our history serves as a lens to see gender roles. The schema theory, created by Robert Axelrod, is a model suggesting that people have a “pre-existing assumption about the way the world is organized” (Axelford, 1974). Furthering this theory is Bem's (1981) Gender Schema Theory, which proposes that one's sexual self-concept affects how one structures items in memory. These theories, applied to the understood roles and activities …
Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat
Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat
ASA Multidisciplinary Research Symposium
Enterprise Computing has quickly become of paramount importance for businesses vying to survive in today’s unlimited competition market. SAP software has become a front runner and leader of business and technical innovation in the enterprise computing industry. Major fortune 500 companies are using SAP software as their main operating software. As the need for individuals knowledgeable on SAP has increased dramatically, learning SAP is becoming important for the market of employment