Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Academic libraries; Automation; Discovery; Evaluation; Information retrieval; Information storage and retrieval systems; Online library catalogs – Evaluation; Survey; Web scale discovery (1)
- Commnication (1)
- Computational linguistics; English language — Data processing; English language — Roots; Natural language processing (Computer science) (1)
- Data management (1)
- Framework (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Library Faculty Publications
Long-term monitoring and research projects are essential to understand ecological change and the effectiveness of management activities. An inherent characteristic of long-term projects is the need for consistent data collection over time, requiring rigorous attention to data management and quality assurance. Recent papers have provided broad recommendations for data management; however, practitioners need more detailed guidance and examples. We present general yet detailed guidance for the development of comprehensive, concise, and effective data management for monitoring projects. The guidance is presented as a graded approach, matching the scale of data management to the needs of the organization and the complexity …
Investigations Into Library Web Scale Discovery Services, Jason Vaughan
Investigations Into Library Web Scale Discovery Services, Jason Vaughan
Library Faculty Publications
Web scale discovery services for libraries provide deep discovery to a library’s local and licensed content, and represent an evolution, perhaps a revolution, for end user information discovery as pertains to library collections. This article frames the topic of Web scale discovery, and begins by illuminating Web scale discovery from an academic library’s perspective – that is, the internal perspective seeking widespread staff participation in the discovery conversation. This included the creation of a Discovery Task Force, a group which educated library staff, conducted internal staff surveys, and gathered observations from early adopters. The article next addresses the substantial research …
Study Of Stemming Algorithms, Savitha Kodimala
Study Of Stemming Algorithms, Savitha Kodimala
UNLV Theses, Dissertations, Professional Papers, and Capstones
Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.
In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.