Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

An Empirical Investigation Of Collaborative Web Search Tool On Novice's Query Behavior, Mareh Fakhir Al-Sammarraie Jan 2017

An Empirical Investigation Of Collaborative Web Search Tool On Novice's Query Behavior, Mareh Fakhir Al-Sammarraie

UNF Graduate Theses and Dissertations

In the past decade, research efforts dedicated to studying the process of collaborative web search have been on the rise. Yet, a limited number of studies have examined the impact of collaborative information search processes on novices’ query behaviors. Studying and analyzing factors that influence web search behaviors, specifically users’ patterns of queries when using collaborative search systems can help with making query suggestions for group users. Improvements in user query behaviors and system query suggestions help in reducing search time and increasing query success rates for novices.

This thesis investigates the influence of collaboration between experts and novices as …


Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval Jan 2017

Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval

UNF Graduate Theses and Dissertations

Cloud Computing is an emerging paradigm in the field of computing where scalable IT enabled capabilities are delivered ‘as-a-service’ using Internet technology. The Cloud industry adopted three basic types of computing service models based on software level abstraction: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Infrastructure-as-a-Service allows customers to outsource fundamental computing resources such as servers, networking, storage, as well as services where the provider owns and manages the entire infrastructure. This allows customers to only pay for the resources they consume. In a fast-growing IaaS market with multiple cloud platforms offering IaaS services, the user's decision on the selection …


Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms. Jan 2017

Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms.

UNF Graduate Theses and Dissertations

Cloud computing is a computing paradigm where large numbers of devices are connected through networks that provide a dynamically scalable infrastructure for applications, data and storage. Currently, many businesses, from small scale to big companies and industries, are changing their operations to utilize cloud services because cloud platforms could increase company’s growth through process efficiency and reduction in information technology spending [Coles16]. Companies are relying on cloud platforms like Amazon Web Services, Google Compute Engine, and Microsoft Azure, etc., for their business development.

Due to the emergence of new technologies, devices, and communications, the amount of data produced is growing …


Generating A Normalized Database Using Class Normalization, Daniel Sushil Sudhindaran Jan 2017

Generating A Normalized Database Using Class Normalization, Daniel Sushil Sudhindaran

UNF Graduate Theses and Dissertations

Relational databases are the most popular databases used by enterprise applications to store persistent data to this day. It gives a lot of flexibility and efficiency. A process called database normalization helps make sure that the database is free from redundancies and update anomalies. In a Database-First approach to software development, the database is designed first, and then an Object-Relational Mapping (ORM) tool is used to generate the programming classes (data layer) to interact with the database. Finally, the business logic code is written to interact with the data layer to persist the business data to the database. However, in …


Security Analysis Of Ecc Based Protocols, Chanchal Khatwani Jan 2017

Security Analysis Of Ecc Based Protocols, Chanchal Khatwani

UNF Graduate Theses and Dissertations

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities, and to enhance them to be more secure against threats. This work demonstrates how currently used ECC based protocols are vulnerable to attacks. If protocols are vulnerable, damages could include critical data loss and elevated privacy concerns. The protocols considered in thiswork differ in their usage of security factors (e.g. passwords, pins, and biometrics), encryption and timestamps. The threatmodel considers various kinds of attacks including …


Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden Jan 2017

Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden

UNF Graduate Theses and Dissertations

In this thesis, the improvement to relevance in computerized search results is studied. Information search tools return ranked lists of documents ordered by the relevance of the documents to the user supplied search. Using a small number of words and phrases to represent complex ideas and concepts causes user search queries to be information sparse. This sparsity challenges search tools to locate relevant documents for users. A review of the challenges to information searches helps to identify the problems and offer suggestions in improving current information search tools. Using the suggestions put forth by the Strategic Workshop on Information Retrieval …