Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Other Computer Engineering

A Strategic Audit Of Microsoft Azure, Lee Fitchett Apr 2019

A Strategic Audit Of Microsoft Azure, Lee Fitchett

Honors Theses, University of Nebraska-Lincoln

This paper looks at Microsoft Azure's current strategies and proposes possible options for the future. It looks at several competitors and explores how Azure will affect and react to Microsoft’s vision.


Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren Apr 2019

Using Gleaned Computing Power To Forecast Emerging-Market Equity Returns With Machine Learning, Xida Ren

Undergraduate Honors Theses

This paper examines developing machine learning and statistic models to build forecast models for equity returns in an emergent market, with an emphasis on computing. Distributed systems were pared with random search and Bayesian optimization to find good hyperparameters for neural networks. No significant results were found.


Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin Jan 2019

Towards A Fault-Tolerant, Scheduling Methodology For Safety-Critical Certified Information Systems, Jian Lin

Journal of International Technology and Information Management

Today, many critical information systems have safety-critical and non-safety-critical functions executed on the same platform in order to reduce design and implementation costs. The set of safety-critical functionality is subject to certification requirements and the rest of the functionality does not need to be certified, or is certified to a lower level. The resulting mixed-criticality systems bring challenges in designing such systems, especially when the critical tasks are required to complete with a timing constraint. This paper studies a problem of scheduling a mixed-criticality system with fault tolerance. A fault-recovery technique called checkpointing is used where a program can go ...


Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn Oct 2018

Introducing Competencies In Organizations, Henk Plessius, Anand Sheombar, Pascal Ravesteyn

Communications of the IIMA

In the fast-changing world of IT, relevant competencies are getting more important as these determine how successful you can function in practice. As a consequence, organizations are introducing competency frameworks like the European e-Competence Framework (e-CF, 2014) in their IT departments. However, for many organizations it is unclear what good practices and pitfalls are when introducing such a framework. In this paper this topic is studied by analysing 13 interviews with IT- and HR-managers who are (or recently have been) involved in a transition towards the use of competencies with their IT-staff.


Minutes & Seconds: The Scientists, Patrick Aievoli Sep 2018

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an ...


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Aug 2018

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

National Training Aircraft Symposium (NTAS)

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...


Delegation Application, Erik Matthew Phillips Jun 2018

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland May 2018

The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland

Simon Cleveland, Ph.D.

This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample ...


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two ...


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

Faculty Scholarship at Penn Law

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song Aug 2017

Modeling The Consumer Acceptance Of Retail Service Robots, So Young Song

Doctoral Dissertations

This study uses the Computers Are Social Actors (CASA) and domestication theories as the underlying framework of an acceptance model of retail service robots (RSRs). The model illustrates the relationships among facilitators, attitudes toward Human-Robot Interaction (HRI), anxiety toward robots, anticipated service quality, and the acceptance of RSRs. Specifically, the researcher investigates the extent to which the facilitators of usefulness, social capability, the appearance of RSRs, and the attitudes toward HRI affect acceptance and increase the anticipation of service quality. The researcher also tests the inhibiting role of pre-existing anxiety toward robots on the relationship between these facilitators and attitudes ...


A Survey Of Addictive Software Design, Chauncey J. Neyman Jun 2017

A Survey Of Addictive Software Design, Chauncey J. Neyman

Computer Science

The average smartphone owner checks their phone more than 150 times per day. As of 2015, 62% of smartphone users had used their phone to look up information about a health condition, while 57% had used their phone to do online banking. Mobile platforms have become the dominant medium of human-computer interaction. So how have these devices established themselves as our go to connection to the Internet? The answer lies in addictive design. Software designers have become well versed in creating software that captivates us at a primal level. In this article, we survey addictive software design strategies, their bases ...


Can You Hack It? Validating Predictors For It Boot Camps, Courtney Gear Jan 2016

Can You Hack It? Validating Predictors For It Boot Camps, Courtney Gear

All Theses, Dissertations, and Other Capstone Projects

Given the large number of information technology jobs open and lack of qualified individuals to fill them, coding boot camps have sprung up in response to this skill gap by offering a specialized training program in an accelerated format. This fast growth has created a need to measure these training programs and understand their effectiveness. In the present study, a series of analyses examined whether specific or combinations of predictors were valid for training performance in this coding academy. Self-rated, daily efficacy scores were used as outcome variables of training success and correlation results showed a positive relationship with efficacy ...


Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman Dec 2015

Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman

Abhijith Anand

No abstract provided.


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy ...


Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga Jan 2015

Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga

UNF Graduate Theses and Dissertations

In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion ...


Future Of Payment Platforms, Salim Benjamin Youssefzadeh Jun 2014

Future Of Payment Platforms, Salim Benjamin Youssefzadeh

Master's Theses and Project Reports

With the vast increase in smartphones, there have been an increasing number of opportunities growing in the app industry. One in particular is the way we deal with money. There are huge overheads in the current payment systems around the world particularly in the United States, many of which include large transaction fees. Many new businesses have grown to solve these inefficiencies and create a new platform that provides a new user experience, security, and convenience among many other things. However, many of these platforms are still centralized, making them more susceptible to attacks. This thesis goes over the various ...


Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


Learning Without Default: A Study Of One-Class Classification And The Low-Default Portfolio Problem, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany Aug 2009

Learning Without Default: A Study Of One-Class Classification And The Low-Default Portfolio Problem, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany

Conference papers

This paper asks at what level of class imbalance one-class classifiers outperform two-class classifiers in credit scoring problems in which class imbalance, referred to as the low-default portfolio problem, is a serious issue. The question is answered by comparing the performance of a variety of one-class and two-class classifiers on a selection of credit scoring datasets as the class imbalance is manipulated. We also include random oversampling as this is one of the most common approaches to addressing class imbalance. This study analyses the suitability and performance of recognised two-class classifiers and one-class classifiers. Based on our study we conclude ...


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online ...


E-Commerce Technology For Safe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri Jun 2000

E-Commerce Technology For Safe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri

Raman K. Attri

The Buzz word E-commerce has revolutionized the way the business and money transactions used to work in the past. It is the latest impact of software arena in the field of banking, business and purchasing. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. This paper mainly concentrates on technology revolution behind the transaction of money over the net. There are still doubts and questions from business and corporate users on the safety aspects of ...