Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Information systems (2)
- Absence of per-flow state (1)
- Access (1)
- Activity Detection (1)
- Bandwidth constraints (1)
-
- Biodiversity (1)
- Commons (1)
- Communications law (1)
- Computer modeling (1)
- Computer science (1)
- Concern For Information Privacy (1)
- Confirmatory factor analysis (1)
- Conflict Identification (1)
- Conflict Resolution (1)
- Congestion management (1)
- Conservation (1)
- Dataset Co-Evolution (1)
- Dataset Synchronization (1)
- Decision Support System (1)
- Ecology (1)
- Ecosystem (1)
- Error correction (1)
- FCC (1)
- Facebook (1)
- Gait Analysis (1)
- Governance (1)
- Health Informatics (1)
- Hydrology (1)
- Improved estimators (1)
- Influenza Mitigation (1)
- Publication
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Physical Sciences and Mathematics
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Kno.e.sis Publications
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …
How Do Designers Of The Built Environment Attempt To Make Ecological Sustainability Sensory Legible?, Carly L. Bartow
How Do Designers Of The Built Environment Attempt To Make Ecological Sustainability Sensory Legible?, Carly L. Bartow
Architecture Undergraduate Honors Theses
This paper attempts to provide a theoretical framework for making ecosystem function and ecologically sustainable design more perceptible or sensible to people through architecture and the built environment. Design features of the Bertschi School Science Wing and the Bullitt Center in Seattle, Washington are incorporated to illustrate the sensory legibility of ecological sustainability criteria.The criteria are available to designers to help educate a building's occupants on environmentally sustainable design and motivate more sustainable behavior.
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Personal Privacy: A Study To Determine Views On Privacy As It Relates To Technology Acceptance, Keith A. Wuotinen
Master's Theses and Doctoral Dissertations
This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction with the control factors of the Big Five personality factors. The study employed a modified Concern for Information Privacy (CFIP) scale and a modified Technology Acceptance Model (TAM) approach in conjunction with the Big Five personality factors using a 51-question survey.
The study surveyed students at Eastern Michigan University in Ypsilanti, Michigan, who were enrolled in the College of Technology. The results indicated that there was a significant positive relationship between the CFIP and the TAM. …
Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi
Determining The Interruption Of Services While Performing V2i Communication Using The Spmd Prototype, Binaya Raj Joshi
Student Work
The use of Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Roadside Unit (V2R) and Vehicle to Other (V2X) communications are increasingly applied over existing and upcoming transportation means by the United States Department of Transportation (USDOT) and other federal agencies. From previous statistical data, these technologies would primarily avoid or mitigate vehicle crashes and would provide more safety, mobility and various other benefits on the roads (“Traffic Safety Facts 2012,” 2013; “Traffic Safety Facts 2013” 2014). During the communication processes between vehicles, infrastructures and roadside units’ various sensitive data such as positions and speed of the vehicles, …
Weights And Balances: Integrating Models For Prevention And Response To Southern California Offshore Oil Spills, Carmen Watts Clayton, Amoret Bunn
Weights And Balances: Integrating Models For Prevention And Response To Southern California Offshore Oil Spills, Carmen Watts Clayton, Amoret Bunn
STAR Program Research Presentations
Licensing offshore oil and gas reserves in the United States waters are overseen by the U.S. Department of the Interior’s Bureau of Safety and Enforcement (BSEE). The licensing application includes planning for any worst-case oil spill scenario between BSEE and the applicant based on lessons learned from historic offshore spills such as the Deepwater Horizon (2010), Exxon Valdez (1989), and the Union Oil Platform Blowout (1969). The process for planning to respond to oil spills involves coordination with multiple agencies, trustees, and stakeholders to ensure that oil spill responses consider multiple factors, including ecologically sensitive species, commercial transportation and fisheries, …
A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield
A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield
Master's Theses and Doctoral Dissertations
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
350 million people are suffering from clinical depression worldwide.
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
Kno.e.sis Publications
– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Kno.e.sis Publications
Unlike machine-centric computing, in which efficient data processing takes precedence over contextual tailoring, human-centric computation provides a personalized data interpretation that most users find highly relevant to their needs. The authors show how semantic, cognitive, and perceptual computing paradigms work together to produce actionable information.
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Kno.e.sis Publications
The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …
The Unforeseen Evolution Of Technology, Dylan White
The Unforeseen Evolution Of Technology, Dylan White
Nebraska College Preparatory Academy: Senior Capstone Projects
Technology has evolved in the past two decades to alter how countries and their people live in the present day. Said technology has also both solved and created new problems for world powers (i.e. the U.S. and China) to face. Issues of cyber security and cyber surveillance are already potential problems that need to be addressed, where topics like cyber warfare need to be closely monitored with time. All of these are potentially underestimated threats to civil liberties, and to countries in their entirety.
I agree with the findings in my project… • The United States is a model to …
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
CCE Theses and Dissertations
The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …
Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi
Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi
CCE Theses and Dissertations
Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
Kno.e.sis Publications
The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:
1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.
The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal
Kno.e.sis Publications
Linking Data initiatives have fostered the publication of large number of RDF datasets in the Linked Open Data (LOD) cloud, as well as the development of query processing infrastructures to access these data in a federated fashion. However, different experimental studies have shown that availability of LOD datasets cannot be always ensured, being RDF data replication required for envisioning reliable federated query frameworks. Albeit enhancing data availability, RDF data replication requires synchronization and conflict resolution when replicas and source datasets are allowed to change data over time, i.e., co-evolution management needs to be provided to ensure consistency. In this paper, …
Uses Of Sampling Techniques & Inventory Control With Capacity Constraints, Florentin Smarandache, Sachin Malik, Neeraj Kumar
Uses Of Sampling Techniques & Inventory Control With Capacity Constraints, Florentin Smarandache, Sachin Malik, Neeraj Kumar
Branch Mathematics and Statistics Faculty and Staff Publications
The main aim of the present book is to suggest some improved estimators using auxiliary and attribute information in case of simple random sampling and stratified random sampling and some inventory models related to capacity constraints. This volume is a collection of five papers, written by six co-authors (listed in the order of the papers): Dr. Rajesh Singh, Dr. Sachin Malik, Dr. Florentin Smarandache, Dr. Neeraj Kumar, Mr. Sanjey Kumar & Pallavi Agarwal. In the first chapter authors suggest an estimator using two auxiliary variables in stratified random sampling for estimating population mean. In second chapter they proposed a family …
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Book Chapters
This chapter explores the related ideas of access to knowledge resources and shared governance of those resources, often known as commons. Knowledge resources consist of many types and forms. Some are tangible, and some are intangible. Some are singular; some are reproduced in copies. Some are singular or unique; some are collected or pooled. Some are viewed, used, or consumed only by a single person; for some resources, collective or social consumption is the norm. Any given resource often has multiple attributes along these dimensions, depending on whether one examines the resource’s physical properties, its creative or inventive properties, or …