Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (13)
- Computer Sciences (7)
- Computer Engineering (4)
- Oceanography and Atmospheric Sciences and Meteorology (4)
- Social and Behavioral Sciences (4)
-
- Civil and Environmental Engineering (3)
- Oceanography (3)
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Public Affairs, Public Policy and Public Administration (3)
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Environmental Sciences (2)
- Information Security (2)
- Other Oceanography and Atmospheric Sciences and Meteorology (2)
- Theory and Algorithms (2)
- Transportation Engineering (2)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Data Science (1)
- Databases and Information Systems (1)
- Economics (1)
- Education (1)
- Emergency and Disaster Management (1)
- Environmental Education (1)
- Environmental Engineering (1)
- Higher Education (1)
- Industrial Engineering (1)
- Materials Science and Engineering (1)
- Mechanical Engineering (1)
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Engineering Management & Systems Engineering Faculty Publications
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …
A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic
A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic
Engineering Management & Systems Engineering Faculty Publications
Human-machine interaction (HMI) has become an essential part of the daily routine in organizations. Although the machines are designed with state-of-the-art Artificial Intelligence applications, they are limited in their ability to mimic human behavior. The human-human interaction occurs between two or more humans; when a machine replaces a human, the interaction dynamics are not the same. The results indicate that a machine that interacts with a human can increase the mental uncertainty that a human experiences. Developments in decision sciences indicate that using quantum probability theory (QPT) improves the understanding of human decision-making than merely using classical probability theory (CPT). …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …
Gold/Qds-Embedded-Ceria Nanoparticles: Optical Fluorescence Enhancement As A Quenching Sensor, Nader Shehata, Effat Samir, Ishac Kandas
Gold/Qds-Embedded-Ceria Nanoparticles: Optical Fluorescence Enhancement As A Quenching Sensor, Nader Shehata, Effat Samir, Ishac Kandas
Electrical & Computer Engineering Faculty Publications
This work focuses on improving the fluorescence intensity of cerium oxide (ceria) nanoparticles (NPs) through added plasmonic nanostructures. Ceria nanoparticles are fluorescent nanostructures which can emit visible fluorescence emissions under violet excitation. Here, we investigated different added plasmonic nanostructures, such as gold nanoparticles (Au NPs) and Cadmium sulfide/selenide quantum dots (CdS/CdSe QDs), to check the enhancement of fluorescence intensity emissions caused by ceria NPs. Different plasmonic resonances of both aforementioned nanostructures have been selected to develop optical coupling with both fluorescence excitation and emission wavelengths of ceria. In addition, different additions whether in-situ or post-synthesis have been investigated. We found …
Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe
Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications
Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …
Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang
Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang
Computer Science Faculty Publications
Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles
Computer Science Faculty Publications
Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …
Natural Resources Governance Employing Blockchain-Based Decision-Making, Farinaz Sabz Ali Pour, Adrian Gheorghe
Natural Resources Governance Employing Blockchain-Based Decision-Making, Farinaz Sabz Ali Pour, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications
Natural resources are essential structures of socio-economic systems which shape the well-being of humanity, environment, and the economy. Human actions have become the critical responsibility for environmental changes and pressuring many planetary boundaries. Having a systematic approach can provide a governance platform including the inherent characteristics of the resource, the historically established form of use, and transaction costs. A natural resource governance framework is developed by applying Blockchain technology as the primary goal of this study to regulate and manage the extraction and trades. Blockchain technology provides a distributed concurrency monitoring system for sustainable resource management. Persistent and pervasive cooperation …
Institutionalizing Resilience In Us Universities: Prospects, Opportunities, And Models, Morris Foster, James O'Donnell, Mark Luckenbach, Elizabeth Andrews, Emily Steinhilber, John Wells, Mark Davis
Institutionalizing Resilience In Us Universities: Prospects, Opportunities, And Models, Morris Foster, James O'Donnell, Mark Luckenbach, Elizabeth Andrews, Emily Steinhilber, John Wells, Mark Davis
ODU Articles
[From Introduction]
The United States is taking a largely region-specific approach to addressing challenges posed by climate change, in contrast with national and international approaches in most of the rest of the world. In locations such as Hampton Roads, New Orleans, and coastal Connecticut, the impacts of climate change tend to be addressed as they become locally evident rather than as part of a larger anticipatory national plan. Given that regional focus, universities can play a unique role in how the United States responds to the challenges of a changing climate. Universities can be knowledge brokers positioned outside or across …
Green Transportation For A Green Earth, Petros J. Katsioloudis, Mildred V. Jones
Green Transportation For A Green Earth, Petros J. Katsioloudis, Mildred V. Jones
STEMPS Faculty Publications
Transportation is one of the biggest contributors to the destruction of the environment. Results from environmental research and pursuant governmental regulations are changing the way companies do business and how transportation systems address the future. The Environmental Protection Agency (EPA) has been at the forefront in leading environmental research and instituting policies and regulations to fight the issues impacting the environment. The transportation industry and consumers alike are concerned about the environment, energy resources, efficiencies, and economics. In this article, the authors suggest that it is vital that people promote the protection of the environment and strengthen the laws that …
Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa
Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa
Computational Modeling & Simulation Engineering Faculty Publications
The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.
Academic Fleet Renewal- Two Years Later, Larry Atkinson
Academic Fleet Renewal- Two Years Later, Larry Atkinson
CCPO Publications
(First paragraph) In November 2000, I wrote a Soapbox article on fleet renewal for Sea Technology. It is a little unsettling to see how slowly ideas move towards implementation. Nevertheless, we are making progress. In this editorial I will note a bit of that progress and try to guess where we will be in two more years.
Future Research Vessels, Larry P. Atkinson
Future Research Vessels, Larry P. Atkinson
CCPO Publications
The academic research vessel fleet in the United States is embarking on a great experiment. By 2004 we will know if SWATH vessels such as the Mlo Moana and the possible built Woods Hole Oceanographic Institution coastal SWATH have such great advantages that all future vessels will be of SWATH design. Or, we will find that the two hull forms have distinct niches and the fleet will evolve with a strategic mix. Regardless of the Mure hull form research vessels will grow in size to accommodate advanced technology and the people to run and maintain it. The research vessel will …
Soapbox: The Academic Research Fleet: An Exciting Time For Renewal, Larry Atkinson
Soapbox: The Academic Research Fleet: An Exciting Time For Renewal, Larry Atkinson
CCPO Publications
(First Paragraph) Academic research ships in the United States are the envy of many scientists around the world. A great strength of our system is the diversity of ships and operators: users have a choice, the system can change. A weakness of the system is that very diversity: sometimes it is hard for us to act together. Nevertheless, we now must act together. The vitality of the academic fleet in the coming decades is at stake. The reason is simply because many of our ships, especially in the intermediate size range, will soon reach the end of their useful life.