Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Secure Authentication Scheme Based On Numerical Series Cryptography For Internet Of Things, Dr Khaled Nagaty, Maha Aladin, Abeer Hamdy Dr. Dec 2022

Secure Authentication Scheme Based On Numerical Series Cryptography For Internet Of Things, Dr Khaled Nagaty, Maha Aladin, Abeer Hamdy Dr.

Computer Science

The rapid advancement of cellular networks and wireless networks has laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities …


Analyzing Academic Self-Regulation Improvement Via Proccoli Task And Time Management Application, Le Jie Bennett Dec 2022

Analyzing Academic Self-Regulation Improvement Via Proccoli Task And Time Management Application, Le Jie Bennett

Computer Science

In the academic context, success is dependent on the individual’s ability to keep track of what needs to be done in a timely manner. But, for most students, procrastination often stands in their way. The time management application, Proccoli, is a tool that the Sahebi/Feyzi lab has developed to study individual and group procrastination behavior and help improve students’ ability to track and manage their tasks and time. Drawing foundations from Human Computer Interaction literature, the application provided features and functionalities to help promote selfregulatory behaviors such as self-observation, self-judgement, and self-reflection. An evaluation survey was sent to previous Proccoli …


A Tale Of Two Regulatory Regimes: Creation And Analysis Of A Bilingual Privacy Policy Corpus, Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Jasmine Mangat, Peter Story, Rex Chen, Martin Degeling, Tom Norton, Thomas Hupperich Jun 2022

A Tale Of Two Regulatory Regimes: Creation And Analysis Of A Bilingual Privacy Policy Corpus, Siddhant Arora, Henry Hosseini, Christine Utz, Vinayshekhar Bannihatti Kumar, Jasmine Mangat, Peter Story, Rex Chen, Martin Degeling, Tom Norton, Thomas Hupperich

Computer Science

Over the past decade, researchers have started to explore the use of NLP to develop tools aimed at helping the public, vendors, and regulators analyze disclosures made in privacy policies. With the introduction of new privacy regulations, the language of privacy policies is also evolving, and disclosures made by the same organization are not always the same in different languages, especially when used to communicate with users who fall under different jurisdictions. This work explores the use of language technologies to capture and analyze these differences at scale. We introduce an annotation scheme designed to capture the nuances of two …


Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr. Mar 2022

Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr.

Computer Science

Bug triage is an essential task in the software maintenance phase. It is the process of assigning a developer (fixer) to bug report. Triaging process is performed by the triager, who has to analyze developers’ profiles and bug reports for the purpose of making a suitable assignment. Manual assignment consumes time, financial resources and human resources; to get a high-quality software with minimum cost, automating this process is necessary. Previous researchers tackled this problem as a classification problem from different perspectives, either information retrieval approach or machine learning algorithms, some researchers handled it as an optimization problem using optimization and …