Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (166)
- University for Business and Technology in Kosovo (28)
- Embry-Riddle Aeronautical University (27)
- Singapore Management University (24)
- Portland State University (15)
-
- Wright State University (15)
- Selected Works (11)
- University of Nebraska - Lincoln (10)
- Purdue University (9)
- SelectedWorks (8)
- Washington University in St. Louis (8)
- Old Dominion University (7)
- Chapman University (5)
- San Jose State University (5)
- University of Massachusetts Amherst (5)
- University of New Haven (5)
- University of Texas at El Paso (5)
- University of Arkansas, Fayetteville (4)
- University of South Florida (4)
- Western University (4)
- California Polytechnic State University, San Luis Obispo (3)
- Edith Cowan University (3)
- Governors State University (3)
- University of Tennessee, Knoxville (3)
- Florida International University (2)
- Missouri University of Science and Technology (2)
- University of South Carolina (2)
- Wayne State University (2)
- Air Force Institute of Technology (1)
- California State University, San Bernardino (1)
- Keyword
-
- Department of Computer Science and Engineering (15)
- Big Data (6)
- Security (6)
- Small Spacecraft (6)
- Artificial Intelligence & Robotic Control (5)
-
- Artificial neural networks (5)
- Digital Forensics (5)
- Digital forensics (5)
- Artificial neural network (4)
- Cloud computing (4)
- Clustering (4)
- Computer security (4)
- CubeSat (4)
- Data (4)
- Distributed generation (4)
- Image processing (4)
- Neural network (4)
- Ontology (4)
- Open Orbiter Project (4)
- RFID (4)
- Classification (3)
- Coalgebra (3)
- Computer Engineering (3)
- Detection (3)
- Evolution (3)
- Genetic algorithm (3)
- Machine learning (3)
- Mathematical Logic and Formal Languages (3)
- Modeling (3)
- Network forensics (3)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
- UBT International Conference (28)
- Journal of Digital Forensics, Security and Law (27)
- Research Collection School Of Computing and Information Systems (24)
- Browse all Theses and Dissertations (15)
-
- Computer Science Faculty Publications and Presentations (14)
- All Computer Science and Engineering Research (8)
- Jeremy Straub (8)
- CSE Conference and Workshop Papers (6)
- Doctoral Dissertations (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (5)
- Engineering Faculty Articles and Research (5)
- Inaugural CSU IR Conference, 2015 (5)
- Stephanie Weirich (5)
- Departmental Technical Reports (CS) (4)
- Electrical and Computer Engineering Publications (4)
- Open Access Dissertations (4)
- All Capstone Projects (3)
- Computer Engineering (3)
- Computer Science Theses & Dissertations (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Graduate Theses and Dissertations (3)
- Masters Theses (3)
- Theses and Dissertations (3)
- USF Tampa Graduate Theses and Dissertations (3)
- Dissertations (2)
- Electronic Theses and Dissertations (2)
- Lorrie F Cranor (2)
- Open Access Theses (2)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (2)
- Publication Type
- File Type
Articles 1 - 30 of 408
Full-Text Articles in Computer Sciences
Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar
Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar
School of Computing and Information Sciences
Pipeline networks are one of the key infrastructures of our modern life. Proactive monitoring and frequent inspection of pipeline networks are very important for sustaining their safe and efficient functionalities. Existing monitoring and maintenance approaches are costly and inefficient because pipelines can be installed in large scale and in an inaccessible and hazardous environment. To overcome these challenges, we propose a novel Radio Frequency IDentification (RFID)-based Autonomous Maintenance system for Pipelines, called RAMP, which combines robotic, sensing, and RFID technologies for efficient and accurate inspection, corrective reparation, and precise geo-location information. RAMP can provide not only economical and scalable remedy …
From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus
From Boolean Equalities To Constraints, Sergio Antoy, Michael Hanus
Computer Science Faculty Publications and Presentations
Although functional as well as logic languages use equality to discriminate between logically different cases, the operational meaning of equality is different in such languages. Functional languages reduce equational expressions to their Boolean values, True or False, logic languages use unification to check the validity only and fail otherwise. Consequently, the language Curry, which amalgamates functional and logic programming features, offers two kinds of equational expressions so that the programmer has to distinguish between these uses. We show that this distinction can be avoided by providing an analysis and transformation method that automatically selects the appropriate operation. Without this distinction …
Data To Decisions For Cyberspace Operations, Steve Stone
Data To Decisions For Cyberspace Operations, Steve Stone
Military Cyber Affairs
In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.
Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim
Nd − Pdpa: N Dimensional Probability Density Profile Analysis, Arjang Fahim
Theses and Dissertations
Proteins are often referred as working molecule of a cell, performing many structural, functional and regulatory processes. Revealing the function of proteins still remains a challenging problem. Advancement in genomics sequence projects produces large protein sequence repository, but due to technical difficulty and cost related to structure determination, the number of identified protein structure is far behind. Novel structures identification are particularly important for a number of reasons: they generate models of similar proteins for comparison; identify evolutionary relationships; further contribute to our understanding of protein function and mechanism; and allow for the fold of other family members to be …
All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo
All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo
Research Collection School Of Computing and Information Systems
Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …
Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin
Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin
Research Collection School Of Computing and Information Systems
Model checking suffers from the infamous state space explosion problem. In this paper, we propose an approach, named GPURC, to utilize the Graphics Processing Units (GPUs) to speed up the reachability verification. The key idea is to achieve a dynamic load balancing so that the many cores in GPUs are fully utilized during the state space exploration.To this end, we firstly construct a compact data encoding of the input transition systems to reduce the memory cost and fit the calculation in GPUs. To support a large number of concurrent components, we propose a multi-integer encoding with conflict-release accessing approach. We …
Can Declared Strategy Voting Be An Effective Instrument For Group Decision-Making?, Lorrie Cranor
Can Declared Strategy Voting Be An Effective Instrument For Group Decision-Making?, Lorrie Cranor
Lorrie F Cranor
The goal of this research is to determine whether declared strategy voting can be an effective tool for group decision-making. Declared strategy voting is a novel group decision-making procedure in which preference is specified using voting strategies - first-order mathematical functions that specify a choice in terms of zero or more parameters. This research will focus on refining the declared strategy voting concept, developing an accessible implementation of declared strategy voting that can be used for mock elections, assessing the potential impacts of declared strategy voting, and evaluating the effectiveness of declared strategy voting for group decision-making. This proposal describes …
Design And Implementation Of A Practical Security-Conscious Electronic Polling System, Lorrie Cranor, Ron Cytron
Design And Implementation Of A Practical Security-Conscious Electronic Polling System, Lorrie Cranor, Ron Cytron
Lorrie F Cranor
We present the design and implementation of Sensus, a practical, secure and private system for conducting surveys and elections over computer networks. Expanding on the work of Fujioka, Okamoto, and Ohta, Sensus uses blind signatures to ensure that only registered voters can vote and that each registered voter only votes once, while at the same time maintaining voters' privacy. Sensus allows voters to verify independently that their votes were counted correctly, and anonymously challenge the results should their votes be miscounted. We outline seven desirable properties of voting systems and show that Sensus satisfied these properties well, in some cases …
Neuron Clustering For Mitigating Catastrophic Forgetting In Supervised And Reinforcement Learning, Benjamin Frederick Goodrich
Neuron Clustering For Mitigating Catastrophic Forgetting In Supervised And Reinforcement Learning, Benjamin Frederick Goodrich
Doctoral Dissertations
Neural networks have had many great successes in recent years, particularly with the advent of deep learning and many novel training techniques. One issue that has affected neural networks and prevented them from performing well in more realistic online environments is that of catastrophic forgetting. Catastrophic forgetting affects supervised learning systems when input samples are temporally correlated or are non-stationary. However, most real-world problems are non-stationary in nature, resulting in prolonged periods of time separating inputs drawn from different regions of the input space.
Reinforcement learning represents a worst-case scenario when it comes to precipitating catastrophic forgetting in neural networks. …
Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris
Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris
Open Access Dissertations
This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …
Learning Query And Image Similarities With Ranking Canonical Correlation Analysis, Ting Yao, Tao Mei, Chong-Wah Ngo
Learning Query And Image Similarities With Ranking Canonical Correlation Analysis, Ting Yao, Tao Mei, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
One of the fundamental problems in image search is to learn the ranking functions, i.e., similarity between the query and image. The research on this topic has evolved through two paradigms: feature-based vector model and image ranker learning. The former relies on the image surrounding texts, while the latter learns a ranker based on human labeled query-image pairs. Each of the paradigms has its own limitation. The vector model is sensitive to the quality of text descriptions, and the learning paradigm is difficult to be scaled up as human labeling is always too expensive to obtain. We demonstrate in this …
Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Research Collection School Of Computing and Information Systems
The large scale and complex nature of social media data raises the need to scale clustering techniques to big data and make them capable of automatically identifying data clusters with few empirical settings. In this paper, we present our investigation and three algorithms based on the fuzzy adaptive resonance theory (Fuzzy ART) that have linear computational complexity, use a single parameter, i.e., the vigilance parameter to identify data clusters, and are robust to modest parameter settings. The contribution of this paper lies in two aspects. First, we theoretically demonstrate how complement coding, commonly known as a normalization method, changes the …
Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan
Novel Software Defined Radio Architecture With Graphics Processor Acceleration, Lalith Narasimhan
Dissertations
Wireless has become one of the most pervasive core technologies in the modern world. Demand for faster data rates, improved spectrum efficiency, higher system access capacity, seamless protocol integration, improved security and robustness under varying channel environments has led to the resurgence of programmable software defined radio (SDR) as an alternative to traditional ASIC based radios. Future SDR implementations will need support for multiple standards on platforms with multi-Gb/s connectivity, parallel processing and spectrum sensing capabilities. This dissertation implemented key technologies of importance in addressing these issues namely development of cost effective multi-mode reconfigurable SDR and providing a framework to …
Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner
Faster Maximium Priority Matchings In Bipartite Graphs, Jonathan Turner
All Computer Science and Engineering Research
A maximum priority matching is a matching in an undirected graph that maximizes a priority score defined with respect to given vertex priorities. An earlier paper showed how to find maximum priority matchings in unweighted graphs. This paper describes an algorithm for bipartite graphs that is faster when the number of distinct priority classes is limited. For graphs with k distinct priority classes it runs in O(kmn1/2) time, where n is the number of vertices in the graph and m is the number of edges.
The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner
The Bounded Edge Coloring Problem And Offline Crossbar Scheduling, Jonathan Turner
All Computer Science and Engineering Research
This paper introduces a variant of the classical edge coloring problem in graphs that can be applied to an offline scheduling problem for crossbar switches. We show that the problem is NP-complete, develop three lower bounds bounds on the optimal solution value and evaluate the performance of several approximation algorithms, both analytically and experimentally. We show how to approximate an optimal solution with a worst-case performance ratio of 3/2 and our experimental results demonstrate that the best algorithms produce results that very closely track a lower bound.
Transforming C Openmp Programs For Verification In Civl, Michael Rogers
Transforming C Openmp Programs For Verification In Civl, Michael Rogers
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
There are numerous way to express parallelism which can make it challenging for developers to verify these programs. Many tools only target a single dialect but the Concurrency Intermediate Verification Language (CIVL) targets MPI, Pthreads, and CUDA. CIVL provides a general concurrency model that can represent pro- grams in a variety of concurrency dialects. CIVL includes a front-end that support all of the dialects mentioned above. The back-end is a verifier that uses model checking and symbolic execution to check standard properties.
In this thesis, we have designed and implemented a transformer that will take C OpenMP programs and transform …
Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Ronald Wai Hong Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin Cerdena Valera, Hwee Xian Tan
Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Ronald Wai Hong Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin Cerdena Valera, Hwee Xian Tan
Research Collection School Of Computing and Information Systems
The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, and the time variation in network statistics like packet transmission rates and link qualities, necessitate the use of adaptive duty cycling techniques. Such adaptive control allows sensor nodes to achieve long-run energy neutrality, where energy supply and demand are balanced in a dynamic environment such that the nodes function continuously. In this paper, we develop a new framework enabling an adaptive duty cycling scheme for sensor networks that takes into account the node battery level, ambient energy that can be harvested, and application-level QoS requirements. We …
Maximum Priority Matchings, Jonathan Turner
Maximum Priority Matchings, Jonathan Turner
All Computer Science and Engineering Research
Let G=(V,E) be an undirected graph with n vertices and m edges, in which each vertex u is assigned an integer priority in [1,n], with 1 being the ``highest'' priority. Let M be a matching of G. We define the priority score of M to be an n-ary integer in which the i-th most-significant digit is the number of vertices with priority i that are incident to an edge in M. We describe a variation of the augmenting path method (Edmonds' algorithm) that finds a matching with maximum priority score in O(mn) time.
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The ITB Journal
Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.
Design And Implementation Of An Economy Plane For The Internet, Xinming Chen
Design And Implementation Of An Economy Plane For The Internet, Xinming Chen
Doctoral Dissertations
The Internet has been very successful in supporting many network applications. As the diversity of uses for the Internet has increased, many protocols and services have been developed by the industry and the research community. However, many of them failed to get deployed in the Internet. One challenge of deploying these novel ideas in operational network is that the network providers need to be involved in the process. Many novel network protocols and services, like multicast and end-to-end QoS, need the support from network providers. However, since network providers are typically driven by business reasons, if they can not get …
Energy-Efficient Content Delivery Networks, Vimal Mathew
Energy-Efficient Content Delivery Networks, Vimal Mathew
Doctoral Dissertations
Internet-scale distributed systems such as content delivery networks (CDNs) operate hundreds of thousands of servers deployed in thousands of data center locations around the globe. Since the energy costs of operating such a large IT infrastructure are a significant fraction of the total operating costs, we argue for redesigning them to incorporate energy optimization as a first-order principle. We focus on CDNs and demonstrate techniques to save energy while meeting client-perceived service level agreements (SLAs) and minimizing impact on hardware reliability. Servers deployed at individual data centers can be switched off at low load to save energy. We show that …
Threat Analysis, Countermeaures And Design Strategies For Secure Computation In Nanometer Cmos Regime, Raghavan Kumar
Threat Analysis, Countermeaures And Design Strategies For Secure Computation In Nanometer Cmos Regime, Raghavan Kumar
Doctoral Dissertations
Advancements in CMOS technologies have led to an era of Internet Of Things (IOT), where the devices have the ability to communicate with each other apart from their computational power. As more and more sensitive data is processed by embedded devices, the trend towards lightweight and efficient cryptographic primitives has gained significant momentum. Achieving a perfect security in silicon is extremely difficult, as the traditional cryptographic implementations are vulnerable to various active and passive attacks. There is also a threat in the form of "hardware Trojans" inserted into the supply chain by the untrusted third-party manufacturers for economic incentives. Apart …
Implementation Of E-Education In Africa Via Space Networks, Dimov Stojce Ilcev
Implementation Of E-Education In Africa Via Space Networks, Dimov Stojce Ilcev
UBT International Conference
In this paper is introduced an advanced E-education provision in remote dispersed communities, such as rural, remote, mobile, agriculture, mining, construction, surveying, military, tourism and so on, based on the specific needs and requirements, implies significant broadband connectivity requirements, timely and quality-assured content delivery of service, applications and interactivity. The E-education solutions of distance learning and training for remote and rural areas, which are out of range of terrestrial and short distance wireless telecommunications facilities, cannot provide the broadband access without space-enabled communication infrastructures, such as satellite constellations and Stratospheric Platform Systems (SPS) or High Altitude Platforms (HAP). The paper …
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
UBT International Conference
Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown …
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
UBT International Conference
This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more …
From Traditional Markets To E-Commerce And Finally To Social Media Commerce, Ardian Hyseni
From Traditional Markets To E-Commerce And Finally To Social Media Commerce, Ardian Hyseni
UBT International Conference
These days, getting new customers is much easier than in the past. People and customers are online sharing and exchanging ideas on products and it has become easier to find products over the internet and lately; with social media, where people can look for information from reviews and comments on sites. This way has changed shopping to a social experience and is the key element to the growth of social commerce. Businesses want to connect with people and customers which they do business, also they want customers opinions and reviews. By using social media, companies can now easily create an …
New Integral Transform In Caputo Type Fractional Difference Operator, Artion Kashuri, Akli Fundo, Rozana Liko
New Integral Transform In Caputo Type Fractional Difference Operator, Artion Kashuri, Akli Fundo, Rozana Liko
UBT International Conference
In this paper, we introduce Caputo type nabla (q,h)-fractional difference operators and investigate their basic properties and also to show the applicability of this interesting (q,h)- new integral transform method and its efficiency in solving linear fractional difference equations. Differential equations with fractional derivative provide a natural framework for the discussion of various kinds of real problems modeled by the aid of fractional derivative. Discrete analogues of some topics of continuous fractional calculus have been developed. Finally, we provide the general solutions in terms of discrete Mittag-Leffler functions.
The Mobile Telecom Operator T-Mobile Macedonia Ad Skopje Abuses Its Dominant Position Harmful For The Mobile Telecom Operators One And Vip In The Telecom Market, Boris Arsov
UBT International Conference
T-Mobile’s abusing of its dominant position is referring to the postpaid tariff models Relax and Relax Surf regarding the residential customers and the postpaid tariff models Business and Business Surf regarding its business customers. The prominent price offer to consumers is a case of predatory prices squeeze identified as a way of preventing or restricting competition in theory and practice. T-Mobile provides services at unreasonably low prices, prices below the level of expenditures necessary for their provision, as it is specific case with the postpaid tariff models Relax and Relax Surf regarding the residential customers and the postpaid tariff plans …
Assessing Clustering In A Social University Network Course, Orgeta Gjermëni
Assessing Clustering In A Social University Network Course, Orgeta Gjermëni
UBT International Conference
A collection of data is gathered from surveys held in a Spring Course of the Economic Faculty in the University “Ismail Qemali” of Vlora, Albania. The data set for each student contains the names of the other students through which he/she have a “social relationship”. This relationship includes frequent communications, discussions on exercise solutions, and sitting usually close to each other in the class. We have constructed. At the end of the course, a final network based on this type of relationship. We are particularly interested on the clustering coefficient of this network and assessing it’s “significance”, in the sense …
Web Application For Students And Lecturer Of Electrical Engineering Faculty, Genci Sharko, Anni Dasho Sharko, Kadri Manaj
Web Application For Students And Lecturer Of Electrical Engineering Faculty, Genci Sharko, Anni Dasho Sharko, Kadri Manaj
UBT International Conference
Electrical Engineering Faculty, nowadays needs to develop by their students the “FIE Student MIS Application”. Development and usage of Web applications are popular due to the ubiquity of the browser as a client, commented mostly as a thin client. The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for their popularity. This paper presents the “FIE Student MIS Application” web platform designed for Electrical Engineering Faculty students and their lecturer to support on time correctly without delays and informing online all students and their lecturer receiving …