Securecoin: A Robust Secure And Effi#14;Cient Protocol For Anonymous Bitcoin Ecosystem, 2017 Helwan University
Securecoin: A Robust Secure And Effi#14;Cient Protocol For Anonymous Bitcoin Ecosystem, Maged H. Ibrahim
Feature Extraction To Improve Nowcasting Using Social Media Event Detection On Cloud Computing And Sentiment Analysis, 2016 Indiana University - Purdue University Fort Wayne
Feature Extraction To Improve Nowcasting Using Social Media Event Detection On Cloud Computing And Sentiment Analysis, David L. Kimmey
Nowcasting is defined as the prediction of the present, the very near future, and the very recent past using real-time data. Nowcasting with social media creates challenges because of the HACE characteristics of big data (i.e., heterogeneous, autonomous, complex, and evolving associations). Thus, this thesis proposes a feature extraction method to improve nowcasting with social media. The proposed social media event detection algorithm utilizes K-SPRE methodology and the results are processed with sentiment analysis. In addition, we develop a parallel algorithm of the methodology on a cloud environment, and we adapt an artificial neural network to build a predictive ...
Implementing A One Address Cpu In Logisim, 2016 Gettysburg College
Implementing A One Address Cpu In Logisim, Charles W. Kann Iii
Gettysburg College Open Educational Resources
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, behavior.
This magic computer does not actually exist. In reality computer are machines, and every action a computer performs reduces to a set of mechanical operations. In fact the first complete definition of a working computer was ...
Secure Software Engineering Education: Knowledge Area, Curriculum And Resources, 2016 North Carolina Agricultural and Technical University
Secure Software Engineering Education: Knowledge Area, Curriculum And Resources, Xiaohong Yuan, Li Yang, Bilan Jones, Huiming Yu, Bei-Tseng Chu
Journal of Cybersecurity Education, Research and Practice
This paper reviews current efforts and resources in secure software engineering education, with the goal of providing guidance for educators to make use of these resources in developing secure software engineering curriculum. These resources include Common Body of Knowledge, reference curriculum, sample curriculum materials, hands-on exercises, and resources developed by industry and open source community. The relationship among the Common Body of Knowledge proposed by the Department of Homeland Security, the Software Engineering Institute at Carnegie Mellon University, and ACM/IEEE are discussed. The recent practices on secure software engineering education, including secure software engineering related programs, courses, and course ...
Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, 2016 Penn State University - Berks
Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci
Journal of Cybersecurity Education, Research and Practice
Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments ...
From The Editors, 2016 Kennesaw State University
From The Editors, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the inaugural issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
Choosing A Repository Platform: Open Source Vs. Hosted Solutions, 2016 Northeastern University
Choosing A Repository Platform: Open Source Vs. Hosted Solutions, Hillary Corbett, Jimmy Ghaphery, Lauren Work, Sam Byrd
Discusses selection of a locally hosted, open-source system (DSpace/Fedora) versus a cloud-hosted, proprietary system (Digital Commons), it is important to note that these examples are merely illustrative. Libraries have a range of choices for repository software that includes open source and proprietary in any number of support environments, and exemplary repositories are flourishing on a variety of systems, both open source and proprietary. This chapter focuses on the differences between proprietary and open-source solutions, but also demonstrates how and why libraries choose a repository system. In writing about this process, we realized that it was important to acknowledge that ...
A Model For Attention-Driven Judgements In Type Theory With Records, 2016 CLASP, University of Gothenburg, Sweden
A Model For Attention-Driven Judgements In Type Theory With Records, Simon Dobnik, John Kelleher
This paper makes three contributions to the discussion on the applicability of Type Theory with Records (TTR) to embodied dialogue agents. First, it highlights the problem of type assignment or judgements in practical implementations which is resource intensive. Second, it presents a judgement control mechanism, which consists of grouping of types into clusters or states by their thematic relations and selection of types following two mechanisms inspired by the Load Theory of selective attention and cognitive control (Lavie et al., 2004), that addresses this problem. Third, it presents a computational framework, based on Bayesian inference, that offers a basis for ...
A Demonstration Of The Pmf-Extraction Approach: Modeling The Effects Of Sound On Crowd Behavior, 2016 University of Pennsylvania
A Demonstration Of The Pmf-Extraction Approach: Modeling The Effects Of Sound On Crowd Behavior, Jason Cornwell, Barry G. Silverman, Kevin O'Brien, Michael Johns
Barry G Silverman
The vast majority of psychology, sociology, and other social-science literature describing human behavior and performance does not reach the eyes of those of us working in the modeling and simulation community. Our recent work has been concerned with the extraction and implementation of Human Behavior Models(HBMs)/ Performance Moderator Functions(PMFs) from this literature. This paper demonstrates how our methodology was applied to extract models of the effects of music and sound on both individuals and groups and to implement them in a simulated environment. PMFs describing how several classes of sound affect decision-making and performance were constructed based on ...
Analyzing Clustered Web Concepts With Homology, 2016 San Jose State University
Analyzing Clustered Web Concepts With Homology, Eric Nam
As data is being mined more and more from the Internet today, Data Science has become an important field of computing to make that data useful. Data Science allows people to turn all of that data into structured knowledge that is easily utilized, validated, and understandable. There are many known theories to analyze data, but this project will focus on a recently introduced method: analyzing text data with homology from mathematics to understand relationships between keyword-sets.
Using structures of algebraic topology as a starting point, keyword-sets in the text are represented by simplexes based on what they are and what ...
A Genetic Algorithmic Approach To Automated Auction Mechanism Design, 2016 CUNY Guttman Community College
A Genetic Algorithmic Approach To Automated Auction Mechanism Design, Jinzhong Niu, Simon Parsons
Publications and Research
In this paper, we present a genetic algorithmic approach to automated auction mechanism design in the context of \cat games. This is a follow-up to one piece of our prior work in the domain, the reinforcement learning-based grey-box approach. Our experiments show that given the same search space the grey-box approach is able to produce better auction mechanisms than the genetic algorithmic approach. The comparison can also shed light on the design and evaluation of similar search solutions to other domain problems.
Formalization Of The Ad Hominem Argumentation Scheme, 2016 University of Windsor
Formalization Of The Ad Hominem Argumentation Scheme, Douglas Walton
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been widely investigated in literature on argumentation. Argumentation schemes represent common patterns of reasoning used in everyday conversational discourse. The most typical ones represent defeasible arguments based on nonmonotonic reasoning. Each scheme has a matching set of critical questions used to evaluate a particular argument fitting that scheme. The project is to study how to build a formal computational model of this scheme for the circumstantial ad hominem argument using argumentation ...
Examination Dialogue: An Argumentation Framework For Critically Questioning An Expert Opinion, 2016 University of Windsor
Examination Dialogue: An Argumentation Framework For Critically Questioning An Expert Opinion, Douglas Walton
Recent work in argumentation theory (Walton and Krabbe, 1995; Walton, 2005) and artificial intelligence (Bench-Capon, 1992, 2003; Cawsey, 1992; McBurney and Parsons, 2002; Bench-Capon and Prakken, 2005) uses types of dialogue as contexts of argument use. This paper provides an analysis of a special type called examination dialogue, in which one party questions another party, sometimes critically or even antagonistically, to try to find out what that party knows about something. This type of dialogue is most prominent in law and in both legal and non-legal arguments based on expert opinion. It is also central to dialogue systems for questioning ...
Critical Questions In Computational Models Of Legal Argument, 2016 University of Windsor
Critical Questions In Computational Models Of Legal Argument, Douglas Walton, Thomas F. Gordon
Two recent computational models of legal argumentation, by Verheij and Gordon respectively, have interpreted critical questions as premises of arguments that can be defeated using Pollock’s concepts of undercutters and rebuttals. Using the scheme for arguments from expert opinion as an example, this paper evaluates and compares these two models of critical questions from the perspective of argumentation theory and competing legal theories about proof standardsfor defeating presumptions. The applicable proof standard is found to be a legal issue subject to argument. Verheij’smodel is shown to have problems because the proof stan-dards it applies to different kinds of ...
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, 2016 George Mason University
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Journal of Digital Forensics, Security and Law
Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing ...
On Abstract Modular Inference Systems And Solvers, 2016 University of Nebraska at Omaha
On Abstract Modular Inference Systems And Solvers, Yuliya Lierler, Miroslaw Truszczyński
Computer Science Faculty Publications
Integrating diverse formalisms into modular knowledge representation systems offers increased expressivity, modeling convenience, and computational benefits. We introduce the concepts of abstract inference modules and abstract modular inference systems to study general principles behind the design and analysis of model generating programs, or solvers, for integrated multi-logic systems. We show how modules and modular systems give rise to transition graphs, which are a natural and convenient representation of solvers, an idea pioneered by the SAT community. These graphs lend themselves well to extensions that capture such important solver design features as learning. In the paper, we consider two flavors of ...
In-Network Retransmissions In Named Data Networking, 2016 Washington University in St Louis
In-Network Retransmissions In Named Data Networking, Hila Ben Abraham, Patrick Crowley
All Computer Science and Engineering Research
The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy.
A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it ...
Factors That Affect Information And Communication Technology Adoption By Small Businesses In China, 2016 University of Nebraska at Omaha
Factors That Affect Information And Communication Technology Adoption By Small Businesses In China, Jie Xiong, Sajda Qureshi, Lotfollah Najjar
Emerging economies appear to be powering growth in their regions. While China is seen to lead growth in the emerging markets of Asia, 98% of its manufacturing and production base is powered by small businesses. These businesses represent the majority of all businesses in emerging countries and their growth increases with their successful adoption of Information Technology. As the driving force behind the economic growth of China, Information and Communications Technologies (ICTs) are shaping the ways in which small businesses are able to grow. The majority of current research into the user acceptance and adoption of ICTs focusses on the ...
A Model Of Icts Adoption For Sustainable Development: An Investigation Of Small Business In The United States And China, 2016 University of Nebraska at Omaha
A Model Of Icts Adoption For Sustainable Development: An Investigation Of Small Business In The United States And China, Jie Xiong, Sajda Qureshi
No abstract provided.
Can Information And Communication Technologies Lead To Community Capital? An Analysis Of Development, 2016 University of Nebraska at Omaha
Can Information And Communication Technologies Lead To Community Capital? An Analysis Of Development, Dave Kocsis, Sajda Qureshi, Jie Xiong
While it is widely accepted that the increasing interconnectedness of the world economy has been fueled by the innovative uses of Information and Communication Technologies (ICTs), little attention has been paid to the increasing inequalities within developed and developing countries. These inequalities manifest themselves in the form of communities in which incomes are considerably below the rest of the country and there is a rise in poverty. This paper investigates this trend by taking a community capital perspective to investigate how ICTs may or may not enable businesses to grow. As micro-enterprises are seen to contribute to the growth of ...