Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,396 Full-Text Articles 72,336 Authors 23,183,657 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,396 full-text articles. Page 1048 of 2018.

Feasibility Of Recording Sleep Quality And Sleep Duration Using Fitbit In Children With Asthma, Amit Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, Revathy Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra 2018 Wright State University - Main Campus

Feasibility Of Recording Sleep Quality And Sleep Duration Using Fitbit In Children With Asthma, Amit Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, Revathy Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra

Kno.e.sis Publications

Sleep disorders are common in children with asthma and are increasingly implicated in poor asthma control. Smart wearables such as the Fitbit wristband allow monitoring of users’ sleep duration and quality in their natural surroundings. However, the utility and efficacy of using such wearable devices to monitor sleep in pediatric patients with asthma have not been well-established. Thus, the objective of this study is to demonstrate the feasibility of recording sleep quality and sleep duration using Fitbit in children with asthma.


Khealth: A Personalized Healthcare Approach For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth 2018 Wright State University - Main Campus

Khealth: A Personalized Healthcare Approach For Pediatric Asthma, Utkarshani Jaimini, Hong Y. Yip, Revathy Venkataramanan, Dipesh Kadariya, Vaikunth Sridharan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra, Amit Sheth

Kno.e.sis Publications

Can we assess the asthma control level, determine vulnerability, and medication compliance for a patient? Can we understand the causal relationship between the asthma symptom and possible factors responsible for it? Can we reduce the number of asthma attacks through continuous monitoring of the patient’s health condition?


“How Is My Child’S Asthma?” Digital Phenotype And Actionable Insights For Pediatric Asthma, Utkarshani Jaimini, Krishnaprasad Thirunarayan, Maninder Kalra, Revathy Venkataramanan, Dipesh Kadariya, Amit Sheth 2018 Wright State University - Main Campus

“How Is My Child’S Asthma?” Digital Phenotype And Actionable Insights For Pediatric Asthma, Utkarshani Jaimini, Krishnaprasad Thirunarayan, Maninder Kalra, Revathy Venkataramanan, Dipesh Kadariya, Amit Sheth

Kno.e.sis Publications

Background: In the traditional asthma management protocol, a child meets with a clinician infrequently, once in 3 to 6 months, and is assessed using the Asthma Control Test questionnaire. This information is inadequate for timely determination of asthma control, compliance, precise diagnosis of the cause, and assessing the effectiveness of the treatment plan. The continuous monitoring and improved tracking of the child’s symptoms, activities, sleep, and treatment adherence can allow precise determination of asthma triggers and a reliable assessment of medication compliance and effectiveness. Digital phenotyping refers to moment-by-moment quantification of the individual-level human phenotype in situ using data from …


Personalized Health Knowledge Graph, Amelia Gyrard, Manas Gaur, Saeedeh Shekarpour, Krishnaprasad Thirunarayan, Amit Sheth 2018 Wright State University - Main Campus

Personalized Health Knowledge Graph, Amelia Gyrard, Manas Gaur, Saeedeh Shekarpour, Krishnaprasad Thirunarayan, Amit Sheth

Kno.e.sis Publications

Our current health applications do not adequately take into account contextual and personalized knowledge about patients. In order to design “Personalized Coach for Healthcare” applications to manage chronic diseases, there is a need to create a Personalized Healthcare Knowledge Graph (PHKG) that takes into consideration a patient’s health condition (personalized knowledge) and enriches that with contextualized knowledge from environmental sensors and Web of Data (e.g., symptoms and treatments for diseases). To develop PHKG, aggregating knowledge from various heterogeneous sources such as the Internet of Things (IoT) devices, clinical notes, and Electronic Medical Records (EMRs) is necessary. In this paper, we …


Open Data Standards For Open Source Software Risk Management Routines: An Examination Of Spdx, Robin A. Gandhi, Matt Germonprez, Georg J.P. Link 2018 University of Nebraska at Omaha

Open Data Standards For Open Source Software Risk Management Routines: An Examination Of Spdx, Robin A. Gandhi, Matt Germonprez, Georg J.P. Link

Information Systems and Quantitative Analysis Faculty Publications

As the organizational use of open source software (OSS) increases, it requires the adjustment of organizational routines to manage new OSS risk. These routines may be influenced by community-developed open data standards to explicate, analyze, and report OSS risks. Open data standards are co-created in open communities for unifying the exchange of information. The SPDX® specification is such an open data standard to explicate and share OSS risk information. The development and subsequent adoption of SPDX raises the questions of how organizations make sense of SPDX when improving their own risk management routines, and of how a community benefits from …


The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr. 2018 University of Nebraska at Omaha

The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in many information systems. The ubiquity of CAs in cell phones, entertainment systems, and messaging applications has led to a growing need to understand how design choices made when developing CAs influence user interactions. In this study, we explore the use case of CAs that gather potentially sensitive information from people—for example, in a medical interview. Using a laboratory experiment, we examine the influence of CA responsiveness and embodiment on the answers people give in response to sensitive and non-sensitive questions. The results show that for sensitive questions, the responsiveness of …


Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja 2018 Updated - AIS

Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja

Information Systems and Quantitative Analysis Faculty Publications

Engagement with open source projects is becoming an increasingly important part of how people work. In this regard, there is a growing interest in how we can better understand the dynamics within an open source project related to project activity, project contributor rewards, and project impact. In this paper, we summarize our work of exploring the relationships between these items.


Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins 2018 University of Nebraska at Omaha

Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins

Information Systems and Quantitative Analysis Faculty Publications

The rapid acceleration of corporate engagement with open source projects is drawing out new ways for CSCW researchers to consider the dynamics of these projects. Research must now consider the complex ecosystems within which open source projects are situated, including issues of for-profit motivations, brokering foundations, and corporate collaboration. Localized project considerations cannot reveal broader workings of an open source ecosystem, yet much empirical work is constrained to a local context. In response, we present eight observations from our eight-year engaged field study about the changing nature of open source projects. We ground these observations through 24 research questions that …


Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi 2018 University of Nebraska at Omaha

Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Purpose – In an environment of constant technological change, the use of virtual teams has become commonplace for many organizations. Virtual teams (VTs) bring together dispersed individuals with varying knowledge and skill sets to accomplish tasks. VTs rely heavily on information technology as the medium for communication and coordination of work. The issue of establishing and maintaining trust in VTs poses challenges for these dispersed workers. Previous research has established that higher trusting teams have better cooperation and experience improved outcomes. We hope to contribute to the literature on trust in VTs by exploring how technology can facilitate high trusting …


Advancing Practical Specification Techniques For Modern Software Systems, John Singleton 2018 University of Central Florida

Advancing Practical Specification Techniques For Modern Software Systems, John Singleton

Electronic Theses and Dissertations

The pervasive nature of software (and the tendency for it to contain errors) has long been a concern of theoretical computer scientists. Many investigators have endeavored to produce theories, tools, and techniques for verifying the behavior of software systems. One of the most promising lines of research is that of formal specification, which is a subset of the larger field of formal methods. In formal specification, one composes a precise mathematical description of a software system and uses tools and techniques to ensure that the software that has been written conforms to this specification. Examples of such systems are Z …


Towards High-Performance Big Data Processing Systems, Hong Zhang 2018 University of Central Florida

Towards High-Performance Big Data Processing Systems, Hong Zhang

Electronic Theses and Dissertations

The amount of generated and stored data has been growing rapidly, It is estimated that 2.5 quintillion bytes of data are generated every day, and 90% of the data in the world today has been created in the last two years. How to solve these big data issues has become a hot topic in both industry and academia. Due to the complex of big data platform, we stratify it into four layers: storage layer, resource management layer, computing layer, and methodology layer. This dissertation proposes brand-new approaches to address the performance of big data platforms like Hadoop and Spark on …


A Value Sensitive Design Approach To Adolescent Mobile Online Safety, Arup Kumar Ghosh 2018 University of Central Florida

A Value Sensitive Design Approach To Adolescent Mobile Online Safety, Arup Kumar Ghosh

Electronic Theses and Dissertations

With the rise of adolescent smartphone use, concerns about teen online safety are also on the rise. A number of parental control apps are available for mobile devices, but adoption of these apps has been markedly low. To better understand these apps, their users, and design opportunities in the space of mobile online safety for adolescents, we have conducted four studies informed by the principles of Value Sensitive Design (VSD). In Study 1 (Chapter 2), we conducted a web-based survey of 215 parents and their teens (ages 13-17) using two separate logistic regression models (parent and teen) to examine the …


Environmental Physical-Virtual Interaction To Improve Social Presence With A Virtual Human In Mixed Reality, Kangsoo Kim 2018 University of Central Florida

Environmental Physical-Virtual Interaction To Improve Social Presence With A Virtual Human In Mixed Reality, Kangsoo Kim

Electronic Theses and Dissertations

Interactive Virtual Humans (VHs) are increasingly used to replace or assist real humans in various applications, e.g., military and medical training, education, or entertainment. In most VH research, the perceived social presence with a VH, which denotes the user's sense of being socially connected or co-located with the VH, is the decisive factor in evaluating the social influence of the VH—a phenomenon where human users' emotions, opinions, or behaviors are affected by the VH. The purpose of this dissertation is to develop new knowledge about how characteristics and behaviors of a VH in a Mixed Reality (MR) environment can affect …


A Certificateless One-Way Group Key Agreement Protocol For End-To-End Email Encryption, Jyh-Haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White 2018 Boise State University

A Certificateless One-Way Group Key Agreement Protocol For End-To-End Email Encryption, Jyh-Haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White

Computer Science Faculty Publications and Presentations

Over the years, email has evolved into one of the most widely used communication channels for both individuals and organizations. However, despite near ubiquitous use in much of the world, current information technology standards do not place emphasis on email security. Not until recently, webmail services such as Yahoo's mail and Google's gmail started to encrypt emails for privacy protection. However, the encrypted emails will be decrypted and stored in the service provider's servers. If the servers are malicious or compromised, all the stored emails can be read, copied and altered. Thus, there is a strong need for end-to-end (E2E) …


Solidification Rate Detection Through Solid-Liquid Interface Tracking, Wei Luo 2018 Missouri University of Science and Technology

Solidification Rate Detection Through Solid-Liquid Interface Tracking, Wei Luo

Masters Theses

”Studying the melt pool dynamics in laser powder bed fusion (LPBF) additive manufacturing is vital to predict the microstructure of the built part. High-speed synchrotron hard X-ray imaging is an advanced technique to monitor the LPBF process in situ and in real time. However, it is very challenging to track the solid-liquid interface due to the low image contrast, high image noise and unstable intensity of the image sequences.

In this paper, we propose an solid-liquid interface detector with human interaction to track the interface to compute the solidification rate of the melt pool. The proposed method includes six independent …


A Network Tomography Approach For Traffic Monitoring In Smart Cities, Ruoxi Zhang 2018 Missouri University of Science and Technology

A Network Tomography Approach For Traffic Monitoring In Smart Cities, Ruoxi Zhang

Masters Theses

"Various urban planning and managing activities required by a Smart City are feasible because of traffic monitoring. As such, the thesis proposes a network tomography-based approach that can be applied to road networks to achieve a cost-efficient, flexible, and scalable monitor deployment. Due to the algebraic approach of network tomography, the selection of monitoring intersections can be solved through the use of matrices, with its rows representing paths between two intersections, and its columns representing links in the road network. Because the goal of the algorithm is to provide a cost-efficient, minimum error, and high coverage monitor set, this problem …


Analyzing Large Scale Trajectory Data To Identify Users With Similar Behavior, Tyler Clark Percy 2018 Missouri University of Science and Technology

Analyzing Large Scale Trajectory Data To Identify Users With Similar Behavior, Tyler Clark Percy

Masters Theses

"In today's society, social networks are a popular way to connect with friends and family and share what's going on in your life. With the Internet connecting us all closer than ever before, it is increasingly common to use social networks to meet new friends online that share similar interests instead of only connecting with those you already know. For the problem of attempting to connect people with similar interests, this paper proposes the foundation for a Geo-social network that aims to extract the semantic meaning from users' location history and use this information to find the similarity between users. …


Online/Offline Traceable Attribute-Based Encryption [In Chinese], Kai ZHANG, Jianfeng MA, Junwei ZHANG, Zuobin YING, Tao ZHANG, Ximeng LIU 2018 Singapore Management University

Online/Offline Traceable Attribute-Based Encryption [In Chinese], Kai Zhang, Jianfeng Ma, Junwei Zhang, Zuobin Ying, Tao Zhang, Ximeng Liu

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE), as a public key encryption, can be utilized for fine-grained access control. However, there are two main drawbacks that limit the applications of attribute-based encryption. First, as different users may have the same decryption privileges in ciphertext-policy attribute-based encryption, it is difficult to catch the users who sell their secret keys for financial benefit. Second, the number of resource-consuming exponentiation operations required to encrypt a message in ciphertext-policy attribute-based encryption grows with the complexity of the access policy, which presents a significant challenge for the users who encrypt data on mobile devices. Towards this end, after proposing …


An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook 2018 Edith Cowan University

An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook

Theses: Doctorates and Masters

Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …


A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat 2018 Edith Cowan University

A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat

Theses: Doctorates and Masters

This thesis investigates mobile electronic transfer of prescription (ETP) in compliance with the security requirements mandated by the Australian healthcare industry and proposes a framework for the development of an Android mobile electronic prescription transfer application. Furthermore, and based upon the findings and knowledge from constructing this framework, another framework is also derived for assessing Android mobile ETP applications for their security compliance.

The centralised exchange model-based ETP solution currently used in the Australian healthcare industry is an expensive solution for on-going use. With challenges such as an aging population and the rising burden of chronic disease, the cost of …


Digital Commons powered by bepress