Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

32,148 Full-Text Articles 32,222 Authors 8,985,906 Downloads 297 Institutions

All Articles in Computer Sciences

Faceted Search

32,148 full-text articles. Page 4 of 932.

Privileged Access Management, Anea Cobia 2019 La Salle University

Privileged Access Management, Anea Cobia

Economic Crime Forensics Capstones

Security breaches are becoming a common occurrence in society today. When breaches occur, people are often left wondering how they will be affected and what steps can be taken to protect them. The passing of stricter standards and regulations has not slowed would be hackers from crafting ways to breach networks. While there are many ways that a breach can occur, the focus of this paper will be to look at the usage of credentials and privileged accounts. Specifically, the idea of privilege access management and methods for protecting credentials will be examined.


Evaluating Motivational Interviewing And Habit Formation To Enhance The Effect Of Activity Trackers On Healthy Adults’ Activity Levels: Randomized Intervention, Laura D. Ellingson, Jeni E. Lansing, Kathryn J. DeShaw, Karissa L. Peyer, Yang Bai, Maria Perez, L. Alison Phillips, Gregory Welk 2019 Iowa State University

Evaluating Motivational Interviewing And Habit Formation To Enhance The Effect Of Activity Trackers On Healthy Adults’ Activity Levels: Randomized Intervention, Laura D. Ellingson, Jeni E. Lansing, Kathryn J. Deshaw, Karissa L. Peyer, Yang Bai, Maria Perez, L. Alison Phillips, Gregory Welk

Psychology Publications

Background: While widely used and endorsed, there is limited evidence supporting the benefits of activity trackers for increasing physical activity; these devices may be more effective when combined with additional strategies that promote sustained behavior change like motivational interviewing (MI) and habit development. Objective: This study aims to determine the utility of wearable activity trackers alone or in combination with these behavior change strategies for promoting improvements in active and sedentary behaviors. Methods: A sample of 91 adults (48/91 female, 53%) was randomized to receive a Fitbit Charge alone or in combination with MI and habit education for 12 ...


Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter 2019 Linnaeus University

Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter

International Journal of Business and Technology

Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious ...


Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal 2019 Linnaeus University

Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal

International Journal of Business and Technology

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data ...


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi 2019 University for Business and Technology

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

International Journal of Business and Technology

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have ...


Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu 2019 University for Business and Technology

Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu

International Journal of Business and Technology

Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order ...


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj 2019 University for Business and Technology

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol ...


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa 2019 University for Business and Technology

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

International Journal of Business and Technology

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s ...


A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani 2019 EduSoft

A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani

International Journal of Business and Technology

State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers ...


Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani 2019 Norwegian University of Science and Technology

Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani

International Journal of Business and Technology

The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a ...


Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova 2019 Technical University Sofia

Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova

International Journal of Business and Technology

The paper makes an overview of the existing methods applied for circuit design with low power consumption objective. It considers Computer-Aided Design (CAD) tools and modules for power consumption estimation at the design stage. For analog and mixed analog-digital circuit design, the power estimation options in ORCAD Design Suit with PSpice and Analog Filter Wizard are studied. For digital communication systems the study covers the power estimation, analysis and optimization in ISE and Vivado systems, Xilinx Power Estimator (XPE) tool and spreadsheet, the XPower Analyzer, as well as similar tools proposed by ALTERA - PowerPlay Early Power Estimator and QUARTUS II ...


Improving Non-Native English Students' Communicative Competence And Collaboration Skills Through Virtual Simulations, Alisa Sadiku 2019 University for Business and Technology

Improving Non-Native English Students' Communicative Competence And Collaboration Skills Through Virtual Simulations, Alisa Sadiku

International Journal of Business and Technology

Knowing how to communicate in the target language is the main goal of most language learners. Furthermore, it is very challenging for teachers to bring real world communication experiences in classroom settings where English is not the native language. Hence, in this paper I explore the role of virtual simulations in promoting communicational and collaboration opportunities to non-native speakers of English. In my research, I describe how virtual worlds improve communicative and collaborative skills of non-native speakers of English. Moreover, I investigate how virtual worlds can create a learner centered environment where students take control of their own language production ...


Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith 2019 University of Glasgow

Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith

International Journal of Business and Technology

The testing of simulation models has much in common with testing processes in other types of application involving software development. However, there are also important differences associated with the fact that simulation model testing involves two distinct aspects, which are known as verification and validation. Model validation is concerned with investigation of modelling errors and model limitations while verification involves checking that the simulation program is an accurate representation of the mathematical and logical structure of the underlying model. Success in model validation depends upon the availability of detailed information about all aspects of the system being modelled. It also ...


Recommender Systems Notation, Michael D. Ekstrand, Joseph A. Konstan 2019 Boise State University

Recommender Systems Notation, Michael D. Ekstrand, Joseph A. Konstan

Computer Science Faculty Publications and Presentations

As the field of recommender systems has developed, authors have used a myriad of notations for describing the mathematical workings of recommendation algorithms. These notations appear in research papers, books, lecture notes, blog posts, and software documentation. The disciplinary diversity of the field has not contributed to consistency in notation; scholars whose home base is in information retrieval have different habits and expectations than those in machine learning or human-computer interaction.

In the course of years of teaching and research on recommender systems, we have seen the value in adopting a consistent notation across our work. This has been particularly ...


Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali 2019 University of Nevada, Las Vegas

Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali

UNLV Best Teaching Practices Expo

For computer science, and many technical fields, it is recognized that projects with real-world applicability play a significant roll in what students get out of the course. Creating applicable projects for upper division such as our data structures classes is very difficult and time consuming. We have utilized the Nifty assignments concept and applied it locally to an upper division data structures course. Our primary goal is to provide a forum for the sharing of data structure project ideas and materials (as applicable).


Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf 2019 Liberty University

Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf

The Kabod

The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and ...


De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng 2019 Qufu Normal University

De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng

Department of Computer Science Publications

Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks ...


Multi-Linear Algebraic Eigendecompositions And Their Application In Data Science, Randy Hoover, Kyle Caudle Dr., Karen Braman Dr. 2019 SDSMT

Multi-Linear Algebraic Eigendecompositions And Their Application In Data Science, Randy Hoover, Kyle Caudle Dr., Karen Braman Dr.

SDSU Data Science Symposium

Multi-dimensional data analysis has seen increased interest in recent years. With more and more data arriving as 2-dimensional arrays (images) as opposed to 1-dimensioanl arrays (signals), new methods for dimensionality reduction, data analysis, and machine learning have been pursued. Most notably have been the Canonical Decompositions/Parallel Factors (commonly referred to as CP) and Tucker decompositions (commonly regarded as a high order SVD: HOSVD). In the current research we present an alternate method for computing singular value and eigenvalue decompositions on multi-way data through an algebra of circulants and illustrate their application to two well-known machine learning methods: Multi-Linear Principal ...


Cs04all: Cryptography Module, Hunter R. Johnson 2019 CUNY John Jay College

Cs04all: Cryptography Module, Hunter R. Johnson

Open Educational Resources

Cryptography module

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this ...


Cs04all: List Comprehensions, Hunter R. Johnson 2019 CUNY John Jay College

Cs04all: List Comprehensions, Hunter R. Johnson

Open Educational Resources

List Comprehensions

This is a tutorial on list comprehensions in Python, suitable for use in an Intro or CS0 course. We also briefly mention set comprehensions and dictionary comprehensions.

https://cocalc.com/share/bde99afd-76c8-493d-9608-db9019bcd346/171/list_comprehensions?viewer=share/

This OER material was produced as a result of the CS04ALL CUNY OER project


Digital Commons powered by bepress