Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud Nov 2021

Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud

Earth and Environmental Sciences Faculty Publications

Knowledge of the groundwater potential, especially in an arid region, can play a major role in planning the sustainable management of groundwater resources. In this study, nine machine learning (ML) algorithms—namely, Artificial Neural Network (ANN), Decision Jungle (DJ), Averaged Perceptron (AP), Bayes Point Machine (BPM), Decision Forest (DF), Locally-Deep Support Vector Machine (LD-SVM), Boosted Decision Tree (BDT), Logistic Regression (LG), and Support Vector Machine (SVM)—were run on the Microsoft Azure cloud computing platform to model the groundwater potential. We investigated the relationship between 512 operating boreholes with a specified specific capacity and 14 groundwater-influencing occurrence factors. The unconfined aquifer in …


A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song Nov 2017

A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song

Information Science Faculty Publications

No abstract provided.


The Cloud, The Crowd, And The City: How New Data Practices Reconfigure Urban Governance?, Philip Ashton, Rachel Weber, Matthew Zook May 2017

The Cloud, The Crowd, And The City: How New Data Practices Reconfigure Urban Governance?, Philip Ashton, Rachel Weber, Matthew Zook

Geography Faculty Publications

No abstract provided.


Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale Mar 2017

Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale

Geography Faculty Publications

No abstract provided.


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Information-Theoretic Secure Outsourced Computation In Distributed Systems, Zhaohong Wang Jan 2016

Information-Theoretic Secure Outsourced Computation In Distributed Systems, Zhaohong Wang

Theses and Dissertations--Electrical and Computer Engineering

Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir's secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participants, making it prone to collusion attacks. In this dissertation, I propose an agent-based computing framework using …


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Finding The Silver Lining In The Cloud: Reconstructing Local File Management, Kate Seago Jun 2012

Finding The Silver Lining In The Cloud: Reconstructing Local File Management, Kate Seago

Library Presentations

No abstract provided.


The Analysis Of Image Feature Robustness Using Cometcloud, Xin Qi, Hyunjoo Kim, Fuyong Xing, Manish Parashar, David J. Foran, Lin Yang Jan 2012

The Analysis Of Image Feature Robustness Using Cometcloud, Xin Qi, Hyunjoo Kim, Fuyong Xing, Manish Parashar, David J. Foran, Lin Yang

Biostatistics Faculty Publications

The robustness of image features is a very important consideration in quantitative image analysis. The objective of this paper is to investigate the robustness of a range of image texture features using hematoxylin stained breast tissue microarray slides which are assessed while simulating different imaging challenges including out of focus, changes in magnification and variations in illumination, noise, compression, distortion, and rotation. We employed five texture analysis methods and tested them while introducing all of the challenges listed above. The texture features that were evaluated include co-occurrence matrix, center-symmetric auto-correlation, texture feature coding method, local binary pattern, and texton. Due …


Energy-Aware Optimization For Embedded Systems With Chip Multiprocessor And Phase-Change Memory, Jiayin Li Jan 2012

Energy-Aware Optimization For Embedded Systems With Chip Multiprocessor And Phase-Change Memory, Jiayin Li

Theses and Dissertations--Electrical and Computer Engineering

Over the last two decades, functions of the embedded systems have evolved from simple real-time control and monitoring to more complicated services. Embedded systems equipped with powerful chips can provide the performance that computationally demanding information processing applications need. However, due to the power issue, the easy way to gain increasing performance by scaling up chip frequencies is no longer feasible. Recently, low-power architecture designs have been the main trend in embedded system designs.

In this dissertation, we present our approaches to attack the energy-related issues in embedded system designs, such as thermal issues in the 3D chip multiprocessor (CMP), …