Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 86

Full-Text Articles in Entire DC Network

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


2019 Wbba Annual Meeting Scientific Sessions And Workshops, 20-21 September, Brighton, Colorado, North American Bird Bander Jan 2024

2019 Wbba Annual Meeting Scientific Sessions And Workshops, 20-21 September, Brighton, Colorado, North American Bird Bander

North American Bird Bander

No abstract provided.


All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis Nov 2023

All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis

USF Tampa Graduate Theses and Dissertations

Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …


Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey May 2023

Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey

36th Florida Conference on Recent Advances in Robotics

According to "The World Report on Vision" by World Health Organization (WHO) [1], there are more than 2.2 billion people who have near or distant vision Impairments, out of which 36 million people are classified as entirely blind. This report also emphasizes the importance of social and communal support in enabling individuals with vision impairments to integrate into society and reach their full potential. While performing daily activities and navigating the environment, people with visual impairments (PVIs) often require direct or synchronous assistance [2]. Consequently, there is a growing need for automated solutions to assist in this regard. However, existing …


Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson Mar 2023

Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson

USF Tampa Graduate Theses and Dissertations

Automation in industrial systems applications has emerged as the fundamental solution for improving quality, production rate, and efficiency of a process. Much of the recent popularity surrounding the transition of processes from manually operated tasks to automated systems can be attributed to the concept of Industry 4.0, which outlines the fundamental guidelines for integrating cyber-physical systems into industrial processes. Due to rapid advancement of technology in robotics and automation as well as the increase in accessibility of resources to this technology, the capability to develop automated systems has become feasible for small-scale enterprise. This work presents a two-part initiative to …


Chapter 03 Careers In Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal Jan 2023

Chapter 03 Careers In Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal

FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English

Information technology now offers a range of attractive career options for workers with a wide variety of interests, skill levels, and career ambitions. See Figure 6. Some of these roles are highlighted in this chapter.


Fundamentals Of Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal Jan 2023

Fundamentals Of Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal

FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English

No abstract provided.


Predicting Intentions To Continue Using Travel Apps In The Post Covid-19 Crisis, Ahmed C. Bouarar, Smail Mouloudj, Asma Makhlouf, Kamel Mouloudj Nov 2022

Predicting Intentions To Continue Using Travel Apps In The Post Covid-19 Crisis, Ahmed C. Bouarar, Smail Mouloudj, Asma Makhlouf, Kamel Mouloudj

University of South Florida (USF) M3 Publishing

In the era of information technology and the Internet, travel apps have become a significant element influencing modern travel behavior. However, research in this context remains limited in the tourism literature. This paper aimed to investigate the factors that influence intentions to continue using travel apps in the post-COVID-19 crisis in Algeria. A convenience sample of 380 Algerian tourists was surveyed, and a total of 244 questionnaires were collected over three months. The method used to test the proposed hypotheses empirically was the multiple regression analysis using SPSS 26. Results showed that attitude, perceived behavior control (PBC), degree of satisfaction, …


Healthcare Iot System And Network Design, Halil Ibrahim Deniz Jul 2022

Healthcare Iot System And Network Design, Halil Ibrahim Deniz

USF Tampa Graduate Theses and Dissertations

The developing IoT concept offers many opportunities to service providers in the medical field. However, the functionality of the developed systems is increasing day by day, and it brings many different problems. One of the most important problems is the transmission of biomedical data of real-time monitoring systems to the medical server with the least delay. Network architectures are changing to meet the changing needs of densely connected devices, and “computing at the edge” is the new architectural approach emerging in IoT networks. This architecture is more dynamic than computation in the cloud because it enables data processing at each …


Response: In And Out Of The Game, As Usual, Steven E. Jones May 2022

Response: In And Out Of The Game, As Usual, Steven E. Jones

English Faculty Publications

In this response article, I revisit the idea of paratext in video games. I start, however, with the example of a book by Tolstoy, and the textual studies work of McKenzie and McGann, in order to make the point that paratextuality has never been limited to Genette’s rigid definition, even in the case of print texts. Video games foreground what has always been the case: the dynamic, volatile, multidirectional nature of paratexts, which can take you into but also out of the enclosure of the main text (or “game itself”) in unexpected ways. Illustrations include Animal Crossing: New Horizons and …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


A Hierarchical Multi-Authority Access Control Scheme For Secure And Efficient Data Sharing In Cloud Storage, Smita Athanere, Dr. Ramesh Thakur Apr 2022

A Hierarchical Multi-Authority Access Control Scheme For Secure And Efficient Data Sharing In Cloud Storage, Smita Athanere, Dr. Ramesh Thakur

Journal of Strategic Security

Enterprises choose to keep their data on the cloud to allow for flexible and efficient data exchange among their authorized staff when dealing with huge data. However, during the sharing of sensitive data, data security and users privacy has become major challenges. Most of the existing studies have several limitations, including weak model security, single point of failure, and lack of efficiency during user revocation. This article proposes cloud storage based Hierarchical Multi-authority Access Control Scheme (HMA-ACS) for secure and efficient data sharing. Through theoretical analysis, this article proves that the proposed mechanism efficiently performs cryptographic key operations and secured …


Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari Mar 2022

Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari

USF Tampa Graduate Theses and Dissertations

Applications of deep learning models and convolutional neural networks have been rapidly increased. Although state-of-the-art CNNs provide high accuracy in many applications, recent investigations show that such networks are highly vulnerable to adversarial attacks. The black-box adversarial attack is one type of attack that the attacker does not have any knowledge about the model or the training dataset, but it has some input data set and theirlabels.

In this chapter, we propose a novel approach to generate a black-box attack in a sparse domain, whereas the most critical information of an image can be observed. Our investigation shows that large …


Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker Mar 2022

Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker

USF Tampa Graduate Theses and Dissertations

The advent of quantum computers and the exponential speed-up of quantum computation will render classical cryptosystems insecure, as that can solve current encryptions in minutes, resulting in a catastrophic failure of privacy preservation and data security. Through the standardizing of quantum-resistant public-key cryptography algorithms, the National Institute of Standards and Technology (NIST) is evaluating potential candidates to thwart such quantum attacks. In this dissertation, countermeasures against fault attacks are proposed to secure various lattice-based cryptosystems, one of the most promising post-quantum cryptosystems. Fault detection architectures for crucial building blocks of lattice-based cryptosystems, i.e., number-theoretic transform, ring polynomial multiplication, and ring …


Re-Architecting The Firm For Increased Value: How Business Models Are Adapting To The New Ai Environment, Gozde Turktarhan, David S. Aleong, Chandra Aleong Mar 2022

Re-Architecting The Firm For Increased Value: How Business Models Are Adapting To The New Ai Environment, Gozde Turktarhan, David S. Aleong, Chandra Aleong

Journal of Global Business Insights

This paper is an examination of how technology, specifically artificial intelligence (AI), brings about changes in business models, with corresponding impacts on the fields of economics and business. Concepts such as value creation and competitive advantage have cascading effects on organizational culture and the functional framework of a firm. Data creation, management, and curation using media platforms enable enhanced scalability and logistics management such that the firm can be re-architected around a digital core. Organizational structure with functions such as marketing and human resource management are integral links in the automated value network anticipating and responding to customers’ needs while …


Emerging Technology Trends In Hospitality And Tourism, Harry Costin, Antonio Eslava Feb 2022

Emerging Technology Trends In Hospitality And Tourism, Harry Costin, Antonio Eslava

University of South Florida (USF) M3 Publishing

This chapter explores how technology has radically reshaped the tourism industry in the last few decades. In particular, IT applications such as the internet since the 1990s, and more recently smartphone Apps, have contributed to that change. Today, travelers and tourists use the internet to explore the many options available to them in terms of transport, lodging and entertainment at popular tourist destinations. Therefore, many local brick and mortar agencies have disappeared and have been replaced by large, platform-based players such as Expedia, AirBnB or Booking.com. The many pictures they upload constantly while traveling, and the feedback collected immediately after …


Novel Approach To Integrate Can Based Vehicle Sensors With Gps Using Adaptive Filters To Improve Localization Precision In Connected Vehicles From A Systems Engineering Perspective, Abhijit Vasili Nov 2021

Novel Approach To Integrate Can Based Vehicle Sensors With Gps Using Adaptive Filters To Improve Localization Precision In Connected Vehicles From A Systems Engineering Perspective, Abhijit Vasili

USF Tampa Graduate Theses and Dissertations

Research and development in Connected Vehicles (CV) Technologies has increased exponentially, with the allocation of 75 MHz radio spectrum in the 5.9 GHz band by the Federal Communication Commission (FCC) dedicated to Intelligent Transportation Systems (ITS) in 1999 and 30 MHz in the 5.9 GHz by the European Telecommunication Standards Institution (ETSI). Many applications have been tested and deployed in pilot programs across many cities all over the world.

CV pilot programs have played a vital role in evaluating the effectiveness and impact of the technology and understanding the effects of the applications over the safety of road users. The …


Human-Centric Cybersecurity Research: From Trapping The Bad Guys To Helping The Good Ones, Armin Ziaie Tabari Nov 2021

Human-Centric Cybersecurity Research: From Trapping The Bad Guys To Helping The Good Ones, Armin Ziaie Tabari

USF Tampa Graduate Theses and Dissertations

The issue of cybersecurity has become much more prevalent over the last few years, with a number of widely publicised incidents, hacking attempts, and data breaches reaching the news. There is no sign of an abatement in the number of cyber incidents, and it would be wise to reconsider the way cybersecurity is viewed and whether a mindset shift is necessary. Cybersecurity, in general, can be seen as primarily a human problem, and it is for this reason that it requires human solutions and tradeoffs. In order to study this problem, using two perspectives; that of the adversaries and that …


Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair Oct 2021

Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair

USF Tampa Graduate Theses and Dissertations

The Digital Twins of complex facilities, specifically 3D models created during their design, is a potentially valuable information asset. This three- article dissertation explores the business case for firms in the petrochemical process industry to manage throughout the facility lifecycle. A maturity model is provided to illustrate the stages of digital twin evolution and serves as a tool to help communicate each of the five levels of digital twin maturity achievable in various use cases. An industry analysis reviews existing literature and proposes a model to assess informing or insight value of digital twins from three perspectives. Next, an empirical …


Hotel And Guest Room Technology, Betsy B. Stringam, John H. Gerdes Sep 2021

Hotel And Guest Room Technology, Betsy B. Stringam, John H. Gerdes

University of South Florida (USF) M3 Publishing

Hotels are utilizing a variety of technologies in the guest room and throughout the hotel. Artificial intelligence (AI), virtual reality (VR), augmented reality (AR), cloud computing, internet of things (IoT), robots, cobots (collaborative robots), and chatbots are changing the service experience and hotel operations. Technology is redefining how we interact with the guest at all touchpoints, and how we manage employees and processes in hotel operations. Hotel and guestroom technologies provide increased management tools and data, to predict reservation demand, guest needs, and even when equipment might fail. While hotel technologies are increasingly automated, the use of technology is balanced …


Network & Cyber Security In Hospitality And Tourism, Emmanuel Fragniere, Kamil Yagci Sep 2021

Network & Cyber Security In Hospitality And Tourism, Emmanuel Fragniere, Kamil Yagci

University of South Florida (USF) M3 Publishing

The tourism sector was transformed early on by digitalization, which makes it a very innovative area of business. At the same time, this high level of digitalization maturity makes it a very vulnerable industry in terms of cyber security. As a tourism specialist, it is therefore crucial to have a good understanding of network and cybersecurity. In this chapter, we will address this topic in an accessible and popularized manner. The goal is to understand the challenges of cybersecurity and as a tourism professional to contribute with specialists in the field to protect your business, your network, and your customers. …


An Introduction To Calling Bullshit: Learning To Think Outside The Black Box, Jevin D. West, Carl T. Bergstrom Aug 2021

An Introduction To Calling Bullshit: Learning To Think Outside The Black Box, Jevin D. West, Carl T. Bergstrom

Numeracy

Bergstrom, Carl T. and Jevin D. West. 2020. Calling Bullshit: The Art of Skepticism in a Data-Driven World. (New York: Random House) 336 pp. ISBN 978-0525509202.

While statistical methods receive greater attention, the art of critically evaluating information in everyday life more commonly depends on thinking outside the black box of the algorithm. In this piece we introduce readers to our book and associated online teaching materials—for readers who want to more capably call “bullshit” or to teach their students to do the same.


The Impact Of Industry 4.0 Strategy On The Work-Life Balance Of Employees, Ali S. Cetinkaya Aug 2021

The Impact Of Industry 4.0 Strategy On The Work-Life Balance Of Employees, Ali S. Cetinkaya

University of South Florida (USF) M3 Publishing

The era of Industry 4.0 has been creating new opportunities for the employees, like having more flexible and spare time. It has changed their work-life balance, like spending more time for the need to learn new concepts and skills. This quantitatively designed research aimed to investigate the impact of firms’ Industry 4.0 strategy on their work-life balance in manufacturing enterprises. The survey technique was used to collect 425 valid survey data from randomly selected employees working in the manufacturing enterprises operating in Konya in Turkey. Data were analyzed by using descriptive statistics, exploratory factor analysis, structural equation modeling path analysis …


Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose Aug 2021

Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose

University of South Florida (USF) M3 Publishing

Advances in Artificial Intelligence and Machine Learning technologies have brought a completely new level of data processing that provides deeper business insights. Purchasing advice, dynamic pricing, personal content and advice have become widely used in the retail industry thanks to artificial intelligence. Almost real-time results can be achieved by expanding the scope of data obtained from existing customers and algorithms that mimic human-like behavior. In addition, interactions with machines are more widely accepted than before, allowing consumers to accept innovations faster and thus increase brand loyalty. On the other hand, the success of artificial intelligence, which will change the future …


The Coverage Of Aiot Based Functional Service: Case Study Of Asian Futuristic Hotel, Gege Wang, Irini L. F. Tang, Eric Chan, Wai H. W. Chan Aug 2021

The Coverage Of Aiot Based Functional Service: Case Study Of Asian Futuristic Hotel, Gege Wang, Irini L. F. Tang, Eric Chan, Wai H. W. Chan

University of South Florida (USF) M3 Publishing

The combination of Artificial Intelligence and Internet of Things (AIOT) have been developing as a prevalent technology for applications in many industries and buildings. This research deliberately chooses a leading hotel in the application of automation to examine the coverage of using the AIOT. A recent functional framework of AIOT was used to investigate the functional attributes via observation to confirm the availability. Then the study proceeded to interview with 10 professionals in the hospitality businesses to solicit their views about the implementation of the same AIOT facilities in other hotels based on the tabled analytical results.


System And Method For A Secured Cloud File System, Vivek Kumar Singh, Kaushik Dutta, Balaji Padmanabhan, Shalini Sasidharan Jul 2021

System And Method For A Secured Cloud File System, Vivek Kumar Singh, Kaushik Dutta, Balaji Padmanabhan, Shalini Sasidharan

USF Patents

A cloud security system and method designed to protect users' data in case of accidental leaks in a cloud computing environment. Secured hashing of the names of folders stored on the cloud data storage are generated and persisted using multiple iterations of cryptographic hash functions along with a concatenated random number for each of the folder names, thereby providing protection against vulnerability of the folder names. The proposed system is a dual-layer framework consisting of a control layer and a data layer. The control layer is responsible for cryptographic hashing and persistence of the folder name, hashed name, salt, and …


A Framework To Aid Decision Making For Smart Manufacturing Technologies In Small-And Medium-Sized Enterprises, Purvee Bhatia Jun 2021

A Framework To Aid Decision Making For Smart Manufacturing Technologies In Small-And Medium-Sized Enterprises, Purvee Bhatia

USF Tampa Graduate Theses and Dissertations

The fourth industrial revolution or Industry 4.0 has changed today’s manufacturing scenario. The transition to smart manufacturing technologies has been evolving over the last few years and has recently accelerated due to the pandemic. The need to make manufacturing systems agile, adaptive, resilient, and robust has expediated the adoption and implementation of smart manufacturing technologies.

Despite the interest of manufacturers in smart manufacturing, the adoption rate has been slow due to the lack of decision-making tools that can provide a clear strategic roadmap for effective execution. Small and medium sized enterprises (SMEs) are especially slow in adoption due to the …


Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian Jun 2021

Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian

USF Tampa Graduate Theses and Dissertations

With the proliferation of smart, handheld devices, there has been a multifold increase in the ability of firms to target and engage with customers through mobile advertising. Therefore, not surprisingly, mobile advertising campaigns have become an integral aspect of firms’ brand building activities, such as improving the awareness and overall visibility of firms' brands. In addition, retailers are increasingly using mobile advertising for targeted promotional activities that increase in-store visits and eventual sales conversions. However, in recent years, mobile or in general online advertising campaigns have been facing one major challenge and one major threat that can negatively impact the …


Adaptive Network Slicing In Fog Ran For Iot With Heterogeneous Latency And Computing Requirements: A Deep Reinforcement Learning Approach, Almuthanna Nassar Jun 2021

Adaptive Network Slicing In Fog Ran For Iot With Heterogeneous Latency And Computing Requirements: A Deep Reinforcement Learning Approach, Almuthanna Nassar

USF Tampa Graduate Theses and Dissertations

In view of the recent advances in Internet of Things (IoT) devices and the emerging new breed of smart city applications and intelligent vehicular systems driven by artificial intelligence, fog radio access network (F-RAN) has been recently introduced for the next generation wireless communications. The capability of F-RAN has emerged to overcome the latency limitations of cloud-RAN (C-RAN) and assure the quality-of-service (QoS) requirements of the ultra-reliable-low-latency-communication (URLLC) for IoT applications. To this end, fog nodes (FNs) are equipped with computing, signal processing and storage capabilities to extend the inherent operations and services of the cloud to the edge. However, …


Bridging The Innovatino Gap At Socom, Gregory J. Ingram Apr 2021

Bridging The Innovatino Gap At Socom, Gregory J. Ingram

USF Tampa Graduate Theses and Dissertations

The purpose of this research is to provide a case study of how a highly bureaucratic organization located on a relatively inaccessible military base created organizational structures and climates to minimize innovation time and efforts. Typical approaches to government acquisition are not conducive to innovation and inhibit it in many cases. Conducting business with any government element, including the United States Special Operations Command (SOCOM), can be difficult. A few of the physical and regulatory challenges include gaining access to MacDill Air Force Base, entering the SOCOM compound and the prohibition of electronic devices on the compound. Another noteworthy challenge …