Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (24)
- Physical Sciences and Mathematics (23)
- Business (19)
- Computer Sciences (18)
- Computer Engineering (12)
-
- Electrical and Computer Engineering (12)
- Social and Behavioral Sciences (11)
- Business Administration, Management, and Operations (9)
- Life Sciences (7)
- Arts and Humanities (6)
- Artificial Intelligence and Robotics (5)
- Technology and Innovation (5)
- Databases and Information Systems (4)
- Education (4)
- Tourism and Travel (4)
- American Studies (3)
- Biology (3)
- Computer and Systems Architecture (3)
- Integrative Biology (3)
- International Relations (3)
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Political Science (3)
- Psychology (3)
- Robotics (3)
- Digital Communications and Networking (2)
- Earth Sciences (2)
- Law (2)
- Operational Research (2)
- Other Computer Engineering (2)
- Statistics and Probability (2)
- Keyword
-
- Machine learning (5)
- Industry 4.0 (4)
- Security (4)
- Cybersecurity (3)
- Deep learning (3)
-
- Architecture (2)
- China (2)
- Cloud computing (2)
- Ecological prediction (2)
- Ecosystem benefits (2)
- Edge computing (2)
- Monitoring (2)
- Network Virtualization (2)
- Remote sensing (2)
- Research priorities (2)
- Scalability (2)
- Security studies (2)
- Sequential data (2)
- Temporal ecology (2)
- Time series (2)
- 2014 USFSP Honors Program Thesis (1)
- 3D Model (1)
- 3D scanning (1)
- 5G Cellular Networks (1)
- AI Ethical Decision-Making (1)
- AI Trust (1)
- AI platforms (1)
- AIOT (1)
- Acquisition (1)
- Additive Manufacturing (1)
- Publication Year
- Publication
-
- USF Tampa Graduate Theses and Dissertations (42)
- University of South Florida (USF) M3 Publishing (7)
- Military Cyber Affairs (6)
- Marine Science Faculty Publications (4)
- Integrative Biology Faculty and Staff Publications (3)
-
- Journal of Strategic Security (3)
- FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English (2)
- Journal of Public Transportation (2)
- 36th Florida Conference on Recent Advances in Robotics (1)
- All Assessment Data (1)
- Crow's Nest (1)
- English Faculty Publications (1)
- Geology Faculty Publications (1)
- International Journal of Speleology (1)
- Journal of Global Business Insights (1)
- Library Annual Reports (1)
- North American Bird Bander (1)
- Numeracy (1)
- Research Reports (1)
- School of Information Faculty Publications (1)
- Theatre and Dance Faculty Publications (1)
- USF Patents (1)
- USF St. Petersburg campus Faculty Publications (1)
- USF St. Petersburg campus Honors Program Theses (Undergraduate) (1)
- University of South Florida (USF) - M3 Publishing (1)
- Publication Type
Articles 1 - 30 of 86
Full-Text Articles in Entire DC Network
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
2019 Wbba Annual Meeting Scientific Sessions And Workshops, 20-21 September, Brighton, Colorado, North American Bird Bander
2019 Wbba Annual Meeting Scientific Sessions And Workshops, 20-21 September, Brighton, Colorado, North American Bird Bander
North American Bird Bander
No abstract provided.
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
USF Tampa Graduate Theses and Dissertations
Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
Live Audiovisual Remote Assistance System (Laras) For Person With Visual Impairments, Zachary Frey, Nghia Vo, Varaha Maithreya, Tais Mota, Urvish Trivedi, Redwan Alqasemi, Rajiv Dubey
36th Florida Conference on Recent Advances in Robotics
According to "The World Report on Vision" by World Health Organization (WHO) [1], there are more than 2.2 billion people who have near or distant vision Impairments, out of which 36 million people are classified as entirely blind. This report also emphasizes the importance of social and communal support in enabling individuals with vision impairments to integrate into society and reach their full potential. While performing daily activities and navigating the environment, people with visual impairments (PVIs) often require direct or synchronous assistance [2]. Consequently, there is a growing need for automated solutions to assist in this regard. However, existing …
Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson
Process Automation And Robotics Engineering For Industrial Processing Systems, Drake Stimpson
USF Tampa Graduate Theses and Dissertations
Automation in industrial systems applications has emerged as the fundamental solution for improving quality, production rate, and efficiency of a process. Much of the recent popularity surrounding the transition of processes from manually operated tasks to automated systems can be attributed to the concept of Industry 4.0, which outlines the fundamental guidelines for integrating cyber-physical systems into industrial processes. Due to rapid advancement of technology in robotics and automation as well as the increase in accessibility of resources to this technology, the capability to develop automated systems has become feasible for small-scale enterprise. This work presents a two-part initiative to …
Chapter 03 Careers In Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal
Chapter 03 Careers In Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal
FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English
Information technology now offers a range of attractive career options for workers with a wide variety of interests, skill levels, and career ambitions. See Figure 6. Some of these roles are highlighted in this chapter.
Fundamentals Of Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal
Fundamentals Of Information Technology, Shambhavi Roy, Clinton Daniel, Manish Agrawal
FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English
No abstract provided.
Predicting Intentions To Continue Using Travel Apps In The Post Covid-19 Crisis, Ahmed C. Bouarar, Smail Mouloudj, Asma Makhlouf, Kamel Mouloudj
Predicting Intentions To Continue Using Travel Apps In The Post Covid-19 Crisis, Ahmed C. Bouarar, Smail Mouloudj, Asma Makhlouf, Kamel Mouloudj
University of South Florida (USF) M3 Publishing
In the era of information technology and the Internet, travel apps have become a significant element influencing modern travel behavior. However, research in this context remains limited in the tourism literature. This paper aimed to investigate the factors that influence intentions to continue using travel apps in the post-COVID-19 crisis in Algeria. A convenience sample of 380 Algerian tourists was surveyed, and a total of 244 questionnaires were collected over three months. The method used to test the proposed hypotheses empirically was the multiple regression analysis using SPSS 26. Results showed that attitude, perceived behavior control (PBC), degree of satisfaction, …
Healthcare Iot System And Network Design, Halil Ibrahim Deniz
Healthcare Iot System And Network Design, Halil Ibrahim Deniz
USF Tampa Graduate Theses and Dissertations
The developing IoT concept offers many opportunities to service providers in the medical field. However, the functionality of the developed systems is increasing day by day, and it brings many different problems. One of the most important problems is the transmission of biomedical data of real-time monitoring systems to the medical server with the least delay. Network architectures are changing to meet the changing needs of densely connected devices, and “computing at the edge” is the new architectural approach emerging in IoT networks. This architecture is more dynamic than computation in the cloud because it enables data processing at each …
Response: In And Out Of The Game, As Usual, Steven E. Jones
Response: In And Out Of The Game, As Usual, Steven E. Jones
English Faculty Publications
In this response article, I revisit the idea of paratext in video games. I start, however, with the example of a book by Tolstoy, and the textual studies work of McKenzie and McGann, in order to make the point that paratextuality has never been limited to Genette’s rigid definition, even in the case of print texts. Video games foreground what has always been the case: the dynamic, volatile, multidirectional nature of paratexts, which can take you into but also out of the enclosure of the main text (or “game itself”) in unexpected ways. Illustrations include Animal Crossing: New Horizons and …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
A Hierarchical Multi-Authority Access Control Scheme For Secure And Efficient Data Sharing In Cloud Storage, Smita Athanere, Dr. Ramesh Thakur
A Hierarchical Multi-Authority Access Control Scheme For Secure And Efficient Data Sharing In Cloud Storage, Smita Athanere, Dr. Ramesh Thakur
Journal of Strategic Security
Enterprises choose to keep their data on the cloud to allow for flexible and efficient data exchange among their authorized staff when dealing with huge data. However, during the sharing of sensitive data, data security and users privacy has become major challenges. Most of the existing studies have several limitations, including weak model security, single point of failure, and lack of efficiency during user revocation. This article proposes cloud storage based Hierarchical Multi-authority Access Control Scheme (HMA-ACS) for secure and efficient data sharing. Through theoretical analysis, this article proves that the proposed mechanism efficiently performs cryptographic key operations and secured …
Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari
Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari
USF Tampa Graduate Theses and Dissertations
Applications of deep learning models and convolutional neural networks have been rapidly increased. Although state-of-the-art CNNs provide high accuracy in many applications, recent investigations show that such networks are highly vulnerable to adversarial attacks. The black-box adversarial attack is one type of attack that the attacker does not have any knowledge about the model or the training dataset, but it has some input data set and theirlabels.
In this chapter, we propose a novel approach to generate a black-box attack in a sparse domain, whereas the most critical information of an image can be observed. Our investigation shows that large …
Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker
Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker
USF Tampa Graduate Theses and Dissertations
The advent of quantum computers and the exponential speed-up of quantum computation will render classical cryptosystems insecure, as that can solve current encryptions in minutes, resulting in a catastrophic failure of privacy preservation and data security. Through the standardizing of quantum-resistant public-key cryptography algorithms, the National Institute of Standards and Technology (NIST) is evaluating potential candidates to thwart such quantum attacks. In this dissertation, countermeasures against fault attacks are proposed to secure various lattice-based cryptosystems, one of the most promising post-quantum cryptosystems. Fault detection architectures for crucial building blocks of lattice-based cryptosystems, i.e., number-theoretic transform, ring polynomial multiplication, and ring …
Re-Architecting The Firm For Increased Value: How Business Models Are Adapting To The New Ai Environment, Gozde Turktarhan, David S. Aleong, Chandra Aleong
Re-Architecting The Firm For Increased Value: How Business Models Are Adapting To The New Ai Environment, Gozde Turktarhan, David S. Aleong, Chandra Aleong
Journal of Global Business Insights
This paper is an examination of how technology, specifically artificial intelligence (AI), brings about changes in business models, with corresponding impacts on the fields of economics and business. Concepts such as value creation and competitive advantage have cascading effects on organizational culture and the functional framework of a firm. Data creation, management, and curation using media platforms enable enhanced scalability and logistics management such that the firm can be re-architected around a digital core. Organizational structure with functions such as marketing and human resource management are integral links in the automated value network anticipating and responding to customers’ needs while …
Emerging Technology Trends In Hospitality And Tourism, Harry Costin, Antonio Eslava
Emerging Technology Trends In Hospitality And Tourism, Harry Costin, Antonio Eslava
University of South Florida (USF) M3 Publishing
This chapter explores how technology has radically reshaped the tourism industry in the last few decades. In particular, IT applications such as the internet since the 1990s, and more recently smartphone Apps, have contributed to that change. Today, travelers and tourists use the internet to explore the many options available to them in terms of transport, lodging and entertainment at popular tourist destinations. Therefore, many local brick and mortar agencies have disappeared and have been replaced by large, platform-based players such as Expedia, AirBnB or Booking.com. The many pictures they upload constantly while traveling, and the feedback collected immediately after …
Novel Approach To Integrate Can Based Vehicle Sensors With Gps Using Adaptive Filters To Improve Localization Precision In Connected Vehicles From A Systems Engineering Perspective, Abhijit Vasili
USF Tampa Graduate Theses and Dissertations
Research and development in Connected Vehicles (CV) Technologies has increased exponentially, with the allocation of 75 MHz radio spectrum in the 5.9 GHz band by the Federal Communication Commission (FCC) dedicated to Intelligent Transportation Systems (ITS) in 1999 and 30 MHz in the 5.9 GHz by the European Telecommunication Standards Institution (ETSI). Many applications have been tested and deployed in pilot programs across many cities all over the world.
CV pilot programs have played a vital role in evaluating the effectiveness and impact of the technology and understanding the effects of the applications over the safety of road users. The …
Human-Centric Cybersecurity Research: From Trapping The Bad Guys To Helping The Good Ones, Armin Ziaie Tabari
Human-Centric Cybersecurity Research: From Trapping The Bad Guys To Helping The Good Ones, Armin Ziaie Tabari
USF Tampa Graduate Theses and Dissertations
The issue of cybersecurity has become much more prevalent over the last few years, with a number of widely publicised incidents, hacking attempts, and data breaches reaching the news. There is no sign of an abatement in the number of cyber incidents, and it would be wise to reconsider the way cybersecurity is viewed and whether a mindset shift is necessary. Cybersecurity, in general, can be seen as primarily a human problem, and it is for this reason that it requires human solutions and tradeoffs. In order to study this problem, using two perspectives; that of the adversaries and that …
Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair
Informing Complexity: The Business Case For Managing Digital Twins Of Complex Process Facilities As A Valuable Asset, William Randell Mcnair
USF Tampa Graduate Theses and Dissertations
The Digital Twins of complex facilities, specifically 3D models created during their design, is a potentially valuable information asset. This three- article dissertation explores the business case for firms in the petrochemical process industry to manage throughout the facility lifecycle. A maturity model is provided to illustrate the stages of digital twin evolution and serves as a tool to help communicate each of the five levels of digital twin maturity achievable in various use cases. An industry analysis reviews existing literature and proposes a model to assess informing or insight value of digital twins from three perspectives. Next, an empirical …
Hotel And Guest Room Technology, Betsy B. Stringam, John H. Gerdes
Hotel And Guest Room Technology, Betsy B. Stringam, John H. Gerdes
University of South Florida (USF) M3 Publishing
Hotels are utilizing a variety of technologies in the guest room and throughout the hotel. Artificial intelligence (AI), virtual reality (VR), augmented reality (AR), cloud computing, internet of things (IoT), robots, cobots (collaborative robots), and chatbots are changing the service experience and hotel operations. Technology is redefining how we interact with the guest at all touchpoints, and how we manage employees and processes in hotel operations. Hotel and guestroom technologies provide increased management tools and data, to predict reservation demand, guest needs, and even when equipment might fail. While hotel technologies are increasingly automated, the use of technology is balanced …
Network & Cyber Security In Hospitality And Tourism, Emmanuel Fragniere, Kamil Yagci
Network & Cyber Security In Hospitality And Tourism, Emmanuel Fragniere, Kamil Yagci
University of South Florida (USF) M3 Publishing
The tourism sector was transformed early on by digitalization, which makes it a very innovative area of business. At the same time, this high level of digitalization maturity makes it a very vulnerable industry in terms of cyber security. As a tourism specialist, it is therefore crucial to have a good understanding of network and cybersecurity. In this chapter, we will address this topic in an accessible and popularized manner. The goal is to understand the challenges of cybersecurity and as a tourism professional to contribute with specialists in the field to protect your business, your network, and your customers. …
An Introduction To Calling Bullshit: Learning To Think Outside The Black Box, Jevin D. West, Carl T. Bergstrom
An Introduction To Calling Bullshit: Learning To Think Outside The Black Box, Jevin D. West, Carl T. Bergstrom
Numeracy
Bergstrom, Carl T. and Jevin D. West. 2020. Calling Bullshit: The Art of Skepticism in a Data-Driven World. (New York: Random House) 336 pp. ISBN 978-0525509202.
While statistical methods receive greater attention, the art of critically evaluating information in everyday life more commonly depends on thinking outside the black box of the algorithm. In this piece we introduce readers to our book and associated online teaching materials—for readers who want to more capably call “bullshit” or to teach their students to do the same.
The Impact Of Industry 4.0 Strategy On The Work-Life Balance Of Employees, Ali S. Cetinkaya
The Impact Of Industry 4.0 Strategy On The Work-Life Balance Of Employees, Ali S. Cetinkaya
University of South Florida (USF) M3 Publishing
The era of Industry 4.0 has been creating new opportunities for the employees, like having more flexible and spare time. It has changed their work-life balance, like spending more time for the need to learn new concepts and skills. This quantitatively designed research aimed to investigate the impact of firms’ Industry 4.0 strategy on their work-life balance in manufacturing enterprises. The survey technique was used to collect 425 valid survey data from randomly selected employees working in the manufacturing enterprises operating in Konya in Turkey. Data were analyzed by using descriptive statistics, exploratory factor analysis, structural equation modeling path analysis …
Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose
Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose
University of South Florida (USF) M3 Publishing
Advances in Artificial Intelligence and Machine Learning technologies have brought a completely new level of data processing that provides deeper business insights. Purchasing advice, dynamic pricing, personal content and advice have become widely used in the retail industry thanks to artificial intelligence. Almost real-time results can be achieved by expanding the scope of data obtained from existing customers and algorithms that mimic human-like behavior. In addition, interactions with machines are more widely accepted than before, allowing consumers to accept innovations faster and thus increase brand loyalty. On the other hand, the success of artificial intelligence, which will change the future …
The Coverage Of Aiot Based Functional Service: Case Study Of Asian Futuristic Hotel, Gege Wang, Irini L. F. Tang, Eric Chan, Wai H. W. Chan
The Coverage Of Aiot Based Functional Service: Case Study Of Asian Futuristic Hotel, Gege Wang, Irini L. F. Tang, Eric Chan, Wai H. W. Chan
University of South Florida (USF) M3 Publishing
The combination of Artificial Intelligence and Internet of Things (AIOT) have been developing as a prevalent technology for applications in many industries and buildings. This research deliberately chooses a leading hotel in the application of automation to examine the coverage of using the AIOT. A recent functional framework of AIOT was used to investigate the functional attributes via observation to confirm the availability. Then the study proceeded to interview with 10 professionals in the hospitality businesses to solicit their views about the implementation of the same AIOT facilities in other hotels based on the tabled analytical results.
System And Method For A Secured Cloud File System, Vivek Kumar Singh, Kaushik Dutta, Balaji Padmanabhan, Shalini Sasidharan
System And Method For A Secured Cloud File System, Vivek Kumar Singh, Kaushik Dutta, Balaji Padmanabhan, Shalini Sasidharan
USF Patents
A cloud security system and method designed to protect users' data in case of accidental leaks in a cloud computing environment. Secured hashing of the names of folders stored on the cloud data storage are generated and persisted using multiple iterations of cryptographic hash functions along with a concatenated random number for each of the folder names, thereby providing protection against vulnerability of the folder names. The proposed system is a dual-layer framework consisting of a control layer and a data layer. The control layer is responsible for cryptographic hashing and persistence of the folder name, hashed name, salt, and …
A Framework To Aid Decision Making For Smart Manufacturing Technologies In Small-And Medium-Sized Enterprises, Purvee Bhatia
A Framework To Aid Decision Making For Smart Manufacturing Technologies In Small-And Medium-Sized Enterprises, Purvee Bhatia
USF Tampa Graduate Theses and Dissertations
The fourth industrial revolution or Industry 4.0 has changed today’s manufacturing scenario. The transition to smart manufacturing technologies has been evolving over the last few years and has recently accelerated due to the pandemic. The need to make manufacturing systems agile, adaptive, resilient, and robust has expediated the adoption and implementation of smart manufacturing technologies.
Despite the interest of manufacturers in smart manufacturing, the adoption rate has been slow due to the lack of decision-making tools that can provide a clear strategic roadmap for effective execution. Small and medium sized enterprises (SMEs) are especially slow in adoption due to the …
Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian
Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian
USF Tampa Graduate Theses and Dissertations
With the proliferation of smart, handheld devices, there has been a multifold increase in the ability of firms to target and engage with customers through mobile advertising. Therefore, not surprisingly, mobile advertising campaigns have become an integral aspect of firms’ brand building activities, such as improving the awareness and overall visibility of firms' brands. In addition, retailers are increasingly using mobile advertising for targeted promotional activities that increase in-store visits and eventual sales conversions. However, in recent years, mobile or in general online advertising campaigns have been facing one major challenge and one major threat that can negatively impact the …
Adaptive Network Slicing In Fog Ran For Iot With Heterogeneous Latency And Computing Requirements: A Deep Reinforcement Learning Approach, Almuthanna Nassar
Adaptive Network Slicing In Fog Ran For Iot With Heterogeneous Latency And Computing Requirements: A Deep Reinforcement Learning Approach, Almuthanna Nassar
USF Tampa Graduate Theses and Dissertations
In view of the recent advances in Internet of Things (IoT) devices and the emerging new breed of smart city applications and intelligent vehicular systems driven by artificial intelligence, fog radio access network (F-RAN) has been recently introduced for the next generation wireless communications. The capability of F-RAN has emerged to overcome the latency limitations of cloud-RAN (C-RAN) and assure the quality-of-service (QoS) requirements of the ultra-reliable-low-latency-communication (URLLC) for IoT applications. To this end, fog nodes (FNs) are equipped with computing, signal processing and storage capabilities to extend the inherent operations and services of the cloud to the edge. However, …
Bridging The Innovatino Gap At Socom, Gregory J. Ingram
Bridging The Innovatino Gap At Socom, Gregory J. Ingram
USF Tampa Graduate Theses and Dissertations
The purpose of this research is to provide a case study of how a highly bureaucratic organization located on a relatively inaccessible military base created organizational structures and climates to minimize innovation time and efforts. Typical approaches to government acquisition are not conducive to innovation and inhibit it in many cases. Conducting business with any government element, including the United States Special Operations Command (SOCOM), can be difficult. A few of the physical and regulatory challenges include gaining access to MacDill Air Force Base, entering the SOCOM compound and the prohibition of electronic devices on the compound. Another noteworthy challenge …