Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 653

Full-Text Articles in Entire DC Network

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo Dec 2015

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo

Faculty and Research Publications

New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …


Personal Reflections / 12.22.15, José M. Torres Dec 2015

Personal Reflections / 12.22.15, José M. Torres

Personal Reflections

Warmest wishes of the holiday season to you and your families! With 2016 upon us, it’s a great time to reflect on an incredible year. While the lack of a fiscal year 2016 State of Illinois budget has pre-empted much of our thinking, we can be proud of making advancements in key areas. I’m so pleased with your work, efforts and results. Each member of our IMSA Community— faculty, staff, students, parents, alumni, Board of Trustees and IMSA Fund Board members, our vendors, partners and stakeholders—pulled together in 2015. Our collaborative and supportive efforts made a difference in advancing IMSA.


Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang Dec 2015

Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang

Computer Science Faculty Research & Creative Works

Scientists are increasingly using the current state of the art big data analytic software (e.g., Hadoop, Giraph, etc.) for their data-intensive applications over HPC environment. However, understanding and designing the hardware environment that these data- and compute-intensive applications require for good performance is challenging. With this motivation, we evaluated the performance of big data software over three different distributed-cyber-infrastructures, including a traditional HPC-cluster called SuperMikeII, a regular datacenter called SwatIII, and a novel MicroBrick-based hyperscale system called CeresII, using our own benchmark Parallel Genome Assembler (PGA). PGA is developed atop Hadoop and Giraph and serves as a good real-world example …


Improving Energy Sustainability In Electrical Vehicle Energy Networks And Internet Of Things, Abdurrahman Arikan Dec 2015

Improving Energy Sustainability In Electrical Vehicle Energy Networks And Internet Of Things, Abdurrahman Arikan

Doctoral Dissertations

Energy sustainability is a pressing issue facing the modern society. The twin pillars of sustainable energy are renewable energy and energy efficiency. In this dissertation, we propose novel architectures and approaches to improve energy sustainability in two application domains: transportation and the Internet of Things. Transporta- tion is one of the major sources of energy consumption and environmental pollution. Plug-in hybrid electric vehicles (PHEVs) present many opportunities in improving energy efficiency and reducing greenhouse gas emissions. In addition, with batteries and built-in mobility, PHEVs can form a mobile and distributed energy network, where energy can be conveniently transported from place …


Strengthening Public Health Through Web-Based Data Query Systems, Manik Ahuja Dec 2015

Strengthening Public Health Through Web-Based Data Query Systems, Manik Ahuja

Doctoral Dissertations

Archival abstract submitted.


Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang Dec 2015

Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang

Business and Information Technology Faculty Research & Creative Works

Discourse plays a central role in organizing vision and computerization movement perspectives on IT innovation diffusion. While we know that different actors within a community contribute to the discourse, we know relatively little about the roles different actors play in diffusing different types of IT innovations. Our study investigates vendor versus adopter roles in social media and big data diffusion. We conceptualize the difference between the two IT innovations in terms of their decentralizability, i.e., extent to which decision rights pertinent to adoption of an organizational innovation can be decentralized. Based on this concept, we hypothesized: (1) adopters would contribute …


Lacan's Cybernetics, Svitlana Matviyenko Dec 2015

Lacan's Cybernetics, Svitlana Matviyenko

Electronic Thesis and Dissertation Repository

This project explores the synchronicity of psychoanalytic and cybernetic practices from the mid-to-late nineteenth century by recovery and analysis of a shared material media culture. This project takes as a starting point the work of French psychoanalyst Jacques Lacan, who observed the affinity between cybernetics and psychoanalysis, “two roughly contemporaneous techniques,” related to the emergence of the two distinct types of sciences: exact and “conjectural.” I investigate their shared patterns of figuration in the two fields, before they developed significant, and even irreconcilable, differences. This project demonstrates that what Lacan discussed explicitly in the 1950s, particularly, in his “cybernetic” Seminar …


Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish Dec 2015

Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish

Electronic Thesis and Dissertation Repository

Cloud systems, also known as cloud services, are among the primary solutions of the information technology domain. Cloud services are accessed through an identity authentication process. These authentication processes have become increasingly vulnerable to adversaries who may perform denial-of-service (DoS) attacks to make cloud services inaccessible. Several strong authentication protocols have been employed to protect conventional network systems. Nevertheless, they can cause a DoS threat when implemented in the cloud-computing system. This is because the comprehensive verification process may exhaust the cloud resources and shut down cloud’s services. This thesis proposes a novel cloud-based secure authentication (CSA) protocol suite that …


Direct Digital Engagement Of Patients And Democratizing Health Care, Dov Greenbaum Dec 2015

Direct Digital Engagement Of Patients And Democratizing Health Care, Dov Greenbaum

Santa Clara High Technology Law Journal

Direct Digital Engagement of Patients and Democratizing Health Care


Secure Cloud Computing For Solving Large-Scale Linear Systems Of Equations, Xuhui Chen Dec 2015

Secure Cloud Computing For Solving Large-Scale Linear Systems Of Equations, Xuhui Chen

Theses and Dissertations

Solving large-scale linear systems of equations (LSEs) is one of the most common and fundamental problems in big data. But such problems are often too expensive to solve for resource-limited users. Cloud computing has been proposed as an efficient and costeffective way of solving such tasks. Nevertheless, one critical concern in cloud computing is data privacy. Many previous works on secure outsourcing of LSEs have high computational complexity and share a common serious problem, i.e., a huge number of external memory I/O operations, which may render those outsourcing schemes impractical. We develop a practical secure outsourcing algorithm for solving large-scale …


Only A Pawn In The Game: Rethinking Induced Patent Infringement, W. Keith Robinson Dec 2015

Only A Pawn In The Game: Rethinking Induced Patent Infringement, W. Keith Robinson

Santa Clara High Technology Law Journal

Only a Pawn in the Game: Rethinking Induced Patent Infringement


On Problematic Robotic Thresholds, Adam K. Taylor Dec 2015

On Problematic Robotic Thresholds, Adam K. Taylor

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Large configuration spaces present difficulties for developers validating large soft- ware systems and for users selecting the proper configuration to achieve the desired runtime behavior. Robot systems face the same challenges as they may have hundreds of configurable parameters. Our work focuses on co-robotic systems, those in which robots and humans work closely together to augment each other’s capabilities. We aim to leverage the user’s knowledge about a system to help determine configuration errors. To accomplish this, users mark runtime failures while observing the system in operation. A marked error indicates the robot “did something when it should not have” …


Lanthorn, Vol. 50, No. 28, December 3, 2015, Grand Valley State University Dec 2015

Lanthorn, Vol. 50, No. 28, December 3, 2015, Grand Valley State University

Volume 50, July 13, 2015 - June 6, 2016

Lanthorn is Grand Valley State's student newspaper, published from 1968 to the present.


Energy Forecasting For Event Venues: Big Data And Prediction Accuracy, Katarina Grolinger, Alexandra L'Heureux, Miriam Am Capretz, Luke Seewald Dec 2015

Energy Forecasting For Event Venues: Big Data And Prediction Accuracy, Katarina Grolinger, Alexandra L'Heureux, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

Advances in sensor technologies and the proliferation of smart meters have resulted in an explosion of energy-related data sets. These Big Data have created opportunities for development of new energy services and a promise of better energy management and conservation. Sensor-based energy forecasting has been researched in the context of office buildings, schools, and residential buildings. This paper investigates sensor-based forecasting in the context of event-organizing venues, which present an especially difficult scenario due to large variations in consumption caused by the hosted events. Moreover, the significance of the data set size, specifically the impact of temporal granularity, on energy …


Parity, Hamza Hasan Dec 2015

Parity, Hamza Hasan

Architecture Senior Theses

Digital data contributes to an increasingly alienated aspect of our infrastructure. The complex practices of the Internet produce highly specified, engineered objects. Though their forms are ‘optimized,’ their intentions are not: the two primary considerations for the development of the infrastructure of the Internet are energy and security. Each category presents its own deliberations, but both often produce non-architectural, infrastructural elements beyond public visibility. The hidden infrastructure of data storage and mining (the indexing and analysis of data and traffic) produces spaces outside the agency of normative architectural discourse.

The key consideration for the design of the Internet is redundancy, …


A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang Dec 2015

A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang

Computer Science Faculty Research

It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which …


Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris Dec 2015

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris

Open Access Dissertations

This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …


Dancing Around Technology And Nursing Informatics: Can Wearable Technology Challenge Educators To Propel Informatics Content Into Baccalaureate Curricula?, Paula Peter Byrne Dec 2015

Dancing Around Technology And Nursing Informatics: Can Wearable Technology Challenge Educators To Propel Informatics Content Into Baccalaureate Curricula?, Paula Peter Byrne

Doctor of Nursing Practice Projects

A more current example of disruptive innovation is The Internet of Things (IoT), a term that describes the expanding network of physical objects that feature an internet provider address allowing connectivity and a wireless communication between these objects and other Internet-enabled devices and systems. The IoT significantly changes the relationship between people and devices, and with increased Broadband access, it allows people to share data effortlessly and seamlessly. Connections can be people-people, people-things, and things-things. Increasingly, everyday objects like a refrigerator, car, or baby monitor are designed to have network connectivity allowing them to send and receive wireless data. Current …


Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden Dec 2015

Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden

Fordham Intellectual Property, Media and Entertainment Law Journal

INTRODUCTION The Internet increasingly offers a preferred medium for access to video and other types of high value content that may require Internet Service Providers (“ISPs”) to use special efforts to ensure superior quality of service (“QOS”). ISPs have made substantial investments in infrastructure upgrades to satisfy growing demand for networks capable of delivering bandwidth intensive traffic at higher transmission speeds. Additionally, they work to accommodate consumer expectations of having content access anytime, anywhere, through any medium, via any device, and in any screen presentation format. Early adopters of new video delivery technologies rely on both wireline and wireless alternatives …


Implementing Sharepoint Migration In A Software Development Firm, Yashwanth Reddy Majji Dec 2015

Implementing Sharepoint Migration In A Software Development Firm, Yashwanth Reddy Majji

Culminating Projects in Mechanical and Manufacturing Engineering

Company ABC, established in 2009, has headquarters in Fremont, California. Company ABC branches out to NC and TX. It had visions to travel beyond horizons. Company ABC offers a wide range of IT services that are needed for business development like Staffing Solutions, Consulting, Software Development, Cloud Computing and many other services. Company ABC’s largest product is User Profile System (UPS). User Profile System store data on a server by creating logs. This makes the data hugely extensible and can be distributed across the clients very easily. Company ABC designs its consumer Profile System to collect modified information which can …


Development Of Insurance Agreement Transfer Assignment, Mithilesh R. Karuka Dec 2015

Development Of Insurance Agreement Transfer Assignment, Mithilesh R. Karuka

Culminating Projects in Mechanical and Manufacturing Engineering

This project was implemented in an insurance company where they offer different insurance for various commercial and personal line of business. XYZ group offer a full array of benefits solutions–including education, enrollment services and valuable claim support–to meet the needs of both employers and their workers. This project will focus on implementation of algorithms to automatically switch agreements between sales representatives. As this project involves interaction with other departments, Integration testing along with user acceptance testing will also be added to testing phase to maintain consistency. The main objective is to implement a new system from the ground up that …


Malware Collection And Analysis Via Hardware Virtualization, Tamas K. Lengyel Dec 2015

Malware Collection And Analysis Via Hardware Virtualization, Tamas K. Lengyel

Doctoral Dissertations

Malware is one of the biggest security threat today and deploying effective defensive solutions requires the collection and rapid analysis of a continuously increasing number of samples. The collection and analysis is greatly complicated by the proliferation of metamorphic malware as the efficacy of signature-based static analysis systems is greatly reduced. While honeypots and dynamic malware analysis has been effectively deployed to combat the problem, significant challenges remain. The rapidly increasing number of malware samples poses a particular challenge as it greatly inflates the cost of the hardware required to process the influx. As modern malware also deploys anti-debugging and …


A Robust Data Exchange Framework For Connected Vehicle Technology Supported Dynamic Transit Operations, Yucheng An Dec 2015

A Robust Data Exchange Framework For Connected Vehicle Technology Supported Dynamic Transit Operations, Yucheng An

All Theses

Transit systems are an integral part of surface transportation systems. A connected vehicle technology (CVT) supported transit system will assist the users to manage trips both dynamically and efficiently. The primary focus of this research is to develop and evaluate the performance of a secure, scalable, and resilient data exchange framework. In the developed data exchange framework, a new data analytics layer, named Transit Cloud, is used to receive data from different sources, and send it to different users for a Dynamic Transit Operations (DTO) application. The DTO application allows the transit users to request trip information and obtain itineraries, …


Equity Crowdfunding: A Market For Lemons?, Darian M. Ibrahim Dec 2015

Equity Crowdfunding: A Market For Lemons?, Darian M. Ibrahim

Faculty Publications

No abstract provided.


An Automated Tool For High Resolution Visualization Applied To Transient Watershed Models, Noah Robert Taylor Dec 2015

An Automated Tool For High Resolution Visualization Applied To Transient Watershed Models, Noah Robert Taylor

Theses and Dissertations

Numeric hydrologic models can aid in water resource management by providing predictive simulations of water behavior. As computers become more advanced, the models developed also become more complex using more data to represent larger areas for forecasting hydrologic behavior. Unfortunately, as the simulations use more data, the output often becomes difficult to manage and share without investing time and effort into setting up server environments or decreasing the quality of the output to compensate for an efficient and effective user experience. A proposed solution to facilitate the accessibility of massive hydrologic model output is through the web-based visualization tool developed …


Bandwidth Estimation For Virtual Networks, Ertong Zhang Dec 2015

Bandwidth Estimation For Virtual Networks, Ertong Zhang

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Cloud computing is transforming a large part of IT industry, as evidenced by the increasing popularity of public cloud computingservices, such as Amazon Web Service, Google Cloud Platform, Microsoft Windows Azure, and Rackspace Public Cloud. Manycloud computing applications are bandwidth-intensive, and thus the network bandwidth information of clouds is important for theirusers to manage and troubleshoot the application performance.

The current bandwidth estimation methods originally developed for the traditional Internet, however, face great challenges in clouds dueto virtualization that is the main enabling technique of cloud computing. First, virtual machine scheduling, which is an importantcomponent of computer virtualization for processor …


An Efficient Holistic Data Distribution And Storage Solution For Online Social Networks, Guoxin Liu Dec 2015

An Efficient Holistic Data Distribution And Storage Solution For Online Social Networks, Guoxin Liu

All Dissertations

In the past few years, Online Social Networks (OSNs) have dramatically spread over the world. Facebook [4], one of the largest worldwide OSNs, has 1.35 billion users, 82.2% of whom are outside the US [36]. The browsing and posting interactions (text content) between OSN users lead to user data reads (visits) and writes (updates) in OSN datacenters, and Facebook now serves a billion reads and tens of millions of writes per second [37]. Besides that, Facebook has become one of the top Internet traffic sources [36] by sharing tremendous number of large multimedia files including photos and videos. The servers …


Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon Dec 2015

Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon

Department of Educational Administration: Dissertations, Theses, and Student Research

This qualitative study examined the topic of mobile device security at higher education institutions in the Midwestern United States. This study sought to answer the question of how higher education institutions have responded to threats to campus data security posed by mobile devices. It explored the questions of what institutions are doing currently, the policies and procedures they have in place, and what leaders should do in the future.

This research study consisted of four case studies, compiled through interviews with key Information Technology (IT) professionals and faculty at each of the four institutions studied as well as an examination …


3d Reconstruction Of Close Range Objects Using Free And Open Source Software And Raspberry Pi Technologies, Juan Lorenzo Monrreal Dec 2015

3d Reconstruction Of Close Range Objects Using Free And Open Source Software And Raspberry Pi Technologies, Juan Lorenzo Monrreal

Theses and Dissertations

Existing 3D rendering open source software along with Raspberry Pi technology can be used to create an affordable method and workflow for time efficient, accurate and quality scans for 3D printing. The emergence of technology spurs a technological community working to progress in a collaborative effort. This brings a potential to the possibility of efficient and economical solutions to emerging problems, in this case, the ability to render three dimensional scans using free and open source software as well as Raspberry Pi technology. The focus of this paper will be divided into three different aspects including the background needed to …


The New Genomic Semicommons, Anna B. Laakmann Dec 2015

The New Genomic Semicommons, Anna B. Laakmann

UC Irvine Law Review

No abstract provided.