Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2019

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 927

Full-Text Articles in Entire DC Network

Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati Dec 2019

Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati

Journal of Environmental Science and Sustainable Development

Digital farming is a type of digital economy that cannot be separated from essential elements, such as data availability and farmers themselves. Digital farming is found easily in many developed or agricultural countries, such as southern Europe and Brazil, nor to Indonesia and South Korea. However, Indonesia and South Korea experienced internet utilization and agricultural land area discrepancies which come to similar result, still developing sustainable agriculture. Thus, subjects of the study are Indonesia and South Korea due to their location in the Asian continent and similar history as developing countries in the past. Using farmer households and land agricultural …


Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan Dec 2019

Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan

Elinvo (Electronics, Informatics, and Vocational Education)

Kemacetan sering terjadi di banyak persimpangan jalan kota-kota besar di Indonesia. Sesuatu yang penting seperti kendaraan prioritas sering pula berada pada kemaccetan tersebut. Untuk mengatasi permasalahan tersebut terdapat inovasi baru yaitu Intelligent Traffic Light yang dibekali dengan Aplikasi "Bang Jopin". Namun terdapat permasalahan baru ketika ada kendaraan prioritas melakukan request emergency secara bersamaan pada traffic light yang sama. Penentuan prioritas tidak dapat dilakukan dengan pengurutan saja karena ketika memprioritaskan kendaraan pada traffic light harus mempertimbangkan karakteristik traffic light dan kebiasaan pengendara. Oleh kerena itu, Metode Analitical Hierarchy Process (AHP) merupakan solusi yang tepat dalam menentukan kendaraan prioritas yang didahulukan ketika …


Book Review: Indonesia's Digital-Based Economic Transformation: The Emergence Of New Technological, Business, Economic, And Policy Trends In Indonesia, Anika Widiana Dec 2019

Book Review: Indonesia's Digital-Based Economic Transformation: The Emergence Of New Technological, Business, Economic, And Policy Trends In Indonesia, Anika Widiana

Economics and Finance in Indonesia

No abstract provided.


Using Blockchain Technology For The Organ Procurement And Transplant Network, Utsav Jain Dec 2019

Using Blockchain Technology For The Organ Procurement And Transplant Network, Utsav Jain

Master's Theses

The organ donation system in the United States is centralized and difficult to audit by the general public. This centralized approach may lead to data integrity issues in the future. The Organ Procurement and Transplant Network (OPTN) was built and maintained by a non-governmental organization called the United Network for Organ Sharing (UNOS) under its proprietary UNet(SM) umbrella platform. This platform is made up of proprietary closed source software and does not provide the general public easy access to the organ transplant data for auditing. This study investigates the feasibility, challenges, and advantages of a blockchain-based OPTN.

A prototype of …


Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis Dec 2019

Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis

Global: Jurnal Politik Internasional

The idea of digital sovereignty in the last twenty years increasingly reifies into chiefly policy making debates as the reaction of China’s determined activism on internet governance, Snowden’s case, and increasingly big internet corporations’ unchecked endeavors. International actors’ growing concerns on security, economy, data protection, and socio-political issues invoke new discourses on digital sovereignty since it bears global political consequences by nature. This stimulates recent intellectual debate in academic literature on how digital sovereignty affects (or be affected by) international politics. This article critically examines the development of digital sovereignty literatures. This article classifies literature taxonomically on four major themes: …


A Hybrid And Scalable Error Correction Algorithm For Indel And Substitution Errors Of Long Reads, Arghya Kusum Das, Sayan Goswami, Kisung Lee, Seung Jong Park Dec 2019

A Hybrid And Scalable Error Correction Algorithm For Indel And Substitution Errors Of Long Reads, Arghya Kusum Das, Sayan Goswami, Kisung Lee, Seung Jong Park

Computer Science Faculty Research & Creative Works

Background: Long-read sequencing has shown the promises to overcome the short length limitations of second-generation sequencing by providing more complete assembly. However, the computation of the long sequencing reads is challenged by their higher error rates (e.g., 13% vs. 1%) and higher cost ($0.3 vs. $0.03 per Mbp) compared to the short reads. Methods: In this paper, we present a new hybrid error correction tool, called ParLECH (Parallel Long-read Error Correction using Hybrid methodology). The error correction algorithm of ParLECH is distributed in nature and efficiently utilizes the k-mer coverage information of high throughput Illumina short-read sequences to rectify the …


Digital Readout And Control Of A Superconducting Qubit, Caleb Jordan Howington Dec 2019

Digital Readout And Control Of A Superconducting Qubit, Caleb Jordan Howington

Dissertations - ALL

In the quest to build a fault-tolerant quantum computer, superconducting circuits based on Josephson junctions have emerged as a leading architecture. Coherence times have increased significantly over the last two decades, and processors with ∼ 50 qubits have been experimentally demonstrated. These systems traditionally utilize microwave frequency control signals, and heterodyne based detection schemes for measurement. Both of these techniques rely heavily on room temperature microwave generators, high-bandwidth lines from room temperature to millikelvin temperatures, and bulky non-reciprocal elements such as cryogenic microwave isolators. Reliance on these elements makes it impractical to scale existing devices up a single order of …


Digital Transformation – The Hype And Conceptual Changes, Luka Tomat, Peter Trkman Dec 2019

Digital Transformation – The Hype And Conceptual Changes, Luka Tomat, Peter Trkman

Economic and Business Review

Digital transformation (DT) is attracting increased attention; many papers and special issues focus on various aspects of DT. Still, DT often serves solely as a repackaging of previously existing ideas. Our paper argues that the term is over-hyped and has been used to rebrand various fields to attract management attention. However, this alone cannot explain the reasons for such an immense rise in the popularity of the concept. To understand the underlying motives for current DT adoration, our paper aims to identify conceptual changes that have happened in the last decade. These changes have to be considered if companies want …


Digital Transformation – A Hungarian Overview, Andrea Kő, Péter Fehér, Zoltán Szabó Dec 2019

Digital Transformation – A Hungarian Overview, Andrea Kő, Péter Fehér, Zoltán Szabó

Economic and Business Review

Digital transformation is considered as an increasingly important process for organizations today, critical for the survival of companies. The spreading of digital technologies throughout our societies brings along various changes in organisational culture, people, business processes and business models. The perception of digital transformation’s importance among the management of companies is lower in some European countries, among others in Hungary. Our research aims to provide an overview of digital transformation in Hungarian companies from the dimensions of strategy, technology and digital innovation capabilities. We discuss the objectives of digital transformation and the role of IT departments in digital transformation. The …


Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón Dec 2019

Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón

University of Miami Inter-American Law Review

Technology is changing our everyday lives at a faster rate every minute from artificial intelligence and medical advances in robotics to the upcoming self-driving cars. Every sector of our lives is being impacted, disrupted, and constantly altered by innovations, including our finances. In the developed markets, fintech, or financial technology, is the new and exciting area of product innovation for financial services. The innovations rely on the internet, blockchain technology, and the new and highly controversial digital currencies. Consequently, new digital platforms and mobile applications create new possibilities while being accessible to more people at a lower cost across borders. …


Identifying At-Risk Clients For Xyz Packaging, Co., Eduardo Carlos Cantu Medellin, Mihir Parikh, Christopher Graves, Brendon Jones Dec 2019

Identifying At-Risk Clients For Xyz Packaging, Co., Eduardo Carlos Cantu Medellin, Mihir Parikh, Christopher Graves, Brendon Jones

SMU Data Science Review

We present a multi-algorithmic modeling approach for the identification of at-risk customers for XYZ Packaging Inc. We define at-risk customers as those having declining seasonally adjusted gross income forecasts which are a strong indicator of impending customer churn. Customer retention is an area of interest regardless of industry but is especially vital in commodity-based low margin industries. We employ traditional Autoregressive Integrated Moving Average (ARIMA) and Anomaly Detection algorithms for discriminating changes in customer revenue patterns. Ultimately, we identify a meaningful proportion of clients whose forward-looking quarterly demand can be predicted within an actionable degree of accuracy.


Exploiting Memristors For Compressive Sensing Applications, Fengyu Qian Dec 2019

Exploiting Memristors For Compressive Sensing Applications, Fengyu Qian

Doctoral Dissertations

The amount of sensory signal is increasing dramatically as we’re stepping into the era of Internet of Things (IoT). Compressive Sensing (CS), feature as Sub-Nyquist sampling rate and low complexity sensing architectures, is very promising for these kinds of applications where resources are restricted. Through applying this novel compression technology, data size of sensory signals are largely compressed such that it is very efficient within the signal processing, data transmitting and storage processes. Compared to conventional codec method, CS technique requires less hardware resources and achieve lower power consumption within sensor nodes.

However, there are several bottle-necks of existing compressive …


Integrating Lidar Data And Multi-Temporal Aerial Imagery To Map Wetland Inundation Dynamics Using Google Earth Engine, Qiusheng Wu, Charles B. Lane, Xuecao Li, Kaiguang Zhao, Yuyu Zhou, Nicholas Clinton, Ben Devries, Heather E. Golden, Megan W. Lang Dec 2019

Integrating Lidar Data And Multi-Temporal Aerial Imagery To Map Wetland Inundation Dynamics Using Google Earth Engine, Qiusheng Wu, Charles B. Lane, Xuecao Li, Kaiguang Zhao, Yuyu Zhou, Nicholas Clinton, Ben Devries, Heather E. Golden, Megan W. Lang

United States Environmental Protection Agency: Staff Publications

The Prairie Pothole Region of North America is characterized by millions of depressional wetlands, which provide critical habitats for globally significant populations of migratory waterfowl and other wildlife species. Due to their relatively small size and shallow depth, these wetlands are highly sensitive to climate variability and anthropogenic changes, exhibiting inter- and intra-annual inundation dynamics. Moderate-resolution satellite imagery (e.g., Landsat, Sentinel) alone cannot be used to effectively delineate these small depressional wetlands. By integrating fine spatial resolution Light Detection and Ranging (LiDAR) data and multi-temporal (2009–2017) aerial images, we developed a fully automated approach to delineate wetland inundation extent at …


Learning Nearest Neighbor Graphs From Noisy Distance Samples, Blake Mason, Ardhendu S. Tripathy, Robert Nowak Dec 2019

Learning Nearest Neighbor Graphs From Noisy Distance Samples, Blake Mason, Ardhendu S. Tripathy, Robert Nowak

Computer Science Faculty Research & Creative Works

We consider the problem of learning the nearest neighbor graph of a dataset of n items. The metric is unknown, but we can query an oracle to obtain a noisy estimate of the distance between any pair of items. This framework applies to problem domains where one wants to learn people's preferences from responses commonly modeled as noisy distance judgments. In this paper, we propose an active algorithm to find the graph with high probability and analyze its query complexity. In contrast to existing work that forces Euclidean structure, our method is valid for general metrics, assuming only symmetry and …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


School Of Education Hooding Ceremony & Reception Program, December 2019, Lindenwood University Dec 2019

School Of Education Hooding Ceremony & Reception Program, December 2019, Lindenwood University

College of Education: Hooding Ceremony

School of Education Hooding Ceremony & Reception Program, December 2019.


A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li Dec 2019

A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li

Journal of System Simulation

Abstract: With the rapid development of Cloud service application, how to effectively optimize the composition of Cloud services on cloud platform and improve the overall performance of cloud platform system have become an urgent research issue. In order to improve the efficiency of Cloud services, a combined optimization model based on Hopfield neural network is proposed. The problem of Cloud services is modeled. The problem is expressed as Hopfield Neural Network energy model for optimization, and a PSO group algorithm with Cauchy disturbance is designed to improve the Hopfield model. The experimental comparison shows that the method can improve …


Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu Dec 2019

Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu

Journal of System Simulation

Abstract: For complex equipment operation safely, the health management problems of complex equipment life cycle is analyzed. In order to realize remote service, complex equipment health management mode based on cloud computing is proposed. Aiming at the accuracy problem in the process of extracting and recognizing complex equipment characteristic data, the feature knowledge acquisition method based on ontology is researched, and the expression and acquisition algorithm of state characteristic knowledge is proposed. A task sequencing algorithm faults based on fuzzy comprehensive evaluation method is proposed, an appropriate task assignment model is selected for scheduling health management technicians. …


Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan Dec 2019

Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan

Journal of System Simulation

Abstract: To solve the problem of unbalanced resource requirements and low resource utilization when the same type of tasks are executed in parallel in the cloud manufacturing system, a task resource scheduling model with the goal of minimizing cost, minimizing time, maximizing reliability and optimizing quality is established. A non-dominated sorting genetic algorithm based on reference points (NSGA-III) is adopted to solve the model by combining real number matrix coding and crossover and mutation based on real number coding instead of common evolutionary strategy. And an optimal decision strategy based on combination of analytic hierarchy process and entropy value method …


The Scheduling Algorithm Of Cloud Job Based On Hopfield Neural Network, Yudong Guo, Jinping Zuo Dec 2019

The Scheduling Algorithm Of Cloud Job Based On Hopfield Neural Network, Yudong Guo, Jinping Zuo

Journal of System Simulation

Abstract: Focusing on the low efficiency of cloud job scheduling and the insufficient utility of resource, a job scheduling algorithm based on Hopfield Neural Network is proposed. In order to improve the resource scheduling ability of the system, The resource characteristics which influence the cloud job scheduling are shown. The mathematical model of resource constraints is established, and the Hopfield energy function is designed and optimized. The average utilization rate of 9 nodes is analyzed by using the standard test cases, and the performance and resource utilization of the proposed strategy are compared with three typical algorithms. …


Study On Optimization Of Shore Bridge Operator Scheduling Considering The Influence Of Ambient Temperature, Yibin Wang, Haihong Yu, Danlan Xie Dec 2019

Study On Optimization Of Shore Bridge Operator Scheduling Considering The Influence Of Ambient Temperature, Yibin Wang, Haihong Yu, Danlan Xie

Journal of System Simulation

Abstract: The refinement of port management puts forward new requirements for its service capacity, and human factors are the key factors affecting the port service capacity. It is a new and feasible research direction to improve port operation efficiency by adjusting human factors. Based on the theoretical model of temperature affecting efficiency, this paper uses FlexSim system simulation software to analyze the change of employee's working efficiency with time, and studies the optimal scheduling strategy of shore bridge operators under different temperatures. Finally, it is concluded that when the ambient temperature is suitable for human body, the eight-hour scheduling …


The United States Eroding Global Military Advantage; Is There A Way Back?, Fatima Munib Dec 2019

The United States Eroding Global Military Advantage; Is There A Way Back?, Fatima Munib

Master's Theses

This thesis explores the U.S. eroding global military advantage in light of the current changing security environment. First, I examine the process and type of erosion taking place. I expand the existing debate and show that the erosion is not defined in monetary terms but in terms of the declining U.S influence within the established rule-based international order. Secondly, I use China and Russia as case-studies to define the present geopolitical rivalries and the (re)emergence of revisionist powers. Both China and Russia aim to shape the emerging international order and threaten the U.S. national security with the increased inter-state competition. …


Application User-Interface Specific Emotional Response Collection, N/A Dec 2019

Application User-Interface Specific Emotional Response Collection, N/A

Defensive Publications Series

A computing device is described that is configured to determine an emotional response of a user to an application being used by the user. For instance, when an application developer wishes to improve an application, the computing device may collect emotional data by utilizing sensors (e.g., cameras, microphone, touch panel, motion sensors, accelerometer, gyroscope, etc.) embedded within the computing device running the application. The computing device may correlate the collected emotional data to specific portions of the application so that the computing device may locate within the application where the emotional data appears to suggest the user is confused. For …


Research On Topology Mapping Method For Multiscale Integration Network Emulation, Liu Yuan, Changling Qiu, Xiaofeng Wang, Jiang Min Dec 2019

Research On Topology Mapping Method For Multiscale Integration Network Emulation, Liu Yuan, Changling Qiu, Xiaofeng Wang, Jiang Min

Journal of System Simulation

Abstract: For large-scale and scalable network emulation requirements, multi-scale integration emulation based on lightweight virtualization and full virtualization is the trend. In order to take into account the advantages of both virtualizations and enhance the performance of network emulation, a topology mapping method (TMMI) is proposed for multi-scale integration network emulation. This method divides the network topology into lightweight virtualization mapping area and integration virtualization mapping area, and according to different mapping areas uses the optimized multi-level partitioning method to map the network topology reasonably. Experiments show that the proposed method can effectively balance the load and communication overhead …


Application Of Ground-Based Lidar And Gap Intercept Measurements To Quantify A Shrub Configuration Metric Within Greater Sage-Grouse Nesting Habitat, Khodabakhsh Zabihi, Kenneth L. Driese, Ginger B. Paige, Ann L. Hild Dec 2019

Application Of Ground-Based Lidar And Gap Intercept Measurements To Quantify A Shrub Configuration Metric Within Greater Sage-Grouse Nesting Habitat, Khodabakhsh Zabihi, Kenneth L. Driese, Ginger B. Paige, Ann L. Hild

Western North American Naturalist

Vegetation composition (i.e., relative proportion of species) and configuration (i.e., horizontal and vertical arrangement of the plant components) in sagebrush-steppe ecosystems are fundamental determinants of the suitability of nesting habitat for Greater Sage-Grouse (Centrocercus urophasianus). The spatial arrangement of shrub and herbaceous canopy cover conceals Greater Sage-Grouse from predators and protects the nest from natural hazards, and gaps in vegetative cover provide escape routes for hens. Most sage-grouse habitat studies quantify vegetation composition, but few quantify habitat configuration at fine scales. We used ground-based lidar (light detection and ranging) data from Greater Sage-Grouse nesting habitat to test the …


Optimal Management Of Virtual Infrastructures Under Flexible Cloud Service Agreements, Zhiling Guo, Jin Li, Ram Ramesh Dec 2019

Optimal Management Of Virtual Infrastructures Under Flexible Cloud Service Agreements, Zhiling Guo, Jin Li, Ram Ramesh

Research Collection School Of Computing and Information Systems

A cloud service agreement entails the provisioning of a required set of virtual infrastructure resources at a specified level of availability to a client. The agreement also lays out the price charged to the client and a penalty to the provider when the assured availability is not met. The availability assurance involves backup resource provisioning, and the provider needs to allocate backups cost-effectively by balancing the resource-provisioning costs with the potential penalty costs. We develop stochastic dynamic optimization models of the backup resource-provisioning problem, leading to cost-effective resource-management policies in different practical settings. We present two sets of dynamic provisioning …


Ethics And Public Policy, Richard Palmatier Jr. Dec 2019

Ethics And Public Policy, Richard Palmatier Jr.

IAAO Annual Legal Seminar

Reviews ethics and public policy. Outline includes: lawyer ethics vs. corporate ethics, who is the "client," who is the opposing party, confidentiality, conflicts of interest, competence, out of "court" publicity and statements, gifts, and volunteer activities.


“Technology Is Great, But It’S Really Time-Consuming:” Understanding Students’ Digital Academic Lives, Mariana Regalado, Maura A. Smale Dec 2019

“Technology Is Great, But It’S Really Time-Consuming:” Understanding Students’ Digital Academic Lives, Mariana Regalado, Maura A. Smale

Publications and Research

Digital technology has become integral to higher education, incorporated by colleges and universities into teaching, student support and operations. We know that undergraduates lead busy lives, especially those attending commuter universities, and that they bring their prior experiences with technology with them into their college careers. However, while technology access and use in our everyday lives and workplaces has increased in the past few decades, it is not as ubiquitous as we might wish, and our students do encounter barriers to learning and connecting with digital technologies.

We draw on our decade of research on the experiences of CUNY undergraduate …


Processing And Delivering Security Signals From Guests To Hosts In Virtualized Environments, Michael Halcrow, Thomas Garnier, Brandon Baker, Eric Biggers, Maya Kaczorowski, Hovik Manucharyan, Konstantin Stepanyuk Dec 2019

Processing And Delivering Security Signals From Guests To Hosts In Virtualized Environments, Michael Halcrow, Thomas Garnier, Brandon Baker, Eric Biggers, Maya Kaczorowski, Hovik Manucharyan, Konstantin Stepanyuk

Defensive Publications Series

This disclosure describes techniques that leverage memory organization in virtual machines and their hosts to emplace code that protects against malware. Malware detection instrumentation is emplaced in guest kernel space, which is relatively privileged and better protected than other guest memory spaces. Malware behavioral analysis logic, which classifies a guest process as benign or malign, is emplaced in host ring 3 space, to take advantage of the virtualization boundary.

Even if unaffected by the attack, the protected kernel may still not be able to quickly communicate knowledge of the attack to the malware behavioral analysis logic, which resides in the …


The Fog Development Kit: A Platform For The Development And Management Of Fog Systems, Colton Powell Dec 2019

The Fog Development Kit: A Platform For The Development And Management Of Fog Systems, Colton Powell

Computer Science and Engineering Master's Theses

With the rise of the Internet of Things (IoT), fog computing has emerged to help traditional cloud computing in meeting scalability demands. Fog computing makes it possible to fulfill real-time requirements of applications by bringing more processing, storage, and control power geographically closer to end-devices. How- ever, since fog computing is a relatively new field, there is no standard platform for research and development in a realistic environment, and this dramatically inhibits innovation and development of fog-based applications. In response to these challenges, we propose the Fog Development Kit (FDK). By providing high-level interfaces for allocating computing and networking resources, …