Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Engineering

Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung Nov 2017

Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung

ASA Multidisciplinary Research Symposium

The purpose of this research is to demonstrate how to reengineer a legacy Database Application using to a target system with MVC and 3-layered architecture. A Coffee Inventory Management database application is used for legacy application. The benefits of the reengineering are discussed.


Research On System Communication By Using Unified Registry Model & Elements, Kujtim Gashi, Atdhe Buja, Fatos Idrizi Oct 2017

Research On System Communication By Using Unified Registry Model & Elements, Kujtim Gashi, Atdhe Buja, Fatos Idrizi

UBT International Conference

Trends of Development of Information Society in the Republic of Kosovo must fit the criteria and standards of the EU. The main objective of the paper is the identification of individual IT systems used by the Republic of Kosovo public institutions related to the trade and working out analysis and recommendations for optimizing their communication (interoperability), eventual unification in the hardware & software level and increase the efficiency of the entire economic system information. The analytical analysis outlined these points, as it follows: current technologies used by public administration of the Republic of Kosovo, risk analysis, analysis of data structures …


Smia: Improving Kosovo's Education Management System, Lazar Adjijgogov, Dejan Stamenov, Edmond Jajaga Oct 2017

Smia: Improving Kosovo's Education Management System, Lazar Adjijgogov, Dejan Stamenov, Edmond Jajaga

UBT International Conference

Successful management of today’s education systems requires effective policy-making and system monitoring through data and information. To this end, countries around the world have invested significant resources into collecting, processing, and managing more and better data through education management information systems (EMIS). SMIA is a modern EMIS, which offers easier management of educational process in Kosovo. It facilitates decision-making, resource planning, strategy building, monitoring and evaluation of educational system through a rich set of analytical and statistical tools. For over six years of activity, the system has efficiently tracked and thus helped the development of the educational process for every …


Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi Oct 2017

Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi

UBT International Conference

As time passes by, we barely see how much time it costs people to stay at work, fixing problems that happen every day. As people we should do more about humanity and technology is the door that opens opportunities for us to do this. Technology today is transforming every human daily life routine and it’s only the beginning of what technology can bring. By 2020 we know that technology will connect the unconnected by introducing the real idea of Internet of Things. Every little, tiny thing all over the world will be connected, but also big and important projects like …


Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili Oct 2017

Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili

UBT International Conference

The field of Artificial Intelligence, which started roughly half a century ago, has a turbulent history. In the 1980s there has been a major paradigm shift towards embodiment. While embodied artificial intelligence is still highly diverse, changing, and far from “theoretically stable”, a certain consensus about the important issues and methods has been achieved or is rapidly emerging. In this paper we briefly characterize the field, summarize its achievements, and identify important issues for future research.

With the popularization of the Internet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and …


Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova Oct 2017

Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova

UBT International Conference

Pseudo Random Bit and Number Generator (PRB/NG) circuits being very widely used for security, compressive sensing and diverse other applications in telecommunications are studies in different aspects in the laboratory of Computer-aided Design in Telecommunications in Technical University-Sofia. Some results of this study are published in [1] where tests for randomness from the National Institute of Standards and Technology (NIST) suit are applied on commonly used PRB/NGs. Other aspects of the PRB/NG circuits study is their power consumption in the aim of green communications as noticed in [2,3] and the concern about low power consuming devices for Internet of Things’ …


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Oct 2017

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

UBT International Conference

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos Oct 2017

A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos

UBT International Conference

Everybody looks to a world that does not remain the same. Furthermore no one can deny that the world is changing, and changing very fast.

Technology, education, science, environment, health, communicating habits, entertainment, eating habits, dress - there is hardly anything in life that is not changing. Some changes we like, while others create fear and anxiety around us. Everywhere there is a feeling of insecurity.

What will happen to us tomorrow, or what will happen to our children, are questions we keep frequently asking. One thing, however, is clear.

It is no more possible to live in the way …


Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu Oct 2017

Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu

UBT International Conference

Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order …


Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi Oct 2017

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi

UBT International Conference

Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Oct 2017

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

UBT International Conference

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s safety …


Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim Oct 2017

Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim

UBT International Conference

To determine the strategic direction for the development of electronic communications market in the part of mobile telecommunication services in Republic of Macedonia, the Agency for electronic communication has made an assessment of the regulatory progress and that has been made in recent years. The needs are in order to obtain a clear strategy for the development of the mobile telecommunication market in Macedonia, and primarily will create a clear picture in the: technical, financial, operational and competitive segments. Republic of Macedonia at this moment has 2 mobile operators with own network and the third mobile virtual operator. They are …


A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani Oct 2017

A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani

UBT International Conference

State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers. …


Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic Oct 2017

Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic

UBT International Conference

The paper describes the advantages of using technical and technological achievements through the social networks and their implementation in Central Banks communication. A study of some Central Banks on their use of social media and some of the most popular social networks are given, showing that social media is becoming an important medium of communication for Central Banks around the world. The study shows that a majority of Central Banks use Twitter to send alerts for information already disseminated through the website, even as they are not very active in responding to public tweets, and also shows an increasing number …


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal Oct 2017

Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal

Commonwealth Computational Summit

No abstract provided.


Additional Data Via Autonomous Systems To Supplement Traditional Sparse Sources For Weather Forecasting And Atmospheric Science, Suzanne Weaver Smith Oct 2017

Additional Data Via Autonomous Systems To Supplement Traditional Sparse Sources For Weather Forecasting And Atmospheric Science, Suzanne Weaver Smith

Commonwealth Computational Summit

No abstract provided.


Integrative Computational Modeling For Developing Means To Manipulate Biological Cells And For Solving Complex Engineering Problems, Yu Zhao, Guigen Zhang Oct 2017

Integrative Computational Modeling For Developing Means To Manipulate Biological Cells And For Solving Complex Engineering Problems, Yu Zhao, Guigen Zhang

Commonwealth Computational Summit

A brief discussion on reductive vs integrative investigation

A case study: how integrative computational modeling helps advance the understanding and application of dielectrophoresis (DEP) in various situations

Other applications in advancing the design and development of nanopore, medical devices, novel materials, actuation devices, and coupled spectroscopic techniques, etc.


Parallelization Of A Three-Dimensional Full Multigrid Algorithm To Simulate Tumor Growth, Dylan Goodin, Chin F. Ng, Hermann B. Frieboes Oct 2017

Parallelization Of A Three-Dimensional Full Multigrid Algorithm To Simulate Tumor Growth, Dylan Goodin, Chin F. Ng, Hermann B. Frieboes

Commonwealth Computational Summit

We present the performance gains of an openMP implementation of a fully adaptive nonlinear full multigrid (FMG) algorithm to simulate three-dimensional multispecies desmoplastic tumor growth on computer systems of varying processing capabilities. The FMG algorithm is applied to solve a recently published thermodynamic mixture model that uses a diffuse interface approach with fourth-order reaction-advection-diffusion PDEs (Cahn-Hilliard-type equations) that are coupled, nonlinear, and numerically stiff. The model includes multiple cell species and extracellular matrix (ECM), with adhesive and elastic energy contributions in chemical potential terms, as well as including blood and lymphatic vessels represented as continuous vasculatures. Advection-reaction-diffusion PDEs are employed …


The Effect Of Inlet Pulsations On Primary Atomization Of Liquid Jets, Kyle Windland, Prashant Khare Oct 2017

The Effect Of Inlet Pulsations On Primary Atomization Of Liquid Jets, Kyle Windland, Prashant Khare

Commonwealth Computational Summit

Objectives

  • Elucidate the physics underlying the primary atomization of liquid jets.
  • Investigate the effect of inlet pulsations on the atomization process.
  • Identify the reliability of numerical predictions using uncertainty quantification techniques (UQ) and sensitivity analyses.


Computational Materials Characterization, Discovery, And Design With High Performance Computing, Qunfei Zhou, Xiaotao Liu, Tyler Maxwell, Thomas John Balk, Matthew J. Beck Oct 2017

Computational Materials Characterization, Discovery, And Design With High Performance Computing, Qunfei Zhou, Xiaotao Liu, Tyler Maxwell, Thomas John Balk, Matthew J. Beck

Commonwealth Computational Summit

No abstract provided.


Integrative Computational Modeling For Developing Means To Manipulate Biological Cells And For Solving Complex Engineering Problems, Yu Zhao, Guigen Zhang Oct 2017

Integrative Computational Modeling For Developing Means To Manipulate Biological Cells And For Solving Complex Engineering Problems, Yu Zhao, Guigen Zhang

Commonwealth Computational Summit

Computational modeling has become more widely used to guide the design of microfluidic devices for manipulating cells using Dielectrophoresis (DEP), and devise novel means for advancing the study of cellular science and engineering. Conventionally, cells are treated as volumeless points in the system, which allows study of the movement of groups of particles under the effect of field. However, this approach often neglects the distortion effect of particle on external field, as well as interactions among particles. Moreover, it ignores the complex inner structures of cell, which are the causes of distinctive cell behavior. To more accurately model the behavior …


High-Fidelity Simulations Of Water Jet In Air Crossflow, Austin Johnston, Prashant Khare Oct 2017

High-Fidelity Simulations Of Water Jet In Air Crossflow, Austin Johnston, Prashant Khare

Commonwealth Computational Summit

Objectives

  • Investigate detailed physics underlying liquid jets in crossflow configurations applicable to various applications such as, gas-turbine, scramjet, and afterburner fuel injection.
  • Develop models to predict the statistical behaviors of resulting droplets.


Investigation Of Photo-Responsive Titania Surfaces, Evan Hyden, Matthew J. Beck Oct 2017

Investigation Of Photo-Responsive Titania Surfaces, Evan Hyden, Matthew J. Beck

Commonwealth Computational Summit

Titania (TiO2) is an oxide commonly used for photocatalysis. This proclivity to form free radicals when exposed to light has also prompted interest in applying porous TiO2 as a reactive/responsive membrane. Surfaces of both main polymorphs of TiO2 (especially rutile {110} and anatase {101}) have been shown to be stable and photo-active.

Polyacrylic acid (PAA) is a molecule of interest as changes in pH can cause the molecule to contract or expand, due to changes in the charge distribution relating to the carboxyl group. Due to TiO2’s ability to generate photocarriers, we hypothesize that …


Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui Oct 2017

Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui

Commonwealth Computational Summit

Explainable Model

  • Black Box (opaque) predictors such as Deep learning and Matrix Factorization are accurate,
  • ... but lack interpretability and ability to give explanations.
  • White Box models such as rules and decision trees are interpretable (explainable),
  • ... but lack accuracy.


Open Source Artificial Intelligence In A Biological/Ecological Context, Trevor Grant Oct 2017

Open Source Artificial Intelligence In A Biological/Ecological Context, Trevor Grant

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Deep Learning In R, Troy Hernandez Oct 2017

Deep Learning In R, Troy Hernandez

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Improving The Accuracy For The Long-Term Hydrologic Impact Assessment (L-Thia) Model, Anqi Zhang, Lawrence Theller, Bernard A. Engel Aug 2017

Improving The Accuracy For The Long-Term Hydrologic Impact Assessment (L-Thia) Model, Anqi Zhang, Lawrence Theller, Bernard A. Engel

The Summer Undergraduate Research Fellowship (SURF) Symposium

Urbanization increases runoff by changing land use types from less impervious to impervious covers. Improving the accuracy of a runoff assessment model, the Long-Term Hydrologic Impact Assessment (L-THIA) Model, can help us to better evaluate the potential uses of Low Impact Development (LID) practices aimed at reducing runoff, as well as to identify appropriate runoff and water quality mitigation methods. Several versions of the model have been built over time, and inconsistencies have been introduced between the models. To improve the accuracy and consistency of the model, the equations and parameters (primarily curve numbers in the case of this model) …


Web-Based Interactive Social Media Visual Analytics, Diego Rodríguez-Baquero, Jiawei Zhang, David S. Ebert, Sorin A. Matei Aug 2017

Web-Based Interactive Social Media Visual Analytics, Diego Rodríguez-Baquero, Jiawei Zhang, David S. Ebert, Sorin A. Matei

The Summer Undergraduate Research Fellowship (SURF) Symposium

Real-time social media platforms enable quick information broadcasting and response during disasters and emergencies. Analyzing the massive amount of generated data to understand the human behavior requires data collection and acquisition, parsing, filtering, augmentation, processing, and representation. Visual analytics approaches allow decision makers to observe trends and abnormalities, correlate them with other variables and gain invaluable insight into these situations. In this paper, we propose a set of visual analytic tools for analyzing and understanding real-time social media data in times of crisis and emergency situations. First, we model the degree of risk of individuals’ movement based on evacuation zones …


Purdue Airsense: An Affordable Way To Measure And Study Air Pollution, Stephane Junior Nouafo Wanko, Shadi Tariq Azouz, Ruihang Du, Brandon Boor, Greg Michalski Aug 2017

Purdue Airsense: An Affordable Way To Measure And Study Air Pollution, Stephane Junior Nouafo Wanko, Shadi Tariq Azouz, Ruihang Du, Brandon Boor, Greg Michalski

The Summer Undergraduate Research Fellowship (SURF) Symposium

Air pollution is a major health hazard worldwide, accounting for one-eighth of all deaths in 2012 (World Health Organization). Globally, there is a severe lack of ground-based spatiotemporal monitoring of gaseous and particulate air pollutants, particularly in Africa, South and Central America, and the Middle East. This is in great part due to the high costs of air quality instrumentation that meet accuracy and reliability criteria set by monitoring agencies. The air quality data that is available is often not presented to the public in a user-friendly manner. Taking advantage of recent developments in low-cost sensing technologies, an integrated sensor …