Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (55)
- University of Nebraska - Lincoln (23)
- University of New Haven (11)
- University of South Carolina (10)
- Wright State University (9)
-
- Old Dominion University (8)
- University of Kentucky (8)
- Florida International University (6)
- Edith Cowan University (5)
- Technological University Dublin (5)
- City University of New York (CUNY) (4)
- Missouri University of Science and Technology (4)
- San Jose State University (4)
- Dartmouth College (3)
- Embry-Riddle Aeronautical University (2)
- Michigan Technological University (2)
- University of Pennsylvania Carey Law School (2)
- Wayne State University (2)
- Western Kentucky University (2)
- Air Force Institute of Technology (1)
- Boise State University (1)
- Chapman University (1)
- Marshall University (1)
- Rowan University (1)
- Southwestern Oklahoma State University (1)
- University of Nevada, Las Vegas (1)
- University of New Mexico (1)
- Utah State University (1)
- Washington University in St. Louis (1)
- Western University (1)
- Keyword
-
- Cybersecurity (5)
- Deep learning (5)
- Security (4)
- Applications (3)
- Digital forensics (3)
-
- Forensics (3)
- IoT (3)
- Testing (3)
- Algorithms (2)
- Android (2)
- Artificial intelligence (2)
- Authentication (2)
- Big data (2)
- Blockchain (2)
- Cloud security (2)
- Convolutional neural network (2)
- Deep Learning (2)
- Department of Electrical and Computer Engineering (2)
- Driver Income (2)
- Encryption (2)
- Feature representation (2)
- Features (2)
- Internet of Things (2)
- Internet of things (2)
- Machine Learning (2)
- Malware (2)
- Mobile security (2)
- Network security (2)
- Optimization (2)
- Orienteering problem (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (55)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (18)
- Faculty Publications (14)
- Electrical & Computer Engineering and Computer Science Faculty Publications (11)
- Computer Science and Engineering Faculty Publications (9)
-
- FIU Electronic Theses and Dissertations (6)
- Research outputs 2014 to 2021 (5)
- Computer Science Faculty Publications (4)
- Conference papers (3)
- Dartmouth Scholarship (3)
- Information Science Faculty Publications (3)
- Publications and Research (3)
- All Faculty Scholarship (2)
- CSE Conference and Workshop Papers (2)
- Chemical Engineering and Materials Science Faculty Research Publications (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Masters Theses & Specialist Projects (2)
- Mechanical and Aerospace Engineering Faculty Research & Creative Works (2)
- Michigan Tech Publications (2)
- Publications (2)
- 2018 Graduate Student Showcase (1)
- All Computer Science and Engineering Research (1)
- Articles (1)
- Biological Engineering Faculty Publications (1)
- Biosystems and Agricultural Engineering Faculty Publications (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Research & Creative Works (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
Articles 151 - 176 of 176
Full-Text Articles in Engineering
Energy Slices: Benchmarking With Time Slicing, Katarina Grolinger, Hany F. Elyamany, Wilson Higashino, Miriam Am Capretz, Luke Seewald
Energy Slices: Benchmarking With Time Slicing, Katarina Grolinger, Hany F. Elyamany, Wilson Higashino, Miriam Am Capretz, Luke Seewald
Electrical and Computer Engineering Publications
Benchmarking makes it possible to identify low-performing buildings, establishes a baseline for measuring performance improvements, enables setting of energy conservation targets, and encourages energy savings by creating a competitive environment. Statistical approaches evaluate building energy efficiency by comparing measured energy consumption to other similar buildings typically using annual measurements. However, it is important to consider different time periods in benchmarking because of differences in their consumption patterns. For example, an office can be efficient during the night, but inefficient during operating hours due to occupants’ wasteful behavior. Moreover, benchmarking studies often use a single regression model for different building categories. …
Application Of Acoustic Emission And Machine Learning To Detect Codling Moth Infested Apples, Mengxing Li, Nader Ekramirad, Ahmed Rady, Akinbode A. Adedeji
Application Of Acoustic Emission And Machine Learning To Detect Codling Moth Infested Apples, Mengxing Li, Nader Ekramirad, Ahmed Rady, Akinbode A. Adedeji
Biosystems and Agricultural Engineering Faculty Publications
Incidence of codling moth (CM) (Cydia pomonella L.) infestation in apples has been a major concern in North America for decades. CM larvae bore deep into the fruit, making it unmarketable. An effective noninvasive method to detect larvae-infested apples is necessary to ensure that apples are CM-free in post-harvest processing. In this study, a novel approach using an acoustic emission (AE) system and subsequent machine learning methods was applied to classify larvae-infested apples from intact apples. 'GoldRush‘ apples were infested with CM neonates and stored at the same conditions as intact apples. The AE system was used to collect …
“Woodlands” - A Virtual Reality Serious Game Supporting Learning Of Practical Road Safety Skills., Krzysztof Szczurowski, Matt Smith
“Woodlands” - A Virtual Reality Serious Game Supporting Learning Of Practical Road Safety Skills., Krzysztof Szczurowski, Matt Smith
Conference Papers
In developed societies road safety skills are taught early and often practiced under the supervision of a parent, providing children with a combination of theoretical and practical knowledge. At some point children will attempt to cross a road unsupervised, at that point in time their safety depends on the effectiveness of their road safety education. To date, various attempts to supplement road safety education with technology were made. Most common approach focus on addressing declarative knowledge, by delivering road safety theory in an engaging fashion. Apart from expanding on text based resources to include instructional videos and animations, some stakeholders …
Recommender Systems For Large-Scale Social Networks: A Review Of Challenges And Solutions, Magdalini Eirinaki, Jerry Gao, Iraklis Varlamis, Konstantinos Tserpes
Recommender Systems For Large-Scale Social Networks: A Review Of Challenges And Solutions, Magdalini Eirinaki, Jerry Gao, Iraklis Varlamis, Konstantinos Tserpes
Faculty Publications
Social networks have become very important for networking, communications, and content sharing. Social networking applications generate a huge amount of data on a daily basis and social networks constitute a growing field of research, because of the heterogeneity of data and structures formed in them, and their size and dynamics. When this wealth of data is leveraged by recommender systems, the resulting coupling can help address interesting problems related to social engagement, member recruitment, and friend recommendations.In this work we review the various facets of large-scale social recommender systems, summarizing the challenges and interesting problems and discussing some of the …
Visual Analytics Of Cascaded Bottlenecksin Planar Flow Networks, Tobias Post, Thomas Wischgoll, Bernd Hamann, Hans Hagen
Visual Analytics Of Cascaded Bottlenecksin Planar Flow Networks, Tobias Post, Thomas Wischgoll, Bernd Hamann, Hans Hagen
Computer Science and Engineering Faculty Publications
Finding bottlenecks and eliminating them to in-crease the overall flow of a network often appears in real world applications, such as production planning, factory layout, flowrelated physical approaches, and even cyber security. In many cases, several edges can form a bottleneck (cascaded bottlenecks). This work presents a visual analytics methodology to analyze these cascaded bottlenecks. The methodology consists of multiple steps: identification of bottlenecks, identification of potential improvements, communication of bottlenecks, interactive adaption of bottlenecks, and a feedback loop that allows users to adapt flow networks and their resulting bottlenecks until they are satisfied with the flow network configuration. To …
Comparing And Enhancing The Analytical Model For Exposure Of A Retail Facility Layout With Human Performance, Bradley R. Guthrie, Pratik Parikh, Tyler Whitlock, Madison Glines, Thomas Wischgoll, John Flach, Scott Watamaniuk
Comparing And Enhancing The Analytical Model For Exposure Of A Retail Facility Layout With Human Performance, Bradley R. Guthrie, Pratik Parikh, Tyler Whitlock, Madison Glines, Thomas Wischgoll, John Flach, Scott Watamaniuk
Computer Science and Engineering Faculty Publications
Recent research in retail facility layout has focused on developing analytical models to estimate visibility measures of novel rack layouts based on assumptions about a shopper’s field of view. However, because of the human element involved in the shopping experience, it is vital to compare these models relative to actual human performance. In this study, we evaluate the predictions of our previously developed analytical model (that estimates exposure of every location on a given rack layout assuming expected head movement) in a 3D Virtual Environment (VE). We conducted trials with 18 participants who were asked to find targets strategically placed …
Towards An Image-Based Indicator For Pad Classification And Localization, Christina Gillmann, Johh H. Matsuura, Hans Hagen, Thomas Wischgoll
Towards An Image-Based Indicator For Pad Classification And Localization, Christina Gillmann, Johh H. Matsuura, Hans Hagen, Thomas Wischgoll
Computer Science and Engineering Faculty Publications
Peripheral Artery Disease (PAD) is an often occurring problem caused by narrowed veins. With this type of disease, mostly the legs receive an insufficient supply of blood to sustain their functions. This can result in an amputation of extremities or strokes. In order to quantify the risks, doctors onsult a classification table which is based on the pain response of a patient. This classification is subjective and does not indicate the exact origin of the PAD symptoms. Resulting from this, complications can occur unprompted. We present the first results for an image-based indicator assisting medical doctors in estimating the stage …
An Uncertainty-Aware Visual System For Image Pre-Processing, Christina Gillmann, Pablo Arbelaez, Jose Tiberio Hernandez, Hans Hagen, Thomas Wischgoll
An Uncertainty-Aware Visual System For Image Pre-Processing, Christina Gillmann, Pablo Arbelaez, Jose Tiberio Hernandez, Hans Hagen, Thomas Wischgoll
Computer Science and Engineering Faculty Publications
Due to image reconstruction process of all image capturing methods, image data is inherently affected by uncertainty. This is caused by the underlying image reconstruction model, that is not capable to map all physical properties in its entirety. In order to be aware of these effects, image uncertainty needs to be quantified and propagated along the entire image processing pipeline. In classical image processing methodologies, pre-processing algorithms do not consider this information. Therefore, this paper presents an uncertainty-aware image pre-processing paradigm, that is aware of the input image’s uncertainty and propagates it trough the entire pipeline. To accomplish this, we …
Caregiver Assessment Using Smart Gaming Technology: A Preliminary Approach, Garrett Goodman, Tanvi Banerjee, William Romine, Cogan Shimizu, Jennifer Hughes
Caregiver Assessment Using Smart Gaming Technology: A Preliminary Approach, Garrett Goodman, Tanvi Banerjee, William Romine, Cogan Shimizu, Jennifer Hughes
Computer Science and Engineering Faculty Publications
As pre-diagnostic technologies are becoming increasingly accessible, using them to improve the quality of care available to dementia patients and their caregivers is of increasing interest. Specifically, we aim to develop a tool for non- invasively assessing task performance in a simple gaming application. To address this, we have developed Caregiver Assessment using Smart Technology (CAST), a mobile application that personalizes a traditional word scramble game. Its core functionality uses a Fuzzy Inference System (FIS) optimized via a Genetic Algorithm (GA) to provide customized performance measures for each user of the system. With CAST, we match the relative level of …
Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry
Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry
Conference papers
This paper presents a use-case based evaluation of the impact of two-level modeling on the automatic federation of ocean observational data. The goal of the work is to increase the interoperability and data quality of aggregated ocean observations to support convenient discovery and consumption by applications. An assessment of the interoperability of served data flows from publicly available ocean observing spatial data infrastructures was performed. Barriers to consumption of existing standards-compliant ocean-observing data streams were examined, including the impact of adherence to agreed data standards. Historical data flows were mapped to a set of archetypes and a backward integration experiment …
An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas
An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas
Engineering Management & Systems Engineering Faculty Publications
Inter-rater reliability can be regarded as the degree of agreement among raters on a given item or a circumstance. Multiple approaches have been taken to estimate and improve inter-rater reliability of the United States Department of Defense Human Factors Analysis and Classification System used by trained accident investigators. In this study, three trained instructor pilots used the DoD-HFACS to classify 347 U.S. Air Force Accident Investigation Board (AIB) Class-A reports between the years of 2000 and 2013. The overall method consisted of four steps: (1) train on HFACS definitions, (2) verify rating reliability, (3) rate HFACS reports, and (4) random …
New Dimensions For A Challenging Security Environment: Growing Exposure To Critical Space Infrastructure Disruption Risk, Adrian V. Gheorghe, Alexandru Georgescu, Olga Bucovetchi, Marilena Lazăr, Cezar Scarlat
New Dimensions For A Challenging Security Environment: Growing Exposure To Critical Space Infrastructure Disruption Risk, Adrian V. Gheorghe, Alexandru Georgescu, Olga Bucovetchi, Marilena Lazăr, Cezar Scarlat
Engineering Management & Systems Engineering Faculty Publications
Space systems have become a key enabler for a wide variety of applications that are vital to the functioning of advanced societies. The trend is one of quantitative and qualitative increase of this dependence, so much so that space systems have been described as a new example of critical infrastructure. This article argues that the existence of critical space infrastructures implies the emergence of a new category of disasters related to disruption risks. We inventory those risks and make policy recommendations for what is, ultimately, a resilience governance issue.
Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez
Fundamentals Of Neutrosophic Logic And Sets And Their Role In Artificial Intelligence (Fundamentos De La Lógica Y Los Conjuntos Neutrosóficos Y Su Papel En La Inteligencia Artificial ), Florentin Smarandache, Maykel Leyva-Vazquez
Branch Mathematics and Statistics Faculty and Staff Publications
Neutrosophy is a new branch of philosophy which studies the origin, nature and scope of neutralities. This has formed the basis for a series of mathematical theories that generalize the classical and fuzzy theories such as the neutrosophic sets and the neutrosophic logic. In the paper, the fundamental concepts related to neutrosophy and its antecedents are presented. Additionally, fundamental concepts of artificial intelligence will be defined and how neutrosophy has come to strengthen this discipline.
Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally
Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally
Research outputs 2014 to 2021
Ransomware infections have grown exponentially during the recent past to cause major disruption in operations across a range of industries including the government. Through this research, we present an analysis of 14 strains of ransomware that infect Windows platforms, and we do a comparison of Windows Application Programming Interface (API) calls made through ransomware processes with baselines of normal operating system behaviour. The study identifies and reports salient features of ransomware as referred through the frequencies of API calls
User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang
User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang
Research Collection School Of Computing and Information Systems
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a …
Using Regular Languages To Explore The Representational Capacity Of Recurrent Neural Architectures, Abhijit Mahalunkar, John D. Kelleher
Using Regular Languages To Explore The Representational Capacity Of Recurrent Neural Architectures, Abhijit Mahalunkar, John D. Kelleher
Conference papers
The presence of Long Distance Dependencies (LDDs) in sequential data poses significant challenges for computational models. Various recurrent neural architectures have been designed to mitigate this issue. In order to test these state-of-the-art architectures, there is growing need for rich benchmarking datasets. However, one of the drawbacks of existing datasets is the lack of experimental control with regards to the presence and/or degree of LDDs. This lack of control limits the analysis of model performance in relation to the specific challenge posed by LDDs. One way to address this is to use synthetic data having the properties of subregular languages. …
Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu
Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu
Electrical & Computer Engineering Faculty Publications
High utility itemsets (HUIs) are sets of items with high utility, like profit, in a database. Efficient mining of high utility itemsets is an important problem in the data mining area. Many mining algorithms adopt a two-phase framework. They first generate a set of candidate itemsets by roughly overestimating the utilities of all itemsets in a database, and subsequently compute the exact utility of each candidate to identify HUIs. Therefore, the major costs in these algorithms come from candidate generation and utility computation. Previous works mainly focus on how to reduce the number of candidates, without dedicating much attention to …
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili
If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Research outputs 2014 to 2021
For robots to attain more general-purpose utility, grasping is a necessary skill to master. Such general-purpose robots may use their perception abilities to visually identify grasps for a given object. A grasp describes how a robotic end-effector can be arranged to securely grab an object and successfully lift it without slippage. Traditionally, grasp detection requires expert human knowledge to analytically form the task-specific algorithm, but this is an arduous and time-consuming approach. During the last five years, deep learning methods have enabled significant advancements in robotic vision, natural language processing, and automated driving applications. The successful results of these methods …
Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh
Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh
Research outputs 2014 to 2021
Highly bismuth-substituted iron garnet thin films are prepared on quartz substrates by using a radio frequency (RF) magnetron sputtering technique. We study the factors (process parameters associated with the RF magnetron sputter deposition technique) affecting the magneto-optical (MO) properties of ferrite garnet films of composition Bi2.1Dy0.9Fe3.9Ga1.1O12. All films show high MO response across the visible range of wavelengths after being annealed. In particular, the effects of substrate stage temperature and rotation rate on the various properties of films are studied. Experimental results reveal that the characteristics of garnet films of this type can be tuned and optimized for use in …
Introduction - Syllabus, C. Ariel Pinto
Introduction - Syllabus, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management
Cybersecurity risk management is a necessary tool for decision making for all management levels from tactical to strategic and creating a common understanding between people from diverse domains or having different priorities. This course adopts a multidisciplinary perspective. It creates a common understanding of risk for a diverse set of students which are coming from different disciplines such as technical, social, economics, law, and politics to remove communication barriers between strategic, operational, and tactical level decision makers.
The course covers related government and industry regulations and standards along with best practices frequently used to assess, analyze and manage cyber risks, …
Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang
Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang
Computational Modeling & Simulation Engineering Faculty Publications
Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute to …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …
Integrated Reward Scheme And Surge Pricing In A Ride Sourcing Market, Hai Yang, Chaoyi Shao, Hai Wang, Jieping Ye
Integrated Reward Scheme And Surge Pricing In A Ride Sourcing Market, Hai Yang, Chaoyi Shao, Hai Wang, Jieping Ye
Research Collection School Of Computing and Information Systems
Surge pricing is commonly used in on-demand ride-sourcing platforms (e.g., Uber, Lyft and Didi) to dynamically balance demand and supply. However, since the price for ride service cannot be unlimited, there is usually a reasonable or legitimate range of prices in practice. Such a constrained surge pricing strategy fails to balance demand and supply in certain cases, e.g., even adopting the maximum allowed price cannot reduce the demand to an affordable level during peak hours. In addition, the practice of surge pricing is controversial and has stimulated long debate regarding its pros and cons. In this paper, to address the …