Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Alma (2)
- Cybersecurity (2)
- Digital forensics (2)
- Primo (2)
- ALMA (1)
-
- Adaboost (1)
- Adjudication (1)
- Aeronautics (1)
- Aerospace (1)
- Algebra (1)
- Algorithmic modeling (1)
- Artificial Neural Network (1)
- Artificial intelligence (1)
- Authentication (1)
- Automation (1)
- Aviation (1)
- Big data (1)
- Blockchain (1)
- Cloud computing (1)
- Cloud forensics (1)
- Cluster (1)
- Computer science education (1)
- Conceptual Estimates (1)
- Construction (1)
- Cost estimating (1)
- Criminal justice (1)
- Cyber-physical system (1)
- Data dashboard (1)
- Data redundancy (1)
- Data separation (1)
Articles 1 - 16 of 16
Full-Text Articles in Engineering
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Houbing Song
Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.
In this paper, we propose a new CPS design paradigm …
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
David Dampier
The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this …
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Houbing Song
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Houbing Song
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Houbing Song
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
David Dampier
The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.
The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques …
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Ilker Karaca
The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)
Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states
Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)
Main explanatory variable: urban density obtained from the US Census figures
Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson
Farzad Hashemi
Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes the …
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Ilker Karaca
This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network methodologies. Both methods …
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
Integrating Mathematics And Educational Robotics: Simple Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal, Sara T. Greenberg
George K. Thiruvathukal
This paper shows how students can be guided to integrate elementary mathematical analyses with motion planning for typical educational robots. Rather than using calculus as in comprehensive works on motion planning, we show students can achieve interesting results using just simple linear regression tools and trigonometric analyses. Experiments with one robotics platform show that use of these tools can lead to passable navigation through dead reckoning even if students have limited experience with use of sensors, programming, and mathematics.
Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon
Real-Time Insight : Developing A Internal Library Data Dashboard, Travis Clamon
Travis Clamon
Library systems are becoming increasingly open, providing API’s that can deliver data in real-time. ETSU Library staff wanted a way to collect metrics from various systems and present it in one centralized dashboard. This presentation will cover our experiences with the project, including successes, challenges, and future goals.
Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon
Authentication Via Openathens: Implementing A Single Sign-On Solution For Primo, Alma, And Ezproxy, Travis Clamon
Travis Clamon
OpenAthens is a hosted identity and access management service that provides a streamlined solution for implementing single sign-on authentication. This presentation will outline the steps East Tennessee State University took to configure OpenAthens authentication across the Alma, Primo, and EZproxy platforms. We will give a brief overview of the internal configurations related to LDAP integration, allocating electronic resources, and selectively assigning permissions. Finally, we will share our experiences with OpenAthens including support, vendor adoption, and end user benefits.
Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon
Eliminating Data Redundancy: Our Solution For Database Discovery Using Alma/Primo, Jacob Kindle, Travis Clamon
Travis Clamon
East Tennessee State University recently adopted Alma & Primo and was suprised by the lack of an A-Z database discovery module. Frustrated by having to maintain electronic resources separately on our library website and in Alma, we embarked on a goal to eliminate redundancy and use Alma/Primo exclusively. This presentation will cover our entire workflow in both Alma & Primo and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules, scoping, …
A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon
A-Z Database Discovery Using Alma: Eliminate Redundancy And Simplify Your Workflow, Travis Clamon
Travis Clamon
Frustrated by having to maintain an A-Z databases list separately on our library website and in Alma/Primo, East Tennessee State University embarked on a goal to eliminate redundancy by using Alma as our primary source of metadata for eResources. This presentation will cover our entire workflow and the issues we encountered along the way. I'll first go over our process in Alma including MARC record creation, electronic collection setup, and the top level collection module. Next, I'll cover our workflow in Primo including normalization rules, scoping, and PNX display. The last section will cover the Alma API's and how they …
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
J. Philip Craiger, Ph.D.
Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.
Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …
Should Robots Prosecute And Defend?, Stephen E. Henderson
Should Robots Prosecute And Defend?, Stephen E. Henderson
Stephen E Henderson