Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 39

Full-Text Articles in Systems and Communications

Effect Of Recommending Users And Opinions On The Network Connectivity And Idea Generation Process, Sriniwas Pandey, Hiroki Sayama May 2024

Effect Of Recommending Users And Opinions On The Network Connectivity And Idea Generation Process, Sriniwas Pandey, Hiroki Sayama

Northeast Journal of Complex Systems (NEJCS)

The growing reliance on online services underscores the crucial role of recommendation systems, especially on social media platforms seeking increased user engagement. This study investigates how recommendation systems influence the impact of personal behavioral traits on social network dynamics. It explores the interplay between homophily, users’ openness to novel ideas, and recommendation-driven exposure to new opinions. Additionally, the research examines the impact of recommendation systems on the diversity of newly generated ideas, shedding light on the challenges and opportunities in designing effective systems that balance the exploration of new ideas with the risk of reinforcing biases or filtering valuable, unconventional …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2022

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations, Hiroki Sayama Apr 2022

Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations, Hiroki Sayama

Northeast Journal of Complex Systems (NEJCS)

We formulated and analyzed a set of partial integro-differential equations that capture the dynamics of our adaptive network model of social fragmentation involving behavioral diversity of agents. Previous results showed that, if the agents’ cultural tolerance levels were diversified, the social network could remain connected while maintaining cultural diversity. Here we converted the original agent-based model into a continuous equation-based one so we can gain more theoretical insight into the model dynamics. We restricted the node states to 1-D continuous values and assumed the network size was very large. As a result, we represented the whole system as a set …


Bistability And Switching Behavior In Moving Animal Groups, Daniel Strömbom, Stephanie Nickerson, Catherine Futterman, Alyssa Difazio, Cameron Costello, Kolbjørn Tunstrøm Mar 2022

Bistability And Switching Behavior In Moving Animal Groups, Daniel Strömbom, Stephanie Nickerson, Catherine Futterman, Alyssa Difazio, Cameron Costello, Kolbjørn Tunstrøm

Northeast Journal of Complex Systems (NEJCS)

Moving animal groups such as schools of fish and flocks of birds frequently switch between different group structures. Standard models of collective motion have been used successfully to explain how stable groups form via local interactions between individuals, but they are typically unable to produce groups that exhibit spontaneous switching. We are only aware of one model, constructed for barred flagtail fish that are known to rely on alignment and attraction to organize their collective motion, that has been shown to generate this type of behavior in 2D (or 3D). Interestingly, another species of fish, golden shiners, do exhibit switching …


Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim Nov 2021

Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim

Future Computing and Informatics Journal

Academic advising plays a vital role in achieving higher educational institution’s purposes. Academic advising is a process where an academic advisor decides to select a certain number of courses for a student to register in each semester to fulfil the graduation requirements. This paper presents an Academic Advising Decision Support System (AADSS) to enhance advisors make better decisions regarding their students’ cases. AADSS framework divided into four layers, data preparation layer, data layer, processing layer and decision layer. The testing results from those participating academic advisors and students considered are that AADSS beneficial in enhancing their decision for selecting courses.


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban Jul 2021

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …


Flocc: From Agent-Based Models To Interactive Simulations On The Web, Scott Donaldson Mar 2021

Flocc: From Agent-Based Models To Interactive Simulations On The Web, Scott Donaldson

Northeast Journal of Complex Systems (NEJCS)

Agent-based modeling (ABM) is a computational technique wherein systems are represented through the actions and interactions of many individual entities (‘agents’) over time. ABM often attempts to elucidate the unpredictable, high-level behavior of systems through the predictable, low-level behavior of actors within the system. There are currently few software or frameworks for ABM that allow modelers to design and build interactive models on the web, for a wide audience as well as a scientifically literate audience well-versed in complexity, models, and simulations. Flocc is a novel framework for agent-based modeling written in JavaScript, the lingua franca programming language of the …


Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan Mar 2021

Network-Based Analysis Of Early Pandemic Mitigation Strategies: Solutions, And Future Directions, Pegah Hozhabrierdi, Raymond Zhu, Maduakolam Onyewu, Sucheta Soundarajan

Northeast Journal of Complex Systems (NEJCS)

Despite the large amount of literature on mitigation strategies for pandemic spread, in practice, we are still limited by naive strategies, such as lockdowns, that are not effective in controlling the spread of the disease in long term. One major reason behind adopting basic strategies in real-world settings is that, in the early stages of a pandemic, we lack knowledge of the behavior of a disease, and so cannot tailor a more sophisticated response. In this study, we design different mitigation strategies for early stages of a pandemic and perform a comprehensive analysis among them. We then propose a novel …


Are Terrorist Networks Just Glorified Criminal Cells?, Elie Alhajjar, Ryan Fameli, Shane Warren Mar 2021

Are Terrorist Networks Just Glorified Criminal Cells?, Elie Alhajjar, Ryan Fameli, Shane Warren

Northeast Journal of Complex Systems (NEJCS)

The notions of organized crime and terrorism have an old and rich history around the globe. Researchers and practitioners have been studying events and phenomena related to these notions for a long time. There are pointers in the literature in which it is misleading to see the unfair comparison between terrorist and criminal networks with the argument that all actors involved in these networks are simply evil individuals. In this paper, we conduct a systematic study of the operational structure of such networks from a network science perspective. We highlight some of the major differences between them and support our …


6g Enabled Smart Infrastructure For Sustainable Society: Opportunities, Challenges, And Research Roadmap, Abotinam Lucky Imoize, Oluwadara Adedeji, Nistha Tandiya, Sachin Shetty Jan 2021

6g Enabled Smart Infrastructure For Sustainable Society: Opportunities, Challenges, And Research Roadmap, Abotinam Lucky Imoize, Oluwadara Adedeji, Nistha Tandiya, Sachin Shetty

VMASC Publications

The 5G wireless communication network is currently faced with the challenge of limited data speed exacerbated by the proliferation of billions of data-intensive applications. To address this problem, researchers are developing cutting-edge technologies for the envisioned 6G wireless communication standards to satisfy the escalating wireless services demands. Though some of the candidate technologies in the 5G standards will apply to 6G wireless networks, key disruptive technologies that will guarantee the desired quality of physical experience to achieve ubiquitous wireless connectivity are expected in 6G. This article first provides a foundational background on the evolution of different wireless communication standards to …


Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy Dec 2020

Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy

Future Computing and Informatics Journal

Background: Early event detection, monitor, and response can significantly decrease the impact of disasters. Lately, the usage of social media for detecting events has displayed hopeful results. Objectives: for event detection and mapping; the tweets will locate and monitor them on a map. This new approach uses grouped geoparsing then scoring for each tweet based on three spatial indicators. Method/Approach: Our approach uses a geoparsing technique to match a location in tweets to geographic locations of multiple-events tweets in Egypt country, administrative subdivision. Thus, additional geographic information acquired from the tweet itself to detect the actual locations that …


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh May 2020

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


A System Dynamic Model For Application Of Blockchain In The United States Electricity Sector, Oluwafemi Ezekiel Oyeniran Apr 2020

A System Dynamic Model For Application Of Blockchain In The United States Electricity Sector, Oluwafemi Ezekiel Oyeniran

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Oluwafemi Ezekiel Oyeniran on April 14, 2020.


Academic Skill Learning And The Problem Of Complexity I: Creational Purposeful Integrated Capability At Skill (Cpics), Martin F. Gardiner Sep 2019

Academic Skill Learning And The Problem Of Complexity I: Creational Purposeful Integrated Capability At Skill (Cpics), Martin F. Gardiner

Northeast Journal of Complex Systems (NEJCS)

Physical and mental skills are intended to achieve success at acting purposefully. As capability at any skill increases, the need to adjust details of application to complexity of context and goals will increase as well. It will become more and more important to prepare mentally for what I now term Creational Purposeful Integrated Capability at Skill (CPICS). This paper develops what I mean by CPICS. Theory concerning Complex Dynamical Systems (CDS) such as the brain and other evidence points to the likelihood that the mental operations by which our brain produces any kind of skillful behavior cannot remain constant, …


Being In Uncertainties: An Inquiry-Based Model Leveraging Complexity In Teaching-Learning, Diane Rosen Sep 2019

Being In Uncertainties: An Inquiry-Based Model Leveraging Complexity In Teaching-Learning, Diane Rosen

Northeast Journal of Complex Systems (NEJCS)

Education is traditionally structured as a closed system, privileging result-driven methods that offer control and predictability. In recent decades this reductionist approach has been effectively challenged by interdisciplinary work in complex systems theory, revealing myriad levels of orderly disorder that make either-or, linear instruction an inadequate norm. Narrowing the broad implications of a complexity lens on education, this paper focuses on generative uncertainty in teaching-learning, a paradoxical state of epistemological and creative growth described by English poet John Keats as "the negative capability of being in uncertainties, mysteries, doubts." Opportunities to advance this potentiating capacity are especially abundant in constructivist …


Creativity As An Emergent Property Of Complex Educational System, Ceire Monahan, Mika Munakata, Ashwin Vaidya Sep 2019

Creativity As An Emergent Property Of Complex Educational System, Ceire Monahan, Mika Munakata, Ashwin Vaidya

Northeast Journal of Complex Systems (NEJCS)

The importance of creativity in education has been discussed often in the literature. While there remains no agreed-upon definition of creativity, the psychological literature points to traits of a creative person. These include the ability to think outside the box, make connections between seemingly disparate ideas, and question norms. The literature provides several examples of classroom experiments to help foster creativity in the classroom. In science and mathematics, we can start by getting students to recognize mathematics and the sciences as being creative endeavors. While these attempts are noteworthy, they are not necessarily aligned with instructional practices. In this article, …


Rethinking Educational Reforms Through A Complex Dynamical Systems Approach: Preliminary Report From An Empirical Research, Eugenia Tsiouplis, Dimitrios Stamovlasis Sep 2019

Rethinking Educational Reforms Through A Complex Dynamical Systems Approach: Preliminary Report From An Empirical Research, Eugenia Tsiouplis, Dimitrios Stamovlasis

Northeast Journal of Complex Systems (NEJCS)

Literature on educational reforms is rich of cases where changes have been attempted, without however to attain success. Likewise the Greek education system had experienced a lot of reforms, most of which have failed to make the intended changes and they attenuated shortly after their implementation or they ceased at the stage of legislative planning. On the other hand, the traditional research have failed to develop a coherent theoretical perspective and provide satisfactory interpretations of the perpetually unsuccessful reforms. This paper is part of wider project which attempts to address the above issue following the Complex Dynamical Systems (CDS) perspective, …


Editorial Introduction To The Northeast Journal Of Complex Systems (Nejcs), Hiroki Sayama, Georgi Georgiev Sep 2019

Editorial Introduction To The Northeast Journal Of Complex Systems (Nejcs), Hiroki Sayama, Georgi Georgiev

Northeast Journal of Complex Systems (NEJCS)

Editorial Introduction to the Northeast Journal of Complex Systems (NEJCS)


Fractality And Power Law Distributions: Shifting Perspectives In Educational Research, Matthijs Koopmans Sep 2019

Fractality And Power Law Distributions: Shifting Perspectives In Educational Research, Matthijs Koopmans

Northeast Journal of Complex Systems (NEJCS)

The dynamical character of education and the complexity of its constituent relationships have long been recognized, but the full appreciation of the implications of these insights for educational research is recent. Most educational research to this day tends to focus on outcomes rather than process, and rely on conventional cross-sectional designs and statistical inference methods that do not capture this complexity. This presentation focuses on two related aspects not well accommodated by conventional models, namely fractality (self-similarity, scale invariance) and power law distributions (an inverse relationship between frequency of occurrence and strength of response). Examples are presented for both phenomena …


Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell Jan 2019

Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell

International Journal of Applied Management and Technology

Agencies from various disciplines supporting law enforcement functions and processes have integrated, shared, and communicated data through ad hoc methods to address crime, terrorism, and many other threats in the United States. Data integration in law enforcement plays a critical role in the technical, business, and intelligence processes created by users to combine data from various sources and domains to transform them into valuable information. The purpose of this qualitative phenomenological study was to explore the current conditions of data integration frameworks through user and system interactions among law enforcement organizational processes. Further exploration of critical success factors used to …


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu Jan 2017

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …


Testimony Before The House Committee On National Security And The House Committee On Oversight And Government Reform, George H. Baker Iii May 2015

Testimony Before The House Committee On National Security And The House Committee On Oversight And Government Reform, George H. Baker Iii

George H Baker

The Commission to Assess the threat to the United States from Electromagnetic Pulse, on which I served as principal staff, made a compelling case for protecting critical infrastructure against the nuclear electromagnetic pulse (EMP) and geomagnetic disturbances (GMD) caused by severe solar storms. Their 2008 Critical Infrastructure Report explains EMP effects, consequences, and protection means for critical infrastructure sectors. EMP and GMD are particularly challenging in that they interfere with electrical power and electronic data, control, transmission, and communication systems organic to nearly all critical infrastructures. The affected geography may be continental in scale. EMP and GMD events thus represent …


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


The Sky Is The Limit, Alexander Hayes Dec 2013

The Sky Is The Limit, Alexander Hayes

Alexander Hayes Mr.

IEEE Technology and Society Magazine Associate Editor Alexander Hayes interviewed Glass Explorer Cecilia Abadie on January 21, 2013. The complete Google Hangout interview is available for viewing on YouTube at http://goo.gl/YFFbxJ.


Innovation, Proximity, And Knowledge Gatekeepers –Is Proximity A Necessity For Learning And Innovation?, Deogratias Harorimana Dr Jun 2013

Innovation, Proximity, And Knowledge Gatekeepers –Is Proximity A Necessity For Learning And Innovation?, Deogratias Harorimana Dr

Dr Deogratias Harorimana

Organisational desire for innovation and growth can be best achieved when they are in proximity. Geographical or technological proximity represent network structure in which a focal organisation is embedded, which has structural, cognitive and relational dimensions. Proximity influences innovation indirectly by its influence on agents’ ability to exchange and combine knowledge in four related ways: by giving access to exchange partners that provide opportunities for learning, increasing the anticipation of value, increasing the motivation to exchange, and by giving access to resources necessary for committing exchanges.