Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Old Dominion University

2018

Keyword
Publication
Publication Type

Articles 1 - 30 of 42

Full-Text Articles in Physical Sciences and Mathematics

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu Oct 2018

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


A Survey Of Matrix Completion Methods For Recommendation Systems, Andy Ramlatchan, Mengyun Yang, Quan Liu, Min Li, Jianxin Wang, Yaohang Li Jul 2018

A Survey Of Matrix Completion Methods For Recommendation Systems, Andy Ramlatchan, Mengyun Yang, Quan Liu, Min Li, Jianxin Wang, Yaohang Li

Computer Science Faculty Publications

In recent years, the recommendation systems have become increasingly popular and have been used in a broad variety of applications. Here, we investigate the matrix completion techniques for the recommendation systems that are based on collaborative filtering. The collaborative filtering problem can be viewed as predicting the favorability of a user with respect to new items of commodities. When a rating matrix is constructed with users as rows, items as columns, and entries as ratings, the collaborative filtering problem can then be modeled as a matrix completion problem by filling out the unknown elements in the rating matrix. This article …


Deep Learning For Segmentation Of 3d Cryo-Em Images, Devin Reid Haslam Jul 2018

Deep Learning For Segmentation Of 3d Cryo-Em Images, Devin Reid Haslam

Computer Science Theses & Dissertations

Cryo-electron microscopy (cryo-EM) is an emerging biophysical technique for structural determination of protein complexes. However, accurate detection of secondary structures is still challenging when cryo-EM density maps are at medium resolutions (5-10 Å). Most existing methods are image processing methods that do not fully utilize available images in the cryo-EM database. In this paper, we present a deep learning approach to segment secondary structure elements as helices and β-sheets from medium- resolution density maps. The proposed 3D convolutional neural network is shown to detect secondary structure locations with an F1 score between 0.79 and 0.88 for six simulated test cases. …


A Framework For Executable Systems Modeling, Matthew Amissah Jul 2018

A Framework For Executable Systems Modeling, Matthew Amissah

Engineering Management & Systems Engineering Theses & Dissertations

Systems Modeling Language (SysML), like its parent language, the Unified Modeling Language (UML), consists of a number of independently derived model languages (i.e. state charts, activity models etc.) which have been co-opted into a single modeling framework. This, together with the lack of an overarching meta-model that supports uniform semantics across the various diagram types, has resulted in a large unwieldy and informal language schema. Additionally, SysML does not offer a built in framework for managing time and the scheduling of time based events in a simulation.

In response to these challenges, a number of auxiliary standards have been offered …


Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque Jul 2018

Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque

Computational Modeling & Simulation Engineering Theses & Dissertations

Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …


New Methods To Improve Protein Structure Modeling, Maha Abdelrasoul Jul 2018

New Methods To Improve Protein Structure Modeling, Maha Abdelrasoul

Computer Science Theses & Dissertations

Proteins are considered the central compound necessary for life, as they play a crucial role in governing several life processes by performing the most essential biological and chemical functions in every living cell. Understanding protein structures and functions will lead to a significant advance in life science and biology. Such knowledge is vital for various fields such as drug development and synthetic biofuels production.

Most proteins have definite shapes that they fold into, which are the most stable state they can adopt. Due to the fact that the protein structure information provides important insight into its functions, many research efforts …


Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen Jul 2018

Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen

Information Technology & Decision Sciences Theses & Dissertations

Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be …


Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan Jul 2018

Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system …


Non-Destructive Evaluation For Composite Material, Desalegn Temesgen Delelegn Jul 2018

Non-Destructive Evaluation For Composite Material, Desalegn Temesgen Delelegn

Electrical & Computer Engineering Theses & Dissertations

The Nondestructive Evaluation Sciences Branch (NESB) at the National Aeronautics and Space Administration (NASA) Langley Research Center (LaRC) has conducted impact damage experiments over the past few years with the goal of understanding structural defects in composite materials. The Data Science Team within the NASA LaRC Office of the Chief Information Officer (OCIO) has been working with the Non-Destructive Evaluation (NDE) subject matter experts (SMEs), Dr. Cheryl Rose, from the Structural Mechanics & Concepts Branch and Dr. William Winfree, from the Research Directorate, to develop computer vision solutions using digital image processing and machine learning techniques that can help identify …


Novel Technique For Gait Analysis Using Two Waist Mounted Gyroscopes, Ahmed Nasr Jul 2018

Novel Technique For Gait Analysis Using Two Waist Mounted Gyroscopes, Ahmed Nasr

Computer Science Theses & Dissertations

Analysis of the human gait is used in many applications such as medicine, sports, and person identification. Several research studies focused on the use of MEMS inertial sensors for gait analysis and showed promising results. The miniaturization of these sensors and their wearability allowed the analysis of gait on a long term outside of the laboratory environment which can reveal more information about the person and introduced the use of gait analysis in new applications such as indoor localization.

Step detection and step length estimation are two basic and important gait analysis tasks. In fact, step detection is a prerequisite …


Temporal And Spatiotemporal Investigation Of Tourist Attraction Visit Sentiment On Twitter, Jose J. Padilla, Hamdi Kavak, Christopher J. Lynch, Ross J. Gore, Saikou Y. Diallo Jun 2018

Temporal And Spatiotemporal Investigation Of Tourist Attraction Visit Sentiment On Twitter, Jose J. Padilla, Hamdi Kavak, Christopher J. Lynch, Ross J. Gore, Saikou Y. Diallo

VMASC Publications

In this paper, we propose a sentiment-based approach to investigate the temporal and spatiotemporal effects on tourists' emotions when visiting a city's tourist destinations. Our approach consists of four steps: data collection and preprocessing from social media; visitor origin identification; visit sentiment identification; and temporal and spatiotemporal analysis. The temporal and spatiotemporal dimensions include day of the year, season of the year, day of the week, location sentiment progression, enjoyment measure, and multi-location sentiment progression. We apply this approach to the city of Chicago using over eight million tweets. Results show that seasonal weather, as well as special days and …


Prediction Of Lncrna-Disease Associations Based On Inductive Matrix Completion, Chengqian Lu, Mengyun Yang, Feng Luo, Fang-Xiang Wu, Min Li, Yi Pan, Yaohang Li, Jianxin Wang Apr 2018

Prediction Of Lncrna-Disease Associations Based On Inductive Matrix Completion, Chengqian Lu, Mengyun Yang, Feng Luo, Fang-Xiang Wu, Min Li, Yi Pan, Yaohang Li, Jianxin Wang

Computer Science Faculty Publications

Motivation: Accumulating evidences indicate that long non-coding RNAs (lncRNAs) play pivotal roles in various biological processes. Mutations and dysregulations of lncRNAs are implicated in miscellaneous human diseases. Predicting lncRNA–disease associations is beneficial to disease diagnosis as well as treatment. Although many computational methods have been developed, precisely identifying lncRNA–disease associations, especially for novel lncRNAs, remains challenging.

Results: In this study, we propose a method (named SIMCLDA) for predicting potential lncRNA– disease associations based on inductive matrix completion. We compute Gaussian interaction profile kernel of lncRNAs from known lncRNA–disease interactions and functional similarity of diseases based on disease–gene and gene–gene onotology …


Tracing Actin Filament Bundles In Three-Dimensional Electron Tomography Density Maps Of Hair Cell Stereocilia, Salim Sazzed, Junha Song, Julio Kovacs, Willi Wriggers, Manfred Auer, Jing He Apr 2018

Tracing Actin Filament Bundles In Three-Dimensional Electron Tomography Density Maps Of Hair Cell Stereocilia, Salim Sazzed, Junha Song, Julio Kovacs, Willi Wriggers, Manfred Auer, Jing He

Computer Science Faculty Publications

Cryo-electron tomography (cryo-ET) is a powerful method of visualizing the three-dimensional organization of supramolecular complexes, such as the cytoskeleton, in their native cell and tissue contexts. Due to its minimal electron dose and reconstruction artifacts arising from the missing wedge during data collection, cryo-ET typically results in noisy density maps that display anisotropic XY versus Z resolution. Molecular crowding further exacerbates the challenge of automatically detecting supramolecular complexes, such as the actin bundle in hair cell stereocilia. Stereocilia are pivotal to the mechanoelectrical transduction process in inner ear sensory epithelial hair cells. Given the complexity and dense arrangement of actin …


Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky Apr 2018

Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky

Mechanical & Aerospace Engineering Theses & Dissertations

Quadrotors offer practical solutions for many applications, such as emergency rescue, surveillance, military operations, videography and many more. For this reason, they have recently attracted the attention of research and industry. Even though they have been intensively studied, quadrotors still suffer from some challenges that limit their use, such as trajectory measurement, attitude estimation, obstacle avoidance, safety precautions, and land cybersecurity. One major problem is flying in a confined environment, such as closed buildings and tunnels, where the aerodynamics around the quadrotor are affected by close proximity objects, which result in tracking performance deterioration, and sometimes instability. To address this …


Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem Apr 2018

Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem

Computer Science Theses & Dissertations

Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting …


Effectiveness Of Social Media Analytics On Detecting Service Quality Metrics In The U.S. Airline Industry, Xin Tian Apr 2018

Effectiveness Of Social Media Analytics On Detecting Service Quality Metrics In The U.S. Airline Industry, Xin Tian

Information Technology & Decision Sciences Theses & Dissertations

During the past few decades, social media has provided a number of online tools that allow people to discuss anything freely, with an increase in mobile connectivity. More and more consumers are sharing their opinions online with others. Electronic Word of Mouth (eWOM) is the virtual communication in use; it plays an important role in customers’ buying decisions. Customers can choose to complain or to compliment services or products on their social media platforms, rather than to complete the survey offered by the providers of those services. Compared with the traditional survey, or with the air travel customer report published …


Flexstream: Sdn-Based Framework For Programmable And Flexible Adaptive Video Streaming, Ibrahim Ben Mustafa Apr 2018

Flexstream: Sdn-Based Framework For Programmable And Flexible Adaptive Video Streaming, Ibrahim Ben Mustafa

Computer Science Theses & Dissertations

With the tremendous increase in video traffic fueled by smartphones, tablets, 4G LTE networks, and other mobile devices and technologies, providing satisfactory services to end users in terms of playback quality and a fair share of network resources become challenging. As a result, an HTTP video streaming protocol was invented and widely adopted by most video providers today with the goal of maximizing the user’s quality of experience. However, despite the intensive efforts of major video providers such as YouTube and Netflix to improve their players, several studies as well as our measurements indicate that the players still suffer from …


Supporting Big Data At The Vehicular Edge, Lloyd Decker Apr 2018

Supporting Big Data At The Vehicular Edge, Lloyd Decker

Computer Science Theses & Dissertations

Vehicular networks are commonplace, and many applications have been developed to utilize their sensor and computing resources. This is a great utilization of these resources as long as they are mobile. The question to ask is whether these resources could be put to use when the vehicle is not mobile. If the vehicle is parked, the resources are simply dormant and waiting for use. If the vehicle has a connection to a larger computing infrastructure, then it can put its resources towards that infrastructure. With enough vehicles interconnected, there exists a computing environment that could handle many cloud-based application services. …


To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin Apr 2018

To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin

Computer Science Theses & Dissertations

When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications made …


Software Intrusion Detection Evaluation System: A Cost-Based Evaluation Of Intrusion Detection Capability, Agbotiname L. Imoize, Taiwo Oyedare, Michael E. Otuokere, Sachin Shetty Jan 2018

Software Intrusion Detection Evaluation System: A Cost-Based Evaluation Of Intrusion Detection Capability, Agbotiname L. Imoize, Taiwo Oyedare, Michael E. Otuokere, Sachin Shetty

VMASC Publications

In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation; a package for computing the intrusion detection capability of intrusion detection system (IDS), given certain input parameters is developed using Java. In order to determine the expected cost at each IDS operating point, the decision tree method of analysis is employed, and plots of expected cost and intrusion detection capability against false positive rate were generated. The point of intersection between the maximum intrusion detection capability and the expected cost is selected as …


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …


Quantification Of Twist From The Central Lines Of Β-Strands, Tunazzina Islam, Michael Poteat, Jing He Jan 2018

Quantification Of Twist From The Central Lines Of Β-Strands, Tunazzina Islam, Michael Poteat, Jing He

Computer Science Faculty Publications

Since the discovery of right-handed twist of a β-strand, many studies have been conducted to understand the twist. Given the atomic structure of a protein, twist angles have been defined using atomic positions of the backbone. However, limited study is available to characterize twist when the atomic positions are not available, but the central lines of β-strands are. Recent studies in cryoelectron microscopy show that it is possible to predict the central lines of β-strands from a medium-resolution density map. Accurate measurement of twist angles is important in identification of β-strands from such density maps. We propose an effective method …


Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2018

Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First paragraph] Preservation of the Web ensures that future generations have a picture of how the web was. Web archives like Internet Archive's Wayback Machine, WebCite, and archive.is allow individuals to submit URIs to be archived, but the captures they preserve then reside at the archives. Traversing these captures in time as preserved by multiple archive sources (using Memento [8]) provides a more comprehensive picture of the past Web than relying on a single archive. Some content on the Web, such as content behind authentication, may be unsuitable or inaccessible for preservation by these organizations. Furthermore, this content may be …


Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu Jan 2018

Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu

Electrical & Computer Engineering Faculty Publications

High utility itemsets (HUIs) are sets of items with high utility, like profit, in a database. Efficient mining of high utility itemsets is an important problem in the data mining area. Many mining algorithms adopt a two-phase framework. They first generate a set of candidate itemsets by roughly overestimating the utilities of all itemsets in a database, and subsequently compute the exact utility of each candidate to identify HUIs. Therefore, the major costs in these algorithms come from candidate generation and utility computation. Previous works mainly focus on how to reduce the number of candidates, without dedicating much attention to …


Introduction - Syllabus, C. Ariel Pinto Jan 2018

Introduction - Syllabus, C. Ariel Pinto

Module 1: Fundamentals of Cybersecurity Risk Management

Cybersecurity risk management is a necessary tool for decision making for all management levels from tactical to strategic and creating a common understanding between people from diverse domains or having different priorities. This course adopts a multidisciplinary perspective. It creates a common understanding of risk for a diverse set of students which are coming from different disciplines such as technical, social, economics, law, and politics to remove communication barriers between strategic, operational, and tactical level decision makers.

The course covers related government and industry regulations and standards along with best practices frequently used to assess, analyze and manage cyber risks, …


Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang Jan 2018

Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang

Computational Modeling & Simulation Engineering Faculty Publications

Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute to …


Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe Jan 2018

Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Managing risk of cyber systems is still on the top of the agendas of Chief Information Security Officers (CISO). Investment in cybersecurity is continuously rising. Efficiency and effectiveness of cybersecurity investments are under scrutiny by boards of the companies. The primary method of decision making on cybersecurity adopts a risk-informed approach. Qualitative methods bring a notion of risk. However, particularly for strategic level decisions, more quantitative methods that can calculate the risk and impact in monetary values are required. In this study, a model is built to calculate the economic value of business interruption during a Distributed Denial-of-Service (DDoS) attack …


Unobtrusive And Extensible Archival Replay Banners Using Custom Elements, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2018

Unobtrusive And Extensible Archival Replay Banners Using Custom Elements, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

We compare and contrast three different ways to implement an archival replay banner. We propose an implementation that utilizes Custom Elements and adds some unique behaviors, not common in existing archival replay systems, to enhance the user experience. Our approach has a minimal user interface footprint and resource overhead while still providing rich interactivity and extended on-demand provenance information about the archived resources.


Efficient Randomized Algorithms For The Fixed Precision Low Rank Matrix Approximation, Wenjian Yu, Yu Gu, Yaohang Li Jan 2018

Efficient Randomized Algorithms For The Fixed Precision Low Rank Matrix Approximation, Wenjian Yu, Yu Gu, Yaohang Li

Computer Science Faculty Publications

Randomized algorithms for low-rank matrix approximation are investigated, with the emphasis on the fixed-precision problem and computational efficiency for handling large matrices. The algorithms are based on the so-called QB factorization, where Q is an orthonormal matrix. First, a mechanism for calculating the approximation error in the Frobenius norm is proposed, which enables efficient adaptive rank determination for a large and/or sparse matrix. It can be combined with any QB-form factorization algorithm in which B's rows are incrementally generated. Based on the blocked randQB algorithm by Martinsson and Voronin, this results in an algorithm called randQB_EI. Then, we further revise …


A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2018

A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

We surveyed various archival systems to compare and contrast different techniques used to implement an archival replay banner. We found that inline plain HTML injection is the most common approach, but prone to style conflicts. Iframe-based banners are also very common and while they do not have style conflicts, they suffer from screen real estate wastage and limited design choices. Custom Elements-based banners are promising, but due to being a new web standard, these are not yet widely deployed.