Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (268)
- China Simulation Federation (52)
- Embry-Riddle Aeronautical University (40)
- University for Business and Technology in Kosovo (36)
- Kennesaw State University (13)
-
- Southern Methodist University (13)
- The University of Maine (13)
- Bridgewater State University (6)
- Prairie View A&M University (6)
- Universitas Negeri Yogyakarta (5)
- Missouri University of Science and Technology (3)
- University of Arkansas, Fayetteville (3)
- University of Minnesota Morris Digital Well (3)
- Brigham Young University (2)
- Cedarville University (2)
- Sacred Heart University (2)
- William & Mary Law School (2)
- Augsburg University (1)
- Macalester College (1)
- Marshall University (1)
- National University of Uzbekistan (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Massachusetts Amherst (1)
- University of South Florida (1)
- University of Wisconsin Milwaukee (1)
- Virginia Community College System (1)
- Vocational Training Council (1)
- Walden University (1)
- Keyword
-
- Classification (10)
- Optimization (8)
- Machine learning (7)
- Cybersecurity (6)
- Particle swarm optimization (5)
-
- Wireless sensor networks (5)
- Artificial neural network (4)
- Digital forensics (4)
- Electrocardiogram (4)
- Energy efficiency (4)
- Genetic algorithm (4)
- Neural networks (4)
- Prediction (4)
- Simulation (4)
- Smart grid (4)
- Support vector machine (4)
- Wavelet (4)
- Big Data (3)
- Cryptocurrency (3)
- Deep learning (3)
- Distributed generation (3)
- Electroencephalogram (3)
- Entropy (3)
- Evaluation (3)
- Feature extraction (3)
- Forecasting (3)
- Image denoising (3)
- Induction motor (3)
- Microstrip (3)
- Modeling (3)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (268)
- Journal of System Simulation (52)
- International Journal of Business and Technology (36)
- Journal of Digital Forensics, Security and Law (35)
- Journal of Spatial Information Science (13)
-
- SMU Data Science Review (12)
- Journal of Cybersecurity Education, Research and Practice (10)
- Applications and Applied Mathematics: An International Journal (AAM) (6)
- International Journal of Cybersecurity Intelligence & Cybercrime (6)
- Elinvo (Electronics, Informatics, and Vocational Education) (5)
- Journal of Aviation/Aerospace Education & Research (3)
- Missouri S&T’s Peer to Peer (3)
- Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal (3)
- The African Journal of Information Systems (3)
- International Journal of Aviation, Aeronautics, and Aerospace (2)
- Journal of the Arkansas Academy of Science (2)
- Marriott Student Review (2)
- Proceedings of the International Conference on Creationism (2)
- School of Computer Science & Engineering Faculty Publications (2)
- Arkansas Law Review (1)
- Augsburg Honors Review (1)
- Bulletin of National University of Uzbekistan: Mathematics and Natural Sciences (1)
- Catholic University Journal of Law and Technology (1)
- Exigence (1)
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (1)
- International Journal of Geospatial and Environmental Research (1)
- Journal of Applied Digital Evidence (1)
- Journal of Social, Behavioral, and Health Sciences (1)
- Macalester Journal of Physics and Astronomy (1)
- Numeracy (1)
Articles 1 - 30 of 480
Full-Text Articles in Physical Sciences and Mathematics
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Journal of Digital Forensics, Security and Law
Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …
Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno
Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno
Elinvo (Electronics, Informatics, and Vocational Education)
Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …
Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail
Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail
Elinvo (Electronics, Informatics, and Vocational Education)
Static CCTV facilities in class need to be optimized in classroom learning, especially in recording learning activities as implementation of learning in the 21st century and strategic steps to face the Industrial Revolution 4.0. Educators need to play a role in utilizing CCTV in learning. This article presents the development of YouTube Integrated Video Moving Surveillance devices using Raspberry Pi 3. The development stages consist of analysis, design, development and evaluation. The analysis shows that: (1) the limitations of CCTV motion are followed up with the addition of motorcycles; (2) limited access to video recording data is followed up by …
Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko
Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko
Elinvo (Electronics, Informatics, and Vocational Education)
SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …
Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno
Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno
Elinvo (Electronics, Informatics, and Vocational Education)
Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …
Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia
Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia
Elinvo (Electronics, Informatics, and Vocational Education)
ABSTRAct
Information and Communication Technology (ICT) can improve the speed of information delivery, efficiency, global reach and transparency. One of the efforts to realize good corporate governance (GCG) governance in the era of regional autonomy is to use information and communication technology or popularly called e-Government. The implementation of e-Government the need for master plan information technology as a guide in the integration of information technology in Local Government, e-Government implementation is expected to help improve interaction between government, community and business, so as to encourage political and economic development. In this paper presents the determination of e-Government policy strategy …
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Journal of Cybersecurity Education, Research and Practice
Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
Journal of Cybersecurity Education, Research and Practice
This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …
Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington
Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington
Journal of Spatial Information Science
Computer programming is becoming an increasingly important scientific skill, but geographers are not necessarily receiving this training as part of their formal education. While there are efforts to promote and support extracurricular introductory computer programming workshops, there remain questions about how best to deliver these workshops. Therefore, as part of a recent introductory programming extracurricular workshop I organized for non-programing geographers, I tried to understand more about their perceptions of computer programming. I identify that one of the most important aspects for geographers to learn to computer program is to have training that is domain specific to ensure that the …
Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan
Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan
Journal of Spatial Information Science
Area and volume values of buildings and building parts have been used in many applications including taxation, valuation and land use planning. Many countries maintain a national standard for representing the measurements of floor areas in buildings. The national standards generally use similar basis for measuring building floor areas, in fact, areas specified in national standards often have semantic differences. Therefore, a number of international standards have been developed for harmonizing floor area measurements; however, they also have differences. This study aims at harmonizing the floor areas defined in the international property measurement standards by revealing the semantic relations between …
Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi
Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi
Journal of Spatial Information Science
No abstract provided.
Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris
Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris
Journal of Spatial Information Science
Geographically weighted regression (GWR) is an inherently exploratory technique for examining process non-stationarity in data relationships. This paper develops and applies a hyper-local GWR which extends such investigations further. The hyper-local GWR simultaneously optimizes both local model selection (which covariates to include in each local regression) and local kernel bandwidth specification (how much data should be included locally). These are evaluated using a measure of model fit. The hyper-local GWR approach evaluates different kernel bandwidths at each location and selects the most parsimonious local regression model. By allowing models and bandwidths to vary locally, this approach extends and refines the …
Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani
Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani
Journal of Spatial Information Science
Place descriptions in everyday communication or in online text provide a rich source of spatial knowledge about places. Such descriptions typically consist of references to places and spatial relationships between them. An important step to utilize such knowledge in information systems is georeferencing the referred places. Beside place name disambiguation, another challenge is that a significant proportion of place references in such descriptions are not official place names indexed by gazetteers, thus cannot be resolved easily. This paper presents a novel approach for georeferencing places from collective descriptions using place graphs, regardless of whether they are referred to by gazetteered …
Towards Place-Based Exploration Of Instagram: Using Co-Design To Develop An Interdisciplinary Geovisualization Prototype, Catherine Emma Jones, Daniele Guido, Marta Severo
Towards Place-Based Exploration Of Instagram: Using Co-Design To Develop An Interdisciplinary Geovisualization Prototype, Catherine Emma Jones, Daniele Guido, Marta Severo
Journal of Spatial Information Science
An abundance of geographic information is hidden within texts and multimedia objects that has the potential to enrich our knowledge about the relationship between people and places. One such example is the geographic information embedded within user-generated content collected and curated by the social media giants. Such geographic data can be encoded either explicitly as geotags or implicitly as geographical references expressed as texts that comprise part of a title or image caption. To use such data for knowledge building there is a need for new mapping interfaces. These interfaces should support both data integration and visualization, and geographical exploration …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom
Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom
Augsburg Honors Review
As the demand of computer processing grows, the burden placed on CPUs will increase as well. Computing systems produce heat, which is attracted to a metal heatsink where it is dissipated out of the system by a fan. Liquid cooling can be more effective, but is more expensive and increases the risk of damaging leaks. Peltier chips, electronic components which transfer heat into electricity, can be used in an effort to reclaim and reuse some of this waste heat. This experiment tested twelve heatsinks of various designs to maximize the effect of the Peltier chip. Variations in designs of the …
Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub
Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub
Arkansas Law Review
No abstract provided.
Transient Solution Of An M/M/1 Retrial Queue With Reneging From Orbit, A. Azhagappan, E. Veeramani, W. Monica, K. Sonabharathi
Transient Solution Of An M/M/1 Retrial Queue With Reneging From Orbit, A. Azhagappan, E. Veeramani, W. Monica, K. Sonabharathi
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, the transient behavior of an M/M/1 retrial queueing model is analyzed where the customers in the orbit possess the reneging behavior. There is no waiting room in the system for the arrivals. If the server is not free when the occurrence of an arrival, the arriving customer moves to the waiting group, known as orbit and retries for his service. If the server is idle when an arrival occurs (either coming from outside the queueing system or from the waiting group), the arrival immediately gets the service and leaves the system. Each individual customer in the orbit, …
Batch Arrival Bulk Service Queue With Unreliable Server, Second Optional Service, Two Different Vacations And Restricted Admissibility Policy, G. Ayyappan, R. Supraja
Batch Arrival Bulk Service Queue With Unreliable Server, Second Optional Service, Two Different Vacations And Restricted Admissibility Policy, G. Ayyappan, R. Supraja
Applications and Applied Mathematics: An International Journal (AAM)
This paper is concerned with batch arrival queue with an additional second optional service to a batch of customers with dissimilar service rate where the idea of restricted admissibility of arriving batch of customers is also introduced. The server may take two different vacations (i) Emergency vacation-during service the server may go for vacation to an emergency call and after completion of the vacation, the server continues the remaining service to a batch of customers. (ii) Bernoulli vacation-after completion of first essential or second optional service, the server may take a vacation or may remain in the system to serve …
An M^X/G(A,B)/1 Queue With Breakdown And Delay Time To Two Phase Repair Under Multiple Vacation, G. Ayyappan, M. Nirmala
An M^X/G(A,B)/1 Queue With Breakdown And Delay Time To Two Phase Repair Under Multiple Vacation, G. Ayyappan, M. Nirmala
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, we consider an Mx /G(a,b)/1 queue with active breakdown and delay time to two phase repair under multiple vacation policy. A batch of customers arrive according to a compound Poisson process. The server serves the customers according to the “General Bulk Service Rule” (GBSR) and the service time follows a general (arbitrary) distribution. The server is unreliable and it may breakdown at any instance. As the result of breakdown, the service is suspended, the server waits for the repair to start and this waiting time is called as „delay time‟ and is assumed to follow general …
The Analysis Of M/M/1 Queue With Working Vacation In Fuzzy Environment, G. Kannadasan, N. Sathiyamoorth
The Analysis Of M/M/1 Queue With Working Vacation In Fuzzy Environment, G. Kannadasan, N. Sathiyamoorth
Applications and Applied Mathematics: An International Journal (AAM)
This study investigates the FM/FM/1 queue with working vacation. For this fuzzy queuing model, the researcher obtains some performance measure of interest such as the regular busy period, working vacation period, stationary queue length and waiting time. Finally, numerical results are presented to show the effects of system parameters.
Induced Hesitant 2-Tuple Linguistic Aggregation Operators With Application In Group Decision Making, Tabasam Rashid, Ismat Beg, Raja N. Jamil
Induced Hesitant 2-Tuple Linguistic Aggregation Operators With Application In Group Decision Making, Tabasam Rashid, Ismat Beg, Raja N. Jamil
Applications and Applied Mathematics: An International Journal (AAM)
In this article, hesitant 2-tuple linguistic arguments are used to evaluate the group decision making problems which have inter dependent or inter active attributes. Operational laws are developed for hesitant 2-tuple linguistic elements and based on these operational laws hesitant 2- tuple weighted averaging operator and generalized hesitant 2- tuple averaging operator are proposed. Combining Choquet integral with hesitant 2-tuple linguistic information, some new aggregation operators are defined, including the hesitant 2-tuple correlated averaging operator, the hesitant 2-tuple correlated geometric operator and the generalized hesitant 2-tuple correlated averaging operator. These proposed operators successfully manage the correlations among the elements. After …