Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2019

Conference

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 92

Full-Text Articles in Physical Sciences and Mathematics

Generating Contextual Text Embeddings For Emergency Department Chief Complaints Using Bert, David Chang Dec 2019

Generating Contextual Text Embeddings For Emergency Department Chief Complaints Using Bert, David Chang

Yale Day of Data

We applied BERT, a state-of-the-art natural language processing model, on chief complaint data from the Yale Emergency Department to map free-text notes to structured chief complaint categories.


Internet Searching Behaviors Of Low Literacy Breast Cancer Survivors, Francisco D. Iacobelli, Ginger L. Dragon, Giselle Mazur, Judy Guitelman Nov 2019

Internet Searching Behaviors Of Low Literacy Breast Cancer Survivors, Francisco D. Iacobelli, Ginger L. Dragon, Giselle Mazur, Judy Guitelman

Faculty Research and Creative Activities Symposium

Internet searching is a popular tool for patients to find health-related information. However, low literacy individuals are at a disadvantage with respect to their ability to evaluate online health information. When using common web search engines to find health information, behaviors such as misspelling, misappropriation of words and incomplete search queries can result in inadequate results and misleading information. The goal of this research is to understand the search strategies and common mistakes that low-literacy Latina breast cancer survivors exhibit when searching for information online in order to inform future information seeking interfaces. To explore search behaviors online we asked …


Integrating Problem Solving, Coding, Mathematics, And Pedagogy, John F. Erickson Nov 2019

Integrating Problem Solving, Coding, Mathematics, And Pedagogy, John F. Erickson

Faculty Research and Creative Activities Symposium

We present a case study illustrating an integrated approach to the teaching of problem solving, computation, and mathematics. This approach combines ideas from Polya, Ross, and Moore about mathematical pedagogy with a heavy dose of computer assisted calculation in the spirit of experimental mathematics facilitated by the rapid prototyping environment of Mathematica which is ideal for an exploratory approach to learning. Essentially, students learn math and programming the same way mathematicians do research and we believe that this can scale all the way from grammar school to graduate school. To be more specific, we start with an elementary recreational math …


Guiding Us Throughout A Sea Of Data - A Survey On Recommender Systems And Its Privacy Challenges, Xiwei Wang, Marcelo O. Sztainberg Nov 2019

Guiding Us Throughout A Sea Of Data - A Survey On Recommender Systems And Its Privacy Challenges, Xiwei Wang, Marcelo O. Sztainberg

Faculty Research and Creative Activities Symposium

Over the past decades, the Internet has served as the backbone connecting people to others, places and things. With the sheer volume of information generated everyday, people can feel overwhelmed when having to make a selection among the multiple options that normally come up after a search or application request. For example, when searching for news articles regarding a particular topic, the search engine will present a number of results to you. When looking for some product on shopping websites, there are usually several pages of results that match the keywords. It can be very challenging for people to find …


Redundancy Effect Of Vehicular Cloud’S Environment Using Location Estimate (Revise), Mohamed El-Tawab, Samy El-Tawab, M. Hossain Heydari Nov 2019

Redundancy Effect Of Vehicular Cloud’S Environment Using Location Estimate (Revise), Mohamed El-Tawab, Samy El-Tawab, M. Hossain Heydari

Showcase of Graduate Student Scholarship and Creative Activities

The rapid growth of modern wireless technology increases the invention of new applications using the concept of Internet of Things (IoT). Vehicular Cloud, which is a concept introduced recently to use the vehicles sitting idle for hours as a processing devices, has been a hot topic. This subject became more popular after the Department of Transportation’s (DOT) announcement of mandatory wireless capabilities of each vehicle since 2015. We investigate the idea of benefiting from the unused processing power of vehicles sitting in parking lots for a long period of time (e.g. an airport, or train station). Moreover, researchers propose the …


An Extensible Geospatial Data Framework (Geoedf) For Fair Science, Carol Song, Rajesh Kalyanam, Lan Zhao Nov 2019

An Extensible Geospatial Data Framework (Geoedf) For Fair Science, Carol Song, Rajesh Kalyanam, Lan Zhao

Purdue GIS Day

The growing urgency in dealing with the 21st century’s grand challenges associated with increasing population, food and water security, frequently occurring natural disasters, and changing climate demands innovative, collaborative, and multidisciplinary solutions for sustainability and resilience. However, scientific data, especially geospatial data, presents significant barriers to the effective access, use and sharing of data as they come in large volumes, from different sources, and with widely varying formats, resolutions, or annotation schemas that can differ among disciplines or even research groups. This presentation describes a recently funded NSF CSSI project to develop an open source, extensible geospatial data framework (GeoEDF), …


Read And Publish: What Can Libraries Expect?, Josh Horowitz Oct 2019

Read And Publish: What Can Libraries Expect?, Josh Horowitz

Charleston Library Conference

The author provides a publisher's perspective on the challenges and opportunities faced by a mid-sized society in navigating the current transition to open access licensing models.


Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing Oct 2019

Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing

Charleston Library Conference

The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …


Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi Oct 2019

Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi

UBT International Conference

Protocols that govern wireless security WPA2/WPA have been proven much more secure in comparison to their predecessor WEP. However, the human factor jeopardizes the solidity of cryptography by implementing passwords consisting of programmatically predictable numerical structures such as 1234512345, 11114444, 999888777 and so on. This practice endangers the security of the WPA protocol in particular, as the locally stored WPA handshake can be attacked for an unlimited number of times using brute-force attacks. The methods presented in this paper are effective in decrypting such passwords within seconds using ordinary processor power. The prevalence of this vulnerable practice in the Prishtina …


Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi Oct 2019

Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi

UBT International Conference

As 5G era is approaching fast and pre-commercial 5G tests and trials are happening everywhere around the world, one of the key challenges for carriers and 5G providers is to maintain and operate the network complexity required to meet diverse services and personalized user experience requirements. This maintenance and operation have to be smarter and more agile in 5G than it was in previous generations. AI and ML can be leveraged in this case to ease 5G complexity and at the same time enhance the intelligent connectivity between diverse devices and diverse tiny end points, e.g. IoT sensors.

Machine learning …


Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad Oct 2019

Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad

UBT International Conference

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typotolerant password checkers, which improve usability at no security cost but are technically complex. We look at the more general problem of computing an edit distance between two strings without having direct access to those strings — by storing the equivalent of a hash. We propose a simpler algorithm for this problem that is asymptotically quasi-optimal in both bits stored and exchanged, at the cost of more computation on the server.


Establishing An Analytics Capability Within Hr, Rizwan Khan Oct 2019

Establishing An Analytics Capability Within Hr, Rizwan Khan

River Cities Industrial and Organizational Psychology Conference

With advancements in technology, HR finally has the tools available to collect and process people data. But is that all that is needed to successfully implement and sustain an analytics capability within HR? The purpose of this presentation/tutorial is to demonstrate a realistic journey The AES Corporation has taken thus far in developing its People Analytics capability. A framework for the implementation of People Analytics will be presented which incorporates themes in I/O Psychology that have been incorporated into the framework such as goal setting theory, job analysis, and change management. How this framework is operationalized will also be demonstrated …


How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni Oct 2019

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni

UBT International Conference

The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …


Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka Oct 2019

Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka

UBT International Conference

Linear operators occupy an important place in functional analysis and linear algebra, which are among the most important and substantive disciplines of mathematics, whose methods and results have created an indispensable apparatus for the development of numerical mathematics, theory of approximations, equations differential and especially mathematical physics and applied mathematics. Also, linear operators are a central object of study in vector space theory.

A linear operator is a function which satisfies the conditions of additivity and homogeneity. Not every function is linear operators. We will try to explore some functions which are also linear operators.


Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati Oct 2019

Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati

UBT International Conference

Biometrics is evolving every day more and more in technical sense and consequently faces with further challenges that become sharper. One of these challenges of is gender recognition that finds very important and key applications. In this paper, we consider the gender recognition process implemented through the Cosfire filter applied through Viola-Jones algorithm and simulated through the Matlab platform. Objective of this paper is improving the execution of gender recognition. The database contains 237 images of 128 to 128 pixels, where 128 are males and 109 are females. For each of them, gender recognition is performed by applying current and …


An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski Oct 2019

An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski

UBT International Conference

Banks are harnessing the power of Big Data. They use Big Data and Data Science to drive change towards data and analytics to gain an overall competitive advantage. The Big Data has potential to transform enterprise operations and processes especially in the banking sector, because they have huge amount of transaction data. The goal of this paper is to give an overview of different approaches and challenges that exists in Big Data in banking sector. The work presented here will fulfill the gap of research papers in the last five years, with focus on Big Data in central banks and …


Semantic Web Technologies, Dukagjin Hyseni Oct 2019

Semantic Web Technologies, Dukagjin Hyseni

UBT International Conference

This study attempts to highlight the great importance of developing Semantic Web as one of the best discovery of better data management and presentation within the WWW. Since the W3C's was discovered, initially providing classic web content as web 1.0 that had link / hyperlink of document`s location, then web 2.0 as web-applications have more advanced technologies to connect data, and finally semantic web as extension of web 3.0 also known as Linked Data. The results show that in addition to the rapid development of the Semantic Web, the demand to use its features by data publishers and data readers …


Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri Oct 2019

Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri

UBT International Conference

A financial institution is an institution that conducts financial transactions, such as depositing money, taking out loans and/or exchanging currencies. Systems used by them like any other system tend to skew old, but, the replacement and integration of these systems is a difficult due to the heterogeneous nature. Due to this it is imperative to consider alternative infrastructure such as SOA (service-oriented architecture), which is seen as the best technology for internal and external interfaces, resulting cost reductions associated with its deployment; combined with standardized protocols, and increased interoperability among IT infrastructures. Studies shows that this flexible architecture will encourage …


International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt Oct 2019

International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 8th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull Oct 2019

Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull

Bucknell University Digital Scholarship Conference

Interdisciplinary collaboration between two faculty members in the humanities and computer science, a research librarian, and an undergraduate student has led to remarkable results in an ongoing international DH research project that has at its core 18th century manuscripts. The corpus stems from a vast collection of archival materials held by the Moravian Church in the UK, Germany, and the US. The number of pages to be transcribed, differences in handwriting styles, paper quality, and original language pose enormous problems for the feasibility of human transcription. This presentation will review the hypothesis, process, and findings of a summer research project …


Internet Core Functions: Security Today And Future State, Jeffrey Jones Oct 2019

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley Oct 2019

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.