Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo Dec 2015

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo

Faculty and Research Publications

New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …


Informing And Performing: A Study Comparingadaptive Learning To Traditional Learning, Meg Coffin Murray, Jorge Perez Jul 2015

Informing And Performing: A Study Comparingadaptive Learning To Traditional Learning, Meg Coffin Murray, Jorge Perez

Faculty and Research Publications

Technology has transformed education, perhaps most evidently in course delivery options. However, compelling questions remain about how technology impacts learning. Adaptive learning tools are technology-based artifacts that interact with learners and vary presentation based upon that interaction. This study examines completion rates and exercise scores for students assigned adaptive learning exercises and compares them to completion rates and quiz scores for students assigned objective-type quizzes in a university digital literacy course. Current research explores the hypothesis that adapting instruction to an individual’s learning style results in better learning outcomes. Computer technology has long been seen as an answer to the …


Mobile Phishing Attacks And Mitigation Techniques, Hossain Shahriar, Tulin Klintic, Victor Clincy Jun 2015

Mobile Phishing Attacks And Mitigation Techniques, Hossain Shahriar, Tulin Klintic, Victor Clincy

Faculty and Research Publications

Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to trick users into entering their credentials in fake websites or fake mobile applications. This paper discusses various phishing attacks using mobile …


A Comparative Study Of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, Victor Clincy Jan 2015

A Comparative Study Of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, Victor Clincy

Faculty and Research Publications

Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only various fields that can be forged by hackers or malicious users, but also the flexibility of composing, editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications. Towards this direction, a number …