Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 12 of 12

Full-Text Articles in Databases and Information Systems

Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho Dec 2020

Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho

Master's Projects

Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …


Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari Oct 2020

Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari

Department of Computer Science Faculty Scholarship and Creative Works

With the rapid growth of smart devices and technological advancements in tracking geospatial data, the demand for Location-Based Services (LBS) is facing a constant rise in several domains, including military, healthcare and transportation. It is a natural step to migrate LBS to a cloud environment to achieve on-demand scalability and increased resiliency. Nonetheless, outsourcing sensitive location data to a third-party cloud provider raises a host of privacy concerns as the data owners have reduced visibility and control over the outsourced data. In this paper, we consider outsourced LBS where users want to retrieve map directions without disclosing their location information. …


Anatomy Of The Edelman: Measuring The World’S Best Analytics Projects, Michael F. Gorman, Lakshminarayana Nittala, Jeffrey M. Aldenb Oct 2020

Anatomy Of The Edelman: Measuring The World’S Best Analytics Projects, Michael F. Gorman, Lakshminarayana Nittala, Jeffrey M. Aldenb

MIS/OM/DS Faculty Publications

Each year, the INFORMS Edelman Award celebrates the best and most impactful implementations of operations research, management science, and analytics. As the Edelman Award approaches its 50-year mark, we provide a history and characterization of the award’s finalists and winners. We provide some basic descriptive analytics about the participating organizations and authors, the impact of their work, and the methods they employed. We also conduct predictive analytics on finalist submissions, gauging contributors to success in establishing winning entries. We find that predicting Edelman winners a priori is extremely difficult; however, given a set of finalists, predictive models based on monetary …


Patterns Of Population Displacement During Mega-Fires In California Detected Using Facebook Disaster Maps, Shenyue Jia, Seung Hee Kim, Son V. Nghiem, Paul Doherty, Menas Kafatos Jul 2020

Patterns Of Population Displacement During Mega-Fires In California Detected Using Facebook Disaster Maps, Shenyue Jia, Seung Hee Kim, Son V. Nghiem, Paul Doherty, Menas Kafatos

Mathematics, Physics, and Computer Science Faculty Articles and Research

The Facebook Disaster Maps (FBDM) work presented here is the first time this platform has been used to provide analysis-ready population change products derived from crowdsourced data targeting disaster relief practices. We evaluate the representativeness of FBDM data using the Mann-Kendall test and emerging hot and cold spots in an anomaly analysis to reveal the trend, magnitude, and agglommeration of population displacement during the Mendocino Complex and Woolsey fires in California, USA. Our results show that the distribution of FBDM pre-crisis users fits well with the total population from different sources. Due to usage habits, the elder population is underrepresented …


An Inventory Of Existing Neuroprivacy Controls, Dustin Steinhagen, Houssain Kettani May 2020

An Inventory Of Existing Neuroprivacy Controls, Dustin Steinhagen, Houssain Kettani

Research & Publications

Brain-Computer Interfaces (BCIs) facilitate communication between brains and computers. As these devices become increasingly popular outside of the medical context, research interest in brain privacy risks and countermeasures has bloomed. Several neuroprivacy threats have been identified in the literature, including brain malware, personal data being contained in collected brainwaves and the inadequacy of legal regimes with regards to neural data protection. Dozens of controls have been proposed or implemented for protecting neuroprivacy, although it has not been immediately apparent what the landscape of neuroprivacy controls consists of. This paper inventories the implemented and proposed neuroprivacy risk mitigation techniques from open …


The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman May 2020

The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman

Seattle Journal of Technology, Environmental & Innovation Law

In 1998, Congress passed the Digital Millennium Copyright Act. This law provided new methods of protecting copyright in online media. These protections shift the normal judicial process that would stop the publication of infringing materials to private actors: the online platforms. As a result, online platforms receive notices of infringement and issue takedowns of allegedly copyrighted works without the judicial process which normally considers the purpose of the original notice of infringement. In at least one case, discussed in detail below, this has resulted in a notice and takedown against an individual for reasons not related to the purpose of …


Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark May 2020

Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark

Electronic Theses and Dissertations

Digital remote sensing and geographic information systems were employed in performing area and volume calculations on glacial landscapes. Characteristics of glaciers from two geographic regions, the Intermountain Region (between the Rocky Mountain and Cascade Ranges) and the Pacific Northwest, were estimated for the years 1985, 2000, and 2015. Glacier National Park was studied for the Intermountain Region whereas Mount Rainier National Park was representative of the glaciers in the Pacific Northwest. Within the thirty year period of the study, the glaciers in Glacier National Park decreased in area by 27.5 percent while those on Mount Rainier only decreased by 5.7 …


Vzwam Web-Based Lookup, Ruben Claudio May 2020

Vzwam Web-Based Lookup, Ruben Claudio

Masters Theses & Doctoral Dissertations

This web-based lookup will allow V employees to find territory sales rep much faster. It will simplify the process and eliminate manual processes.

At the moment, a combination of multiple manual processes is needed to find territory sales reps. The company’s CRM does not allow to find rep sales quickly. When an in-house sales representative is talking to a prospect, this sales rep has to go through a few series of steps to find an outside or territory sales rep --which is usually needed to schedule in-person meetings, that results in delays while doing transactions with the prospects. Besides, because …


Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng Apr 2020

Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng

Department of Computer Science Faculty Scholarship and Creative Works

In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to …


Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos Mar 2020

Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos

Electronic Thesis and Dissertation Repository

Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large-scale adoption is still in its infancy. The relatively recent popularity of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, etc. have been largely ignored or left to future work. This thesis seeks to aid in the adoption of ABAC by filling in …


A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser Mar 2020

A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser

Psychology Faculty Articles and Research

A challenge for data sharing in systems neuroscience is the multitude of different data formats used. Neurodata Without Borders: Neurophysiology 2.0 (NWB:N) has emerged as a standardized data format for the storage of cellular-level data together with meta-data, stimulus information, and behavior. A key next step to facilitate NWB:N adoption is to provide easy to use processing pipelines to import/export data from/to NWB:N. Here, we present a NWB-formatted dataset of 1863 single neurons recorded from the medial temporal lobes of 59 human subjects undergoing intracranial monitoring while they performed a recognition memory task. We provide code to analyze and export/import …


Building Something With The Raspberry Pi, Richard Kordel Jan 2020

Building Something With The Raspberry Pi, Richard Kordel

Presidential Research Grants

In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”

As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all be permitted …