Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (6)
- Information Security (6)
- Systems Architecture (5)
- Computer Engineering (4)
- Numerical Analysis and Scientific Computing (4)
-
- Digital Communications and Networking (3)
- Graphics and Human Computer Interfaces (3)
- Theory and Algorithms (3)
- Artificial Intelligence and Robotics (2)
- Civil and Environmental Engineering (2)
- Computer and Systems Architecture (2)
- Data Storage Systems (2)
- OS and Networks (2)
- Programming Languages and Compilers (2)
- Software Engineering (2)
- Transportation Engineering (2)
- Bioinformatics (1)
- Categorical Data Analysis (1)
- Civil Engineering (1)
- Data Science (1)
- Development Studies (1)
- Electrical and Computer Engineering (1)
- Health Services Research (1)
- Industrial Engineering (1)
- Industrial Technology (1)
- Life Sciences (1)
- Medicine and Health Sciences (1)
- Keyword
-
- Algorithmic fairness (2)
- Cybersecurity (2)
- Machine learning (2)
- Academia (1)
- Algorithms (1)
-
- Asset (1)
- Attribute Based Encryption (1)
- Bias (1)
- Bioinformatics (1)
- Blockchain (1)
- Chosen plaintext attack (CPA) (1)
- Cloud-Assisted Systems (1)
- Computer Vision (1)
- Consumer health vocabulary (1)
- DNS Tunneling (1)
- DNS-based attacks (1)
- Data Collection (1)
- Data Integrity (1)
- Data analysis (1)
- Data privacy (1)
- Data recovery (1)
- Decentralized Authentication (1)
- Deep Learning (1)
- Demographic profiles (1)
- Demographics (1)
- Differential privacy (1)
- Diversity ranking (1)
- Equity (1)
- Expertise models (1)
- Experts (1)
Articles 1 - 12 of 12
Full-Text Articles in Databases and Information Systems
Fair And Diverse Group Formation Based On Multidimensional Features, Mohammed Saad A Alqahtani
Fair And Diverse Group Formation Based On Multidimensional Features, Mohammed Saad A Alqahtani
Graduate Theses and Dissertations
The goal of group formation is to build a team to accomplish a specific task. Algorithms are being developed to improve the team's effectiveness so formed and the efficiency of the group selection process. However, there is concern that team formation algorithms could be biased against minorities due to the algorithms themselves or the data on which they are trained. Hence, it is essential to build fair team formation systems that incorporate demographic information into the process of building the group. Although there has been extensive work on modeling individuals’ expertise for expert recommendation and/or team formation, there has been …
Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley
Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley
Graduate Theses and Dissertations
Identifying freight patterns in transit is a common need among commercial and municipal entities. For example, the allocation of resources among Departments of Transportation is often predicated on an understanding of freight patterns along major highways. There exist multiple sensor systems to detect and count vehicles at areas of interest. Many of these sensors are limited in their ability to detect more specific features of vehicles in traffic or are unable to perform well in adverse weather conditions. Despite this limitation, to date there is little comparative analysis among Laser Imaging and Detection and Ranging (LIDAR) sensors for freight detection …
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Graduate Theses and Dissertations
The advancement of information technology in coming years will bring significant changes to the way sensitive data is processed. But the volume of generated data is rapidly growing worldwide. Technologies such as cloud computing, fog computing, and the Internet of things (IoT) will offer business service providers and consumers opportunities to obtain effective and efficient services as well as enhance their experiences and services; increased availability and higher-quality services via real-time data processing augment the potential for technology to add value to everyday experiences. This improves human life quality and easiness. As promising as these technological innovations, they are prone …
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Graduate Theses and Dissertations
Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Graduate Theses and Dissertations
Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.
Cloud computing has become more and more popular in …
A Machine Learning Approach To Understanding Emerging Markets, Namita Balani
A Machine Learning Approach To Understanding Emerging Markets, Namita Balani
Graduate Theses and Dissertations
Logistic providers have learned to efficiently serve their existing customer bases with optimized routes and transportation resource allocation. The problem arises when there is potential for logistics growth in an emerging market with no previous data. The purpose of this work is to use industry data for previously known and well-documented markets to apply data analytic techniques such as machine learning to investigate the uncertainty in a new market. The thesis looks into machine learning techniques to predict miles per stop given historical data. It mainly focuses on Random Forest Regression Analysis, but concludes that additional techniques, such as Polynomial …
Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri
Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri
Graduate Theses and Dissertations
As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Graduate Theses and Dissertations
Individuals and organizations rely on the Internet as an essential environment for personal or business transactions. However, individuals and organizations have been primary targets for attacks that steal sensitive data. Adversaries can use different approaches to hide their activities inside the compromised network and communicate covertly between the malicious servers and the victims. The domain name system (DNS) protocol is one of these approaches that adversaries use to transfer stolen data outside the organization's network using various forms of DNS tunneling attacks. The main reason for targeting the DNS protocol is because DNS is available in almost every network, ignored, …
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Graduate Theses and Dissertations
Machine learning algorithms are used to make decisions in various applications, such as recruiting, lending and policing. These algorithms rely on large amounts of sensitive individual information to work properly. Hence, there are sociological concerns about machine learning algorithms on matters like privacy and fairness. Currently, many studies only focus on protecting individual privacy or ensuring fairness of algorithms separately without taking consideration of their connection. However, there are new challenges arising in privacy preserving and fairness-aware machine learning. On one hand, there is fairness within the private model, i.e., how to meet both privacy and fairness requirements simultaneously in …
Characteristic Reassignment For Hardware Trojan Detection, Noah Waller
Characteristic Reassignment For Hardware Trojan Detection, Noah Waller
Graduate Theses and Dissertations
With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. However, the use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers. A core threat posed by Hardware Trojans is the difficulty in detecting such malicious insertions/alternations in order to prevent the damage. This thesis work provides major improvements on a soft IP analysis methodology and tool known as the Structural Checking tool, which analyzes Register-Transfer Level (RTL) soft IPs for determining their functionalities and screening for hardware Trojans. This is done by breaking down …
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Graduate Theses and Dissertations
Mashup application development is becoming a widespread software development practice due to its appeal for a shorter application development period. Application developers usually use web APIs from different sources to create a new streamlined service and provide various features to end-users. This kind of practice saves time, ensures reliability, accuracy, and security in the developed applications. Mashup application developers integrate these available APIs into their applications. Still, they have to go through thousands of available web APIs and chose only a few appropriate ones for their application. Recommending relevant web APIs might help application developers in this situation. However, very …
An Automated Method To Enrich And Expand Consumer Health Vocabularies Using Glove Word Embeddings, Mohammed Ibrahim
An Automated Method To Enrich And Expand Consumer Health Vocabularies Using Glove Word Embeddings, Mohammed Ibrahim
Graduate Theses and Dissertations
Clear language makes communication easier between any two parties. However, a layman may have difficulty communicating with a professional due to not understanding the specialized terms common to the domain. In healthcare, it is rare to find a layman knowledgeable in medical jargon, which can lead to poor understanding of their condition and/or treatment. To bridge this gap, several professional vocabularies and ontologies have been created to map laymen medical terms to professional medical terms and vice versa. Many of the presented vocabularies are built manually or semi-automatically requiring large investments of time and human effort and consequently the slow …