Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Dayton (30)
- Selected Works (26)
- Dakota State University (10)
- Western University (10)
- University of South Alabama (5)
-
- California State University, San Bernardino (3)
- Chapman University (3)
- Florida International University (3)
- California Polytechnic State University, San Luis Obispo (2)
- City University of New York (CUNY) (2)
- Kennesaw State University (2)
- Michigan Technological University (2)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (2)
- Montclair State University (2)
- San Jose State University (2)
- University of Nebraska - Lincoln (2)
- University of Tennessee, Knoxville (2)
- American University in Cairo (1)
- Eastern Washington University (1)
- Georgia Southern University (1)
- Harrisburg University of Science and Technology (1)
- Liberty University (1)
- Louisiana State University (1)
- Southern Methodist University (1)
- Technological University Dublin (1)
- University of Alabama in Huntsville (1)
- University of Minnesota Law School (1)
- University of Montana (1)
- University of Nebraska at Omaha (1)
- University of Tennessee Health Science Center (1)
- Keyword
-
- Out-of-turn interaction (7)
- IoT (6)
- Navigation (5)
- Analytical models (4)
- Delay (4)
-
- Hierarchical hypermedia (4)
- Information Retrieval (4)
- Information personalization (4)
- Internet of Things (4)
- Probability (4)
- Website transformation (4)
- Automated Telephone Services (ATS) (3)
- Automatic Speech Recognition (ASR) (3)
- Cloud Computing (3)
- Computer Security (3)
- Computer science (3)
- Deep Learning (3)
- Interactive Voice-Response systems (IVRs) (3)
- Mixed-initiative interaction (3)
- Security (3)
- Speech user interfaces (3)
- Usability. (3)
- User studies (3)
- Accuracy (2)
- Age-based selection (2)
- Age-proportional graphs (2)
- Algorithm design and analysis (2)
- Arbitrary age-biased neighbor-selection algorithm (2)
- Botnet proliferation (2)
- Bro (2)
- Publication Year
- Publication
-
- Computer Science Faculty Publications (28)
- Saverio Perugini (18)
- Masters Theses & Doctoral Dissertations (8)
- Electronic Thesis and Dissertation Repository (7)
- Zhongmei Yao (4)
-
- <strong> Theses and Dissertations </strong> (3)
- Electronic Theses, Projects, and Dissertations (3)
- FIU Electronic Theses and Dissertations (3)
- John Christian Smith (3)
- Bulletin of TUIT: Management and Communication Technologies (2)
- Computer Science Working Papers (2)
- Department of Computer Science Faculty Scholarship and Creative Works (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electrical and Computer Engineering Publications (2)
- Engineering Faculty Articles and Research (2)
- Master's Projects (2)
- Research & Publications (2)
- Computational and Data Sciences Theses (1)
- Computer Science and Software Engineering (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations (1)
- EWU Masters Thesis Collection (1)
- Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- Honors Theses (1)
- LSU Master's Theses (1)
- Library Philosophy and Practice (e-journal) (1)
Articles 31 - 60 of 122
Full-Text Articles in Other Computer Sciences
Building Something With The Raspberry Pi, Richard Kordel
Building Something With The Raspberry Pi, Richard Kordel
Presidential Research Grants
In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”
As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all be permitted …
Multimodal Data Integration For Real-Time Indoor Navigation Using A Smartphone, Yaohua Chang
Multimodal Data Integration For Real-Time Indoor Navigation Using A Smartphone, Yaohua Chang
Dissertations and Theses
We propose an integrated solution of indoor navigation using a smartphone, especially for assisting people with special needs, such as the blind and visually impaired (BVI) individuals. The system consists of three components: hybrid modeling, real-time navigation, and client-server architecture. In the hybrid modeling component, the hybrid model of a building is created region by region and is organized in a graph structure with nodes as destinations and landmarks, and edges as traversal paths between nodes. A Wi-Fi/cellular-data connectivity map, a beacon signal strength map, a 3D visual model (with destinations and landmarks annotated) are collected while a modeler walks …
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo
The African Journal of Information Systems
This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source …
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Electronic Thesis and Dissertation Repository
Internet of Things is a massively growing field where billions of devices are connected to the Internet using different protocols and produce an enormous amount of data. The produced data is consumed and processed by different applications to make operations more efficient. Application development is challenging, especially when applications access sensor data since IoT devices use different communication protocols.
The existing IoT architectures address some of these challenges. This thesis proposes an IoT Middleware that provides applications with the abstraction required of IoT devices while distributing the processing of sensor data to provide a real-time or near real-time response and …
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
Dissertations, Theses, and Capstone Projects
It is a challenging problem for researchers and engineers in the assistive technology (AT) community to provide suitable solutions for visually impaired people (VIPs) through AT to meet orientation, navigation and mobility (ONM) needs. Given the spectrum of assistive technologies currently available for the purposes of aiding VIPs with ONM, our literature review and survey have shown that there is a reluctance to adopt these technological solutions in the VIP community.
Motivated by these findings, we think it critical to re-examine and rethink the approaches that have been taken. It is our belief that we need to take a different …
Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano
Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano
Senior Honors Theses
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a …
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
FIU Electronic Theses and Dissertations
Adversaries leverage social networks to collect sensitive data about regular users and target them with abuse that includes fake news, cyberbullying, malware distribution, and propaganda. Such behavior is more effective when performed by the social network friends of victims. In two preliminary user studies we found that 71 out of 80 participants have at least 1 Facebook friend with whom (1) they never interact, either in Facebook or in real life, or whom they believe is (2) likely to abuse their posted photos or status updates, or (3) post offensive, false or malicious content. Such friend abuse is often considered …
Evaluating The Impacts Of Detecting X.509 Covert Channels, Cody Welu
Evaluating The Impacts Of Detecting X.509 Covert Channels, Cody Welu
Masters Theses & Doctoral Dissertations
This quasi-experimental before-and-after study examined the performance impacts of detecting X.509 covert channels in the Suricata intrusion detection system. Relevant literature and previous studies surrounding covert channels and covert channel detection, X.509 certificates, and intrusion detection system performance were evaluated. This study used Jason Reaves’ X.509 covert channel proof of concept code to generate malicious network traffic for detection (2018). Various detection rules for intrusion detection systems were created to aid in the detection of the X.509 covert channel. The central processing unit (CPU) and memory utilization impacts that each rule had on the intrusion detection system was studied and …
Matching Possible Mitigations To Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner Mcneil
Matching Possible Mitigations To Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner Mcneil
Masters Theses & Doctoral Dissertations
Cyber systems are ubiquitous in all aspects of society. At the same time, breaches to cyber systems continue to be front-page news (Calfas, 2018; Equifax, 2017) and, despite more than a decade of heightened focus on cybersecurity, the threat continues to evolve and grow, costing globally up to $575 billion annually (Center for Strategic and International Studies, 2014; Gosler & Von Thaer, 2013; Microsoft, 2016; Verizon, 2017). To address possible impacts due to cyber threats, information system (IS) stakeholders must assess the risks they face. Following a risk assessment, the next step is to determine mitigations to counter the threats …
The Application Of Cloud Resources To Terrain Data Visualization, Gregory J. Larrick
The Application Of Cloud Resources To Terrain Data Visualization, Gregory J. Larrick
EWU Masters Thesis Collection
In this thesis, the recent trends in cloud computing, via virtual machine hosted servers, are applied to the field of big data visualization. In particular, we investigate the visualization of terrain data acquired from several major open data sets with a graphics library for browser based rendering. Similar terrain data visualization solutions have not fully taken advantage of remote computational resources. In this thesis, we show that, by using a collection of Amazon EC-2 machines for fetching and decoding of terrain data, in conjunction with modern graphics libraries, three dimensional terrain information may be viewed and interacted with by many …
Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald, Daniel W. Engels
Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald, Daniel W. Engels
SMU Data Science Review
Payment cards (e.g., credit and debit cards) are the most frequent form of payment in use today. A payment card transaction entails many verification information exchanges between the cardholder, merchant, issuing bank, a merchant bank, and third-party payment card processors. Today, a record of the payment transaction often records to multiple ledgers. Merchant’s incur fees for both accepting and processing payment cards. The payment card industry is in dire need of technology which removes the need for third-party verification and records transaction details to a single tamper-resistant digital ledger. The private blockchain is that technology. Private blockchain provides a linked …
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …
Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang
Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang
Department of Computer Science Faculty Scholarship and Creative Works
As the underlying infrastructure of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many applications. Network coding is a technique in WSNs to combine multiple channels of data in one transmission, wherever possible, to save node’s energy as well as increase the network throughput. So far most works on network coding are based on two assumptions to determine coding opportunities: (1) All the links in the network have the same transmission success rate; (2) Each link is bidirectional, and has the same transmission success rate on both ways. However, these assumptions may not be …
Custom T-Shirt Designs, Ranjan Khadka
Custom T-Shirt Designs, Ranjan Khadka
Electronic Theses, Projects, and Dissertations
Custom T-shirt Designs is a web-based application. The purpose of this project is to provide a website that would allow customers to be able to customize T-shirt and place an order of custom T-shirt. Customers can sign up, sign in, select T-shirt color, add text, choose Font, choose Font color, upload an image, apply filters to images, transform text or images, choose T-shirt size and save designs for future references. Customers would be able to add the design to a cart, manage cart and checkout with their credit card to purchase for the order and view their previous orders. The …
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
Research & Publications
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate our approach using the Eucalyptus cloud computing infrastructure where we observe a 100 percent detection rate for abnormal login events and data copies to outside systems.
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Electronic Thesis and Dissertation Repository
More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models being …
The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson
The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson
Political Science Publications
Game theory is used to rationally and dispassionately examine the strategic behaviour of nations, especially superpower behaviour. This article explains how basic game theory - at its simplest level - was used by Anatol Rapoport to generate ideas about how to enhance world peace. Rapoport was at the forefront of the game theoreticians who sought to conceptualize strategies that could promote international cooperation. Accordingly, the basic logic of game theory is explained using the game models of ‘Chicken’ and ‘Prisoner’s Dilemma’. These models were used by Rapoport in his books and lectures in simple and complex ways. Then Rapoport’s revolutionary …
Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov
Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov
Master of Science in Computer Science Theses
Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom. Indoor …
User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang
User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang
Saverio Perugini
As detailed in Chap. 1, system implementations for dynamic taxonomies and faceted search allow a wide range of query possibilities on the data. Only when these are made accessible by appropriate user interfaces, the resulting applications can support a variety of search, browsing and analysis tasks. User interface design in this area is confronted with specific challenges. This chapter presents an overview of both established and novel principles and solutions.
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Saverio Perugini
Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
Saverio Perugini
We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …
Users Acceptance Of Health Behavioral Change Support Systems, Mohammad Al-Ramahi, Insu Park, Jun Liu
Users Acceptance Of Health Behavioral Change Support Systems, Mohammad Al-Ramahi, Insu Park, Jun Liu
Research & Publications
Behavioral Change Support Systems (BCSSs) is a socio-technical information systems with psychological and behavioral outcomes aim to change users’ behavior and lifestyle. The promising outcomes of BCSSs make them especially useful in certain areas such as healthcare, where these systems could be leveraged to motivate people toward healthy behavior and then help them to achieve their goals better. However, health BCSSs cannot help facilitate self-monitoring and self-management or even improve patients’ health outcomes when patients do not accept the technology first. In this article, we extend the existing literature of users’ acceptance of health BCSSs by introducing new variables that …
Chillisource Game Engine Particle System Study, Angela Gross
Chillisource Game Engine Particle System Study, Angela Gross
Graduate Student Theses, Dissertations, & Professional Papers
The majority of modern game engines utilize intricate objects called particle systems which are a collection of many particles that together represent an object without well-defined surfaces. This thesis discusses the results of studying and stressing particle systems within ChilliSource, an open-source game engine written in C++, with the goal of understanding a complex system and exploring possible optimizations that could be made to it. The studies performed were driven by metrics generated with custom profiling classes that kept track of things like the number of particles rendered, how long the engine spent rendering particles, or even how long a …
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
Computer Science Faculty Publications
We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …
Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz
Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz
Electrical and Computer Engineering Publications
The demand for knowledge extraction has been increasing. With the growing amount of data being generated by global data sources (e.g., social media and mobile apps) and the popularization of context-specific data (e.g., the Internet of Things), companies and researchers need to connect all these data and extract valuable information. Machine learning has been gaining much attention in data mining, leveraging the birth of new solutions. This paper proposes an architecture to create a flexible and scalable machine learning as a service. An open source solution was implemented and presented. As a case study, a forecast of electricity demand was …
Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel
Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel
Computer Science Faculty Publications
Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him- or herself. In the field of speech language pathology, the approach of VSM has been successfully used for treatment of language in children with Autism and in individuals with fluency disorder of stuttering. Technical challenges remain in creating VSM contents that depict previously unseen behaviors. In this paper, we propose a novel system that synthesizes new video sequences for VSM treatment of patients with voice disorders. Starting with a video recording of a voice-disorder patient, the proposed …
Metalogic Notes, Saverio Perugini
Metalogic Notes, Saverio Perugini
Saverio Perugini
A collection of notes, formulas, theorems, postulates and terminology in symbolic logic, syntactic notions, semantic notions, linkages between syntax and semantics, soundness and completeness, quantified logic, first-order theories, Goedel's First Incompleteness Theorem and more.
Statistics Notes, Saverio Perugini
Statistics Notes, Saverio Perugini
Saverio Perugini
A collection of terms, definitions, formulas and explanations about statistics.
An Open Source Advertisement Server, Pushkar Umaranikar
An Open Source Advertisement Server, Pushkar Umaranikar
Master's Projects
This report describes a new online advertisement system and its implementation for the Yioop open source search engine. This system was implemented for my CS298 project. It supports both selling advertisements and displaying them within search results. The selling of advertisement is done using a novel auction system, which we describe in this paper. With this auction system, it is possible to create an advertisement, attach keywords to it, and add it to the advertisement inventory. An advertisement is displayed on a search results page if the search keyword matches the keywords attached to the advertisement. Display of advertisements is …
Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua
Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua
Computer Science Faculty Publications
There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by the big file size of video data and fixed bandwidth allocation in constant routing paths. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select …