Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, 2024 Lecturers at Department of Computer Sciences Yarmouk University Irbid, Jordan
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.
The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …
Securing Edge Computing: A Hierarchical Iot Service Framework, 2024 Northern Kentucky University
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, 2024 Pace University - New York
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
Reducing Food Scarcity: The Benefits Of Urban Farming, 2023 Brigham Young University
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Data Provenance Via Differential Auditing, 2023 Peng Cheng Laboratory
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Research Collection School Of Computing and Information Systems
With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …
Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, 2023 Education management in Jazan region, Saudi Arabia
Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam Y. Otaif
International Journal for Research in Education
The study aimed to identify the degree of awareness of cybersecurity, and to reveal the reality of digital transformation and the relationship between them from the point of view of the supervisors of the Education Department in the Jazan region. The study followed the descriptive correlative approach, by stratified random sampling (257). a questionnaire was built , The study found that the degree of cybersecurity awareness is high with an arithmetic mean of (3.48), and also degree of awareness of cybersecurity concepts is high, (3,52), and awareness of cybersecurity risks and violations (3.45), and it was found that the total …
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, 2023 University of New Mexico - Main Campus
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda
Electrical and Computer Engineering ETDs
This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …
Building A Benchmark For Industrial Iot Application, 2023 California Polytechnic State University, San Luis Obispo
Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala
College of Engineering Summer Undergraduate Research Program
In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.
In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, 2023 Singapore Management University
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng
Research Collection School Of Computing and Information Systems
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) …
When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, 2023 Singapore Management University
When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Peer-to-Peer (P2P) logistics platforms, unlike traditional last-mile logistics providers, do not have dedicated delivery resources (both vehicles and drivers). Thus, the efficiency of such operating model lies in the successful matching of demand and supply, i.e., how to match the delivery tasks with suitable drivers that will result in successful assignment and completion of the tasks. We consider a Same-Day Delivery Problem (SDDP) involving a P2P logistics platform where new orders arrive dynamically and the platform operator needs to generate a list of recommended orders to the crowdsourced drivers. We formulate this problem as a Dynamic Order Recommendations Problem (DORP). …
Paradigm Review Of Data Localization In India And Its Implications For China, 2023 School of Law, Henan University of Economics and Law, Zhengzhou 450046, China
Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan
Bulletin of Chinese Academy of Sciences (Chinese Version)
Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …
On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, 2023 Law School, Yunnan University, Kunming 650500, China Faculty of Law, University of Fribourg, Fribourg CH1700, Switzerland
On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao
Bulletin of Chinese Academy of Sciences (Chinese Version)
This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …
Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, 2023 School of Management Science and Engineering, Central University of Finance and Economics, Beijing 100081, China
Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …
Design And Analysis Of Content Caching Systems, 2023 University of Massachusetts Amherst
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Doctoral Dissertations
Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …
Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, 2023 Clemson University
Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan
All Theses
Modern HPC applications compute and analyze massive amounts of data. The data volume is growing faster than memory capabilities and storage improvements leading to performance bottlenecks. An example of this is pySDC, a framework for solving collocation problems iteratively using parallel-in-time methods. These methods require storing and exchanging 3D volume data for each parallel point in time. If a simulation consists of M parallel-in-time stages, where the full spatial problem has to be stored for the next iteration, the memory demand for a single state variable is M ×Nx ×Ny ×Nz per time-step. For an application simulation with many state …
Transaction Management Sysyem For A Publisher, 2023 California State University - San Bernardino
Transaction Management Sysyem For A Publisher, Hassain Shareef Mohammed Jr
Electronic Theses, Projects, and Dissertations
Managing the day-to-day operations of a publishing house isn't easy. For example, it's hard to keep track of stocks, manage vendor orders, and maintain transaction records. Our project titled Transaction Management System aims to solve these problems by offering a single tool that helps standardize and digitize publishing operations. It assists in automating and improving the efficiency of the various processes involved in a publishing house. The Transaction Management System is a full-stack web application that can be accessed through an internet browser. The user experience and interface are simple and easy to use so that users can find information …
Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, 2023 Lindenwood University
Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, Naresh Kshetri, Keith Miller, Gaurango Banerjee, Bikesh Raj Upreti
International Journal of Emerging and Disruptive Innovation in Education : VISIONARIUM
Blockchain Technology is a distributed database technology that has emerged as a ground-breaking technology with several possible solutions to critical applications, say from supply chain management, agribusiness, marketing to healthcare industry including internet of medical things. Although it started as a digital coin (popularly known as bitcoin), it is slowly influencing business, marketing policy and society. We have presented an in-depth study and ethical analysis of how blockchain is applied over the economic and financial sector including banks, credit unions and other retail giants. During our research, we have also investigated how blockchain technology can affect financial institutions around the …
An Enhanced Adaptive Learning System Based On Microservice Architecture, 2023 Helwan University
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Risk Assessment Approaches In Banking Sector –A Survey, 2023 Faculty of Commerce and Business Administration, Future University in Egypt, Egypt
Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …
News’ Credibility Detection On Social Media Using Machine Learning Algorithms, 2023 Business Information Systems, Faculty of Commerce and Business Administration, Helwan University, Egypt
News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami
Future Computing and Informatics Journal
Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …