“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists,
2010
Macquarie University
“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists, Robyn Torok
Australian Counter Terrorism Conference
As a consequence of the war on terror, al-Qaeda and associated jihad groups have evolved and made increasing use of internet technologies for cyber recruitment. Recently, there has been an increasing focus on recruiting home grown terrorists who can more easily escape the scrutiny of cross border entries. Case study analysis indicates that links do exist between cyber tools, radicalisation and terrorism, however, the strength and nature of these relationships is generally unclear. Evidence does seem to support that cyber tools are most significant in the initial phases of recruitment and radicalisation. Coupled with this is the strong evolution of …
National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting,
2010
Edith Cowan University
National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, Craig Harmes
Australian Security and Intelligence Conference
Within the National Security domain there is a convergence of security responsibility across the national security agencies, law enforcement and private security sectors. The sensitivity of this environment requires individuals operating in the domain to be honest, trustworthy and loyal. Personnel vetting is a formal process used to determine an individual’s suitability for access to this domain. Notwithstanding this process, significant breaches of trust, security, and corruption still occur. In psychology, resilience is a well researched phenomenon that is considered a multidimensional construct where individual attributes, family aspects and social environment interact in aiding individuals to deal with vulnerability. There …
Defining The Security Professional: Definition Through A Body Of Knowledge,
2010
Edith Cowan University
Defining The Security Professional: Definition Through A Body Of Knowledge, Mel Griffiths, David J. Brooks, Jeffrey Corkill
Australian Security and Intelligence Conference
A subject that eludes a consensus definition, security is an amalgam of disciplines that is moving inexorably towards professionalisation. Yet identifying who or what defines a security professional remains as difficult and elusory as a comprehensive definition of security that captures all of its modern facets and many actors. The view of elevating such a discipline as security to the status of a profession provokes polarised opinions. This article reviews the literature, examining what elements identify a security professional and exploring the significant themes and issues. To support these elements, security experts (n=27) were surveyed using a multidimensional scaling technique …
A Clustering Comparison Measure Using Density Profiles And Its Application To The Discovery Of Alternate Clusterings,
2010
Wright State University - Main Campus
A Clustering Comparison Measure Using Density Profiles And Its Application To The Discovery Of Alternate Clusterings, Eric Bae, James Bailey, Guozhu Dong
Kno.e.sis Publications
Data clustering is a fundamental and very popular method of data analysis. Its subjective nature, however, means that different clustering algorithms or different parameter settings can produce widely varying and sometimes conflicting results. This has led to the use of clustering comparison measures to quantify the degree of similarity between alternative clusterings. Existing measures, though, can be limited in their ability to assess similarity and sometimes generate unintuitive results. They also cannot be applied to compare clusterings which contain different data points, an activity which is important for scenarios such as data stream analysis. In this paper, we introduce a …
Digitally Optimizing "Smart" Photovoltaics,
2010
University of Alabama in Huntsville
Digitally Optimizing "Smart" Photovoltaics, Nicholas M. Christensen
Von Braun Symposium Student Posters
No abstract provided.
Program Transformations For Information Personalization,
2010
University of Dayton
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Computer Science Faculty Publications
Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …
Stockmarket Trading Using Fundamental Variables And Neural Networks,
2010
Bond University
Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Tobias Hahn
This paper uses a neural network methodology developed by Vanstone & Finnie[1] to develop a successful stockmarket trading system. The approach is based on these same 4 fundamental variables used within the Aby et al. fundamental trading strategies [2, 3], and demonstrates the important role neural networks have to play within complex and noisy environments, such as that provided by the stockmarket.
Stockmarket Trading Using Fundamental Variables And Neural Networks,
2010
Bond University
Stockmarket Trading Using Fundamental Variables And Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Bruce Vanstone
This paper uses a neural network methodology developed by Vanstone & Finnie[1] to develop a successful stockmarket trading system. The approach is based on these same 4 fundamental variables used within the Aby et al. fundamental trading strategies [2, 3], and demonstrates the important role neural networks have to play within complex and noisy environments, such as that provided by the stockmarket.
Cloud Computing:Strategies For Cloud Computing Adoption,
2010
Technological University Dublin
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Dissertations
The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.
Although, the adoption …
A Comparative Study Of Threshold-Based Feature Selection Techniques,
2010
Western Kentucky University
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
Dr. Huanjing Wang
Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …
A Comparative Study Of Filter-Based Feature Ranking Techniques,
2010
Western Kentucky University
A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao
Dr. Huanjing Wang
One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feature ranking techniques, a commonly used method is to assess the classification performance of models built with the respective selected feature subsets in terms of a given performance metric (e.g., classification accuracy or misclassification rate). Since a given performance metric usually can …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis,
2010
University of Dayton
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
MIS/OM/DS Faculty Publications
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
A Comparative Study Of Filter-Based Feature Ranking Techniques,
2010
Western Kentucky University
A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao
Computer Science Faculty Publications
One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feature ranking techniques, a commonly used method is to assess the classification performance of models built with the respective selected feature subsets in terms of a given performance metric (e.g., classification accuracy or misclassification rate). Since a given performance metric usually can …
A Comparative Study Of Threshold-Based Feature Selection Techniques,
2010
Western Kentucky University
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
Computer Science Faculty Publications
Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …
Bringing Geospatial Technology (Gis) To The Curriculum,
2010
Seidenberg School of CSIS, Pace University
Bringing Geospatial Technology (Gis) To The Curriculum, Daniel Farkas, Roy Girasa, Joseph F. Ryan, Martha Kelly, Medaline Philbert
Cornerstone 3 Reports : Interdisciplinary Informatics
Geographic Information Systems utilize data that has location information associated with it – a location such as an address or latitude and longitude. This leads to the ability to solve problems with an underlying spatial focus. Whether real-time sensing of scientific data, conducting market analysis, understanding socio-economic population trends, conducting epidemiological studies, or teaching kids how to better understand their world, GIS systems provide a unique way for students, faculty, researchers, and professionals from a variety of disciplines to understand, analyze, and visualize data in different ways.
Measurement And Interpolation Of Sea Surface Temperature And Salinity In The Tropical Pacific: A 9,000 Nautical Mile Research Odyssey,
2010
California Polytechnic State University, San Luis Obispo
Measurement And Interpolation Of Sea Surface Temperature And Salinity In The Tropical Pacific: A 9,000 Nautical Mile Research Odyssey, Amber Brooks
Earth and Soil Sciences
The purpose of this project was to compare spline and inverse distance weighting interpolation tools on data collected in the tropical Pacific Ocean by ship and data from a global network of CTD floats, known as Argo floats (fig.1), to provide evidence that technological advancement and integration is aiding our understanding of the ocean-atmosphere system of planet Earth. Thirty-one sea surface temperature and salinity samples were manually taken across a 9,000 nautical mile trek of the Pacific Ocean for the months of April, May and June 2008. Argo ASCII globally gridded monthly averaged sea surface temperature and salinity data, from …
Engaging Students In Real-Life Data And Network Security Assessment Of Pace Computing Environment,
2010
Pace University
Engaging Students In Real-Life Data And Network Security Assessment Of Pace Computing Environment, Narayan Murthy, Ravi Ravishanker
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Updating The Laboratory Notebook: Electronic Documentation Software In Teaching And Research,
2010
Dyson College, Pace University
Updating The Laboratory Notebook: Electronic Documentation Software In Teaching And Research, Zhaohua Dai, Dan Strahs
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Re-Solving Stochastic Programming Models For Airline Revenue Management,
2010
University of Dayton
Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello
MIS/OM/DS Faculty Publications
We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model proposed in the literature. The approach we study consists of solving a sequence of two-stage stochastic programs with simple recourse, which can be viewed as an approximation to a multi-stage stochastic programming formulation to the seat allocation problem. Our theoretical results show that the proposed approximation is robust, in the sense that solving more successive two-stage programs can never worsen the expected revenue obtained with the corresponding allocation policy. Although intuitive, such a property is known not …
Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing,
2010
California Polytechnic State University - San Luis Obispo
Optimization Of P3ht-Pcbm Polymer Solar Cells Through Device Simulation And Manufacturing, James Boom
Computer Engineering
Given a good model and implementation of that model, computer simulation can be used to reduce the time and material costs of research. To this end I worked with other students to manufacture, test and simulate the single layer P3HT-PCBM solar cell. Using the data collected from this project, future work can then be done with the project's simulator to further optimize these types of solar cell devices.