Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 5851 - 5880 of 6720
Full-Text Articles in Physical Sciences and Mathematics
An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan
An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan
International Conference on Information and Communication Technologies
Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …
Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman
Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman
International Conference on Information and Communication Technologies
Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …
Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel
Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel
International Conference on Information and Communication Technologies
Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.
Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan
Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan
International Conference on Information and Communication Technologies
Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …
Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid
Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid
International Conference on Information and Communication Technologies
This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.
A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed
A Comparative Study And Analysis Of Pvm And Mpi For Parallel And Distributed Systems, Dr. Syed Jamal Hussain, Ghufran Ahmed
International Conference on Information and Communication Technologies
Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability represented by these NOWs, various new tools are being developed. Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) have existed on UNIX workstations for some time, and are maturing in their capability for handling Distributed Parallel Processing (DPP). This research is aimed to explore each of these two vehicles for DPP, considering capability, ease of use, and availability, and compares their distinguishing features; and also explores programmer interface and …
Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman
Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman
International Conference on Information and Communication Technologies
The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …
Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali
Poster Session A: Classification Of Compressed Human Face Images By Using Principle Components, Zahid Riaz, Arif Gilgiti, Zulfiqar Ali
International Conference on Information and Communication Technologies
This paper describes the novel approach of classifying the humans on the basis of their compressed face images. The compression of the face images is performed using Discrete Wavelet Transform (DWT). While the classification encompass the use of Principal Components Analysis (PCA). Classification technique utilizes PCA in some different way. Only first principal component is used as feature vector out of 92 components (since image size is 112×92), causing a better results of 87.39%. The Euclidean distance is used as distance metric. In the end our results are compared to our previous research of classifying the uncompressed images.
Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan
Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan
International Conference on Information and Communication Technologies
The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
International Conference on Information and Communication Technologies
The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …
Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum
Poster Session A: Face Recognition Using Sub-Holistic Pca, Muhammad Murtaza Khan, Dr. Muhammad Younus Javed, Muhammad Almas Anjum
International Conference on Information and Communication Technologies
This paper proposes a face recognition scheme that enhances the correct face recognition rate as compared to conventional Principal Component Analysis (PCA). The proposed scheme, Sub-Holistic PCA (SH-PCA), was tested using ORL database and out performed PCA for all test scenarios. SH-PCA requires more computational power and memory as compared to PCA however it yields an improvement of 6% correct recognition on the complete ORL database of 400 images. The correct recognition rate for the complete ORL database is 90% for the SH-PCA technique.
Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds
Keynote: The Use Of Meta-Heuristic Algorithms For Data Mining, Dr. Beatrize De La Iglesia, A. Reynolds
International Conference on Information and Communication Technologies
In this paper we explore the application of powerful optimisers known as metaheuristic algorithms to problems within the data mining domain. We introduce some well-known data mining problems, and show how they can be formulated as optimisation problems. We then review the use of metaheuristics in this context. In particular, we focus on the task of partial classification and show how multi-objective metaheuristics have produced results that are comparable to the best known techniques but more scalable to large databases. We conclude by reinforcing the importance of research on the areas of metaheuristics for optimisation and data mining. The combination …
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
Keynote: Emerging Era Of Cooperative Empowerment: Grid, Peer-To-Peer, And Community Computing, Dr. Javed I. Khan
International Conference on Information and Communication Technologies
In this paper we discuss an emerging trend in high performance computing-the social or community computing. The emergence of screensaver computing, grid computing, peer-to-peer systems, and their demonstrated ability to garner computing power as potent as the supercomputers seems to be auspicious. In this paper we discuss the new phenomenon of community computing-including their potential applications in solving a new set of grand challenge problems. We also discuss the previously uncharted technological challenges architects of these new paradigms are addressing.
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed
International Conference on Information and Communication Technologies
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
International Conference on Information and Communication Technologies
Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid
International Conference on Information and Communication Technologies
The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed …
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta
International Conference on Information and Communication Technologies
Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
International Conference on Information and Communication Technologies
Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi
International Conference on Information and Communication Technologies
Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah
International Conference on Information and Communication Technologies
Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia
International Conference on Information and Communication Technologies
Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …
How Does Information Technology Effect Development? Integrating Theory And Practice Into A Process Model, Sajda Qureshi
How Does Information Technology Effect Development? Integrating Theory And Practice Into A Process Model, Sajda Qureshi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
The concept of development suggests that countries and regions grow to become self-sustaining partners in what is being called the global economy. In more recent years this concept has been synonymous with the emergence of an “information society” whose wheels are oiled by information sharing and the application of knowledge. Some international agencies even propose that information and communications technologies enable development to be achieved more effectively and efficiently. While success stories abound, there is a recognition that not all investments in information technology bring about growth or economic development. So the question remains: how does information technology effect development? …
Extracting Reduced Logic Programs From Artificial Neural Networks, Jens Lehmann, Sebastian Bader, Pascal Hitzler
Extracting Reduced Logic Programs From Artificial Neural Networks, Jens Lehmann, Sebastian Bader, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Artificial neural networks can be trained to perform excellently in many application areas. While they can learn from raw data to solve sophisticated recognition and analysis problems, the acquired knowledge remains hidden within the network architecture and is not readily accessible for analysis or further use: Trained networks are black boxes. Recent research efforts therefore investigate the possibility to extract symbolic knowledge from trained networks, in order to analyze, validate, and reuse the structural insights gained implicitly during the training process. In this paper, we will study how knowledge in form of propositional logic programs can be obtained in such …
Integrating First-Order Logic Programs And Connectionist Systems - A Constructive Approach, Sebastian Bader, Andreas Witzel, Pascal Hitzler
Integrating First-Order Logic Programs And Connectionist Systems - A Constructive Approach, Sebastian Bader, Andreas Witzel, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Significant advances have recently been made concerning the integration of symbolic knowledge representation with artificial neural networks (also called connectionist systems). However, while the integration with propositional paradigms has resulted in applicable systems, the case of first-order knowledge representation has so far hardly proceeded beyond theoretical studies which prove the existence of connectionist systems for approximating first-order logic programs up to any chosen precision. Advances were hindered severely by the lack of concrete algorithms for obtaining the approximating networks which were known to exist: the corresponding proofs are not constructive in that they do not yield concrete methods for building …
Enterprise Applications Of Semantic Web: The Sweet Spot Of Risk And Compliance, Amit P. Sheth
Enterprise Applications Of Semantic Web: The Sweet Spot Of Risk And Compliance, Amit P. Sheth
Kno.e.sis Publications
Semantic Web is in the transition from vision and research to reality. In this early state, it is important to study the technical capabilities in the context of real-world applications, and how applications built using the Semantic Web technology meet the real market needs. Beyond push from research, it is the market pull and the ability of the technology to meet real business needs that is a key to ultimate success of any technology. In this paper, we discuss the market of Risk and Compliance which presents unique market opportunity combined with challenging technical requirements. We discuss how the Semantic …
Ontology Learning As A Use-Case For Neural-Symbolic Integration, Pascal Hitzler, Sebastian Bader, Artur Garcez
Ontology Learning As A Use-Case For Neural-Symbolic Integration, Pascal Hitzler, Sebastian Bader, Artur Garcez
Computer Science and Engineering Faculty Publications
We argue that the field of neural-symbolic integration is in need of identifying application scenarios for guiding further research. We furthermore argue that ontology learning - as occurring in the context of semantic technologies - provides such an application scenario with potential for success and high impact on neural-symbolic integration.