{"response":{"docs":[{"system_create_dtsi":"2020-06-22T18:15:22Z","system_modified_dtsi":"2020-07-10T14:54:13Z","has_model_ssim":["StudentWork"],"id":"pr76f503v","accessControl_ssim":["ec8fb04e-f7e4-4036-a880-9d93138ebc65"],"hasRelatedMediaFragment_ssim":["p8418p72j"],"hasRelatedImage_ssim":["p8418p72j"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["CareLine"],"date_uploaded_dtsi":"2020-06-22T18:15:22Z","date_modified_ssi":"Fri Jul 10 10:54:11 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Souders,Garrett","Thomas, Jeremy","Moore, Merideth"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["If a relative were placed in a long-term healthcare facility tomorrow, we would all love to be able to communicate frequently with them over the web, wouldn’t we? In many places, we simply cannot. According to the Centers for Disease Control and Prevention (CDC), over eight million people receive some form of long-term care annually. Whether at a nursing home, adult service center, or mental health institution, long-term care has great importance in our society. Yet these facilities mostly operate using dated technology and software. We built CareLine to bridge that communication gap between families, patients, and caretakers. CareLine provides an innovative solution that features a mobile friendly site, built-in office appointment-making, text and video chat, and email notifications with automated updates as a means to ease the anxiety that comes with long-term care. CareLine is a sleek and modern web application that features a built-in calendar for office appointments, text and video chat, and email notifications with automated\r\nupdates. It has a TypeScript front end with a NodeJS and Fastify back end and a Microsoft SQL Server database. Our app is HIPAA compliant and secured with modern authentication tools. CareLine is designed to increase the amount of communication between not only the family and their relatives in long-term care situations, but also the family and the facility's caretakers. There is a myriad of concerns that come along with these scenarios, which our app aims to ease. While we do not provide the care ourselves, we offer a platform to give families a direct line. CareLine is your line to care, right away"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/p8418p72j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p8418p72j","cf95jd05h","76537282p","5138jg077"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["p8418p72j","cf95jd05h","76537282p","5138jg077"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CARELINE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/pr76f503v"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124957605068800,"timestamp":"2021-04-15T16:34:43.799Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T18:36:36Z","system_modified_dtsi":"2020-06-18T19:03:54Z","has_model_ssim":["StudentWork"],"id":"vm40xs89b","accessControl_ssim":["b911bde5-6f22-43e0-b49c-ef1395c557aa"],"hasRelatedMediaFragment_ssim":["5138jg05p"],"hasRelatedImage_ssim":["5138jg05p"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Establishing a comprehensive census of undergraduate economics curricula: Foundational and special requirements for major programs in the U.S."],"date_uploaded_dtsi":"2020-06-18T18:36:36Z","date_modified_dtsi":"2020-06-18T18:49:04Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/dt05-2064"],"alternate_title_tesim":["Census of Economic Core Requirements"],"geo_subject_tesim":["United States"],"advisor_tesim":["Moore, Thomas","Erhardt, Erwin","Stitzlein, Sarah","Johnson, Marcus"],"degree_tesim":["MA in Human Resources - Educational Studies (Concentration in Foundations of Education and Social Change)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"genre_tesim":["Document"],"time_period_tesim":["21st Century","20th Century"],"creator_tesim":["Turner, Grant"],"publisher_tesim":["Grant W. Turner"],"subject_tesim":["Human Capital","Rethinking Economics","Economics","Interdisciplinary","Undergraduate Economics","Heterodox","Curriculum Studies","Economic Thought","Socioeconomics","History of Economics","Innovation","Economic Education","Knowledge Capital","Education","Pluralism"],"language_tesim":["English"],"description_tesim":["Abstract\r\n\r\n      This study is the first of a series of studies, collectively embodying a multiphase mixed methods design. The overall objective of these studies is to explore and address a variety of issues and features of the discipline of economics, particularly as they relate to and represent past present and future factors of globalization, education, citizenship, and society. This is done by collecting and analyzing data on numerous aspects of the undergraduate economics curriculum, economics as a discipline, and economics as applied in the real world. \r\n\r\n       The overall purpose of these studies is to inform ongoing debates concerning the future of the discipline of economics and how it is taught, by examining and creating paradigms and methods that may be of aide. Additionally these studies collectively aim to outline, and in small ways develop, potential technological and organizational solutions for detailed longitudinal curriculum tracking. The frameworks employed and developed in these studies may eventually be scaled and adapted for all sorts of curricula. Ideally, the completion of this study’s overall objective yields practical insights and tools that empower faculty and departments, in economics and eventually in general, to better understand and design their own curriculum.\r\n\r\n      This immediate study fills gaps in and updates data on the curriculum of undergraduate economics majors in U.S. institutions, while also establishing a baseline data set for future studies to build on. A qualitative census methodology is adapted and employed to explore how various institutional and program factors relate to certain types of major program requirements. Descriptive statistics are used for analysis, primarily to allow for comparisons to previous studies. In sum, the purpose of the data collected and analyzed in this census is to give a glimpse into the current state of the undergraduate economics curriculum in the U.S., and to inform the qualitative, quantitative, and transformative studies that are to follow in this multiphase series. \r\n"],"license_tesim":["http://creativecommons.org/licenses/by-nc-sa/4.0/"],"date_created_tesim":["2018-05-19"],"thumbnail_path_ss":"/downloads/5138jg05p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5138jg05p"],"member_of_collections_ssim":["Rethinking Economics: Longitudinal Tracking and Assessment of Economics Education"],"member_of_collection_ids_ssim":["pg15bg21t"],"file_set_ids_ssim":["5138jg05p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ESTABLISHING A COMPREHENSIVE CENSUS OF UNDERGRADUATE ECONOMICS CURRICULA FOUNDATIONAL AND SPECIAL REQUIREMENTS FOR MAJOR PROGRAMS IN THE US","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public","admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["pg15bg21t"],"nesting_collection__parent_ids_ssim":["pg15bg21t"],"nesting_collection__pathnames_ssim":["pg15bg21t/vm40xs89b"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697118252427116544,"timestamp":"2021-04-15T14:48:09.244Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T17:21:52Z","system_modified_dtsi":"2020-07-10T14:54:15Z","has_model_ssim":["StudentWork"],"id":"7p88ch81r","accessControl_ssim":["cb7f94dd-312b-4fa9-89bd-ba18047c0b32"],"hasRelatedMediaFragment_ssim":["g158bj83z"],"hasRelatedImage_ssim":["g158bj83z"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Manahan Agreement"],"date_uploaded_dtsi":"2020-06-18T17:21:49Z","date_modified_ssi":"Fri Jul 10 10:54:14 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["idk"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Library Service, CECH"],"description_tesim":["testing a theory"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["g158bj83z"],"file_set_ids_ssim":["g158bj83z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MANAHAN AGREEMENT","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["7p88ch81r"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697088161914552320,"timestamp":"2021-04-15T06:49:52.695Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T15:43:36Z","system_modified_dtsi":"2020-07-10T14:54:16Z","has_model_ssim":["StudentWork"],"id":"1g05fc979","accessControl_ssim":["114aab0b-eeb8-475d-a0b9-60db70ad5b50"],"hasRelatedMediaFragment_ssim":["fn107037q"],"hasRelatedImage_ssim":["fn107037q"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["IT2019_Vineela_Kunapareddi_Oreofeoluwa_Oyelowo_Briana_Padgett.pdf"],"date_uploaded_dtsi":"2020-06-18T15:43:35Z","date_modified_ssi":"Fri Jul 10 10:54:15 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Ryan Moore","Bo Vykhovanyuk","Tyler Hopperton","Abdou Fall"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Library Service, CECH"],"description_tesim":["2019 CECH Senior Design Projects"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/fn107037q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["fn107037q"],"file_set_ids_ssim":["fn107037q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IT2019_VINEELA_KUNAPAREDDI_OREOFEOLUWA_OYELOWO_BRIANA_PADGETTPDF","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["1g05fc979"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697103125249261568,"timestamp":"2021-04-15T10:47:42.843Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T15:40:48Z","system_modified_dtsi":"2020-07-10T14:54:17Z","has_model_ssim":["StudentWork"],"id":"gb19f715t","accessControl_ssim":["080e0677-d307-4f8d-aa77-e3d8182b4bd7"],"hasRelatedMediaFragment_ssim":["h989r4676"],"hasRelatedImage_ssim":["h989r4676"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["IT_2019_Merideth_Moore_Garrett_Souders_Jeremy_Thomas.pdf"],"date_uploaded_dtsi":"2020-06-18T15:40:47Z","date_modified_ssi":"Fri Jul 10 10:54:17 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Ryan Moore","Bo Vykhovanyuk","Tyler Hopperton","Abdou Fall"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Library Service, CECH"],"description_tesim":["2019 CECH Senior Design Projects"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/h989r4676?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["h989r4676"],"file_set_ids_ssim":["h989r4676"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IT_2019_MERIDETH_MOORE_GARRETT_SOUDERS_JEREMY_THOMASPDF","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["gb19f715t"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697101560964710400,"timestamp":"2021-04-15T10:22:51.024Z","score":0.00049999997},{"system_create_dtsi":"2020-06-15T13:38:26Z","system_modified_dtsi":"2020-07-10T14:47:35Z","has_model_ssim":["StudentWork"],"id":"v692t7622","accessControl_ssim":["f93f46a0-d85d-4bd8-829a-3c0b2214ffb3"],"hasRelatedMediaFragment_ssim":["q811km15s"],"hasRelatedImage_ssim":["q811km15s"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["1819 Innovation Hub Mobile App"],"date_uploaded_dtsi":"2020-06-15T13:38:26Z","date_modified_ssi":"Fri Jul 10 10:47:33 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Demoss, Cameron","Holschuh, Chris","Burns, Aidan"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Have you had a chance to visit the 1819 Innovation hub yet? If not, you're probably not familiar with all the exciting opportunities and services the building has to offer. To some, the possibilities at 1819 can be quite overwhelming, but with the 1819 Mobile app, we make these opportunities more approachable. With our location based informational beacons and seamless check-in pre-registration process, you can skip to the front of the line and get right to work on your latest ideas and inventions. Using Apple’s Core Location services, the power of Swift, and the latest in Bluetooth low energy beacon technology, the 1819 Mobile app provides you with up to date contextual information about key locations within the University of Cincinnati’s 1819 Innovation Hub. The 1819 Mobile app ensures that you have access to the tools and information needed to succeed in your visit."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/q811km15s?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["q811km15s","kd17cv201"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["q811km15s","kd17cv201"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000001819 INNOVATION HUB MOBILE APP","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/v692t7622"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086720583925760,"timestamp":"2021-04-15T06:26:58.135Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:11:49Z","system_modified_dtsi":"2020-05-15T23:11:57Z","has_model_ssim":["Article"],"id":"nc580n99m","accessControl_ssim":["f0088021-199e-4cbb-8ce7-fd6886b00978"],"hasRelatedMediaFragment_ssim":["8049g6245"],"hasRelatedImage_ssim":["8049g6245"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["IoT Emergency Detection Devices"],"date_uploaded_dtsi":"2020-05-15T23:11:48Z","date_modified_dtsi":"2020-05-15T23:11:48Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/nedb-ds91"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Tresenwriter, Isaac"],"publisher_tesim":["University of Cincinnati "],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["In a world where technology continues to vastly grow and improve, IoT devices have increasingly become more and more a part of people’s everyday lives. Although that is the case there is a need to understand how to better use these devices for threat detection. This paper presents early work to understand gaps in this regard using a review of previously used techniques to identify known threats to households. Through the use of smart home device clusters we seek to effectively reduce the amount of false alarms and create a more reliable resource for home residents."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/18"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/8049g6245?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["8049g6245"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["8049g6245"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IOT EMERGENCY DETECTION DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/nc580n99m"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086687912394752,"timestamp":"2021-04-15T06:26:26.976Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:09:49Z","system_modified_dtsi":"2020-05-15T23:14:46Z","has_model_ssim":["Article"],"id":"m326m3092","accessControl_ssim":["49fa97c5-46f8-4606-a4c9-9b710c33221e"],"hasRelatedMediaFragment_ssim":["p2676w829"],"hasRelatedImage_ssim":["p2676w829"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm"],"date_uploaded_dtsi":"2020-05-15T23:09:49Z","date_modified_dtsi":"2020-05-15T23:09:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r3qd-fz22"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Azumah, Sylvia Worlali","Li, Chengcheng"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a  detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a  SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.  \r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/17"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/p2676w829?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p2676w829"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["p2676w829"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SECURING A SMALL OFFICE HOME OFFICE NETWORK INTEGRATING A SUPERVISED NEURAL NETWORK ALGORITHM","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/m326m3092"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680363696128,"timestamp":"2021-04-15T06:26:19.778Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:08:12Z","system_modified_dtsi":"2020-05-15T23:15:13Z","has_model_ssim":["Article"],"id":"hq37vp88t","accessControl_ssim":["3ebee09e-1b06-4376-b2b7-07f36fd09562"],"hasRelatedMediaFragment_ssim":["5425kc00j"],"hasRelatedImage_ssim":["5425kc00j"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Implementation of a hybrid machine learning technique for network intrusion detection"],"date_uploaded_dtsi":"2020-05-15T23:08:11Z","date_modified_dtsi":"2020-05-15T23:08:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/0nqd-j038"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Eichie, Maxwell"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/16"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/5425kc00j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5425kc00j"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["5425kc00j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IMPLEMENTATION OF A HYBRID MACHINE LEARNING TECHNIQUE FOR NETWORK INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/hq37vp88t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086681729990656,"timestamp":"2021-04-15T06:26:21.081Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:06:29Z","system_modified_dtsi":"2020-05-15T23:15:31Z","has_model_ssim":["Article"],"id":"f1881n26p","accessControl_ssim":["ca9b438e-5e61-4d3f-9d85-8b51bfa48298"],"hasRelatedMediaFragment_ssim":["1v53jz342"],"hasRelatedImage_ssim":["1v53jz342"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots"],"date_uploaded_dtsi":"2020-05-15T23:06:28Z","date_modified_dtsi":"2020-05-15T23:06:28Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/x6f0-b209"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Hussein, Abdul Aziz","Ozer, Murat"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This research focuses on two fundamental aspects of hot spot policing that have been widely neglected by previous scholarly research. These aspects include the adequate concentration of crime at a smaller geographical unit to be considered a crime hot spot, and the cost-benefit implication of focusing limited police resources on such a smaller place in an effort to prevent criminal activities. Substantial limitations in call-t- service data from police departments raise concern on the purported concentration of crime at places that warrant such strategy in the first place. We will examine data from the Cincinnati Police Department and propose guidelines on adopting a threshold when designating places as crime hot spots, using time and cost-benefit analysis as key determinants."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/15"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/1v53jz342?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1v53jz342"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["1v53jz342"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CRIME HOT SPOTS PROPOSING A NEW MODEL FOR APPROPRIATE IDENTIFICATION OF CRIME HOT SPOTS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/f1881n26p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086682252181504,"timestamp":"2021-04-15T06:26:21.579Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Student Work","hits":485,"label":"Student Work"},{"value":"Article","hits":40,"label":"Article"},{"value":"Document","hits":11,"label":"Document"},{"value":"Image","hits":2,"label":"Image"},{"value":"Media","hits":2,"label":"Media"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Library Service, CECH","hits":57,"label":"Library Service, CECH"},{"value":"Green-Schwartz, Clair","hits":8,"label":"Green-Schwartz, Clair"},{"value":"Information Technology Research Symposium","hits":6,"label":"Information Technology Research Symposium"},{"value":"Turner, Grant","hits":5,"label":"Turner, Grant"},{"value":"Gonen, Bilal","hits":4,"label":"Gonen, Bilal"},{"value":"DenBleyker, Emma","hits":3,"label":"DenBleyker, Emma"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Information Technology","hits":32,"label":"Information Technology"},{"value":"Cyber Security","hits":4,"label":"Cyber Security"},{"value":"Economics","hits":3,"label":"Economics"},{"value":"Evidence-Based IT","hits":3,"label":"Evidence-Based IT"},{"value":"Black Market","hits":2,"label":"Black Market"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Information Technology","hits":171,"label":"Information Technology"},{"value":"CECH Library","hits":91,"label":"CECH Library"},{"value":"- School of Information Technology","hits":24,"label":"- School of Information Technology"},{"value":"School of Information Technology","hits":11,"label":"School of Information Technology"},{"value":"Impact Accelerator","hits":8,"label":"Impact Accelerator"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"en_US","hits":224,"label":"en_US"},{"value":"English","hits":40,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":469,"label":"University of Cincinnati"},{"value":"University of Cincinnnati","hits":2,"label":"University of Cincinnnati"},{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Grant W. Turner","hits":1,"label":"Grant W. Turner"},{"value":"IEEE","hits":1,"label":"IEEE"},{"value":"Le 'Wanda M. LaBoy","hits":1,"label":"Le 'Wanda M. LaBoy"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04","hits":55,"label":"2020-04"},{"value":"2021-04","hits":44,"label":"2021-04"},{"value":"2019-04","hits":33,"label":"2019-04"},{"value":"2022-04","hits":30,"label":"2022-04"},{"value":"2020-04-14","hits":14,"label":"2020-04-14"},{"value":"2005-06-02","hits":13,"label":"2005-06-02"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"7d278v66w","hits":52,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"xw42n9511","hits":41,"label":"xw42n9511"},{"value":"1r66j276h","hits":38,"label":"1r66j276h"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":541,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":20,"next_page":21,"prev_page":19,"total_pages":55,"limit_value":10,"offset_value":190,"total_count":541,"first_page?":false,"last_page?":false}}}