{"response":{"docs":[{"system_create_dtsi":"2020-05-15T22:50:12Z","system_modified_dtsi":"2020-05-15T22:50:19Z","has_model_ssim":["Article"],"id":"pz50gx42n","accessControl_ssim":["fcc3cdaa-855f-4f54-b6f9-b8493f2900f3"],"hasRelatedMediaFragment_ssim":["z029p6046"],"hasRelatedImage_ssim":["z029p6046"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A Community-based Approach to Co-Managing Privacy and Security in Smart Homes"],"date_uploaded_dtsi":"2020-05-15T22:50:12Z","date_modified_dtsi":"2020-05-15T22:50:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/p2kf-mn08"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Brandopadhayay, Rajdeep","Halse, Shane","Elrod, Nathan J.","Kropczynski, Jess","Burden, Eric"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This study proposes enhanced oversight of smart homes by leveraging the social networks of homeowners to co-monitor for emergencies, while being mindful of privacy preserving features necessary for adoption. A pilot co-design workshop was conducted to determine features for co-monitoring. A group of four participants provided early findings and informed modifications to study design, and new insights for user behavior were emphasized. By refining the study design, we hope to better target users’ tacit knowledge in future workshops. Early findings include the users’ need for more than simply sharing access to a camera during an emergency in the home; users desired control over the microphone, the camera video stream, and the length of time. We believe this work will contribute to a broader understanding of features that better meet the needs and goals of smart device owners to enable co-monitoring.\r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/11"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/z029p6046?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["z029p6046"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["z029p6046"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"COMMUNITYBASED APPROACH TO COMANAGING PRIVACY AND SECURITY IN SMART HOMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/pz50gx42n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686893178880,"timestamp":"2021-04-15T06:26:26.005Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:47:56Z","system_modified_dtsi":"2020-05-15T23:24:21Z","has_model_ssim":["Article"],"id":"tt44pp09h","accessControl_ssim":["83ea3652-4301-48ac-883f-9a5fbbf28025"],"hasRelatedMediaFragment_ssim":["gx41mk17p"],"hasRelatedImage_ssim":["gx41mk17p"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Smart Home Repos: Taking Data from Devices"],"date_uploaded_dtsi":"2020-05-15T22:47:55Z","date_modified_dtsi":"2020-05-15T23:24:21Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/1p51-4y21"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Mahajan, Pranav"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This is an ongoing research project focused on creating a framework for capturing various artifacts concerning Internet of Things devices. Research has shown a severe lack of frameworks focusing on collecting data from and about IoT devices. Mozilla’s WebThings Gateway focuses on collecting this information from the devices. This project expects to find methods of IoT data collection through a proposed test-bed utilizing the WebThings Gateway."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/9"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/gx41mk17p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gx41mk17p"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["gx41mk17p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SMART HOME REPOS TAKING DATA FROM DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/tt44pp09h"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086683333263360,"timestamp":"2021-04-15T06:26:22.610Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:45:56Z","system_modified_dtsi":"2020-05-15T22:46:03Z","has_model_ssim":["Article"],"id":"2f75r916x","accessControl_ssim":["93596cd5-d3bb-4ef4-89df-3c9288060bb2"],"hasRelatedMediaFragment_ssim":["s7526d822"],"hasRelatedImage_ssim":["s7526d822"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Understanding Decision-Making Needs of Open Government Data Users"],"date_uploaded_dtsi":"2020-05-15T22:45:56Z","date_modified_dtsi":"2020-05-15T22:45:56Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/shpp-5481"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Murthy, Svati Sundara"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Open Government Data (OGD) promotes transparency, innovation, and value creation that makes information gathered by the government about the city and community open to all. The City of Cincinnati Open Government Data Portal allows citizens to access local data as part of a local OGD initiative. Although these datasets are available and are used by a broad audience, little is known about how users engage with this data and the general usability of the platforms. To learn more about this audience, this study is conducted in two steps 1)- a think-aloud activity and 2)- an online survey. Through these activities, we aim to gather information about how the users are interacting with the available data and for what purpose are they interacting with different sections of the portal. After gathering relevant data from the think-aloud activity, we aim to generate a questionnaire by analyzing all the information collected in the previous event at a larger scale. Using a web-based survey shared with individuals via Qualtrics, we will explore the use of the portal to gain more insight and knowledge on user requirements and their suggestions. The endpoint of this study is to develop insights that will help us understand user expectations and how changes could benefit the portal."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/5"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/s7526d822?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["s7526d822"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["s7526d822"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"UNDERSTANDING DECISIONMAKING NEEDS OF OPEN GOVERNMENT DATA USERS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/2f75r916x"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686287101952,"timestamp":"2021-04-15T06:26:25.427Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:43:40Z","system_modified_dtsi":"2020-05-15T22:43:44Z","has_model_ssim":["Article"],"id":"j098zc44r","accessControl_ssim":["d4c63124-cd44-4db2-a724-5d521d4e7b58"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach"],"date_uploaded_dtsi":"2020-05-15T22:43:40Z","date_modified_dtsi":"2020-05-15T22:43:40Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g8mz-xf69"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Alalade, Emmanuel Dare"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Internet of Things (IoT) enabled smart homes to have made our daily lives easier, but these conveniences have also introduced security concerns. IoT devices hold security risks as well as smart home hubs and gateways. Gateways present a centralized point of communication among devices that can create a backdoor into network data for hackers but also present a detection opportunity. Intrusion detection is a common way to detect anomalies in network traffic. This paper introduces early work on an intrusion detection system (IDS) by detecting anomalies in the smart home network using Extreme Learning Machine and Artificial Immune System (AIS ELM). AIS uses the clonal Algorithm for the optimization of the input parameters, and ELM analyzes the input parameter for better convergence in detecting anomalous activity. The larger goal of this work is to apply this approach to a smart home network gateway and combined it with a push notification system that will allow the homeowner to identify any abnormalities in the smart home network and take appropriate action."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/3"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTRUSION DETECTION SYSTEM IN SMART HOME NETWORK USING ARTIFICIAL IMMUNE SYSTEM AND EXTREME LEARNING MACHINE HYBRID APPROACH","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/j098zc44r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086687355600896,"timestamp":"2021-04-15T06:26:26.446Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:14:34Z","system_modified_dtsi":"2020-05-15T22:14:41Z","has_model_ssim":["Article"],"id":"4f16c431p","accessControl_ssim":["3d7175ba-0462-4cf6-b296-c7b9bc427f71"],"hasRelatedMediaFragment_ssim":["rr171z63k"],"hasRelatedImage_ssim":["rr171z63k"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices"],"date_uploaded_dtsi":"2020-05-15T22:14:34Z","date_modified_dtsi":"2020-05-15T22:14:34Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g9ne-9f26"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Agrawal, Dev"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Devices in the Internet of Things (IoT) have enhanced our ability to automate functions in smart homes and increased our ability to monitor day to day activities regardless of whether we are in our home. Despite these benefits of IoT devices, it is the case that notifications about threats to our home when we are away are typically only sent to one or two people within the home. We proposed enhanced monitoring of threats by allowing temporary access to IoT devices to extended networks of homeowners in situations where primary IoT device owners are not able to address a smartphone notification quickly."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/rr171z63k?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["rr171z63k"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["rr171z63k"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ENHANCING PHYSICAL AND CYBER SECURITY OF SMART HOMES USING COMONITORING OF IOT DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/4f16c431p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097428211073024,"timestamp":"2021-04-15T09:17:09.724Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:10:46Z","system_modified_dtsi":"2020-05-15T22:10:54Z","has_model_ssim":["Article"],"id":"b5644s84b","accessControl_ssim":["b5cd1fc7-8b0f-4f9f-9f2b-018f99483d1f"],"hasRelatedMediaFragment_ssim":["6w924d32n"],"hasRelatedImage_ssim":["6w924d32n"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats"],"date_uploaded_dtsi":"2020-05-15T22:10:46Z","date_modified_dtsi":"2020-05-15T22:10:46Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r35x-0f80"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Gilany, Yahya","Kunapareddy, Vivek","Bakare, Adeyinka","Said, Hazem"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["As incessant cyber-attacks on organizations increase in complexity and destructiveness with the aim\r\nto disrupt services and steal information, proactive measures are critically needed to mitigate these\r\nattacks, cyber security risk assessment tops the list of measures. This study provides an overview of\r\ncybersecurity risk assessment, various types of frameworks, and the difference between qualitative\r\nand quantitative cybersecurity risk assessments. The aim of this early research is the creation of a\r\nhybrid system which integrates an existing cybersecurity risk assessment system based on the NIST framework into the Factor Analysis of Information Risk (FAIR) model, an analytic risk assessment model that enables true quantitative measurement. In this study, we propose a hybrid-assessment tool which will be used to describe and compare the impact of using NIST driven values\r\nas inputs for the resistance strength to determine the Loss Event Frequent (LEF) and Annual Loss\r\nExpectancy (ALE) of a risk scenario as opposed to using experts’ opinion as user inputs for determination of the LEF and ALE values."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/6w924d32n?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6w924d32n"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["6w924d32n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTEGRATING NIST FRAMEWORK INTO FAIR MODEL FOR QUANTITATIVE RISK ASSESSMENT OF CYBER THREATS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/b5644s84b"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097427570393088,"timestamp":"2021-04-15T09:17:09.113Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:06:28Z","system_modified_dtsi":"2020-05-15T22:06:36Z","has_model_ssim":["Article"],"id":"7h149r21s","accessControl_ssim":["97f0a554-2053-4949-a14d-a2d1f0b854e8"],"hasRelatedMediaFragment_ssim":["v692t7533"],"hasRelatedImage_ssim":["v692t7533"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Finding Actionable Information on Social Media"],"date_uploaded_dtsi":"2020-05-15T22:06:28Z","date_modified_dtsi":"2020-05-15T22:06:28Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/y7jh-h521"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Abdelhalim, Ammar Ahmed"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["A great deal of data is generated every day on social media, although this information is used for marketing purposes regularly, it has the potential to serve other purposes, such as in crisis management. This study focuses on collecting data from social media, specifically Twitter, in order to help 911 telecommunicators (floor supervisors, call takers, and dispatchers) to 1) identify Twitter users requesting assistance during a crisis, 2) identify information that may be useful to incidents that were called into 911, and 3) pass the information to the first responders (police, fire, and emergency medical services). Previous research in this area can be summarized into three stages. First, a set of information requirements has been developed that must be satisfied to dispatch first responders and meet their immediate awareness needs. Second, a coding schema has been presented to identify six types of actionable information. Finally, it proposed automated methods based on previous literature which can be used to implement these methods in the future (Kropczynski et al. 2018). This research concentration is on refining social media data by starting with finding local tweets that contain this information and recognize patterns of how it is used. Next, patterns will be used in the development of automated methods in the future. The contribution of this work is extending the coding schema of the 6Ws and put it on an action, develop an interface to view the data of social media separated by the 6Ws. It will begin with just on of the six Ws (Weapons)."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/v692t7533?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["v692t7533"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["v692t7533"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"FINDING ACTIONABLE INFORMATION ON SOCIAL MEDIA","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/7h149r21s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097421702561792,"timestamp":"2021-04-15T09:17:03.517Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T21:53:40Z","system_modified_dtsi":"2020-05-15T22:04:22Z","has_model_ssim":["Article"],"id":"m326m308s","accessControl_ssim":["f1e9e1c6-a477-4541-9d7d-409b9c1b5bb1"],"hasRelatedMediaFragment_ssim":["vh53wx147"],"hasRelatedImage_ssim":["vh53wx147"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM"],"date_uploaded_dtsi":"2020-05-15T21:53:40Z","date_modified_dtsi":"2020-05-15T22:04:22Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/50pr-pd30"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Halliday, Nnennaya"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Depression is a common illness that negatively affects feelings, thoughts and behaviors and can harm regular activities like sleeping. It is a leading cause of disability and many other diseases (Choudhury, et al 2013, Mathur et al, 2016, Watkins et al, 2013). According to WHO (World Health Organization) 1 statistics, more than 300 million people over the world are affected in depression and in each country at least 10% are provided treatment. Poor recognition and treatment of depression may aggravate heart failure symptoms, precipitate functional decline, disrupt social and occupational functioning, and lead to an increased risk of mortality (Cully, et al 2009). Early detection of depression is thus necessary. Unfortunately the rates of detecting and treating depression among those with medical illness are quite low (Egede, 2007). This research proposes a solution of using random forest classifier algorithm to detect and predict detection. A mobile application will be developed in order to collect user data and make prediction."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/vh53wx147?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["vh53wx147"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["vh53wx147"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/m326m308s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097423257600000,"timestamp":"2021-04-15T09:17:05Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T21:48:56Z","system_modified_dtsi":"2020-05-15T21:49:04Z","has_model_ssim":["Article"],"id":"b8515p72s","accessControl_ssim":["b9c36ab6-10bd-489f-b54a-b49cf6c54c98"],"hasRelatedMediaFragment_ssim":["mc87pr72d"],"hasRelatedImage_ssim":["mc87pr72d"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE BACKUP, DISASTER RECOVERY AND HIGH AVAILABILITY"],"date_uploaded_dtsi":"2020-05-15T21:48:56Z","date_modified_dtsi":"2020-05-15T21:48:56Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/t5jz-9m40"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Li, Chengcheng","Efosa, Ogbomo"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cloud computing has been one of the major disruptive technology of this century changing the entire face of IT infrastructure across all spectrum. This has led to tremendous development, improvement and cost efficient means of securing IT infrastructures. Virtualization is the backbone driving the numerous cloud solutions and also making them marketable in the pay-as-you-use mechanism for all kind of deployment. This research is focus on improving the security and performance of cloud storage, backup and disaster recovery by evaluating the possibility of eliminating the Recovery Point Objective (RPO) and Recovery Time Objective (RTO). A live synchronization between production and Disaster Recovery (DR) sites is presented. We considered the mechanism behind Virtual Machines (VM) and hypervisor interaction with physical memory on host computers and evaluated the ability of VM to read/write directly to a unified multiple storage locations. Dependencies, requirements and guidelines for implementing this solution would also be analyzed."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/mc87pr72d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["mc87pr72d"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["mc87pr72d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"LOOK AT EDGELESS HYBRIDCLOUD INFRASTRUCTURE AN OPTIMIZED SOLUTION FOR MULTISITE BACKUP DISASTER RECOVERY AND HIGH AVAILABILITY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/b8515p72s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097422277181440,"timestamp":"2021-04-15T09:17:04.064Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T21:46:44Z","system_modified_dtsi":"2020-05-15T21:46:52Z","has_model_ssim":["Article"],"id":"jw827c91c","accessControl_ssim":["82e7fcf8-ea59-4f3f-a0bb-69dab8afb98a"],"hasRelatedMediaFragment_ssim":["pn89d7890"],"hasRelatedImage_ssim":["pn89d7890"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Predicting Future Shooting Crime Locations Using Principles of Data Analytics (SHOPS)"],"date_uploaded_dtsi":"2020-05-15T21:46:44Z","date_modified_dtsi":"2020-05-15T21:46:44Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/twmk-q297"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Varlioglu, M. Said","Ozer, Murat"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Shooting crime is a serious public health problem in the US. The analysis of any historical crime data reveals that crime is non-randomly distributed in time and space. Based on this notion, hot spots policing has gained its momentum to effectively predict future crime locations. Recent studies; however, pointed out that traditional hot spots policing occasionally predict rare crimes such as homicides and shootings due to their less frequent recurring counts in a given place and time (specifically for shorter time periods such as weeks and months). Given this context, we developed a new shooting prediction system (SHOPS) to explore whether recent dynamic/mobility activity patterns of known violent individuals increase the prediction of short-term fatal and non-fatal shootings compared to the traditional hot spots policing. Findings suggest that SHOPS predicts fatal and non-fatal shooting locations more precisely by identifying fewer hotspot locations. Policy implications of the study were discussed in the conclusion section."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/pn89d7890?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pn89d7890"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["pn89d7890"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PREDICTING FUTURE SHOOTING CRIME LOCATIONS USING PRINCIPLES OF DATA ANALYTICS SHOPS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/jw827c91c"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097424444588032,"timestamp":"2021-04-15T09:17:06.132Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4797,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":978,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":666,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1950,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12572,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":264,"next_page":265,"prev_page":263,"total_pages":1275,"limit_value":10,"offset_value":2630,"total_count":12743,"first_page?":false,"last_page?":false}}}