Search Constraints
Filtering by:
Type of Work
Article
Remove constraint Type of Work: Article
Publisher
University of Cincinnati
Remove constraint Publisher: University of Cincinnati
« Previous |
1 - 50 of 134
|
Next »
Number of results to display per page
Search Results
- Type:
- Article
- Description/Abstract:
- Article from Modernnati.com about Benjmain Dombar, Cincinnati architect.
- Creator/Author:
- Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 11/21/2023
- Date Modified:
- 11/21/2023
- Date Created:
- 20th century
- License:
- All rights reserved
2. Examining the energy performance of older and historic building using municipal benchmarking data
- Type:
- Article
- Description/Abstract:
- Until recently, nationally representative survey data has been the primary source of information on the energy performance of buildings in the U.S., relative to their year of construction. The emergence of municipal energy benchmarking ordinances and public availability of benchmarking datasets now makes it possible to explore these relationships at the local level, and to link this data with information about a building’s historic designation status. This paper presents results from an initial statistical analysis examining the relationships between building energy use, year of construction, and historic designation status. First, municipal benchmarking data from six U.S. cities is used to examine local trends in the relationship between building age and energy performance. Second, an exploratory analysis of the energy performance of designated historic compared to non-historic buildings in New York City is presented. The methods described in this paper could be applied more widely to benchmarking datasets from other cities.
- Creator/Author:
- Webb, Amanda; M. David Burton, and Beckett, Lauren
- Submitter:
- Amanda Webb
- Date Uploaded:
- 05/26/2022
- Date Modified:
- 05/26/2022
- Date Created:
- 2018-09-26
- License:
- Attribution 4.0 International
- Type:
- Article
- Description/Abstract:
- An expanded version of "The Future of Conflict: Neurowarfare", both of which discuss emerging neurotechnology, neuroscience, and their implications for war, politics, medicine, ethics, and society.
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 10/15/2021
- Date Modified:
- 10/15/2021
- Date Created:
- 2021-10-02
- License:
- Attribution-NonCommercial-ShareAlike 4.0 International
- Type:
- Article
- Description/Abstract:
- Revival of Wright in the University of Cincinnati's Faculty Center (demolished to make way for the new Linder Center)
- Creator/Author:
- Meyer, Elizabeth A. and Snadon, Patrick
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Recladding of Procter Hall and Kroger Headquarters
- Creator/Author:
- Meyer, Elizabeth A. and Snadon, Patrick
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
6. Procter Hall
- Type:
- Article
- Description/Abstract:
- Procter Hall at the University of Cincinnati designed by Woodie Garber
- Creator/Author:
- Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2017
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Sculpture and Art in the Terrace Plaza Hotel and Public Library of Cincinnati Hamilton County
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Leo Marx, in his famous 1964 book, “The Machine in the Garden,” proposed that a central conflict in the American psyche resulted from the industrialization of the unspoiled, Eden-like landscapes of the new world. Wright’s Organic Modernism perhaps allowed 20th-century Americans to unconsciously feel that they could “resolve" that conflict by living in harmony with nature, while International Style Modernism and its machine-like buildings perhaps pointed too directly to the tragedy of industrial capitalism’s despoiling of the environment.
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- The Corbett House kitchen and John Becker Residence, both notable Cincinnati kitchens.
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Scandals in newspapers of Frank Lloyd Wright
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- House designed by deKoven Hill in Cincinnati's Hyde Park neighborhood
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
12. Crosley Tower
- Type:
- Article
- Description/Abstract:
- Article about Crosley Tower on University of Cincinnati's campus.
- Creator/Author:
- Simpson, Scott
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2020
- License:
- All rights reserved
13. Tonken's House
- Type:
- Article
- Description/Abstract:
- The Tonken's House in the Cincinnati neighborhood of Amberley Village and was designed by Frank Lloyd Wright.
- Creator/Author:
- Snadon, Patrick and Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- Bibliography and Sources for further research
- Creator/Author:
- Meyer, Elizabeth A. and Snadon, Patrick
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
15. Crosley Tower
- Type:
- Article
- Description/Abstract:
- An article about Crosely Tower on University of Cincinnati's campus
- Creator/Author:
- Meyer, Elizabeth A. and Simpson, Scott
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2020
- License:
- All rights reserved
16. Boswell House
- Type:
- Article
- Description/Abstract:
- Article about Frank Lloyd Wright's designed house in Indian Hill, Ohio
- Creator/Author:
- Meyer, Elizabeth A.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 09/22/2021
- Date Modified:
- 09/22/2021
- Date Created:
- 2018
- License:
- All rights reserved
17. Common Objects
- Type:
- Article
- Description/Abstract:
- In the 1960"s and 1970', when most of these unfinished essays were written, I was a free thinking architecture student who perceived a fundamental disconnect within diverse institutions, including Architecture and Education and Money - Banking. I had an intuitive feeling that architecture is more than a visual aesthetic, rather a holistic social experience. The everyday objects with which we interact are an integral part of our social disposition and social wellbeing. The attempt is to develop a method for understanding some previously largely ignored aspects of environmental design – the role of Common Objects as a communication facilitator.- Eric M. Lee
- Creator/Author:
- Lee, Eric M.
- Submitter:
- Elizabeth A. Meyer
- Date Uploaded:
- 04/20/2021
- Date Modified:
- 04/21/2021
- Date Created:
- 1960
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker & Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy.
- Creator/Author:
- Turner, Grant
- Submitter:
- Grant Turner
- Date Uploaded:
- 07/07/2020
- Date Modified:
- 07/08/2020
- Date Created:
- August 11, 2019
- License:
- Attribution-NonCommercial-ShareAlike 4.0 International
- Type:
- Article
- Description/Abstract:
- El movimiento relativo de un punto respecto de un observador no solo depende de la velocidad relativa del movimiento. La dirección de esta velocidad juega un papel fundamental en la deformación del tiempo. En este estudio, se ha cuantificado el efecto de la dirección sobre el factor de intervalos de tiempo.
- Creator/Author:
- Viaña, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 06/18/2020
- Date Modified:
- 06/18/2020
- Date Created:
- June 10, 2020
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.
- Creator/Author:
- Azumah, Sylvia Worlali and Li, Chengcheng
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%.
- Creator/Author:
- Eichie, Maxwell
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- This research focuses on two fundamental aspects of hot spot policing that have been widely neglected by previous scholarly research. These aspects include the adequate concentration of crime at a smaller geographical unit to be considered a crime hot spot, and the cost-benefit implication of focusing limited police resources on such a smaller place in an effort to prevent criminal activities. Substantial limitations in call-t- service data from police departments raise concern on the purported concentration of crime at places that warrant such strategy in the first place. We will examine data from the Cincinnati Police Department and propose guidelines on adopting a threshold when designating places as crime hot spots, using time and cost-benefit analysis as key determinants.
- Creator/Author:
- Hussein, Abdul Aziz and Ozer, Murat
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate.
- Creator/Author:
- Adewale, Adewopo Victor and Gonen, Bilal
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research.
- Creator/Author:
- Ponnakanti, Hari Priya; Ozer, Murat, and Gonen, Bilal
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Signature-based intrusion detection methods report high accuracy with a low false alarm rate. However, they do not perform well when faced with new or emerging threats. This work focuses on anomaly-based data driven methods to identify potential zero-day-attacks using a specific class of neural networks known as the autoencoder.
- Creator/Author:
- Li, Chengcheng; Lee, Kijung; Mathur, Nitin, and Gonen, Bilal
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Previous studies have offered a variety of explanations on the relationship between democracy and the internet. Some argue that with free access to information, knowledge sharing without any constraint, and the spread of political knowledge, the internet will help change people’s political attitudes and spread democracy. Other studies found that authoritarian regimes by censoring the internet, tracking the political activist, prosecuting the dissidents, and using the internet to spread their propaganda limit the democratization. Also, some studies explored the effects of diffusion of false news through the internet and especially via social media. However, most of these studies concentrate on regions, specific states or authoritarian regimes. No study has investigated the influence of the internet in partly free countries defined by the Freedom House. Moreover, very little is known about the effects of online censorship on the development, stagnation, or decline of democracy. To fully understand the impact of the internet and online censorship on democratization in partly free countries, we must explore these relationships in these countries. Drawing upon the International Telecommunication Union, Freedom House, and World Bank reports and using machine learning methods, this study sheds new light on the effects of the internet on democratization in partly free countries. The findings suggest that internet penetration and online censorship both have a negative impact on democracy scores and the internet’s effect on democracy scores is conditioned by online censorship. Moreover, results from random forest suggest that online censorship is the most important variable followed by governance index and education on democracy scores.
- Creator/Author:
- Varlioglu, M. Said and Sagir, Mustafa
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- The paper focuses on exploring the social networks of technology caregivers and caregivees and also work on learning their preferred mode of information exchange. Responses from the participants of the study will throw light on the relationships between different efficacies (discussed in detail in the paper) that may have an impact on an individual’s decision. Participant’s responses are recorded through well constructed surveys that have been distributed around by word of mouth or specific social media platforms which will also prove if being a power user has any effect on the end result. The responses will be analyzed and the various efficacy constructs such as self efficacy, community collective efficacy will be kept in mind.
- Creator/Author:
- Kaushik, Sanjana and Elrod, Nathan J.
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- This study proposes enhanced oversight of smart homes by leveraging the social networks of homeowners to co-monitor for emergencies, while being mindful of privacy preserving features necessary for adoption. A pilot co-design workshop was conducted to determine features for co-monitoring. A group of four participants provided early findings and informed modifications to study design, and new insights for user behavior were emphasized. By refining the study design, we hope to better target users’ tacit knowledge in future workshops. Early findings include the users’ need for more than simply sharing access to a camera during an emergency in the home; users desired control over the microphone, the camera video stream, and the length of time. We believe this work will contribute to a broader understanding of features that better meet the needs and goals of smart device owners to enable co-monitoring.
- Creator/Author:
- Brandopadhayay, Rajdeep; Halse, Shane; Elrod, Nathan J.; Kropczynski, Jess, and Burden, Eric
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- This is an ongoing research project focused on creating a framework for capturing various artifacts concerning Internet of Things devices. Research has shown a severe lack of frameworks focusing on collecting data from and about IoT devices. Mozilla’s WebThings Gateway focuses on collecting this information from the devices. This project expects to find methods of IoT data collection through a proposed test-bed utilizing the WebThings Gateway.
- Creator/Author:
- Mahajan, Pranav
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Open Government Data (OGD) promotes transparency, innovation, and value creation that makes information gathered by the government about the city and community open to all. The City of Cincinnati Open Government Data Portal allows citizens to access local data as part of a local OGD initiative. Although these datasets are available and are used by a broad audience, little is known about how users engage with this data and the general usability of the platforms. To learn more about this audience, this study is conducted in two steps 1)- a think-aloud activity and 2)- an online survey. Through these activities, we aim to gather information about how the users are interacting with the available data and for what purpose are they interacting with different sections of the portal. After gathering relevant data from the think-aloud activity, we aim to generate a questionnaire by analyzing all the information collected in the previous event at a larger scale. Using a web-based survey shared with individuals via Qualtrics, we will explore the use of the portal to gain more insight and knowledge on user requirements and their suggestions. The endpoint of this study is to develop insights that will help us understand user expectations and how changes could benefit the portal.
- Creator/Author:
- Murthy, Svati Sundara
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- Internet of Things (IoT) enabled smart homes to have made our daily lives easier, but these conveniences have also introduced security concerns. IoT devices hold security risks as well as smart home hubs and gateways. Gateways present a centralized point of communication among devices that can create a backdoor into network data for hackers but also present a detection opportunity. Intrusion detection is a common way to detect anomalies in network traffic. This paper introduces early work on an intrusion detection system (IDS) by detecting anomalies in the smart home network using Extreme Learning Machine and Artificial Immune System (AIS ELM). AIS uses the clonal Algorithm for the optimization of the input parameters, and ELM analyzes the input parameter for better convergence in detecting anomalous activity. The larger goal of this work is to apply this approach to a smart home network gateway and combined it with a push notification system that will allow the homeowner to identify any abnormalities in the smart home network and take appropriate action.
- Creator/Author:
- Alalade, Emmanuel Dare
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2020-04-14
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Devices in the Internet of Things (IoT) have enhanced our ability to automate functions in smart homes and increased our ability to monitor day to day activities regardless of whether we are in our home. Despite these benefits of IoT devices, it is the case that notifications about threats to our home when we are away are typically only sent to one or two people within the home. We proposed enhanced monitoring of threats by allowing temporary access to IoT devices to extended networks of homeowners in situations where primary IoT device owners are not able to address a smartphone notification quickly.
- Creator/Author:
- Agrawal, Dev
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- As incessant cyber-attacks on organizations increase in complexity and destructiveness with the aim to disrupt services and steal information, proactive measures are critically needed to mitigate these attacks, cyber security risk assessment tops the list of measures. This study provides an overview of cybersecurity risk assessment, various types of frameworks, and the difference between qualitative and quantitative cybersecurity risk assessments. The aim of this early research is the creation of a hybrid system which integrates an existing cybersecurity risk assessment system based on the NIST framework into the Factor Analysis of Information Risk (FAIR) model, an analytic risk assessment model that enables true quantitative measurement. In this study, we propose a hybrid-assessment tool which will be used to describe and compare the impact of using NIST driven values as inputs for the resistance strength to determine the Loss Event Frequent (LEF) and Annual Loss Expectancy (ALE) of a risk scenario as opposed to using experts’ opinion as user inputs for determination of the LEF and ALE values.
- Creator/Author:
- Gilany, Yahya; Kunapareddy, Vivek; Bakare, Adeyinka, and Said, Hazem
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- A great deal of data is generated every day on social media, although this information is used for marketing purposes regularly, it has the potential to serve other purposes, such as in crisis management. This study focuses on collecting data from social media, specifically Twitter, in order to help 911 telecommunicators (floor supervisors, call takers, and dispatchers) to 1) identify Twitter users requesting assistance during a crisis, 2) identify information that may be useful to incidents that were called into 911, and 3) pass the information to the first responders (police, fire, and emergency medical services). Previous research in this area can be summarized into three stages. First, a set of information requirements has been developed that must be satisfied to dispatch first responders and meet their immediate awareness needs. Second, a coding schema has been presented to identify six types of actionable information. Finally, it proposed automated methods based on previous literature which can be used to implement these methods in the future (Kropczynski et al. 2018). This research concentration is on refining social media data by starting with finding local tweets that contain this information and recognize patterns of how it is used. Next, patterns will be used in the development of automated methods in the future. The contribution of this work is extending the coding schema of the 6Ws and put it on an action, develop an interface to view the data of social media separated by the 6Ws. It will begin with just on of the six Ws (Weapons).
- Creator/Author:
- Abdelhalim, Ammar Ahmed
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Depression is a common illness that negatively affects feelings, thoughts and behaviors and can harm regular activities like sleeping. It is a leading cause of disability and many other diseases (Choudhury, et al 2013, Mathur et al, 2016, Watkins et al, 2013). According to WHO (World Health Organization) 1 statistics, more than 300 million people over the world are affected in depression and in each country at least 10% are provided treatment. Poor recognition and treatment of depression may aggravate heart failure symptoms, precipitate functional decline, disrupt social and occupational functioning, and lead to an increased risk of mortality (Cully, et al 2009). Early detection of depression is thus necessary. Unfortunately the rates of detecting and treating depression among those with medical illness are quite low (Egede, 2007). This research proposes a solution of using random forest classifier algorithm to detect and predict detection. A mobile application will be developed in order to collect user data and make prediction.
- Creator/Author:
- Halliday, Nnennaya
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Cloud computing has been one of the major disruptive technology of this century changing the entire face of IT infrastructure across all spectrum. This has led to tremendous development, improvement and cost efficient means of securing IT infrastructures. Virtualization is the backbone driving the numerous cloud solutions and also making them marketable in the pay-as-you-use mechanism for all kind of deployment. This research is focus on improving the security and performance of cloud storage, backup and disaster recovery by evaluating the possibility of eliminating the Recovery Point Objective (RPO) and Recovery Time Objective (RTO). A live synchronization between production and Disaster Recovery (DR) sites is presented. We considered the mechanism behind Virtual Machines (VM) and hypervisor interaction with physical memory on host computers and evaluated the ability of VM to read/write directly to a unified multiple storage locations. Dependencies, requirements and guidelines for implementing this solution would also be analyzed.
- Creator/Author:
- Li, Chengcheng and Efosa, Ogbomo
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Shooting crime is a serious public health problem in the US. The analysis of any historical crime data reveals that crime is non-randomly distributed in time and space. Based on this notion, hot spots policing has gained its momentum to effectively predict future crime locations. Recent studies; however, pointed out that traditional hot spots policing occasionally predict rare crimes such as homicides and shootings due to their less frequent recurring counts in a given place and time (specifically for shorter time periods such as weeks and months). Given this context, we developed a new shooting prediction system (SHOPS) to explore whether recent dynamic/mobility activity patterns of known violent individuals increase the prediction of short-term fatal and non-fatal shootings compared to the traditional hot spots policing. Findings suggest that SHOPS predicts fatal and non-fatal shooting locations more precisely by identifying fewer hotspot locations. Policy implications of the study were discussed in the conclusion section.
- Creator/Author:
- Varlioglu, M. Said and Ozer, Murat
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- The principles of minimalist design are evident in much of the technology we use today. This is especially the case with mobile applications. The most successful of which attempt to minimize the amount of user input needed to provide users with the information they are seeking. Although many mobile applications use data gathered by in-system activity such as a GPS to minimize input from users—some systems require user input, such is the case with roommate matching. This study utilizes the RoomUP mobile application as a testbed to define minimal criteria that can be used to gather user input and produce a compatible roommate match. Participatory design with prospective student users is used to reduce the number of variables and provide recommendations for a minimalistic user interface. The resulting prototype is then used to verify that it meets design goals and supports a satisfactory user experience.
- Creator/Author:
- Maddirala, Sumanth
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- Virtual Reality’s recent commercialization has created a potential for its implementation into classroom and training environments. Past adoptions of this technology and their efficacy are explored in the literature review. This paper outlines the possibility of combining current VR technology with custom hardware allowing the user to interact with physical and mechanical object within virtual worlds and its implication on the future of kinesthetic learning and training in hazardous or expensive scenarios.
- Creator/Author:
- Keller, Ian
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- The healthcare industry is thriving and the abundant amount of data involved raises call for help relating to managing and maintaining them. It becomes a hassle to keep the data in it’s required place and to pull and retrieve whenever necessary. The search for a proper data mining technique to enhance the process is always appreciated and encouraged. Our era is controlled by the upcoming technologies that are fast paced and yield great results. There is always a scope for improvement and optimization. Every individual from every generation has been an avid user of mobile phone and its applications. Healthcare facilities have slowly begun to depend on applications and technologies associated and supported by mobile phones and other networking platforms in order to have everyone within the facility and also the patients who have ties to the facility have access to the information that they are entitled to have.
- Creator/Author:
- Kaushik, Sanjana
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved
- Type:
- Article
- Description/Abstract:
- With the prevalence of anxiety, depression, and stress among young adult populations, adaptive and innovative treatment options must be considered for the future. While there are various approaches to mental health treatment, art therapy is one traditional method that has been used to treat the symptoms of mental health disorders across various health contexts and populations. Some art therapists have even integrated information and communication technologies (ICTs) into their practices. With these factors in mind and considering the prominence of ICTs use among student populations, this study seeks to understand how the immersion and presence afforded by one such technology, virtual reality (VR), can impact the outcomes of art therapy practices. Through the use of an arts-based VR application, Tilt Brush, this study compares traditional art therapy methods as they are employed in and outside of VR. Through the comparison of self-reported measures, we can better understand the possibilities and effectiveness of art therapy practices delivered via Tilt Brush VR.
- Creator/Author:
- Schaaf, Andrea
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- Hypervisor-based hardware virtualization- also known as the first phase of virtualization uses Virtual Machines (VM) to provide better hardware resource utilization and application isolation. A VM provides some level of portability, but still requires a full operating system (OS) with all the binaries and libraries required to run the service it hosts. Therefore, moving an application from a development to a production environment for instance is no different than moving them between two Physical Machines (PM). Container-based virtualization-sometimes known as the next phase of virtualization addresses some of these limitations by providing virtualization at the OS level. Docker is an open source engine launched in 2013 by a company called Docker, Inc. Docker is used to manage the lifecycle of containers. Using containers, it is no longer necessary to dedicate an entire VM to an application in order to provide isolation, thus saving OS license costs. In this project we plan to formulate a generic model that can be used to fine tune a container-based setup for maximum performance benefit.
- Creator/Author:
- Chengcheng Li and Nitin Mathur
- Submitter:
- Jess Kropczynski
- Date Uploaded:
- 05/15/2020
- Date Modified:
- 05/15/2020
- Date Created:
- 2019-04-11
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- The time dilation formulas of both the Special Relativity and General Relativity could be studied using a factor dependent on specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. This mathematical definition of mass is finally compared to the equations that define Dark Matter Annihilation into charged states via loop-level processes.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 12/04/2019
- Date Modified:
- 12/04/2019
- Date Created:
- November 25, 2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- The time dilation formulas of both the Special Relativity and General Relativity could be studied using an expression dependent on specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter Annihilation into charged states via loop-level processes.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 11/30/2019
- Date Modified:
- 11/30/2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- The time dilation formulas of both the Special Relativity and the General Relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter annihilation into charged states via loop-level processes.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 11/20/2019
- Date Modified:
- 11/25/2019
- Date Created:
- November 19, 2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- The time dilation formulas of both the Special Relativity and the General Relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Should such factor be used to define the relativistic mass, the equation that arises is an approximation of the mass and energy relation. An entangled mathematical definition of mass that is finally compared to the equations that define Dark Matter annihilation into charged states via loop-level processes.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 11/20/2019
- Date Modified:
- 11/20/2019
- Date Created:
- November 18, 2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- The time dilation formulas of both the specific relativity and the general relativity could be understood as children of a common expression that uses a factor dependent on the specific energy. Surprisingly when such factor is used to define the relativistic mass, the equation that arises is an extraordinary approximation of the mass and energy relation. An entangled mathematical perspective of both time and mass that opens up again the question of what their definition really is, and which are the factors that modify such variables.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 11/01/2019
- Date Modified:
- 11/01/2019
- Date Created:
- November 1, 2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- A formula has been developed that defines the relativity of time in a novel approach. In the present paper, this is particularized for cases of temporary dilation due to speed and gravity. Using the previous equation, that serves as basis of the theory proposed, an interpretation of the nature of Black Holes, their formation, growth, and dimension can be developed. Which ultimately leads to an alternative understanding of mass and energy.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 10/03/2019
- Date Modified:
- 10/03/2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- A formula has been developed that defines the relativity of time in a novel approach. In the present paper, this is particularized for cases of temporary dilation due to speed and gravity. Using the previous equation, that serves as basis of the “Time Theory” proposed, an interpretation of the nature of black holes, their formation, growth, and dimension can be developed. Which ultimately leads to an alternative understanding of mass and energy.
- Creator/Author:
- Viana, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 09/11/2019
- Date Modified:
- 09/11/2019
- License:
- All rights reserved

- Type:
- Article
- Description/Abstract:
- A new formula has been developed that determines the passage of time. In the paper, this is particularized for cases of temporary dilation due to speed and gravity. Additionally, using the previous equation, an interpretation of the nature of black holes, their formation, growth, and dimension can be developed. Moreover, and based on all of the above, a different way of understanding mass and space is proposed. Which ultimately implies an alternative expression that relates mass and energy.
- Creator/Author:
- Viaña, Javier
- Submitter:
- Javier Viana
- Date Uploaded:
- 09/06/2019
- Date Modified:
- 09/06/2019
- Date Created:
- 2016-06-10
- License:
- All rights reserved
- « Previous
- Next »
- 1
- 2
- 3