3044 Slices
  Title Author Publisher Format Buy Remix
Medium 9781601323101

Exploring and Analyzing Big Data Processing Technology Based on the EMU

Hamid R. Arabnia, Mary Q. Yang, George Jandieri, James J. (Jong Hyuk) Park, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. on Advances in Big Data Analytics | ABDA'14 |

257

Exploring and Analyzing Big Data Processing Technology

Based on the EMU

Qiming Niu 12, Feng Liu 1, Jie Liu 3, and Chun Zhang 1

School of Computer Science, Beijing Jiaotong University, Beijing, China

2

Computing center, Hebei University, Baoding, China

3

Department of Computer Science, Western Oregon University, Monmouth, Oregon, USA

1

Abstract - In the era of big data, the development of the railway industry faces new challenges, and brings new opportunities. Big Data processing technology is a powerful tool to deal with Electric Multiple Unit(EMU) big data analysis. Application of Big Data processing technology is a critical development stage of intelligent EMU. In the process of EMU's operation, repair and maintenance, it generate a large number of heterogeneous, multi-state data. Only the data are effectively dealt with before it can be more quickly to access and manipulate. Therefore, the method of processing data become more and more important. combining the current development situation of EMU, This paper explores and analyses Big Data processing technology based on EMU.

See All Chapters
Medium 9781601323132

The Significance of the Race Factor in Breast Cancer Prognosis

Robert Stahlbock, Gary M. Weiss, Mahmoud Abou-Nasr, Hamid R. Arabnia CSREA Press PDF

Int'l Conf. Data Mining | DMIN'14 |

55

The Significance of the Race Factor in Breast

Cancer Prognosis

M. Mehdi Owrang O.

Department of Computer Science, American University, Washington, D.C, USA

Abstract - In this work, we looked at the significance of the race factor in breast cancer prognosis, using

Association rules data mining technique. We utilized

XLMiner data mining tool for our experiments. The data used is the National Cancer Institute’s SEER Public-Use

Data. Several experiments were conducted based on the prognostic factors including those of Age, Behavior code,

Stage of cancer, Grade, and Marital status with respect to

Race. Our discovered association rules indicate that

Japanese patients have better survival rate than White patients and White //patients have better survival rate than Black patients.

Keywords: Data Mining, Association Rules, Breast

Cancer Prognosis,

1 Introduction

Breast cancer is a malignant cancer causing tumor that begins when cells in the breast tissue grow abnormally, without managing cell division and cell death rates.

See All Chapters
Medium 9781601322609

Scaffolding the Software Design Process: Fine-Grained Specifications from Design Tactics

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Vince Schmidt, Ashu M.G. Solo, Fernando G. Tinetti CSREA Press PDF

144

Int'l Conf. Software Eng. Research and Practice | SERP'13 |

Scaffolding the Software Design Process: Fine-Grained

Specifications from Design Tactics

A. Ejnioui1, C. E. Otero1, and A. A. Qureshi2

Dept. of Information Technology, University of South Florida, Lakeland, Florida, USA

2

Dept. of Mathematics and Computer Science, University of Virginia’s College at Wise, Wise, Virginia, USA

1

Abstract–Software projects define requirements to describe what the system does. In some cases, these requirements are not available. Instead, customers demand that the system meet specific quality goals. Experience shows that domain experts use design tactics to meet quality goals for several application domains. Because most engineers are not domain experts, they may experience difficulties in understanding and implementing these tactics as effective solutions to design problems related to quality attributes. In these situations, a significant amount of trial-and-error work takes place during design to ensure a particular goal is met. In some cases, this valuable knowledge can be lost throughout the life cycle or hard to reuse in future projects. This paper proposes a twostep approach in which fine-grained specifications can be extracted from design tactics. To address this problem, design tactics are modeled as activity diagrams. The Unified

See All Chapters
Medium 9781601323286

Environment for Requirements Elicitation Supported by Ontology-Based Conceptual Models: A Proposal

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

144

Int'l Conf. Software Eng. Research and Practice | SERP'14 |

Environment for Requirements Elicitation Supported by

Ontology-Based Conceptual Models: A Proposal

J. Valaski, S. Reinehr, and A. Malucelli

PPGIa, Pontifícia Universidade Católica do Paraná, Curitiba, Paraná, Brazil

Abstract - Requirements Elicitation is a Requirements

Engineering activity that aids understanding of the customer’s needs. The lack of understanding of the problem domain, the poor communications among stakeholders and a lack of consensus regarding the use of terms, are some of the main challenges of this activity. Ontologies are a type of formalism that can be applied to aid understanding and reach a consensus in a knowledge domain. In this context, the goal of this study is to present a proposal for an environment that supports requirements elicitation from the early stages, when communications are more informal, to the point where a list of software requirements is obtained. This environment will be supported by natural language processing techniques and ontology-based conceptual model represented in OntoUML.

See All Chapters
Medium 9781601322401

Android Exchange (AEx): AVirtual Community for Students on eTeams

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

47

Android Exchange (AEx):

A Virtual Community for Students on eTeams

R. Shankar1, F. McAfee2, M. Harris3, J. Folkes4, and R. Behara5

1

Department of CEECS, College of Engineering, Florida Atlantic University, Boca Raton, FL, USA

2

SCMS, College of Arts and Letters, Florida Atlantic University, Davie, FL, USA

3

Anthropology, College of Arts and Letters, Florida Atlantic University, Boca Raton, FL, USA

4

Center for eLearning, Academic Affairs, Florida Atlantic University, Boca Raton, FL, USA

5

ITOM, College of Business, Florida Atlantic University, Boca Raton, FL, USA

Abstract - A group of faculty members from engineering, arts, anthropology, and business have jointly taught courses (for 3 years) on smart phone

App development to undergraduate students. The students with academic background in these disciplines have come together to form teams and to develop unique smart phone Apps. Industry professionals from these disciplines evaluate these projects. An eLearning version of the joint course was taught recently. Android Exchange (AEx), a virtual community environment, is proposed here to build on that experience and on existing social and professional networks to connect participants with peers, mentors, professionals, and businesses for mutual benefits of learning, collaboration and jobs.

See All Chapters
Medium 9781601322470

A Grey Prediction Based TOPSIS Decision Making for Product Form Design

Hamid R. Arabnia, David de la Fuente Elena B. Kozerenko, Peter M. LaMonica Raymond A. Liuzzi, Todd Waskiewicz, George Jandieri, Ashu M. G. Solo, Ivan Nunes da Silva, Fernando G. Tinetti, and Fadi Thabtah CSREA Press PDF

782

Int'l Conf. Artificial Intelligence | ICAI'13 |

A Grey Prediction Based TOPSIS Decision Making for

Product Form Design

Yang-Cheng Lin

Department of Arts and Design, National Dong Hwa University, 974, Hualien, Taiwan

Abstract – The grey prediction (GP) has been developed to examine the relationship among factors with the uncertain and incomplete information. In addition, the technique for order preference by similarity to ideal solution (TOPSIS) has been highlighted by its wide use in multi-attribute decision making (MADM). As such, this paper is based on the process of kansei engineering in conjunction with GP and TOPSIS.

Three GP models are used a basis to build a GP-based

TOPSIS decision support database, which helps product designers obtain the optimal design alternatives that best meet consumers’ preferences for a new characteristic toy design.

This approach provides an effective mechanism for facilitating the process of the new product form design.

Keywords: Product Form Design; TOPSIS; Grey Prediction;

See All Chapters
Medium 9781601322432

Integrating Games Into the Computer Science Curriculum: From General Education to the Graduate Level

Hamid R. Arabnia, Azita Bahrami, Victor A. Clincy, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

321

INTEGRATING GAMES INTO THE COMPUTER

SCIENCE CURRICULUM: FROM GENERAL

EDUCATION TO THE GRADUATE LEVEL

Robert E. Marmelstein, Eun-Joo Lee

Department of Computer Science,

East Stroudsburg University

East Stroudsburg, Pennsylvania, USA

ABSTRACT - The use of game-based projects in the computer science curriculum has the potential to make the teaching of numerous computing courses more effective and interesting. In this paper, approaches are presented for using computer games to teach computer science at different educational stages: from general education through the graduate level. In each case, we examine how the game project supports the goals of the course. Potential pitfalls and lessons learned from these teaching experiences are also addressed.

x

KEY WORDS - Computer Games, Artificial Intelligence,

Computer Science Education and Curriculum

x

I.

Why Teach Computer Games?

For many of us, teaching computer game programming is not just a pedagogical exercise—it’s also personal because we love recreating the games we play. Likewise, many students become motivated to become computer scientist as a result of the computer games they play as children and teenagers. Beyond the challenge of playing the game, the underlying technology that makes these games work fascinates many students. In short, playing these games provides the motivation to learn how to program them. While most students may never become professional game programmers, it’s important for computer science educators to appreciate the power of the computer game as a mechanism for teaching many facets of the discipline. The following bullets illustrate the rationale for this assertion: x x

See All Chapters
Medium 9781601322517

Kukulcan: Semantic Web Framework for Knowledge Management in the Domain of Digital Circuits

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, Joan Lu, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

8

Int'l Conf. Information and Knowledge Engineering | IKE'13 |

Kukulcan: Semantic Web Framework for Knowledge Management in the

Domain of Digital Circuits

F. Edgar Castillo-Barrera1 , R. Carolina Medina-Ram´ırez2 ,

J. Emilio Labra Gayo3 , and S. Masoud Sadjadi4

1

School of Engineering, Universidad Aut´onoma de San Luis Potos´ı, San Luis Potos´ı, M´exico

2

Department of Electrical Engineering, Universidad Aut´onoma Metropolitana, Distrito Federal, M´exico

3

Department of Computer Science, Universidad de Oviedo, Espa˜na

4

School of Computing and Information Sciences, Florida International University (FIU), Miami, USA

Abstract

In recent years Ontologies have boomed as artifacts to represent a domain and they are considered an important key to the success of the Semantic Web. Thus, Humans and

Machines would be able to understand and share information on the Web which are also important in the context of Knowledge Management. Although the study of the relation between Ontologies and Knowledge Management is not new and this is applied in Knowledge Engineering, Semantic Web Techniques such as Reasoners and Ontology queries have been recently studied and applied. A Framework based on Semantic Web Techniques can give more options for sharing, increasing, reusing, and capitalizing the knowledge in organizations and companies. In digital circuits domain, a Semantic Web Framework can be employed for teaching logic gates (and, or, not, xor, etc.), and this approach has been deemed as an effective way for capturing and using the knowledge of the logic gates on assembling circuit systems. This knowledge can be reused by new developers gaining time and reducing circuits manufacturing costs. In addition, the correct assembling among logic gates and the right output of a circuit can be validated by using semantic techniques. In this paper, we describe a semantic web framework based on a core ontology, a Pellet reasoner and SPARQL queries for Knowledge Management based on the domain of digital circuits. We use an example and a prototype called Kukulcan to explain our approach.

See All Chapters
Medium 9781601322401

Understanding usage behaviors in social network service site -- A study using well-being model and self-determination theory

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

302

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

Understanding usage behaviors in social network service site -A study using well-being model and self-determination theory

Nai-Ching Yeh and Judy Chuan-Chuan Lin*

Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan, R.O.C. cherishyeh@gmail.com

Department of Computer Science and Information Management, Soochow University, Taipei, Taiwan, R.O.C. jclin@csim.scu.edu.tw (* Corresponding Author)

Abstract— The purpose of this study is to explore the predictors of continuance intention towards social networking sites. Based on well-being model and self-determination theory, we proposed the effects of enjoyment, well-being, autonomy, relatedness, and competence on individuals’ intention to continuously participate in social networking sites. Preliminary

Data were collected from Facebook. Results showed the significant influences of well-being on enjoyment, while autonomy, relatedness, and competence are important factors stimulating individuals’ well-being. The results also indicated that enjoyment, autonomy, relatedness, and competence are important factors stimulating individuals’ continued intention in a social networking site, whereas well-being affects continuance intention mediating by enjoyment with indirect influence.

See All Chapters
Medium 9781601322548

LBP-based Hierarchical Sparse Patch Learning for Face Recognition

Hamid R. Arabnia, Leonidas Deligiannidis, Joan Lu, Fernando G. Tinetti, Jane You, George Jandieri, Gerald Schaefer, Ashu M. G. Solo, Vladimir Volkov CSREA Press PDF

860

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'13 |

LBP-based Hierarchical Sparse Patch Learning for Face

Recognition

Yue Zhao1 , and Jianbo Su1

1 Department of Automation, Shanghai Jiao Tong University, and Key Laboratory of System Control and Information Processing,

Ministry of Education, Shanghai, 200240, China

Abstract— Local Binary Pattern (LBP) features and its variants are computed on the patches with the fixed positions and a fixed size in images, while the limited variety of the size and position cannot accurately measure the nature of face image. In this paper, we propose a new learning method, Hierarchical Sparse Patch Learning (HSPL), to select face patches with different positions and sizes for face recognition. HSPL employs a sparse learning model to hierarchically select patches at two levels: in level 1 the optimal patch candidates are figured out, while in level 2 the optimal patches from the candidates are obtained. LBP features are extracted from the optimal patches to recognize faces. Experimental results show that the proposed method is more efficient and achieves higher recognition rate than the other two compared methods.

See All Chapters
Medium 9781601323101

Lessons Learned: Building a Big Data Research and Education Infrastructure

Hamid R. Arabnia, Mary Q. Yang, George Jandieri, James J. (Jong Hyuk) Park, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. on Advances in Big Data Analytics | ABDA'14 |

209

Lessons Learned: Building a Big Data Research and

Education Infrastructure

G. Hsieh, R. Sye, S. Vincent and W. Hendricks

Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA

[ghsieh, wthendricks]@nsu.edu, [r.sye, s.m.vincent]@spartans.nsu.edu

Abstract – Big data is an emerging technology which has been growing and evolving rapidly in related research, development, and applications. It is used by major corporations and government agencies to store, process, and analyze huge volumes and variety of data. The open source Apache Hadoop platform and related tools are becoming the de facto industry standard for big data solutions. It is a very powerful, flexible, efficient, and feature-rich framework for reliable, scalable, distributed computation using clusters of commodity hardware. On the other hand, Hadoop and its ecosystem are very complex and they change rapidly with new releases, features, packages, and tools. They are also relatively new, and thus lack adequate documentation and broad user experience base that come with mature products. Hence, it is very challenging to learn, install, configure, operate, and manage Hadoop systems, especially for smaller organizations and educational institutions without plenty of resources. In this paper, we describe our experiences and lessons learned in our efforts to build up a big data infrastructure and knowledge base in our university during the past nine months, using a variety of environments and resources, along with an incremental and iterative learning and implementation approach. In addition, we discuss the plan being implemented to enhance the infrastructure to provide enterprise-class capabilities by the end of 2014.

See All Chapters
Medium 9781576752500

Opportunities: They’re Still Knocking

Beverly Kaye Berrett-Koehler Publishers ePub

I left for a better opportunity.

—Said in thousands of exit interviews

Sometimes people say it on their way out the door just because they don’t want to burn bridges. In other cases it’s the truth—they leave in search of opportunities. They want to learn new skills, take on more responsibility, use cutting-edge technologies, or have other (or more) career options.

Many of their managers say, “We could have offered that. Why didn’t he/she tell me?” Yes, most managers could have asked their talented people what opportunities they wanted, but most employees who left also could have spoken up and asked for what they wanted. If they had, they might have found just what they were looking for, right where they were.

To uncover opportunities in your organization, tell someone you are looking for them!

Try this quick quiz to see how opportunity minded you are. How descriptive is each statement of you? Answer yes, somewhat, or no to each.99

If you answered yes to most of these questions, you are already opportunity minded and should find it easy to keep aware of favorable opportunities within the organization. If you answered somewhat or no to more than half of the questions, you may be “inert” or blind to available or potential opportunities right where you are.100

See All Chapters
Medium 9781601323279

Detecting the Vulnerability of Multi-Party Authorization Protocols to Name Matching Attacks

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

76

Int'l Conf. Security and Management | SAM'14 |

Detecting the Vulnerability of Multi-Party

Authorization Protocols to Name Matching Attacks

Wenjie Lin (Contact Author)∗ , Guoxing Chen∗ , Ten H. Lai∗ , David Lee†

∗ Ohio

State University, 2015 Neil Ave, Columbus, OH

Labs, 1501 Page Mill Road, Palo Alto, CA

{linw, chenguo, lai}@cse.ohio-state.edu {david.lee10}@hp.com

† HP

Abstract—Software as a Service (SaaS) clouds cooperate to provide services, which often provoke multi-party authorization.

The multi-party authorization suffers the so-called name matching attacks where involved parties misinterpret the other parties in the authorization, thus leading to undesired or even fatal consequences (e.g., an adversary can shop for free or can log into a victim’s Facebook account).

In this paper, we propose a scheme to detect the vulnerability of multi-party authorization protocols that are susceptible to name matching attacks. We implement the detecting scheme and apply it to real world multi-party authorization protocols including Alipay PeerPay, Amazon FPS Marketplace, and PayPal

See All Chapters
Medium 9788131805220

ALLC10-1

Manish Goyal Laxmi Publications PDF

10

Curve-Fitting, Cubic

Spline and Approximation

10.1. CURVE FITTING

Let there be two variables x and y which give us a set of n pairs of numerical values

(x1, y1), (x2, y2).......(xn, yn). In order to have an approximate idea about the relationship of these two variables, we plot these n paired points on a graph thus, we get a diagram showing the simultaneous variation in values of both the variables called scatter or dot diagram. From scatter diagram, we get only an approximate non-mathematical relation between two variables.

Curve fitting means an exact relationship between two variables by algebraic equations, infact this relationship is the equation of the curve. Therefore, curve fitting means to form an equation of the curve from the given data. Curve fitting is considered of immense importance both from the point of view of theoretical and practical statistics.

Theoretically, it is useful in the study of correlation and regression. Practically, it enables us to represent the relationship between two variables by simple algebraic expressions e.g., polynomials, exponential or logarithmic functions.

See All Chapters
Medium 9781601323293

The Use of Semantic-based Suggestions for Web Service Composition

Hamid R. Arabnia, Leonidas Deligiannidis, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

38

Int'l Conf. Semantic Web and Web Services | SWWS'14 |

The Use of Semantic-based Suggestions for Web Service Composition

Diogo Phelipe Busanello da Silva and Frank Siqueira

Department of Informatics and Statistics, Federal University of Santa Catarina

Florianópolis, Santa Catarina, Brazil

Abstract - The creation of complex SOA applications requires multiple services to be combined. Building service compositions, though, requires analyzing if inputs and outputs of composed services are compatible, and this is a costly task to be done manually. The semantic description of Web

Services using ontology concepts to describe the provided operations, inputs and outputs, is able to facilitate the service composition process. This paper describes a mechanism that helps the user to build a service composition, providing service recommendations based on the semantic description of

Web services. The semantic service suggestion mechanism is integrated with a composition tool, called CVFlow, in order to provide a complete support for composition developers.

See All Chapters

Load more